This book offers a timely and in-depth analysis of how Non-Fungible Tokens (NFTs) and metaverse technologies are reshaping key legal concepts and regulatory frameworks in the digital age.
This book offers a timely and in-depth analysis of how Non-Fungible Tokens (NFTs) and metaverse technologies are reshaping key legal concepts and regulatory frameworks in the digital age.
Digital government consists in the purposeful use of information and communication technologies (ICT), in particular the internet, to transform the relationship between government and society in a positive manner.
The Internet of Things as an emerging global Internet-based information archit- ture facilitating the exchange of goods and services is gradually developing.
Patent laws are different in many countries, and inventors are sometimes at a loss to understand which basic requirements should be satisfied if an invention is to be granted a patent.
AI Forensics provides a comprehensive framework for investigating artificial intelligence systems when they fail, cause harm, or become subjects of legal or regulatory scrutiny.
This book provides a novel framework for adapting tort law to the challenges of artificial intelligence (AI) in all of its forms-from machine learning to generative models to autonomous and agentic systems.
This book provides a novel framework for adapting tort law to the challenges of artificial intelligence (AI) in all of its forms-from machine learning to generative models to autonomous and agentic systems.
Undeniably widespread and powerful as it is, the Internet is not almighty: it can reach as high as the skies (cloud computing), but it cannot escape competition.
The Medical Internet of Things (MIoT) has redefined healthcare by interconnecting devices, systems, and applications to monitor, analyze, and manage patient data in real time.
The Medical Internet of Things (MIoT) has redefined healthcare by interconnecting devices, systems, and applications to monitor, analyze, and manage patient data in real time.
AI Forensics provides a comprehensive framework for investigating artificial intelligence systems when they fail, cause harm, or become subjects of legal or regulatory scrutiny.
These post-proceedings contain 27 papers that were accepted for presentation at the Fifth International Workshop on Information Hiding, held 7-9 October 2002, in Noordwijkerhout, The Netherlands.
The EGOV Conference Series intends to assess the state of the art in e-Gove- ment and to provide guidance for research and development in this fast-moving ?
This book constitutes the thoroughly refereed post-proceedings of the Second International Workshop on Digital Rights Management, DRM 2002, held in Washington, DC, USA, in November 2002, in conjunction with ACM CCS-9.
Computer Science Why is a book that presents a straightforward, curiosity based approach to filling in the blanks around common, introductory material taught in Computer Science (CS) classes.
For years, cyber security was the 'poor relation' in many boardrooms: treated as inferior to other priorities, seen as an irritating cost centre and assumed to be money that could be spent 'better' elsewhere.
Computer Science Why is a book that presents a straightforward, curiosity based approach to filling in the blanks around common, introductory material taught in Computer Science (CS) classes.
CyberSentinel+: An Advanced Hybrid Honeypot Intrusion Detection System Augmented with Big Data Analytics and Machine Learning Intelligence is a fascinating look at the invisible fight going on under our networked lives.
For years, cyber security was the 'poor relation' in many boardrooms: treated as inferior to other priorities, seen as an irritating cost centre and assumed to be money that could be spent 'better' elsewhere.
In an era where cyber threats evolve faster than traditional defenses can adapt, the need for a paradigm shift in cybersecurity auditing has never been more urgent.
CyberSentinel+: An Advanced Hybrid Honeypot Intrusion Detection System Augmented with Big Data Analytics and Machine Learning Intelligence is a fascinating look at the invisible fight going on under our networked lives.
In an era where cyber threats evolve faster than traditional defenses can adapt, the need for a paradigm shift in cybersecurity auditing has never been more urgent.
In a world where machines learn, evolve, and sometimes outthink us, Artificial Intelligence and Safety offers a rare, integrated lens into both the power and peril of intelligent systems.
In a world where machines learn, evolve, and sometimes outthink us, Artificial Intelligence and Safety offers a rare, integrated lens into both the power and peril of intelligent systems.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.
This book is an in-depth exploration of the mysterious and complex realm of the Dark Web, Dark AI Tools, and offensive security use cases offering readers a comprehensive understanding of its history, structure, and the illicit activities that transpire within its hidden corridors using Dark Web-AI-Offensive tactics.