Twitter has become a household name, discussed both for its role in prominent national elections, natural disasters, and political movements, as well as for what some malign as narcissistic chatter.
This book focuses on a subtopic of explainable AI (XAI) called explainable agency (EA), which involves producing records of decisions made during an agent's reasoning, summarizing its behavior in human-accessible terms, and providing answers to questions about specific choices and the reasons for them.
CyberMedics: Navigating AI and Security in the Medical Field is a comprehensive exploration of the transformative role of artificial intelligence (AI) in healthcare and the critical importance of securing medical data in an increasingly digital world.
The Digital Environment and Small States in Europe delves into how the digital revolution intersects with global security dynamics and reshapes the geopolitical landscape.
This book offers a radically different introduction to law, one that reflects the challenges and opportunities presented by the rapid technological developments of our time.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic.
If you believe the sky really is the limit when it comes to creating unparalleled user experiences and applications for the Web--then Macromedia Flash MX is sure to be your tool of choice.
Although most people don't give security much attention until their personal or business systems are attacked, this thought-provoking anthology demonstrates that digital security is not only worth thinking about, it's also a fascinating topic.
If you believe the sky really is the limit when it comes to creating unparalleled user experiences and applications for the Web--then Macromedia Flash MX is sure to be your tool of choice.
Macromedia Flash is fast becoming the Web's most widely used platform for creating rich media with animation and motion graphics, but mastering Flash isn't easy.
This handbook explores smart cities of the future, provides an understanding of their development and management systems, and discusses the technology challenges.
This book explores the impact of technology on Human Resource (HR) practices and how organisations can effectively incorporate progress in technology to improve HR processes.
Introduction to Modern Cryptography, the most relied-upon textbook in the field, provides a mathematically rigorous yet accessible treatment of this fascinating subject.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
This book introduces undergraduates and computing industry professionals to basic legal principles and the peculiarities of legal issues in cyberspace.
In 2007, Estonia faced a series of cyberattacks on its cyber infrastructure, which caused widespread damage to the country's economy, politics, and security.
With the advancements in sensor and computation technologies, connected autonomous vehicle (CAV) services are being tested and deployed on public roads, sharing the road with human- driven vehicles (HVs).
Provides critical information for business professionals who want to understand a ''connected world'', linking businesses, customers, and service providers.
The first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals.
Social networks enable anyone with a computer and Internet connection to stay in touch with friends and family across the globe, and rediscover old acquaintances.
A unique investigation of the state of the art in design, architectures, and implementations of advanced computational infrastructures and the applications they support Emerging large-scale adaptive scientific and engineering applications are requiring an increasing amount of computing and storage resources to provide new insights into complex systems.
A must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance.
A must-have guide for all companies undertaking service-oriented architecture (SOA) and IT governance Service-Oriented Architecture Governance for the Services Driven Enterprise expertly covers the business, organizational, process, compliance, security, and technology facets of SOA and IT governance.
This book presents the impact and scope of Internet of Things (IoT), Artificial Intelligence (AI), and Machine Learning (ML) in the growth of intelligent digital farming and smart agriculture.
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc.
While Computer Security is a broader term which incorporates technologies, protocols, standards and policies to ensure the security of the computing systems including the computer hardware, software and the information stored in it, Cyber Security is a specific, growing field to protect computer networks (offline and online) from unauthorized access, botnets, phishing scams, etc.
As the distributed architecture underpinning the initial Bitcoin anarcho-capitalist, libertarian project, 'blockchain' entered wider public imagination and vocabulary only very recently.