This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
This book deals with how to measure innovation in crisis management, drawing on data, case studies, and lessons learnt from different European countries.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues.
This book focuses on futuristic approaches and designs for real-time systems and applications, as well as the fundamental concepts of including advanced techniques and tools in models of data-driven blockchain ecosystems.
Condiciones minimas de transferencia de tecnologia y conocimiento para el beneficio global se deriva de un proyecto de investigacion que abordo el tema de la trasferencia de tecnologia y conocimiento dentro de las Instituciones de Educacion Superior (IES), reto actual de dichas instituciones, como es el caso de la Universidad de Guadalajara, y que se estudia especificamente en esta obra.
This book demonstrates how information security requires a deep understanding of an organization's assets, threats and processes, combined with the technology that can best protect organizational security.
Intellectual property owners who exploit new ways of reproducing, distributing, and marketing their creations digitally must also protect them from piracy.
This book constitutes the refereed proceedings of the 22nd International Conference on Information and Communications Security, ICICS 2020, held in Copenhagen, Denmark*, in August 2020.
This book constitutes the thoroughly refereed post-workshop proceedings of the 25th International Workshop on Security Protocols, held in Cambridge, UK, in March 2017.
This book critically assesses legal frameworks involving the bulk processing of personal data, initially collected by the private sector, to predict and prevent crime through advanced profiling technologies.
Das Problem der fragmentierten IT Sicherheit: Informationssicherheit und deren Normen und Standards (BSI Grundschutz, ISO27001, weitere) sowie IT-Sicherheit (Technik und Betrieb) sollen zukünftig besser verzahnen.
In the midst of the fourth industrial revolution, big data is weighed in gold, placing enormous power in the hands of data scientists - the modern AI alchemists.
Grounded in the user-centered design movement, this book offers a broad consideration of how our civilization has evolved its technical infrastructure for human purpose to help us make sense of our contemporary information infrastructure and online existence.
With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also impacted learning processes in the education sector.
With the increasing use of e-learning, technology has not only revolutionized the way businesses operate but has also impacted learning processes in the education sector.
Grounded in the user-centered design movement, this book offers a broad consideration of how our civilization has evolved its technical infrastructure for human purpose to help us make sense of our contemporary information infrastructure and online existence.
Regulating Hate Speech Created by Generative AI explores the new hybrid space of Human Machine Interaction (HMI) in which hate speech is represented and computed through algorithms and AI generative systems.
Offering a holistic view of the pioneering trends and innovations in smart healthcare management, this book focuses on the methodologies, frameworks, design issues, tools, architectures, and technologies necessary to develop and understand intelligent healthcare systems and emerging applications in the present era.
Resisting State Surveillance in the Digital Age provides an in-depth examination of the complexity and diversity of organised opposition to increasing state surveillance powers in the UK.
AI for Scientific Discovery provides an accessible introduction to the wide-ranging applications of artificial intelligence (AI) technologies in scientific research and discovery across the full breadth of scientific disciplines.
AI for Scientific Discovery provides an accessible introduction to the wide-ranging applications of artificial intelligence (AI) technologies in scientific research and discovery across the full breadth of scientific disciplines.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards.
Artificial Intelligence (AI) in general and machine learning (ML) and deep learning (DL) in particular and related digital technologies are a couple of fledging paradigms that next-generation healthcare services are sprinting towards.
Artificial Intelligence was meant to be the great social equalizer that helps promote fairness by removing human bias from the equation, but is this true?
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
This book focuses on various authorization and access control techniques, threats and attack modeling, including an overview of the Open Authorization 2.
In the midst of the fourth industrial revolution, big data is weighed in gold, placing enormous power in the hands of data scientists - the modern AI alchemists.
This book provides a set of proposals for the new conceptual network required in order to establish civil law rules for a world permeated by Artificial Intelligence.