The Handbook of Financial Cryptography and Security elucidates the theory and techniques of cryptography and illustrates how to establish and maintain security under the framework of financial cryptography.
In the rapidly evolving landscape of finance and governance, the integration of blockchain technology and artificial intelligence is reshaping the way we perceive and interact with traditional systems.
Covering a wide range of different online platforms, including social media sites and chatrooms, this volume is a comprehensive exploration of the current state of sociological and criminological scholarship focused on online deviance.
Covering the essential concepts of the computer science area of algorithms, this 6-page guide is part 1 of 2 guides that also serves as a reference for designing and analyzing algorithms.
Queer Techn offers an intimate portrait of the practices, embodied knowledge, desires, and friendships that animate the technical innovation of early digital computing.
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations that local devices are unable to handle.
One of the major developments in the computing field has been cloud computing, which enables users to do complicated computations that local devices are unable to handle.
This book provides a comprehensive understanding of how intelligent data-driven techniques can be used for modelling, controlling, and optimizing various power and energy applications.
This book provides a comprehensive understanding of how intelligent data-driven techniques can be used for modelling, controlling, and optimizing various power and energy applications.
Artificial intelligence advancements, machine intelligence innovations, and semantic web developments together make up semantic intelligence technologies.
The fifth edition of this core textbook in advanced remote sensing continues to maintain its emphasis on statistically motivated, data-driven techniques for remote sensing image analysis.
This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.
This book is about how to design the most complex types of digital circuit boards used inside servers, routers and other equipment, from high-level system architecture down to the low-level signal integrity concepts.
This book is about how to design the most complex types of digital circuit boards used inside servers, routers and other equipment, from high-level system architecture down to the low-level signal integrity concepts.
An utterly absorbing account of humans, computers, and how much they differ Dame Diane Coyle, author of Cogs and MonstersWhat does Artificial Intelligence mean for our identity?
Blender 2D Animation: The Complete Guide to the Grease Pencil, Second Edition describes how to access the Grease Pencil component in Blender and create 2D animation within the Blender 3D environment.
By imparting crucial insights into the digital evolution of far-right extremism and its challenges, this book explores how far-right extremism has transformed, utilising digital spaces for communication and employing coded language to evade detection.
This book constitutes the refereed proceedings of the Second International Conference on Future Network Systems and Security, FNSS 2016, held in Paris, France, in November 2016.
This book goes beyond the current hype of expectations generated by the news on artificial intelligence and machine learning by analyzing realistic expectations for society, its limitations, and possible future scenarios for the use of this technology in our current society.
This book goes beyond the current hype of expectations generated by the news on artificial intelligence and machine learning by analyzing realistic expectations for society, its limitations, and possible future scenarios for the use of this technology in our current society.