Deep Learning for Multimedia Processing Applications is a comprehensive guide that explores the revolutionary impact of deep learning techniques in the field of multimedia processing.
This edited collection brings in multiple scholarly perspectives to examine the impact of the pandemic and resulting government policies, especially lockdowns, on one particular cultural sphere: games.
When you think of 'gambling' you might think of Vegas casinos, betting shops and football flutters but the risk of gambling is embedded in numerous corners of popular culture that many of us consume.
This edited collection brings in multiple scholarly perspectives to examine the impact of the pandemic and resulting government policies, especially lockdowns, on one particular cultural sphere: games.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
This book sheds light on the cyber security challenges associated with nextgeneration computing technologies, emphasizing the serious threats posed to individuals, businesses, and nations.
Take your penetration testing career to the next level by discovering how to set up and exploit cost-effective hacking lab environments on AWS, Azure, and GCPKey FeaturesExplore strategies for managing the complexity, cost, and security of running labs in the cloudUnlock the power of infrastructure as code and generative AI when building complex lab environmentsLearn how to build pentesting labs that mimic modern environments on AWS, Azure, and GCPPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionThe significant increase in the number of cloud-related threats and issues has led to a surge in the demand for cloud security professionals.
The connected world paradigm effectuated through the proliferation of mobile devices, Internet of Things (IoT), and the metaverse will offer novel services in the coming years that need anytime, anywhere, high-speed access.
Essential reading for anyone who has to work with social media in a professional capacity, from using networking sites to marketing their businesses or employers.
Essential reading for anyone who has to work with social media in a professional capacity, from using networking sites to marketing their businesses or employers.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
The Cloud is fast becoming the de facto standard for businesses in Corporate America today, with Microsoft Azure being one of the most widely used systems.
Told through the diverse and fascinating careers of nine streamers, this is a ';timely and insightful dive into the players and politics of one of the twenty-first century's most influential modes of media' (Brian Merchant, author of Blood in the Machine), examining how Twitch has revolutionized technology, entertainment, business, and pop culture.
Digital Humanities and Laboratories explores laboratories dedicated to the study of digital humanities (DH) in a global context and contributes to the expanding body of knowledge about situated DH knowledge production.
This academic analysis explores social media, specifically examining its influence on the cultural, political, and economic organization of our society and the role capitalism plays within its domain.
Focusing on the user experience of online search, this book explores the complex design at play and the ways social media platforms, websites, and other online interfaces have been created to provide information.
Revised and updated to address shifts in the climate of bullying in schools and online, this timely work suggests anti-bullying approaches that are concrete, practical, and grounded in research.
Dieses Buch ist kein gewöhnlicher Trading-Guide – es ist dein persönlicher Fahrplan, um Trading wirklich zu meistern und dabei deine eigene Entwicklung voranzutreiben.
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities.
Understand psychology-driven social engineering, arm yourself with potent strategies, and mitigate threats to your organization and personal data with this all-encompassing guideKey FeaturesGain insights into the open source intelligence (OSINT) methods used by attackers to harvest dataUnderstand the evolving implications of social engineering on social networksImplement effective defensive strategies to mitigate the probability and impact of social engineering attacksPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionSocial engineering is one of the most prevalent methods used by attackers to steal data and resources from individuals, companies, and even government entities.
Revised and updated to address shifts in the climate of bullying in schools and online, this timely work suggests anti-bullying approaches that are concrete, practical, and grounded in research.