Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sorts of challenges digital humanists face in making their work accessible and useful.
With the recent debacle of cryptocurrency exchange FTX and the crypto trading company Alameda Research, the importance of comprehending the security and regulations of Web3, cryptocurrency, and blockchain projects has been magnified.
Learn blockchain in a simple, non-tech way and explore the different emerging technologies that open a world of opportunities in the space of tourism and hospitality.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.
Wenn Sie neugierig auf die Grundlagen der künstlichen Intelligenz, der Blockchain-Technologie und des Quantencomputings sind, die für die digitale Transformation und Innovation von entscheidender Bedeutung sind, ist Digital Fluency Ihr praktischer Leitfaden.
This book addresses the legal feasibility of ethnic data collection and positive action for equality and anti-discrimination purposes, and considers how they could be used to promote the Roma minority's inclusion in Europe.
This book provides a concise overview of the current state of the art in cybersecurity and shares novel and exciting ideas and techniques, along with specific cases demonstrating their practical application.
Professionelle Hackerangriffe (sogenannte Advanced Persistent Threats) treffen heutzutage Regierungen, Unternehmen und sogar kritische Infrastrukturen wie Flughäfen oder Stromnetzbetreiber.
Using both a theoretical argumentation and an empirical investigation, this book rationalizes the view that in order to understand people's privacy perceptions and behaviors, a situational perspective needs to be adopted.
The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills.
Electronic information networks offer extraordinary advantages to business, government, and individuals in terms of power, capacity, speed, accessibility, and cost.
Tools and technologies have long complemented and extended our physical abilities: from pre-historic spearheads to steam-propelled ploughs and high-tech prosthetics.
Cybersecurity and Data Science Innovations for Sustainable Development of HEICC: Healthcare, Education, Industry, Cities, and Communities brings together a collection of chapters that explore the intersection of cybersecurity, data science, and sustainable development across key sectors: healthcare, education, industry, cities, and communities.
In a world increasingly driven by technology, this book explores the intersection of artificial intelligence (AI), IoT, and Cloud Computing and women's safety, highlighting the transformative potential of technology in safeguarding women's well-being in the physical and the digital world.
The rapid proliferation of smart devices has transformed our lives and industries, but it has also created a complex and evolving cyber threat landscape.
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital assets and mitigating evolving cyber threats.