The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
The importance of businesses being 'operationally resilient' is becoming increasingly important, and a driving force behind whether an organization can ensure that its valuable business operations can 'bounce back' from or manage to evade impactful occurrences is its security risk management capabilities.
Occupational Health and Safety has been a growth industry for several decades and has moved beyond the realm of the human resource department and workers' compensation claims.
Occupational Health and Safety has been a growth industry for several decades and has moved beyond the realm of the human resource department and workers' compensation claims.
This collection of essays explores the present and future of digital communication through a range of interdisciplinary approaches, all of which focus on the so-called metaverse.
This collection of essays explores the present and future of digital communication through a range of interdisciplinary approaches, all of which focus on the so-called metaverse.
Digital transformation has become more than a buzzword from the media since companies figured out the importance of rethinking business processes during global challenges.
The Disputed Freedoms of a Disrupted Press explores the origins, connections, and contradictions evident amongst divergent understandings of press freedom around the world.
The Disputed Freedoms of a Disrupted Press explores the origins, connections, and contradictions evident amongst divergent understandings of press freedom around the world.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Security implementation is crucial in the Internet of Medical Things (IoMT) as it ensures the protection of sensitive medical data and prevents unauthorized access to or manipulation of devices and systems.
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
Against the backdrop of high Internet penetration and smartphone use, coupled with the widespread diffusion of credit cards, Korea has been leading the digital payment revolution, transforming itself into a cashless society.
This book explores the integration of Artificial Intelligence (AI) with the Internet of Things (IoT) to address security challenges in smart environments.
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 6 is the most comprehensive and up-to-date reference available on information security and assurance.
Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data.
This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations.
Brain Technology in Augmented Cognition: Current and Future Trends informs engineers interested in human-computer interaction about the current state of augmented cognition.
Identifying and stopping the dissemination of fabricated news, hate speech, or deceptive information camouflaged as legitimate news poses a significant technological hurdle.
The Routledge International Handbook of Automated Essay Evaluation (AEE) is a definitive guide at the intersection of automation, artificial intelligence, and education.
The book presents a comprehensive and interdisciplinary exploration of the impact of AI on various sectors of society to foster a greater understanding of the opportunities and challenges presented by this transformative technology.
¿La Inteligencia Artificial responde correctamente al reto social que implica su irrupción en la sociedad contemporánea, a las dudas de su real aplicación y a los beneficios y perjuicios que genera?
This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
Condiciones minimas de transferencia de tecnologia y conocimiento para el beneficio global se deriva de un proyecto de investigacion que abordo el tema de la trasferencia de tecnologia y conocimiento dentro de las Instituciones de Educacion Superior (IES), reto actual de dichas instituciones, como es el caso de la Universidad de Guadalajara, y que se estudia especificamente en esta obra.
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy.