Cyber Terrorism: A Guide for Facility Managers addresses cyberterrorism and other forms of terrorist activity including mailroom security, bomb threats, and the constant attacks from viruses, hackers, and other invasive programs.
Since databases are the primary repositories of information for today's organizations and governments, database security has become critically important.
In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain-computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
Advancing Data Science Education in K-12 offers a highly accessible, research-based treatment of the foundations of data science education and its increasingly vital role in K-12 instructional content.
By focusing on the experiences of users, gamers, and audiences inside one of the world's largest gaming communities (Xbox Live), this book provides an overview of the landscape, architecture, and socio-technical structure of console gaming.
Artificial Intelligence in Forensic Science addresses the current and emerging opportunities being utilized to apply modern Artificial Intelligence (AI) technologies to current forensic and investigation practices.
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks.
In the ever-evolving landscape of digital forensics and cybercrime investigation, staying ahead with the latest advancements is not just advantageous-it's imperative.
This book analyses animal creativity in order to unsettle the dominant assumptions that underpin current ideas of authorship and ownership in intellectual property.
This book analyses animal creativity in order to unsettle the dominant assumptions that underpin current ideas of authorship and ownership in intellectual property.
[Writings pertaining to European and international private, banking and commercial law] Europeanization and internationalization challenge the realm of jurisprudence to an extraordinary degree.
This book examines the transformative potential of integrating explainable artificial intelligence (XAI) and blockchain technology in modern supply chain management.
The concept of a PKI (public key infrastructure) has been around for decades, but it is one strand of IT which has taken an extraordinarily long time to come to fruition within the mainstream.
Ob Sie als angestellter Mitarbeiter Programmierarbeiten für Ihren Chef durchführen oder als Freiberufler Aufträge von Kunden umsetzen – es gibt einige juristische Punkte, die Beachtung finden sollten.
Der wachsende Bedarf an IT-Leistungen erfordert von Unternehmen umfassendes Know-how bei der Gestaltung, der Verhandlung und dem Management von IT-Verträgen.
Revolutionizing Communication: The Role of Artificial Intelligence explores the wide-ranging effects of artificial intelligence (AI) on how we connect and communicate, changing social interactions, relationships, and the very structure of our society.
Identifying and stopping the dissemination of fabricated news, hate speech, or deceptive information camouflaged as legitimate news poses a significant technological hurdle.
This book addresses the question of how competition authorities assess mergers in the Information Communication Technology (ICT) sector so as to promote competition in innovation.
The Concept Contractual Management offers a holistic approach to managerial decision-making based on contracts or business processes that are related to contracts.
Das Buch sensibilisiert den Praktiker für die rechtlichen Risiken, die die Digitalisierung im Gesundheitswesen mit sich bringt und bietet Lösungsansätze.
Dieses Praktikerhandbuch enthält Hinweise zur praktischen Umsetzung der EU-Datenschutz-Grundverordnung (DSGVO) sowie eine systematische Analyse der neuen Vorschriften.
Digitale Dienste werden für unsere Gesellschaft immer wichtiger, daher gelangen sie auch stärker ins Visier von Wirtschaftskriminellen, Spionen, Terroristen oder staatsfeindlichen Gruppierungen.