Design and assemble an inexpensive yet fast and reliable PCConstruct the PC of your dreams using the practical information contained in this hands-on guide.
This book explores the transformative potential of blockchain technology and shows how blockchain can promote equitable access to resources and bridge societal gaps.
This book constitutes the thoroughly refereed post-conference proceedings of the 4th International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems, CyberICPS 2018, and the Second International Workshop on Security and Privacy Requirements Engineering, SECPRE 2018, held in Barcelona, Spain, in September 2018, in conjunction with the 23rd European Symposium on Research in Computer Security, ESORICS 2018.
In the intricate world of corporate governance, the bridge between the Audit Committee and Internal Audit determines whether an organization sails smoothly toward transparency-or flounders in turbulent waters.
In the intricate world of corporate governance, the bridge between the Audit Committee and Internal Audit determines whether an organization sails smoothly toward transparency-or flounders in turbulent waters.
The book explores the intricate nexus between biometric systems and the need for preserving data integrity as well as security needed during the data communication.
The book explores the intricate nexus between biometric systems and the need for preserving data integrity as well as security needed during the data communication.
Visual Sensing and Ubiquitous Computing explores applied machine learning and deep learning in the field of sensing, vision and sensor-based applications.
Visual Sensing and Ubiquitous Computing explores applied machine learning and deep learning in the field of sensing, vision and sensor-based applications.
Internet of Things (IoT) systems create a massive attack surface with billions of connected devices that often have weak default credentials and limited security capabilities, making them easy targets for cybercriminals to exploit at scale.
Artificial intelligence (AI) has become deeply embedded in modern life, with autonomous systems now controlling many crucial functions in healthcare, transportation, and industry.
Federated Learning in Finance: Unlocking Privacy-Preserving and Cyber Resilience using AI is an edited volume designed to explore how Federated Intelligence can help the finance industry defend against cyber threats, detect fraud, and comply with regulations, all while keeping sensitive financial data secure and distributed.
Federated Learning in Finance: Unlocking Privacy-Preserving and Cyber Resilience using AI is an edited volume designed to explore how Federated Intelligence can help the finance industry defend against cyber threats, detect fraud, and comply with regulations, all while keeping sensitive financial data secure and distributed.
The New Face of Online Extremism offers an overview of cutting-edge empirical research around the intersection of extremism and the internet and addresses the challenges and opportunities faced by researchers working on online extremism.
Redefining Auditing in the Digital Era: Global Perspectives on Technology, Security, and Leadership explores how digital transformation is reshaping the audit profession across industries and regions.
Artificial intelligence (AI) has become deeply embedded in modern life, with autonomous systems now controlling many crucial functions in healthcare, transportation, and industry.
This is the first book to focus on the psychology of esports and competitive gaming, bridging the gap between traditional sports psychology and the unique demands of digital competition.
This is the first book to focus on the psychology of esports and competitive gaming, bridging the gap between traditional sports psychology and the unique demands of digital competition.
The New Face of Online Extremism offers an overview of cutting-edge empirical research around the intersection of extremism and the internet and addresses the challenges and opportunities faced by researchers working on online extremism.
This book examines Internet of Things applications in textile and apparel industries, covering smart manufacturing systems, healthcare textiles, and wearable technologies.