In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
In recent years, virtual meeting technology has become a part of the everyday lives of more and more people, often with the help of global online social networks (OSNs).
In the modern world, most gross product is created within Enterprise firms, project programs, state agencies, transnational corporations and their divisions, as well as various associations and compositions of the above entities.
In the modern world, most gross product is created within Enterprise firms, project programs, state agencies, transnational corporations and their divisions, as well as various associations and compositions of the above entities.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy.
Trust and Records in an Open Digital Environment explores issues that arise when digital records are entrusted to the cloud and will help professionals to make informed choices in the context of a rapidly changing digital economy.
Advances in smart healthcare systems (SHS) and artificial intelligence (AI) domains highlight the need for ICT systems that aim not only to improve human quality of life but improve safety too.
Advances in smart healthcare systems (SHS) and artificial intelligence (AI) domains highlight the need for ICT systems that aim not only to improve human quality of life but improve safety too.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts.
Despite increasing scholarly attention to artificial intelligence (AI), studies at the intersection of AI and communication remain ripe for exploration, including investigations of the social, political, cultural, and ethical aspects of machine intelligence, interactions among agents, and social artifacts.
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network.
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of data or transmission of data over the network.
The quantity, diversity, and sophistication of Internet of Things (IoT) items are rapidly increasing, posing significant issues but also innovative solutions for forensic science.
Becoming a Digital Parent is a practical, readable guide that will help all parents have confidence to successfully navigate technology with their children.
Becoming a Digital Parent is a practical, readable guide that will help all parents have confidence to successfully navigate technology with their children.
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc.
This book seeks to provide and promote a better understanding and a more responsive and inclusive governance of the automation and digital devices in public institutions, particularly the law and justice sector.
This book seeks to provide and promote a better understanding and a more responsive and inclusive governance of the automation and digital devices in public institutions, particularly the law and justice sector.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes.
Countering Cyber Sabotage: Introducing Consequence-Driven, Cyber-Informed Engineering (CCE) introduces a new methodology to help critical infrastructure owners, operators and their security practitioners make demonstrable improvements in securing their most important functions and processes.
This book provides an in-depth overview of artificial intelligence and deep learning approaches with case studies to solve problems associated with biometric security such as authentication, indexing, template protection, spoofing attack detection, ROI detection, gender classification etc.
This new work explores the growth of information and communication technologies with an emphasis on cyber-physical systems and security management of these systems.
This new work explores the growth of information and communication technologies with an emphasis on cyber-physical systems and security management of these systems.
Justice apps - mobile and web-based programmes that can assist individuals with legal tasks - are being produced, improved, and accessed at an unprecedented rate.
Information Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the modern healthcare environment.
Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information.
Information Security in Healthcare is an essential guide for implementing a comprehensive information security management program in the modern healthcare environment.
Implementing Information Security in Healthcare: Building a Security Program offers a critical and comprehensive look at healthcare security concerns in an era of powerful computer technology, increased mobility, and complex regulations designed to protect personal information.