This book presents a complete overview of the main EEG-based Brain-Computer Interface (BCI) paradigms and the related practical solutions for their design, prototyping, and testing.
Addressing the rising prevalence of interactive systems in our daily lives, this book focuses on the essential aspects of usability, user experience (UX), and inclusive design.
In the past decade, artificial intelligence (AI) has made significant advancements in various sectors of society, such as education, health, e-commerce, media and entertainment, banking and finance, transportation, and defense, among others.
This book explores the impact of technology on Human Resource (HR) practices and how organisations can effectively incorporate progress in technology to improve HR processes.
The purpose of this book is to avail students of the many different reasons and back-stories equated with the advent of interaction design and its effect on our world.
Smart grid is a new generation of power grids that is expected to enhance its reliability and reduce carbon footprint by integrating distributed resources.
Design and assemble an inexpensive yet fast and reliable PCConstruct the PC of your dreams using the practical information contained in this hands-on guide.
Reach more customers and grow your business with today's most powerful marketing tool: Word-of-MouthHighly Recommended shows the impact of customer recommendations on businesses--transforming how people buy, how you reach customers, how you improve products, and ultimately how you can grow your company by leveraging the power of recommendations.
“[Tufekci’s] personal experience in the squares and streets, melded with her scholarly insights on technology and communication platforms, makes [this] such an unusual and illuminating work.
An eye-opening look at the invisible workers who protect us from seeing humanity's worst on today's commercial internetSocial media on the internet can be a nightmarish place.
Psybersecurity: Human Factors of Cyber Defence is a clarion call to action in the face of a stark reality: over 90% of cyberattacks exploit human vulnerabilities, as highlighted by the 2022 Global Risks Report from the World Economic Forum.
This volume looks at the forms and functions of counterspeech as well as what determines its effectiveness and success from multidisciplinary perspectives.
Integration of AI-Based Manufacturing and Industrial Engineering Systems with the Internet of Things describes how AI techniques, such as deep learning, cognitive computing, and Machine Learning, can be used to analyze massive volumes of data produced by IoT devices in manufacturing environments.
In a world where tiny fingers are as familiar with touchscreens as they are with crayons, ensuring our children's safety online has never been more crucial.
The Military Metaverse explores the impact that the Metaverse is having today on how the world's militaries procure, maintain, train, plan, and fight, and how the Metaverse presents new challenges and opportunities for future conflict.
This book offers a comprehensive overview of the theory and practical applications of swarm intelligence in fog computing, beyond 5G networks, and information security.
Absolute Essentials of Ethereum is a concise textbook which guides the reader through the fascinating world of the emerging Ethereum ecosystem, from the basics of how its blockchain works to cutting-edge applications.
Cybersecurity is a paramount concern in both Internet of Things (IoT) and Cyber-Physical Systems (CPSs) due to the interconnected and often critical nature of these systems.
Detailing a comprehensive set of requirements for secure and resilient software development and operation, this book supplies documented test cases for those requirements and best practices for testing nonfunctional requirements.
In an era where digital security transcends mere convenience to become a pivotal aspect of our daily lives, Spies in the Bits and Bytes: The Art of Cyber Threat Intelligence by Dr.
Information security primarily serves these six distinct purposes-authentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiation.
This book constitutes the refereed proceedings of the 10th International Conference on Digital Forensics and Cyber Crime, ICDF2C 2018, held in New Orleans, LA, USA, in September 2018.
This book critically assesses how the rise of the collaborative economy in the European Union Digital Single Market is disrupting consolidated legal acquisitions, such as classical internal market categories, as well as the applicability of consumer protection, data protection, and labour and competition law.
This book examines the right to be forgotten and finds that this right enjoys recognition mostly in jurisdictions where privacy interests impose limits on freedom of expression.
Cyber CISO Marksmanship is the only book of its kind authored by multiple highly experienced individuals to collectively bring together the "e;best of the best"e; on what works and what doesn't, as a CISO, in a unique storytelling format.
This book constitutes the proceedings of the 12th International Conference on Network and System Security, NSS 2018, held in Hong Kong, China, in August 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book discusses the main legal and economic challenges to the creation and enforcement of security rights in intellectual property and explores possible avenues of reform, such as more specific rules for security in IP rights and better coordination between intellectual property law and secured transactions law.
This book constitutes the thoroughly refereed proceedings of the 11th International Conference on Security for Information Technology and Communications, SecITC 2018, held in Bucharest, Romania, in November 2018.
The two-volume set of LNCS 11239 and LNCS 11240 constitutes the revised proceedings of the 16th International Conference on Theory of Cryptography, TCC 2018, held in Panaji, India, in November 2018.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.