The book offers a critical exploration of the integration of AI, blockchain, and metaverse technology in the hospitality and tourism industry to investigate the potential of these technologies in revolutionizing the industry.
The influence of technology on hobbies and leisure time is quickly becoming a regular part of daily life, but how much do we really understand about how or why we're using it, and its impact on our health?
This book delves into the history of biometrics, the different systems that have been developed to date, problems that have arisen from these systems, the necessity of AI-based biometrics systems, different AI techniques developed to date (including machine learning, deep learning, natural language processing, and pattern recognition), their potential uses and applications, security and privacy issues in AI-based Biometric systems, current trends in AI-based biometrics, and presents case studies of AI-based biometrics.
In an era defined by rapid digital transformation, Agile Security in the Digital Era: Challenges and Cybersecurity Trends emerges as a pivotal resource for navigating the complex and ever-evolving cybersecurity landscape.
Intrusion Detection Networks: A Key to Collaborative Security supplies a complete introduction to intrusion detection systems (IDS) and intrusion detection networks (IDN).
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity.
Finance Transformation: Leadership on Digital Transformation and Disruptive Innovation is a general and wide-ranging survey of finance transformation and emerging technologies.
This book is a short book about public key cryptosystems, digital signature algorithms, and their basic cryptanalysis which are provided at a basic level so that it can be easy to understand for the undergraduate engineering students who can be defined as the core audience.
This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.
Although recent advances in technology have made life easier for individuals, societies, and states, they have also led to the emergence of new and different problems in the context of security.
The Certified Information Systems Security Professional-Information Systems Security Management Professional (CISSP-ISSMP) certification was developed for CISSPs who are seeking to further their careers and validate their expertise in information systems security management.
This book covers user experience methods and tools in designing user friendly products and servicesby encompassing widely utilized successful methods, including elicitation, analysis and establishment of requirements, collaborative idea generation with design teams and intended users, prototype testing and evaluation of the user experience through empirical and non empirical means.
This book introduces two internationally recognized bodies of knowledge: COBIT 5 from a cybersecurity perspective and the NIST Framework for Improving Critical Infrastructure Cybersecurity (CSF).
Internet Protocol (IP) networks increasingly mix traditional data assets with traffic related to voice, entertainment, industrial process controls, metering, and more.
Global criminology is an emerging field covering international and transnational crimes that have not traditionally been the focus of mainstream criminology or criminal justice.
This book explores the intersection of legal frameworks, healthcare innovation, and computational intelligence, shedding light on how emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping the medical landscape.
This book provides insights into how AI is changing legal practice, government processes, and individuals' access to those processes, encouraging each of us to consider how technological advances are changing the legal system.
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber threats.
This book provides insights into how AI is changing legal practice, government processes, and individuals' access to those processes, encouraging each of us to consider how technological advances are changing the legal system.
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technolo
Offering hundreds of tips, templates, checklists, and pointers to information in the public domain, Business Resumption Planning, Second Edition assists you in creating a rock solid recovery plan for any size organization.
The Naked Android: Synthetic Socialness and the Human Gaze illuminates the connection between the stories people tell, their expectations of what a robot is, and how these beliefs and values manifest in how real robots are designed and used.
In a rapidly evolving world where technology is increasingly integrated into our daily lives, security has become a top priority for individuals, organizations, and governments.