Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
Blockchain for Healthcare Systems: Challenges, Privacy, and Securing of Data provides a detailed insight on how to reap the benefits of blockchain technology in healthcare, as the healthcare sector faces several challenges associated with privacy and security issues.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
This book is written for the first security hire in an organization, either an individual moving into this role from within the organization or hired into the role.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
It is becoming increasingly important to design and develop adaptive, robust, scalable, reliable, security and privacy mechanisms for IoT applications and for Industry 4.
As cyber threat actors have become more sophisticated, data breaches, phishing attacks, and ransomware are increasing, and the global cybercrime damage in 2021 was $16.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology by looking at subjects and experiences the average person will have come into contact with in their life.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain.
The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain.
The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes.
The Home in the Digital Age is a set of multidisciplinary studies exploring the impact of digital technologies in the home, with a shift of emphasis from technology to the people living and using this in their homes.
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services.
Most applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house environments, Cloud applications, public web sites, scientific experiments and simulations, data warehouse, monitoring platforms, and e-government services.
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.
Focused on the latest mobile technologies, this book addresses specific features (such as IoT) and their adoptions that aim to enable excellence in business in Industry 4.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent.
Internet of Things (IoT) is an ecosystem comprised of heterogeneous connected devices that communicate to deliver capabilities making our living, cities, transport, energy, and other areas more intelligent.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security.
Cyber-Security Threats, Actors, and Dynamic Mitigation provides both a technical and state-of-the-art perspective as well as a systematic overview of the recent advances in different facets of cyber-security.
The book aims to showcase the basics of both IoT and Blockchain for beginners as well as their integration and challenge discussions for existing practitioner.
The book aims to showcase the basics of both IoT and Blockchain for beginners as well as their integration and challenge discussions for existing practitioner.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy.
As the 2020 global lockdown became a universal strategy to control the COVID-19 pandemic, social distancing triggered a massive reliance on online and cyberspace alternatives and switched the world to the digital economy.
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts.