This review was interesting, but I haven't yet laid hands on a copy of the book. What do those who've read the book think? Is it more convincing in defense of traditional conceptual analysis than the review suggests? Signed comments preferred.
Cyber security professional here -reliably determining when a computational artifact (file, etc.) was created is *hard*. This is sorta why…




Leave a Reply