|
Books > Computing & IT > Computer communications & networking
During the COVID-19 era, the functions of social policy and public
administration have undergone a meaningful change, especially with
the advancement of digital elements and online and virtual
functions. Cyber developments, cyber threats, and the effects of
cyberwar on the public administrations of countries have become
critical research subjects, and it is important to have resources
that can introduce and guide users through the current best
practices, laboratory methods, policies, protocols, and more within
cyber public administration and social policy. The Handbook of
Research on Cyber Approaches to Public Administration and Social
Policy focuses on the post-pandemic changes in the functions of
social policy and public administration. It also examines the
implications of the cyber cosmos on public and social policies and
practices from a broad perspective. Covering topics such as
intersectional racism, cloud computing applications, and public
policies, this major reference work is an essential resource for
scientists, laboratory technicians, professionals, technologists,
computer scientists, policymakers, students, educators,
researchers, and academicians.
The artificial intelligence subset machine learning has become a
popular technique in professional fields as many are finding new
ways to apply this trending technology into their everyday
practices. Two fields that have majorly benefited from this are
pattern recognition and information security. The ability of these
intelligent algorithms to learn complex patterns from data and
attain new performance techniques has created a wide variety of
uses and applications within the data security industry. There is a
need for research on the specific uses machine learning methods
have within these fields, along with future perspectives. Machine
Learning Techniques for Pattern Recognition and Information
Security is a collection of innovative research on the current
impact of machine learning methods within data security as well as
its various applications and newfound challenges. While
highlighting topics including anomaly detection systems,
biometrics, and intrusion management, this book is ideally designed
for industrial experts, researchers, IT professionals, network
developers, policymakers, computer scientists, educators, and
students seeking current research on implementing machine learning
tactics to enhance the performance of information security.
Every day approximately three-hundred thousand to four-hundred
thousand new malware are registered, many of them being adware and
variants of previously known malware. Anti-virus companies and
researchers cannot deal with such a deluge of malware - to analyze
and build patches. The only way to scale the efforts is to build
algorithms to enable machines to analyze malware and classify and
cluster them to such a level of granularity that it will enable
humans (or machines) to gain critical insights about them and build
solutions that are specific enough to detect and thwart existing
malware and generic-enough to thwart future variants. Advances in
Malware and Data-Driven Network Security comprehensively covers
data-driven malware security with an emphasis on using statistical,
machine learning, and AI as well as the current trends in
ML/statistical approaches to detecting, clustering, and
classification of cyber-threats. Providing information on advances
in malware and data-driven network security as well as future
research directions, it is ideal for graduate students,
academicians, faculty members, scientists, software developers,
security analysts, computer engineers, programmers, IT specialists,
and researchers who are seeking to learn and carry out research in
the area of malware and data-driven network security.
The damaging effects of cyberattacks to an industry like the
Cooperative Connected and Automated Mobility (CCAM) can be
tremendous. From the least important to the worst ones, one can
mention for example the damage in the reputation of vehicle
manufacturers, the increased denial of customers to adopt CCAM, the
loss of working hours (having direct impact on the European GDP),
material damages, increased environmental pollution due e.g., to
traffic jams or malicious modifications in sensors' firmware, and
ultimately, the great danger for human lives, either they are
drivers, passengers or pedestrians. Connected vehicles will soon
become a reality on our roads, bringing along new services and
capabilities, but also technical challenges and security threats.
To overcome these risks, the CARAMEL project has developed several
anti-hacking solutions for the new generation of vehicles. CARAMEL
(Artificial Intelligence-based Cybersecurity for Connected and
Automated Vehicles), a research project co-funded by the European
Union under the Horizon 2020 framework programme, is a project
consortium with 15 organizations from 8 European countries together
with 3 Korean partners. The project applies a proactive approach
based on Artificial Intelligence and Machine Learning techniques to
detect and prevent potential cybersecurity threats to autonomous
and connected vehicles. This approach has been addressed based on
four fundamental pillars, namely: Autonomous Mobility, Connected
Mobility, Electromobility, and Remote Control Vehicle. This book
presents theory and results from each of these technical
directions.
In recent years, falsification and digital modification of video
clips, images, as well as textual contents have become widespread
and numerous, especially when deepfake technologies are adopted in
many sources. Due to adopted deepfake techniques, a lot of content
currently cannot be recognized from its original sources. As a
result, the field of study previously devoted to general multimedia
forensics has been revived. The Handbook of Research on Advanced
Practical Approaches to Deepfake Detection and Applications
discusses the recent techniques and applications of illustration,
generation, and detection of deepfake content in multimedia. It
introduces the techniques and gives an overview of deepfake
applications, types of deepfakes, the algorithms and applications
used in deepfakes, recent challenges and problems, and practical
applications to identify, generate, and detect deepfakes. Covering
topics such as anomaly detection, intrusion detection, and security
enhancement, this major reference work is a comprehensive resource
for cyber security specialists, government officials, law
enforcement, business leaders, students and faculty of higher
education, librarians, researchers, and academicians.
