Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this constantly evolving subject since the previous edition was released in 2022.
This book broaches the newly crafted concept of algorithmic dictatorship that draws on a plethora of human biases that creep into the algorithm and feeds into an automated decision that comes to the expense of citizens´ lives, freedoms, health, property, fair lending, and credit scoring.
Microsoft Sentinel for Internet of Medical Things (IoMT) provides advanced threat detection, investigation, and automated response for connected medical devices, guaranteeing real-time protection in healthcare environments.
This book provides a comprehensive overview of palliative care digital health by covering current developments, methodology, clinical relevance, research priorities, ethical issues, and policy related to technological innovations for those with serious illness.
This book explains how to combine Lean (including Hoshin Kanri) with Digital solutions to maximize sustainable performance that complies with people's and planet's performance expectations and needs.
Bringing together some of the world’s foremost supply-chain thinkers, this book shows how artificial intelligence (AI) is rewriting the rules of global supply chain management.
ETF, Aktien, Daytrading, Technische Analyse: Mit diesem 4 in 1 Hörbuch nehmen Sie die Abkürzung zum erfolgreichen Broker - Wie Sie die Börse lesen und ein Vermögen aufbauen!
This volume offers a multidisciplinary reflection on the impact of artificial intelligence (AI) technologies and digitalization in technology, epistemology, ethics, and governance.
Comprehensive textbook covering the latest developments in the field of cybersecurity law Cybersecurity Law offers an authoritative guide to the key statutes, regulations, and court rulings that pertain to cybersecurity, reflecting the latest legal developments for this constantly evolving subject since the previous edition was released in 2022.
In an effort to investigate the revolutionary potential of augmented reality (AR) and virtual reality (VR) technologies in the field of mechanical and medical emergency management, Virtual Reality, Real Emergency was written.
This book constitutes the refereed proceedings of the 7th International Conference on Quantum Interaction, QI 2013, held in Leicester, UK, in July 2013.
Prepare for the next technological frontier with this essential, multidisciplinary guide that delves into hyper-intelligent networks, providing a comprehensive overview of how AI and machine learning are revolutionizing telecommunications, healthcare, and other vital sectors with cognitive, autonomous connectivity.
The seven-volume set LNCS 15737-15743 constitutes the proceedings of the International Conference on Extended Reality, XR Salento 2025, held in Otranto, Italy, during June 17-20, 2025.
Advances in Fog Computing and the Internet of Things for Smart Healthcare delves into the transformative impact of fog computing and IoT on modern healthcare systems.
This book covers the optimization of the energy flow management of a grid-tied photovoltaic-wind-battery energy storage system and the development of demand response algorithms for a single customer at the lowest level and extended it to a large community of participants at the highest level.
Plasma chemistry, a foundational science driving advancements in the engineering ofbiomedicine, space propulsion, and semiconductor manufacturing, is currently increasinglyrelying on AI to diagnose and control chemical compositions and reaction rates in plasmas.
Gain hands-on experience building, fine-tuning, and deploying GenAI applications using DeepSeekKey FeaturesExplore DeepSeek's architecture, training data, and reasoning capabilitiesBuild agents, fine-tune with distillation, and deploy with CI/CD pipelinesApply DeepSeek to real-world use cases like coding, ideation, and legal analysisPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionLearn how to build, fine-tune, and deploy AI systems using DeepSeek, one of the most influential open-source large language models available today.
Deep Learning Applications in Operations Research explores cutting-edge applications of deep learning and optimization techniques across various domains.
This book constitutes the proceedings of the 6th International Conference on Information Theoretic Security, ICITS 2012, held in Montreal, Canada, in August 2012.
Now in its second edition, this handbook collects authoritative contributions on modern methods and tools in statistical bioinformatics with a focus on the interface between computational statistics and cutting-edge developments in computational biology.
Guia d'estudi de Kubernetes i Cloud Native Associate (KCNA)Amb l'avenc imparable de l'adopcio del nuvol, Kubernetes s'ha consolidat com l'estandard de facto dins de l'ecosistema cloud native.
This book is based on the best papers accepted for presentation during the AISMA-2025: International Workshop on Advanced in Information Security Management and Applications.
This book comprises a selection of articles from the 13th World Conference on Information Systems and Technologies (WorldCIST’25), held from April 15 to 17, 2025, at the Federal University of Santa Catarina, Florianópolis, Brazil.
This two-volume set LNAI 16121-16122 constitutes the proceedings of the 24th EPIA Conference on Progress in Artificial Intelligence, EPIA 2025, held in Faro, Portugal, during October 1–3, 2025.