Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.
This guide explains how to gain a handle on the vital aspects of data protection, offering a solid understanding of how data protection fits into various organizations.
Truly a practical work, this handbook offers a comprehensive roadmap for designing and implementing an effective information security program based on real world scenarios.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
Addressing the rising prevalence of interactive systems in our daily lives, this book focuses on the essential aspects of usability, user experience (UX), and inclusive design.
Blockchain and distributed-ledger technologies enable new modes of communication, synchronization, and transfer of value with a broad impact on Internet of Things (IoT), Data Science, society, industry, commerce, and government.
Network Optimization in Intelligent Internet of Things Applications: Principles and Challenges sheds light on the optimization methods that form the basis of effective communication between networked devices.
Handbook of Inclusive Knowledge Management: Ensuring Inclusivity, Diversity, and Equity in Knowledge Processing Activities examines the role that diversity, equity and inclusivity (DEI) plays in the field and discipline of knowledge management (KM).
This book presents the latest developments in deep learning-enabled healthcare tools and technologies and offers practical ideas for using the IoT with deep learning (motion-based object data) to deal with human dynamics and challenges including critical application domains, technologies, medical imaging, drug discovery, insurance fraud detection and solutions to handle relevant challenges.
Advancements in computational intelligence, which encompasses artificial intelligence, machine learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data.
Advancements in computational intelligence, which encompasses artificial intelligence, machine learning, and data analytics, have revolutionized the way we process and analyze biomedical and health data.
The International Conference on Security, Surveillance & Artificial Intelligence (ICSSAI2023) was held in West Bengal, India during December 1-2, 2023.
The International Conference on Security, Surveillance & Artificial Intelligence (ICSSAI2023) was held in West Bengal, India during December 1-2, 2023.
This book presents the latest developments in deep learning-enabled healthcare tools and technologies and offers practical ideas for using the IoT with deep learning (motion-based object data) to deal with human dynamics and challenges including critical application domains, technologies, medical imaging, drug discovery, insurance fraud detection and solutions to handle relevant challenges.
Intelligent Cybersecurity and Resilience for Critical Industries: Challenges and Applications thoroughly explores cybersecurity principles, strategies, and technologies crucial for protecting digital assets and combating evolving cyber threats in critical industries.
The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.