This book offers a unique model for understanding the cognitive underpinnings, interactions and discursive effects of our evolving use of smartphones in everyday app-mediated communication, from text messages and GIFs to images, video and social media apps.
This book offers a unique model for understanding the cognitive underpinnings, interactions and discursive effects of our evolving use of smartphones in everyday app-mediated communication, from text messages and GIFs to images, video and social media apps.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications.
The book explores modern sensor technologies while also discussing security issues, which is the dominant factor for many types of Internet of Things (IoT) applications.
Cybercrime and Information Technology: Theory and Practice-The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
Cybercrime and Information Technology: Theory and Practice-The Computer Network Infostructure and Computer Security, Cybersecurity Laws, Internet of Things (IoT), and Mobile Devices is an introductory text addressing current technology, trends, and security issues.
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts.
Threat actors, be they cyber criminals, terrorists, hacktivists or disgruntled employees, are employing sophisticated attack techniques and anti-forensics tools to cover their attacks and breach attempts.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
The book Security of Internet of Things Nodes: Challenges, Attacks, and Countermeasures(R) covers a wide range of research topics on the security of the Internet of Things nodes along with the latest research development in the domain of Internet of Things.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
A Practical Introduction to Enterprise Network and Security Management, Second Edition, provides a balanced understanding of introductory and advanced subjects in both computer networking and cybersecurity.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
Conducted properly, information security risk assessments provide managers with the feedback needed to manage risk through the understanding of threats to corporate assets, determination of current control vulnerabilities, and appropriate safeguards selection.
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.
Considering the overall situation of the current pandemic and pertinent recommendations, this book focuses on the use of augmented reality (AR) applications for preventing COVID-19 outbreaks along with techniques, tools, and platforms to achieve social distancing.
The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain.
The purpose of this edited book is to provide the relevant technologies and case studies in a concise format that will simplify and streamline the processing of blockchain.
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
A Sensible Guide to Program Management Professional (PgMP)(R) Success is for program managers preparing to take the PgMP exam based on The Standard for Program Management - 4th Edition (PgM4 Standard).
Digital Learning and Collaborative Practices offers a comprehensive overview of design-based, technology-enhanced approaches to teaching and learning in virtual settings.
Digital Learning and Collaborative Practices offers a comprehensive overview of design-based, technology-enhanced approaches to teaching and learning in virtual settings.
Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R.
Public Policy Analytics: Code & Context for Data Science in Government teaches readers how to address complex public policy problems with data and analytics using reproducible methods in R.