Management and IT professionals in the healthcare arena face the fear of the unknown: they fear that their massive efforts to comply with HIPAA requirements may not be enough, because they still do not know how compliance will be tested and measured.
This volume assembles hundreds of cases and studies to provide the most accurate and comprehensive picture of the status of pornography in the criminal justice system.
Successful security professionals have had to modify the process of responding to new threats in the high-profile, ultra-connected business environment.
Artificial Intelligence (AI) innovations in digital health offer unprecedented opportunities to facilitate human health and provide tools and techniques that reduce overall costs.
Finance Transformation: Leadership on Digital Transformation and Disruptive Innovation is a general and wide-ranging survey of finance transformation and emerging technologies.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
In the ever-evolving landscape of technology, emerging innovations like artificial intelligence (AI), blockchain, quantum computing, brain-computer interfaces (BCIs), and the Metaverse are transforming industries at an unprecedented rate.
Covering research at the frontier of this field, Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques presents state-of-the-art privacy-preserving data mining techniques for application domains, such as medicine and social networks, that face the increasing heterogeneity and complexity of new forms of data.
This book studies the evolution of sustainable green smart cities and demonstrates solutions for green environmental issues using modern industrial IoT solutions.
Keeping up with the latest developments in cyber security requires ongoing commitment, but without a firm foundation in the principles of computer security and digital forensics, those tasked with safeguarding private information can get lost in a turbulent and shifting sea.
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control.
Originally written by a team of Certified Protection Professionals (CPPs), Anthony DiSalvatore gives valuable updates to The Complete Guide for CPP Examination Preparation.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
In an era where cyber threats loom larger than ever, Navigating the Cyber Maze: Insights and Humor on the Digital Frontier offers a refreshing blend of deep insights and engaging humor to demystify the complex world of cybersecurity.
Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork.
Artificial Intelligence and Machine Learning for Sustainable Development is a comprehensive exploration of how artificial intelligence (AI) and machine learning (ML) technologies are revolutionizing the field of sustainable development.
Every year, in response to new technologies and new laws in different countries and regions, there are changes to the fundamental knowledge, skills, techniques, and tools required by all IT security professionals.
This book builds on the popular GARDENER OF GOVERNANCE article, which enjoys amazing traction in the professional community globally and has been translated into 25+ languages.
Fostering Women's Engagement in STEM Through Education: A Cross-Cultural Academic-Industry Journey uniquely intertwines academic rigour with real-world impact, offering a comprehensive exploration of science, technology, engineering, and mathematics (STEM) experiences forged through the Partnership for Innovation in Employability (PIE) programme.
The security criteria of the International Standards Organization (ISO) provides an excellent foundation for identifying and addressing business risks through a disciplined security management process.
The influence of technology on hobbies and leisure time is quickly becoming a regular part of daily life, but how much do we really understand about how or why we're using it, and its impact on our health?
This book investigates the spaces where architecture and computer science share a common set of assumptions and goals, using methods and objectives from architecture, ethnography, and human-computer interaction (HCI).
This book delves into the history of biometrics, the different systems that have been developed to date, problems that have arisen from these systems, the necessity of AI-based biometrics systems, different AI techniques developed to date (including machine learning, deep learning, natural language processing, and pattern recognition), their potential uses and applications, security and privacy issues in AI-based Biometric systems, current trends in AI-based biometrics, and presents case studies of AI-based biometrics.