This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data.
This groundbreaking book filters down the wealth of information on cybersecurity to the most relevant and highly applicable aspects for coaches, therapists, researchers and all other practitioners handling confidential client conversations and data.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
A Guide to Using the Anonymous Web in Libraries and Information Organizations provides practical guidance to those who are interested in integrating the anonymous web into their services.
This book explores how digital transformation is reshaping the manner in which higher education sectors emerge, work, and evolve and how auditors should respond to this challenging and risky digital audit universe in transforming the higher education system.
This book explores how digital transformation is reshaping the manner in which higher education sectors emerge, work, and evolve and how auditors should respond to this challenging and risky digital audit universe in transforming the higher education system.
In the age of global climate change, society will require cities that are environmentally self-sufficient, able to withstand various environmental problems and recover quickly.
In the age of global climate change, society will require cities that are environmentally self-sufficient, able to withstand various environmental problems and recover quickly.
This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems.
This book highlights the state-of-the-art research on data usage, security, and privacy in the scenarios of the Internet of Things (IoT), along with related applications using Machine Learning and Big Data technologies to design and make efficient Internet-compatible IoT systems.
In this thought-provoking volume, Eran Fisher interrogates the relationship between algorithms as epistemic devices and modern notions of subjectivity.
In this thought-provoking volume, Eran Fisher interrogates the relationship between algorithms as epistemic devices and modern notions of subjectivity.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.
Whether you are a project manager looking to lead blockchain projects, a developer who would like to create blockchain-based applications, or a student with an interest, this book will provide you with the foundational understanding that you need.
This book offers a fresh perspective on information systems, a field of study and practice currently undergoing substantial upheaval, even as it expands rapidly and widely with new technologies and applications.
This book offers a fresh perspective on information systems, a field of study and practice currently undergoing substantial upheaval, even as it expands rapidly and widely with new technologies and applications.
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it.
This textbook was written from the perspective of someone who began his software security career in 2005, long before the industry began focusing on it.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
This handbook provides a comprehensive collection of knowledge for emerging multidisciplinary research areas such as cybersecurity, IoT, Blockchain, Machine Learning, Data Science, and AI.
The goal of this book is to provide a reference for applications of mathematical modelling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making.
The goal of this book is to provide a reference for applications of mathematical modelling in social media and related network analysis and offer a theoretically sound background with adequate suggestions for better decision-making.