In an era where advanced technology plays a critical role in maintaining national security, Artificial Intelligence for Military Applications with Blockchain investigates how combining AI and blockchain could transform military operations.
The Information Security Management Handbook continues its tradition of consistently communicating the fundamental concepts of security needed to be a true CISSP.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security.
The Routledge Handbook of International Cybersecurity examines the development and use of information and communication technologies (ICTs) from the perspective of international peace and security.
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources.
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources.
"e;The Biometric Computing: Recognition & Registration"e; presents introduction of biometrics along with detailed analysis for identification and recognition methods.
"e;The Biometric Computing: Recognition & Registration"e; presents introduction of biometrics along with detailed analysis for identification and recognition methods.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs).
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs).
On the back of their last book, Cyber-risk and Youth, and building on a new research project, Adorjan and Ricciardelli marshal current research to explore parenting in the digital age.
From AI ethics and cybersecurity to augmented realities, virtual interfaces, and much more, Futureshock provides an accessible introduction to the leading edge topics of today.
The book demonstrates that the solutions to security in information systems are to be found through adopting appropriate management strategies and mechanisms, rather than merely seeking technical solutions.
A report offering a review of existing intellectual property protection for computer softwear, protection of copyright, patents and trade secrets, a statement of current problems and the extent to which US legislature might solve them, and the view of industry and others in the computer community.
Focuses mainly on communications and communication standards with emphasis also on risk analysis, ITSEC, EFT and EDI with numerous named viruses described.
This book aims to demonstrate the use of business driven risk assessments to address government regulations and guidelines specific to the management of risks related to all third party arrangements and emphasises that organisations retain accountability for business activities, functions and services outsourced to a third party.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.
This study, written in the context of its first publication in 1970, discusses and documents the invasion of privacy by the corporation and the social institution in the search for efficiency in information processing.
This book introduces the prevailing domains of recommender systems and cross-device federated learning, highlighting the latest research progress and prospects regarding cross-device federated recommendation.
Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches.
As organizations grow increasingly complex and unpredictable, the topic of proactivity at work has become of great importance for contemporary workplaces.
As organizations grow increasingly complex and unpredictable, the topic of proactivity at work has become of great importance for contemporary workplaces.
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security work in the US and around the world.
This new volume, edited by industrial and organizational psychologists, will look at the important topic of cyber security work in the US and around the world.
The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways.
The emergence of the World Wide Web, smartphones, and computers has transformed the world and enabled individuals to engage in crimes in a multitude of new ways.