Digital government consists in the purposeful use of information and communication technologies (ICT), in particular the internet, to transform the relationship between government and society in a positive manner.
The Internet of Things as an emerging global Internet-based information archit- ture facilitating the exchange of goods and services is gradually developing.
Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent.
AI Forensics provides a comprehensive framework for investigating artificial intelligence systems when they fail, cause harm, or become subjects of legal or regulatory scrutiny.
This book provides a novel framework for adapting tort law to the challenges of artificial intelligence (AI) in all of its forms-from machine learning to generative models to autonomous and agentic systems.
This book provides a novel framework for adapting tort law to the challenges of artificial intelligence (AI) in all of its forms-from machine learning to generative models to autonomous and agentic systems.
Undeniably widespread and powerful as it is, the Internet is not almighty: it can reach as high as the skies (cloud computing), but it cannot escape competition.
AI Forensics provides a comprehensive framework for investigating artificial intelligence systems when they fail, cause harm, or become subjects of legal or regulatory scrutiny.
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 October 2002, in Noordwijkerhout, The Netherlands.
The EGOV Conference Series intends to assess the state of the art in e-Gove- ment and to provide guidance for research and development in this fast-moving ?
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.
Computer Science Why is a book that presents a straightforward, curiosity based approach to filling in the blanks around common, introductory material taught in Computer Science (CS) classes.
For years, cyber security was the 'poor relation' in many boardrooms: treated as inferior to other priorities, seen as an irritating cost centre and assumed to be money that could be spent 'better' elsewhere.
Computer Science Why is a book that presents a straightforward, curiosity based approach to filling in the blanks around common, introductory material taught in Computer Science (CS) classes.
CyberSentinel+: An Advanced Hybrid Honeypot Intrusion Detection System Augmented with Big Data Analytics and Machine Learning Intelligence is a fascinating look at the invisible fight going on under our networked lives.
For years, cyber security was the 'poor relation' in many boardrooms: treated as inferior to other priorities, seen as an irritating cost centre and assumed to be money that could be spent 'better' elsewhere.
In an era where cyber threats evolve faster than traditional defenses can adapt, the need for a paradigm shift in cybersecurity auditing has never been more urgent.
CyberSentinel+: An Advanced Hybrid Honeypot Intrusion Detection System Augmented with Big Data Analytics and Machine Learning Intelligence is a fascinating look at the invisible fight going on under our networked lives.
In an era where cyber threats evolve faster than traditional defenses can adapt, the need for a paradigm shift in cybersecurity auditing has never been more urgent.
In a world where machines learn, evolve, and sometimes outthink us, Artificial Intelligence and Safety offers a rare, integrated lens into both the power and peril of intelligent systems.
In a world where machines learn, evolve, and sometimes outthink us, Artificial Intelligence and Safety offers a rare, integrated lens into both the power and peril of intelligent systems.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
For the first time in history, the most powerful artificial intelligence (AI) works through language itself: The same medium humans use to think and communicate.
For the first time in history, the most powerful artificial intelligence (AI) works through language itself: The same medium humans use to think and communicate.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
This book constitutes the refereed post-conference proceedings of the 23rd International Conference on Information Security, ISSA 2024, held in Gqeberha, South Africa, during December 2-3, 2024.
Enterprising the Internet has been a process over the past years and while this book does not set judgement, it does call for a moment of pause and reflection on the impact of these technologies to individuals.