This book presents an overview of the blockchain-based Internet of Things systems, along with the opportunities, challenges, and solutions in diverse fields such as business, education, agriculture, and healthcare.
Written by experts from various fields, this edited collection explores a wide range of issues pertaining to how computers evoke human social expectations.
Artificial Intelligence (AI) is defined as the simulation of human intelligence through the mimicking of the human brain for analysis, modeling, and decision making.
"e;Our Next Reality does a fantastic job of giving a balanced and insightful analysis to some of the most pressing questions our society will face in the near future.
Describing both the practical details of interest to students and the high-level concepts and abstractions highlighted by faculty, The Tao of Computing, Second Edition presents a comprehensive introduction to computers and computer technology.
Recent research shows that collaboration and social networking can foster knowledge sharing and innovation by sparking new connections, ideas, and practices.
The Smart Grid has the potential to revolutionize electricity delivery systems, and the security of its infrastructure is a vital concern not only for cyber-security practitioners, engineers, policy makers, and utility executives, but also for the media and consumers.
Quantum Calculus and Functional Analysis with Applications presents advanced research on quantum calculus, functional analysis, and their interdisciplinary applications.
The book covers the emerging communication and computational technologies for future cyber-physical systems and discusses the security of in-vehicle communication protocols using automotive embedded systems, presenting an in-depth analysis across various domains, such as manufacturing, transportation, health-care, and smart cities.
While many agencies struggle to comply with Federal Information Security Management Act (FISMA) regulations, those that have embraced its requirements have found that their comprehensive and flexible nature provides a sound security risk management framework for the implementation of essential system security controls.
Guides Students in Understanding the Interactions between Computing/Networking Technologies and Security Issues Taking an interactive, "e;learn-by-doing"e; approach to teaching, Introduction to Computer and Network Security: Navigating Shades of Gray gives you a clear course to teach the technical issues related to security.
If you want to be successful in any area of game development-game design, programming, graphics, sound, or publishing-you should know how standouts in the industry approach their work and address problems.
This book investigates the transformative impact of AI, ML, data analytics, and IoT on modern business, emphasizing their roles in strategic growth, operational efficiency, and data-driven decision-making.
This book explores the exciting world of quantum computing, from its theoretical foundations to its practical applications, offering both non-technical and expert readers a comprehensive and accessible introduction to this cutting-edge technology that has the potential to revolutionize the way we process and transmit information.
Researching an individual's, firm's or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement.
Modern computing is no longer about devices but is all about providing services, a natural progression that both consumers and enterprises are eager to embrace.
The result of more than 15 years of collective research, Multimedia Ontology: Representation and Applications provides a theoretical foundation for understanding the nature of media data and the principles involved in its interpretation.
Following in the footsteps of its bestselling predecessor, The Practical Guide to HIPAA Privacy and Security Compliance, Second Edition is a one-stop, up-to-date resource on Health Insurance Portability and Accountability Act (HIPAA) privacy and security, including details on the HITECH Act, the 2013 Omnibus Rule, and the pending rules.
The Key to Fully Understanding the Basics of a 3D WorldProminently used in games, movies, and on television, 3D graphics are tools of creation used to enhance how material and light come together to manipulate objects in 3D space.
CoCo: The Colorful History of Tandy's Underdog Computer is the first book to document the complete history of the Tandy Color Computer (CoCo), a popular 8-bit PC series from the 1980s that competed against the era's biggest names, including the Apple II, IBM PC, and Commodore 64.
This book addresses the security challenges facing the rapidly growing Internet of Things (IoT) industry, including the potential threats and risks arising from its complex architecture.
See How to Unobtrusively Incorporate Good Teaching into Your Game's MechanicsLearn to Play: Designing Tutorials for Video Games shows how to embed a tutorial directly into your game design mechanics so that your games naturally and comfortably teach players to have fun.