This book explores the opportunities and challenges people with disabilities experience in the context of digital games from the perspective of three related areas: representation, access and inclusion, and community.
Artificial intelligence (AI) is increasingly impacting many aspects of people's lives across the globe, from relatively mundane technology to more advanced digital systems that can make their own decisions.
Artificial intelligence (AI) is increasingly impacting many aspects of people's lives across the globe, from relatively mundane technology to more advanced digital systems that can make their own decisions.
Computational intelligence (CI) refers to the ability of computers to accomplish tasks that are normally completed by intelligent beings such as humans and animals.
This book is a concise introduction to emerging concepts and ideas found at the intersection of contemporary behavioural science and artificial intelligence.
This book is a concise introduction to emerging concepts and ideas found at the intersection of contemporary behavioural science and artificial intelligence.
This book explores the opportunities and challenges people with disabilities experience in the context of digital games from the perspective of three related areas: representation, access and inclusion, and community.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities.
Hidden and Devalued Feminized Labour in the Digital Humanities examines the data-driven labour that underpinned the Index Thomisticus-a preeminent project of the incunabular digital humanities-and advanced the data-foundations of computing in the Humanities.
This book provides critical commentary on key issues around virtual reality, using media technology as a tool to challenge perspectives for learning and understanding cultural diversities.
This book provides critical commentary on key issues around virtual reality, using media technology as a tool to challenge perspectives for learning and understanding cultural diversities.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
The Payment Card Industry Data Security Standard (PCI DSS) is now in its 18th year, and it is continuing to dominate corporate security budgets and resources.
Algebraic Structures in Natural Language addresses a central problem in cognitive science concerning the learning procedures through which humans acquire and represent natural language.
Algebraic Structures in Natural Language addresses a central problem in cognitive science concerning the learning procedures through which humans acquire and represent natural language.
This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain.
This reference text provides the theoretical foundations, the emergence, and the application areas of Blockchain in an easy-to-understand manner that would be highly helpful for the researchers, academicians, and industry professionals to understand the disruptive potentials of Blockchain.
The text focuses on the basics of Python programming fundamentals and introduction to present-day applications in technology and the upcoming state-of-art trends in a comprehensive manner.
The text focuses on the basics of Python programming fundamentals and introduction to present-day applications in technology and the upcoming state-of-art trends in a comprehensive manner.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Most organizations place a high priority on keeping data secure, but not every organization invests in training its engineers or employees in understanding the security risks involved when using or developing technology.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens.
Cyber immune systems try to mimic the adaptive immune system of humans and animals because of its capability to detect and fend off new, unseen pathogens.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security.
Starting with the historical evolution of computer and communications networks and their security, the book then arrives at the main definitions of cryptography and network security.