Posthuman Social Science and Computational Culture offers theoretical and practical insight into posthuman social science research methods, addressing new challenges in computational culture.
In an era where mobile devices are extensions of our personal and professional lives, securing Android applications is no longer optional but imperative.
Securing Health: The Convergence of AI and Cybersecurity in Healthcare explores how emerging technologies are revolutionizing modern medicine, ensuring not just innovation but safety and trust in the digital age.
In the digital finance world, cybersecurity and cloud tools can be used to prevent attacks and secure sensitive information such as the data of business transactions, internal payments, interbank payments, bank accounts, loan and deposit accounts, stocks, and other financial transactions.
Securing Health: The Convergence of AI and Cybersecurity in Healthcare explores how emerging technologies are revolutionizing modern medicine, ensuring not just innovation but safety and trust in the digital age.
Posthuman Social Science and Computational Culture offers theoretical and practical insight into posthuman social science research methods, addressing new challenges in computational culture.
While the Industrial Internet of Things (IIoT) and Wireless Sensor Networks (WSNs) continue to redefine industrial infrastructure, the need for proactive, intelligent, and scalable cybersecurity solutions has never been more pressing.
This book offers a comprehensive guide to navigating the transformation of the workforce due to the influence of artificial intelligence (AI) across industries and discusses detailed strategies for executing reskilling and upskilling programs for professionals and managers in charge of workforce development, training, and employee retention in an AI-driven landscape.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.
The second edition of this bestselling book provides an in-depth explanation of not only why we fall for scams and how fraudsters use technology and other techniques to manipulate others but also why fraud prevention advice is not always effective.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
This book constitutes the refereed proceedings of the 7th International Conference on Cybersecurity, Privacy and Trust, held as Part of the 27th International Conference, HCI International 2025, in Gothenburg, Sweden, during June 22–27, 2025.
'Reasonable expectations of privacy' have become a cornerstone concept in privacy and data protection legislation worldwide, extending today from US constitutional law to the GDPR, Article 8 ECHR, and various Asian and African data protection frameworks.
This book is a practical guide to be used by people with little or no knowledge of sustainability as well as sustainability professionals and experts who intend to prepare software companies to undergo sustainability audits and assessments conducted by different organizations, successfully.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This book provides a comprehensive exploration of the security challenges and solutions with digital sustainability in the rapidly evolving digital landscape of digital forensics.
This newly updated edition presents a global perspective on ergonomics, addressing its application across occupational, recreational, design, and technological environments.
Edge computing and intelligence is a new technical discipline that researches and develops theories, methods, technologies, and application systems for enabling fast and efficient processing and intelligent decision-making using the big data generated from the Internet of Things (IoT) system.