The Digital Environment and Small States in Europe delves into how the digital revolution intersects with global security dynamics and reshapes the geopolitical landscape.
Artificial Intelligence (AI) has revolutionized several sectors, with digital forensics being one that has been notably affected by its rapid advancement.
After many years during which it languished in relative obscurity, in remote classrooms of computer science departments and in small prototype projects for tech companies, artificial intelligence (AI) is now a searingly hot topic across the media.
After many years during which it languished in relative obscurity, in remote classrooms of computer science departments and in small prototype projects for tech companies, artificial intelligence (AI) is now a searingly hot topic across the media.
The increasing prominence of generative AI across various industries presents an abundance of opportunities for integration within the healthcare sector.
The Military Metaverse explores the impact that the Metaverse is having today on how the world's militaries procure, maintain, train, plan, and fight, and how the Metaverse presents new challenges and opportunities for future conflict.
This book looks at the integration of blockchain technology in healthcare settings, focusing on its potential to address security and privacy concerns of medical applications.
Blockchain and Digital Twin Applications in Smart Agriculture presents scenarios, solutions, applications to optimize crop management, improve resource allocation, and enhance sustainability in modern farming practices.
Information security teams are charged with developing and maintaining a set of documents that will protect the assets of an enterprise from constant threats and risks.
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly important.
Examining the importance of aligning computer security (information assurance) with the goals of an organization, this book gives security personnel direction as to how systems should be designed, the process for doing so, and a methodology to follow.
The Institute of Electrical and Electronics Engineers (IEEE) Communications Society designed the IEEE wireless communication engineering technologies (WCET) certification program to address the wireless industry's growing need for communications professionals with practical problem-solving skills in real-world situations.
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state.
The Digital Age offers many far-reaching opportunities - opportunities that allow for fast global communications, efficient business transactions and stealthily executed cyber crimes.
Activity, Behavior, and Healthcare Computing relates to the fields of vision and sensor-based human action or activity and behavior analysis and recognition.
Statistical Methods in Computer Security summarizes discussions held at the recent Joint Statistical Meeting to provide a clear layout of current applications in the field.
Effective Surveillance for Homeland Security: Balancing Technology and Social Issues provides a comprehensive survey of state-of-the-art methods and tools for the surveillance and protection of citizens and critical infrastructures against natural and deliberate threats.
With the advancements in sensor and computation technologies, connected autonomous vehicle (CAV) services are being tested and deployed on public roads, sharing the road with human- driven vehicles (HVs).
Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology.
In distributed, open systems like cyberspace, where the behavior of autonomous agents is uncertain and can affect other agents' welfare, trust management is used to allow agents to determine what to expect about the behavior of other agents.
A How-to Guide for Implementing Algorithms and ProtocolsAddressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems.
The continued growth of e-commerce mandates the emergence of new technical standards and methods that will securely integrate online activities with pre-existing infrastructures, laws and processes.
Drawing from philosophy, information theory, and network science, Organized Skepticism in the Age of Misinformation: Surviving the Kingdom of Gossip offers a novel conceptual framework that views information as a form of gossip.
In the past several years, there has been an increasing trend in the use of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) as well as in the integration of both systems due to their complementary nature, flexible combination, and the demand for ubiquitous computing.
The conference on network security and communication engineering is meant to serve as a forum for exchanging new developments and research progresss between scholars, scientists and engineers all over the world and providing a unique opportunity to exchange information, to present the latest results as well as to review the relevant issues on
The Certified Information Security Manager(CISM) certification program was developed by the Information Systems Audit and Controls Association (ISACA).
Drawing from philosophy, information theory, and network science, Organized Skepticism in the Age of Misinformation: Surviving the Kingdom of Gossip offers a novel conceptual framework that views information as a form of gossip.
Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements.