Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages.
Mobile Heritage explores how diverse digital technologies (such as apps, GPS, games, social platforms, NFTs, drones, AR, MR, and AI, among others) have allowed for new types of mobilities and introduced a novel set of practices, interventions, and politics for heritage collections, archives, exhibitions, entertainment, conservation, management, commerce, education, restitution, activism, and regulation.
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and Information Security (NIS) Directive.
This book comprehensively explores the latest technological advancements in healthcare, with a particular focus on the application of cutting-edge technologies, such as artificial intelligence (AI), computer vision, and robotics.
Making Media Futures offers a multi-perspectival exploration of how imaginaries and knowledge of the future are constructed in and through various media.
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks.
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises.
The past decade has seen a dramatic increase in the amount and variety of information that is generated and stored electronically by business enterprises.
Responsive Security: Be Ready to Be Secure explores the challenges, issues, and dilemmas of managing information security risk, and introduces an approach for addressing concerns from both a practitioner and organizational management standpoint.
Requiring no prior hacking experience, Ethical Hacking and Penetration Testing Guide supplies a complete introduction to the steps required to complete a penetration test, or ethical hack, from beginning to end.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents.
Addressing the problems surrounding cyber security and cyberspace, this book bridges the gap between the technical and political worlds to increase our understanding of this major security concern in our IT-dependent society, and the risks it presents.
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications.
This book covers a broader scope of Attribute-Based Encryption (ABE), from the background knowledge, to specific constructions, theoretic proofs, and applications.
Systemic-structural activity theory (SSAT), founded by Gregory Bedny, is a relatively new unified framework for the study of efficiency of human performance, equipment, and software design.
Systemic-structural activity theory (SSAT), founded by Gregory Bedny, is a relatively new unified framework for the study of efficiency of human performance, equipment, and software design.
This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection.
This book provides a comprehensive overview of the research on anomaly detection with respect to context and situational awareness that aim to get a better understanding of how context information influences anomaly detection.
In an era where advanced technology plays a critical role in maintaining national security, Artificial Intelligence for Military Applications with Blockchain investigates how combining AI and blockchain could transform military operations.
The internet has launched the world into an era into which enormous amounts of data aregenerated every day through technologies with both positive and negative consequences.
The internet has launched the world into an era into which enormous amounts of data aregenerated every day through technologies with both positive and negative consequences.
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources.
Cyber security is the protection of information systems, hardware, software, and information as well from theft, damages, interruption or misdirection to any of these resources.
"e;The Biometric Computing: Recognition & Registration"e; presents introduction of biometrics along with detailed analysis for identification and recognition methods.
"e;The Biometric Computing: Recognition & Registration"e; presents introduction of biometrics along with detailed analysis for identification and recognition methods.
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs).
Reinforcement Learning for Cyber-Physical Systems: with Cybersecurity Case Studies was inspired by recent developments in the fields of reinforcement learning (RL) and cyber-physical systems (CPSs).
On the back of their last book, Cyber-risk and Youth, and building on a new research project, Adorjan and Ricciardelli marshal current research to explore parenting in the digital age.