Intelligence and security informatics (ISI) can be broadly defined as the study of the development and use of advanced information technologies and systems for national and international security-related applications, through an integrated technological, organizational, and policy-based approach.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
This book provides a multi-disciplinary understanding of pathways into and out of youth cybercrime, and evidence-led ways to tackle the cybercrime epidemic, drawing on theoretical perspectives and insights from the largest European H2020 study of youth cybercrime undertaken to date.
Privacy in statistical databases is a discipline whose purpose is to provide solutions to the tension between the increasing social, political and economical demand of accurate information, and the legal and ethical obligation to protect the privacy of the various parties involved.
This book offers a practical and in-depth exploration of Open Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
This book offers a practical and in-depth exploration of Open Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive Guide to Responsible AI is a timely guide to help set the foundation for responsible and trustworthy AI use.
As organizations are still attempting to figure out how to navigate AI risks, compliance, and governance, The Definitive Guide to Responsible AI is a timely guide to help set the foundation for responsible and trustworthy AI use.
This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D digital world designed to replicate and enhance physical reality through some advanced technologies, such as extended reality (xR), artificial intelligence (AI), blockchain, 5G/6G, and computer vision.
This book provides a comprehensive exploration of the engineering and scientific principles behind the Metaverse, a 3D digital world designed to replicate and enhance physical reality through some advanced technologies, such as extended reality (xR), artificial intelligence (AI), blockchain, 5G/6G, and computer vision.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
This volume engages with the question of how labour is transforming under late capitalism, and what insights the study of sex work offers into these transformations.
Political disinformation, broadly understood as disinformation relating to matters of public interest, presents a pervasive challenge in today's information landscape.
This volume engages with the question of how labour is transforming under late capitalism, and what insights the study of sex work offers into these transformations.
This book lays a systematic foundation for professionals, researchers, and industry readers who are interested the applications and implications of generative AI for cybersecurity.
Driving Intelligence takes a critical and captivating tour of autonomous driving, a phenomenon at the intersection of data-driven platforms, artificial (general) intelligence and the mind.
Driving Intelligence takes a critical and captivating tour of autonomous driving, a phenomenon at the intersection of data-driven platforms, artificial (general) intelligence and the mind.
This book provides an in-depth exploration of the dynamic intersection between machine learning (ML) and cybersecurity, offering a detailed analysis of how these technologies are reshaping the security landscape.
Political disinformation, broadly understood as disinformation relating to matters of public interest, presents a pervasive challenge in today's information landscape.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
This book lays a systematic foundation for professionals, researchers, and industry readers who are interested the applications and implications of generative AI for cybersecurity.
As the world rapidly advances toward unparalleled connectivity and urbanization, the intersection of state-of-the-art telecommunications, smart city initiatives, and the Internet of Things (IoT) holds the potential for revolutionary changes in our daily lives.
The integration of artificial intelligence (AI) in healthcare organizations is no longer a futuristic concept-it's here, reshaping patient care, optimizing operational efficiency, and enhancing diagnostic accuracy.
In the digital finance world, cybersecurity and cloud tools can be used to prevent attacks and secure sensitive information such as the data of business transactions, internal payments, interbank payments, bank accounts, loan and deposit accounts, stocks, and other financial transactions.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
The integration of artificial intelligence (AI) in healthcare organizations is no longer a futuristic concept-it's here, reshaping patient care, optimizing operational efficiency, and enhancing diagnostic accuracy.