Synthesizing basic results on how to design human work with complex systems, Joint Cognitive Systems: Patterns in Cognitive Systems Engineering provides examples of successful cognitive systems engineering research and design.
The four-volume set LNCS 11244, 11245, 11246, and 11247 constitutes the refereed proceedings of the 8th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, ISoLA 2018, held in Limassol, Cyprus, in October/November 2018.
Executives should not necessarily know the intricacies of project management, but they should know how project management, as a discipline, can benefit the organization in implementing its strategies and realizing its vision.
As seen on CBS 60 Minutes"e;No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.
This book constitutes the refereed proceedings of the 19th International Conference on Information and Communications Security, ICICS 2017, held in Beijing, China, in December 2017.
Techniques for Designing and Analyzing Algorithms Design and analysis of algorithms can be a difficult subject for students due to its sometimes-abstract nature and its use of a wide variety of mathematical tools.
The ultimate guide to Google AdWords is fully updated for its third edition This is the ultimate guide for those who want to quickly get beyond AdWords basics to learn and apply the advanced techniques and tactics that are used by Fortune 500 companies.
This book examines the latest developments in Artificial Intelligence (AI)-based metaheuristics algorithms with applications in information security for digital media.
This book constitutes the refereed proceedings of the 21st International Symposium on Research in Attacks, Intrusions, and Defenses, RAID 2018, held in Heraklion, Crete, Greece, in September 2018.
Longlisted for the 2022 Inner Temple Main Book PrizeThe Right to be Forgotten is one of the most publicised areas of the GDPR and has received massive worldwide publicity following judicial and legal developments in Europe.
This book constitutes the refereed proceedings of the 14th International Conference on Information Systems Security, ICISS 2018, held in Bangalore, India, in December 2018.
There are many webinars and training courses on Data Analytics for Internal Auditors, but no handbook written from the practitioner's viewpoint covering not only the need and the theory, but a practical hands-on approach to conducting Data Analytics.
The Wireless Internet Explained covers the full spectrum of wireless technologies from a wide range of vendors, including initiatives by Microsoft and Compaq.
This book constitutes the refereed proceedings of the 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, held in Wollongong, Australia, in July 2018.
This two-volume set constitutes the revised selected papers of the 18th CCF Conference on Computer Supported Cooperative Work and Social Computing, ChineseCSCW 2023 held in Harbin, China, in August 2023.
The ten-volume set LNCS 15016-15025 constitutes the refereed proceedings of the 33rd International Conference on Artificial Neural Networks and Machine Learning, ICANN 2024, held in Lugano, Switzerland, during September 17-20, 2024.
Cloud computing is the on-demand availability of computer system resources, especially data storage and computing power, without direct active management by the user.
The shift from in-person to online health services has now become a driving force in delivering efficient healthcare, especially in developing countries where this need is imperative.
The Next Generation Innovation in IoT and Cloud Computing with Applications is a thought-provoking edited book that explores the cutting-edge advancements and transformative potential of the Internet of Things (IoT) and cloud computing.
This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.
This book constitutes the refereed proceedings of the 5th International Conference on Electronic Government and the Information Systems Perspective, EGOVIS 2016, held in Porto, Portugal, in September 2016, in conjunction with DEXA 2015.
This comprehensive text provides a how-to guide for content strategy, enabling students and professionals to understand and master the skills needed to develop and manage technical content in a range of professional contexts.
Master effective IT auditing techniques, from security control reviews to advanced cybersecurity practices, with this essential field manualKey FeaturesSecure and audit endpoints in Windows environments for robust defenseGain practical skills in auditing Linux systems, focusing on security configurations and firewall auditing using tools such as ufw and iptablesCultivate a mindset of continuous learning and development for long-term career successPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs cyber threats evolve and regulations tighten, IT professionals struggle to maintain effective auditing practices and ensure robust cybersecurity across complex systems.
The 7-volume set of LNCS 13841-13847 constitutes the proceedings of the 16th Asian Conference on Computer Vision, ACCV 2022, held in Macao, China, December 2022.
In the updated edition of this critically acclaimed and bestselling book, Microsoft project veteran Scott Berkun offers a collection of essays on field-tested philosophies and strategies for defining, leading, and managing projects.
A comprehensive, structured, and up-to-date introduction to the law governing the dissemination of information in a computer-mediated world in China, Internet Law in China stresses the practical applications of the law that are encountered by all individuals and organizations in Chinese cyberspace, but always in the light of theoretical underpinnings.
Conservation of Time-based Media Art is the first book to take stock of the current practices and conceptual frameworks that define the emerging field of time-based media conservation, which focuses on contemporary artworks that contain video, audio, film, slides or software components.
This book examines the challenge of accelerating automation, and argues that countering and adapting to this challenge requires new methodological, philosophical, scientific, sociological, economic, ethical, and political perspectives that fundamentally rethink the categories of work and education.
The Internet of Things (IoT) concept is defined as a flexible and futuristic network where all the different types of devices and smart objects can become seamlessly connected to each other and can actively participate in all types of processes which are happening around us.
Advanced data structures is a core course in Computer Science which most graduate program in Computer Science, Computer Science and Engineering, and other allied engineering disciplines, offer during the first year or first semester of the curriculum.