If you're an information security professional today, you are being forced to address growing cyber security threats and ever-evolving compliance requirements, while dealing with stagnant and decreasing budgets.
Computer users have a significant impact on the security of their computer and personal information as a result of the actions they perform (or do not perform).
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
This book brings together all the latest methodologies, tools and techniques related to the Internet of Things and Artificial Intelligence in a single volume to build insight into their use in sustainable living.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated.
In this multidisciplinary book, experts from around the globe examine how data-driven political campaigning works, what challenges it poses for personal privacy and democracy, and how emerging practices should be regulated.
Today the healthcare sector is facing challenges such as detecting the cause of ailments, disease prevention, high operating costs, availability of skilled technicians and infrastructure bottlenecks.
Today the healthcare sector is facing challenges such as detecting the cause of ailments, disease prevention, high operating costs, availability of skilled technicians and infrastructure bottlenecks.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
As long as humans write software, the key to successful software security is making the software development program process more efficient and effective.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Health care utilization routinely generates vast amounts of data from sources ranging from electronic medical records, insurance claims, vital signs, and patient-reported outcomes.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
Smart Card Security: Applications, Attacks, and Countermeasures provides an overview of smart card technology and explores different security attacks and countermeasures associated with it.
This book presents the creation of a bilingual thesaurus (Italian and English), and its conversion into an ontology system, oriented to the Cybersecurity field of knowledge term management and the identification of a replicable method over other specialized areas of study, through computational linguistics procedures, to a statistical and qualitative measurement of the terminological coverage threshold a controlled vocabulary is able to guarantee with respect to the semantic richness proper to the domain under investigation.
This book presents the creation of a bilingual thesaurus (Italian and English), and its conversion into an ontology system, oriented to the Cybersecurity field of knowledge term management and the identification of a replicable method over other specialized areas of study, through computational linguistics procedures, to a statistical and qualitative measurement of the terminological coverage threshold a controlled vocabulary is able to guarantee with respect to the semantic richness proper to the domain under investigation.
The Learning Engineering Toolkit is a practical guide to the rich and varied applications of learning engineering, a rigorous and fast-emerging discipline that synthesizes the learning sciences, instructional design, engineering design, and other methodologies to support learners.
The Learning Engineering Toolkit is a practical guide to the rich and varied applications of learning engineering, a rigorous and fast-emerging discipline that synthesizes the learning sciences, instructional design, engineering design, and other methodologies to support learners.
This volume enables security professionals to structure the best security program designed to meet the complex needs of an entire organization, taking into account the organization's business goals as well as the surrounding controls, processes, and units already in existence.
This is the first book to show how digitalisation and the better provision of information and communication technologies (ICTs) can improve access to a wide-range of social services, as well as make them more inclusive.
This is the first book to show how digitalisation and the better provision of information and communication technologies (ICTs) can improve access to a wide-range of social services, as well as make them more inclusive.
VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI industry outcomes, which results in high speed and low power of operation of integrated devices.
VLSI devices downscaling is a very significant part of the design to improve the performance of VLSI industry outcomes, which results in high speed and low power of operation of integrated devices.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain.
Cyber Security Threats and Challenges Facing Human Life provides a comprehensive view of the issues, threats, and challenges that are faced in the cyber security domain.
Written in accessible language without mathematical formulas, this short book provides an overview of the wide and varied applications of artificial intelligence (AI) across the spectrum of physical sciences.
Written in accessible language without mathematical formulas, this short book provides an overview of the wide and varied applications of artificial intelligence (AI) across the spectrum of physical sciences.
This book is for people who work in the tech industry-computer and data scientists, software developers and engineers, designers, and people in business, marketing or management roles.
This book is for people who work in the tech industry-computer and data scientists, software developers and engineers, designers, and people in business, marketing or management roles.
This book provides solid, state-of-the-art contributions from both scientists and practitioners working on botnet detection and analysis, including botnet economics.
Unleashing the Art of Digital Forensics is intended to describe and explain the steps taken during a forensic examination, with the intent of making the reader aware of the constraints and considerations that apply during a forensic examination in law enforcement and in the private sector.