Do you feel overwhelmed by the AI wave? Worried that it could cost you your job, harm your business, or even take over? AI has pervaded our lives and is aggressively disrupting business. No person today can afford to ignore AI.
Age of Agency is your companion, helping you leverage AI's capabilities to power your productivity and success. By understanding AI, you will learn to use it as a tool for personal career growth and business success.
Former Microsoft executive Kerushan Govender demystifies AI, emphasising the importance of human agency. Reconnect with the needs of humanity and learn the importance of care as a differentiator in an AI world. Avoid the potential pitfalls of excessive reliance on the technology.
Age of Agency is a blueprint for ensuring human agency outpaces computer agency. It boldly pits the limits of machine learning against the infinity of human ability. With this survival guide, you’ll uncover ways to connect with humanity on a deeper level, going beyond anything AI can do.
Ready to become AI-savvy, with your humanity as your differentiator? Dive into the future with the confidence to ride the wave of today’s AI revolution.
For computer-security courses that are taught at the undergraduate
level and that have as their sole prerequisites an introductory
computer science sequence (e.g., CS 1/CS 2). A new Computer
Security textbook for a new generation of IT professionals. Unlike
most other computer security textbooks available today,
Introduction to Computer Security, 1e does NOT focus on the
mathematical and computational foundations of security, and it does
not assume an extensive background in computer science. Instead it
looks at the systems, technology, management, and policy side of
security, and offers students fundamental security concepts and a
working knowledge of threats and countermeasures with "just-enough"
background in computer science. The result is a presentation of the
material that is accessible to students of all levels.
The use of digital images in today's modernized market is rapidly
increasing throughout organizations due to the prevalence of social
media and digital content. Companies who wish to distribute their
content over the internet face numerous security risks such as
copyright violation. Advanced methods for the protection and
security of digital data are constantly emerging, and up-to-date
research in this area is lacking. Advancements in Security and
Privacy Initiatives for Multimedia Images is a collection of
innovative research on the methods and applications of contemporary
techniques for the security and copyright protection of images and
their distribution. While highlighting topics including
simulation-based security, digital watermarking protocols, and
counterfeit prevention, this book is ideally designed for security
analysts, researchers, developers, programmers, academicians,
practitioners, students, executives, educators, and policymakers
seeking current research on modern security improvements for
multimedia images.
Digital technologies are currently dramatically changing
healthcare. Cloud healthcare is an increasingly trending topic in
the field, converging skills from computer and health science. This
new strategy fosters the management of health data at a large scale
and makes it easier for healthcare organizations to improve patient
experience and health team productivity while helping the support,
security, compliance, and interoperability of health data.
Exploring the Convergence of Computer and Medical Science Through
Cloud Healthcare is a reference in the ongoing digital
transformation of the healthcare sector. It presents a
comprehensive state-of-the-art approach to cloud internet of things
health technologies and practices. It provides insights over
strategies, methodologies, techniques, tools, and services based on
emerging cloud digital health solutions to overcome digital health
challenges. Covering topics such as auxiliary systems, the internet
of medical things, and natural language processing, this premier
reference source is an essential resource for medical
professionals, hospital administrators, medical students, medical
professors, libraries, researchers, and academicians.
In Online Predators, An Internet Insurgency: A Field Manual for
Teaching and Parenting in the Digital Arena Jeffrey A. Lee brings
his ten plus years' experience in the fight against online child
exploitation to bear in an easy to follow guide for all with a
stake in the life of a child. This book equips parents, guardians,
extended family, and educational professionals with practical
strategies to help keep kids safe in a technology connected world.
Instead of focusing on ever changing technology, Lee proposes a key
fundamental change in the fight against online predation-to develop
an insatiable curiosity about their child's online life, then get
in the front lines and stay there.
The internet of things (IoT) has drawn great attention from both
academia and industry, since it offers a challenging notion of
creating a world where all things around us are connected to the
internet and communicate with each other with minimal human
intervention. Another component for helping IoT to succeed is cloud
computing. The combination of cloud computing and IoT will enable
new monitoring services and powerful processing of sensory data
streams. These applications, alongside implementation details and
challenges, should also be explored for successful mainstream
adoption. IoT is also fueled by the advancement of digital
technologies, and the next generation era will be cloud-based IoT
systems. Integration and Implementation of the Internet of Things
Through Cloud Computing studies, analyzes, and presents cloud-based
IoT-related technologies, protocols, and standards along with
recent research and development in cloud-based IoT. It also
presents recent emerging trends and technological advances of
cloud-based IoT, innovative applications, and the challenges and
implications for society. The chapters included take a strong look
at the societal and social aspects of this technology along with
its implementations and technological analyses. This book is
intended for IT specialists, technologists, practitioners,
researchers, academicians, and students who are interested in the
next era of IoT through cloud computing.
