Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
Leading technology scholars examine how networks powered by algorithms are transforming humanity, posing deep questions about power, freedom, and fairness.
Artificial intelligence (AI), machine learning, and advanced electronic circuits involve learning from every data input and using those inputs to generate new rules for future business analytics.
This book focuses on artificial intelligence (AI) and machine learning (ML) technologies and how they are progressively being incorporated into a wide range of products, including consumer gadgets, "e;smart"e; personal assistants, cutting-edge medical diagnostic systems, and quantum computing systems.
This study allows readers to get to grips with the conceptual tools and practical techniques for building robust machine learning in the face of adversaries.
This study allows readers to get to grips with the conceptual tools and practical techniques for building robust machine learning in the face of adversaries.
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
A practical guide to establishing a risk-based, business-focused information security program to ensure organizational successKey FeaturesFocus on business alignment, engagement, and support using risk-based methodologiesEstablish organizational communication and collaboration emphasizing a culture of securityImplement information security program, cybersecurity hygiene, and architectural and engineering best practicesPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionInformation Security Handbook is a practical guide that'll empower you to take effective actions in securing your organization's assets.
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML).
Integration of AI-Based Manufacturing and Industrial Engineering Systems with the Internet of Things describes how AI techniques, such as deep learning, cognitive computing, and Machine Learning, can be used to analyze massive volumes of data produced by IoT devices in manufacturing environments.
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN's Sustainable Development Goals where universal accessibility to ICTs remains a serious concern.
5G, the emerging technology in mobile communication, is expected to deliver an important and decisive impact on several of the UN's Sustainable Development Goals where universal accessibility to ICTs remains a serious concern.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.