|
|
Books > Computing & IT
As the internet and its applications grow more sophisticated and
widespread, so too do the strategies of modern terrorist groups.
The existence of the dark web adds to the online arsenal of groups
using digital networks and sites to promulgate ideology or recruit
supporters. It is necessary to understand how terrorist cells are
using and adapting online tools in order to counteract their
efforts. Utilization of New Technologies in Global Terror: Emerging
Research and Opportunities is an informative resource that explores
new developments in technological advancements and the progression
of terror organizations while also examining non-government
activist organizations and their new role in protecting internet
freedom and combating cyberterrorism. Featuring relevant topics
such as social media, cyber threats, and counterterrorism, this
publication will benefit government officials, political
scientists, policymakers, researchers, academicians, and graduate
students interested in political science, mass communication, and
cyberwarfare.
With the rapid advancement in technology, a myriad of new threats
have emerged in online environments. The broad spectrum of these
digital risks requires new and innovative methods for protection
against cybercrimes. Combating Security Breaches and Criminal
Activity in the Digital Sphere is a pivotal reference source for
the latest scholarly research on current trends in cyber forensic
investigations, focusing on advanced techniques for protecting
information security and preventing potential exploitation for
online users. Featuring law enforcement perspectives, theoretical
foundations, and forensic methods, this book is ideally designed
for policy makers, analysts, researchers, technology developers,
and upper-level students.
Technology continues to make great strides in society by providing
opportunities for advancement, inclusion, and global competency. As
new systems and tools arise, novel applications are created as
well. Smart Technology Applications in Business Environments is an
essential reference source for the latest scholarly research on the
risks and opportunities of utilizing the latest technologies in
different aspects of society such as education, healthcare systems,
and corporations. Featuring extensive coverage on a broad range of
topics and perspectives including virtual reality, robotics, and
social media, this publication is ideally designed for
academicians, researchers, students, and practitioners seeking
current research on the improvement and increased productivity from
the implementation of smart technologies.
This book explains the concepts, history, and implementation of IT
infrastructures. Although many of books can be found on each
individual infrastructure building block, this is the first book to
describe all of them: datacenters, servers, networks, storage,
operating systems, and end user devices. The building blocks
described in this book provide functionality, but they also provide
the non-functional attributes performance, availability, and
security. These attributes are explained on a conceptual level in
separate chapters, and specific in the chapters about each
individual building block. Whether you need an introduction to
infrastructure technologies, a refresher course, or a study guide
for a computer science class, you will find that the presented
building blocks and concepts provide a solid foundation for
understanding the complexity of today's IT infrastructures. This
book can be used as part of IT architecture courses based on the IS
2010.4 curriculum.
Peering Carrier Ethernet Networks begins by providing background
information on the evolution of important concepts and building
blocks that have led to the current state of high bandwidth and
high performance Ethernet technology in order to support current
and emerging customer applications. The background information
covered includes an overview of Public Switched Telephone Networks
(PSTN) to describe circuit switching, multiplexing, and voice
digitization that lead to the development of T1/T3 and SONET/SDH
for transport. It interweaves these developments with changes in
the regulatory regime. Additional coverage includes Carrier
Ethernet networks' technical standards, which describe how service
providers can offer services to off-net customers using peered
Carrier Ethernet networks and a description of the taxonomy of
customers and their current and emerging applications at Layer 2
and Layer 3 on peered Carrier Ethernet networks. The book concludes
by describing next steps in Ethernet technology to meet growing
demands and emerging trends.
Artificial intelligence is smarter than humans. It can process information at lightning speed and remain focused on specific tasks without distraction. AI can see into the future, predict outcomes and even use sensors to see around physical and virtual corners. So why does AI frequently get it so wrong and cause harm?
The answer is us: the human beings who write the code and teach AI to mimic our behaviour. Scary Smart explains how to fix the current trajectory now, to make sure that the AI of the future can preserve our species. This book offers a blueprint, pointing the way to what we can do to safeguard ourselves, those we love and the planet itself.
Artificial intelligence (AI) and knowledge management can create
innovative digital solutions and business opportunities in Asia
from circular and green economies to technological disruption,
innovation, and smart cities. It is essential to understand the
impact and importance of AI and knowledge management within the
digital economy for future development and for fostering the best
practices within 21st century businesses. The Handbook of Research
on Artificial Intelligence and Knowledge Management in Asia's
Digital Economy offers conceptual frameworks, empirical studies,
and case studies that help to understand the latest developments in
artificial intelligence and knowledge management, as well as its
potential for digital transformation and business opportunities in
Asia. Covering topics such as augmented reality. Convolutional
neural networks, and digital transformation, this major reference
work generates enriching debate on the challenges and opportunities
for economic growth and inclusion in the region among business
executives and leaders, IT managers, policymakers, government
officials, students and educators of higher education, researchers,
and academicians.
Wearable technology can range anywhere between activity trackers to
prosthetics. These new advancements are continuously progressing
and becoming a part of daily life. Examining Developments and
Applications of Wearable Devices in Modern Society is a pivotal
reference source for the most innovative research on the expansion
of wearable computing and technology. Featuring coverage on a broad
range of topics such as stroke monitoring, augmented reality, and
cancer detection, this publication is ideally designed for
academicians, researchers, and students seeking current research on
the challenges and benefits of the latest wearable devices.
Network Function Virtualization provides an architectural,
vendor-neutral level overview of the issues surrounding the large
levels of data storage and transmission requirements needed for
today's companies, also enumerating the benefits of NFV for the
enterprise. Drawing upon years of practical experience, and using
numerous examples and an easy-to-understand framework, authors Tom
Nadeau and Ken Gary discuss the relevancy of NFV and how it can be
effectively used to create and deploy new services. Readers will
learn how to determine if network function virtualization is right
for their enterprise network, be able to use hands-on, step-by-step
guides to design, deploy, and manage NFV in an enterprise, and
learn how to evaluate all relevant NFV standards, including ETSI,
IETF, Openstack, and Open Daylight.
|
|