The key parameter that needs to be considered when planning the
management of resources in futuristic wireless networks is a
balanced approach to resource distribution. A balanced approach is
necessary to provide an unbiased working environment for the
distribution, sharing, allocation, and supply of resources among
the devices of the wireless network. Equal resource distribution
also maintains balance and stability between the operations of
communication systems and thus improves the performance of wireless
networks. Managing Resources for Futuristic Wireless Networks is a
pivotal reference source that presents research related to the
control and management of key parameters of bandwidth, spectrum
sensing, channel selection, resource sharing, and task scheduling,
which is necessary to ensure the efficient operation of wireless
networks. Featuring topics that include vehicular ad-hoc networks,
resource management, and the internet of things, this publication
is ideal for professionals and researchers working in the field of
networking, information and knowledge management, and communication
sciences. Moreover, the book will provide insights and support
executives concerned with the management of expertise, knowledge,
information, and organizational development in different types of
work communities and environments.
Businesses have had to face many challenges due to the COVID-19
pandemic; to survive in the changing landscape, they had to adapt
quickly and implement new tactics and best practices to stay
competitive. Networking is one of the many areas that looks vastly
different in a post-pandemic world and companies must understand
this change or risk falling behind. Further study is required to
uncover the various difficulties and potential future directions of
networking and innovation within the business landscape. The
Handbook of Research on Digital Innovation and Networking in
Post-COVID-19 Organizations provides a thorough overview of the
ways in which organizations have had to change and adapt to the new
business environments and considers how networking looks different
in a post-COVID-19 world. Covering key topics such as
organizational structures, consumer behavior, teleworking, and
collaborations, this major reference work is ideal for managers,
business owners, industry professionals, policymakers, researchers,
scholars, academicians, practitioners, instructors, and students.
The COVID-19 pandemic has forced organizations and individuals to
embrace new practices such as social distancing and remote working.
During these unprecedented times, many have increasingly relied on
the internet for work, shopping, and healthcare. However, while the
world focuses on the health and economic threats posed by the
COVID-19 pandemic, cyber criminals are capitalizing on this crisis
as the world has become more digitally dependent and vulnerable
than ever. Cybersecurity Crisis Management and Lessons Learned From
the COVID-19 Pandemic provides cutting-edge research on the best
guidelines for preventing, detecting, and responding to cyber
threats within educational, business, health, and governmental
organizations during the COVID-19 pandemic. It further highlights
the importance of focusing on cybersecurity within organizational
crisis management. Covering topics such as privacy and healthcare,
remote work, and personal health data, this premier reference
source is an indispensable resource for startup companies, health
and business executives, ICT procurement managers, IT
professionals, libraries, students and educators of higher
education, entrepreneurs, government officials, social media
experts, researchers, and academicians.
Cybersecurity has been gaining serious attention and recently has
become an important topic of concern for organizations, government
institutions, and largely for people interacting with digital
online systems. As many individual and organizational activities
continue to grow and are conducted in the digital environment, new
vulnerabilities have arisen which have led to cybersecurity
threats. The nature, source, reasons, and sophistication for
cyberattacks are not clearly known or understood, and many times
invisible cyber attackers are never traced or can never be found.
Cyberattacks can only be known once the attack and the destruction
have already taken place long after the attackers have left.
Cybersecurity for computer systems has increasingly become
important because the government, military, corporate, financial,
critical infrastructure, and medical organizations rely heavily on
digital network systems, which process and store large volumes of
data on computer devices that are exchanged on the internet, and
they are vulnerable to ""continuous"" cyberattacks. As
cybersecurity has become a global concern, it needs to be clearly
understood, and innovative solutions are required. Advancing
Cybersecurity for Digital Transformation: Opportunities and
Challenges looks deeper into issues, problems, and innovative
solutions and strategies that are linked to cybersecurity. This
book will provide important knowledge that can impact the
improvement of cybersecurity, which can add value in terms of
innovation to solving cybersecurity threats. The chapters cover
cybersecurity challenges, technologies, and solutions in the
context of different industries and different types of threats.
This book is ideal for cybersecurity researchers, professionals,
scientists, scholars, and managers, as well as practitioners,
stakeholders, researchers, academicians, and students interested in
the latest advancements in cybersecurity for digital
transformation.
|
|