Phishing Detection Using Content-Based Image Classification is an invaluable resource for any deep learning and cybersecurity professional and scholar trying to solve various cybersecurity tasks using new age technologies like Deep Learning and Computer Vision.
Phishing Detection Using Content-Based Image Classification is an invaluable resource for any deep learning and cybersecurity professional and scholar trying to solve various cybersecurity tasks using new age technologies like Deep Learning and Computer Vision.
Machine Learning for Criminology and Crime Research: At the Crossroads reviews the roots of the intersection between machine learning, artificial intelligence (AI), and research on crime; examines the current state of the art in this area of scholarly inquiry; and discusses future perspectives that may emerge from this relationship.
Machine Learning for Criminology and Crime Research: At the Crossroads reviews the roots of the intersection between machine learning, artificial intelligence (AI), and research on crime; examines the current state of the art in this area of scholarly inquiry; and discusses future perspectives that may emerge from this relationship.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media.
Deep Fakes: Algorithms and Society focuses on the use of artificial intelligence technologies to produce fictitious photorealistic audiovisual clips that are indistinguishable from traditional video media.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, 'Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.
In May 2021, Jim Gosler, known as the Godfather and commander of US agencies' cyber offensive capability, said, 'Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
It is essential for an organization to know before involving themselves in cloud computing and big data, what are the key security requirements for applications and data processing.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
Public Corruption in the United States provides a comprehensive view of public corruption, including discussion on its types, methods, trends, challenges, and overall impact.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.
Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising, and cellular location data.
Systemic Bias: Algorithms and Society looks at issues of computational bias in the contexts of cultural works, metaphors of magic and mathematics in tech culture, and workplace psychometrics.
Privacy: Algorithms and Society focuses on encryption technologies and privacy debates in journalistic crypto-cultures, countersurveillance technologies, digital advertising, and cellular location data.
Democratic Frontiers: Algorithms and Society focuses on digital platforms' effects in societies with respect to key areas such as subjectivity and self-reflection, data and measurement for the common good, public health and accessible datasets, activism in social media and the import/export of AI technologies relative to regime type.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia.
Digital Totalitarianism: Algorithms and Society focuses on important challenges to democratic values posed by our computational regimes: policing the freedom of inquiry, risks to the personal autonomy of thought, NeoLiberal management of human creativity, and the collapse of critical thinking with the social media fueled rise of conspiranoia.
A Fresh Look at Fraud features psychologists, criminologists, and computer scientists to address the state-of-the-art research on the rising problem of fraud, scams, and financial abuse, stimulating a cross-disciplinary exchange of ideas, theories, methods, and practices.
A Fresh Look at Fraud features psychologists, criminologists, and computer scientists to address the state-of-the-art research on the rising problem of fraud, scams, and financial abuse, stimulating a cross-disciplinary exchange of ideas, theories, methods, and practices.
This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data.
This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
This book explores how digital transformation is reshaping the manner in which higher education sectors emerge, work, and evolve and how auditors should respond to this challenging and risky digital audit universe in transforming the higher education system.
This book explores how digital transformation is reshaping the manner in which higher education sectors emerge, work, and evolve and how auditors should respond to this challenging and risky digital audit universe in transforming the higher education system.