|
Books > Computing & IT
Data is the most important commodity, which is why data protection
has become a global priority. Data breaches and security flaws can
jeopardize the global economy. Organizations face a greater risk of
failing to achieve strategy and business goals as cyber threat
behavior grows in frequency, sophistication, and destructiveness. A
breach can result in data loss, business interruption, brand and
reputation harm, as well as regulatory and legal consequences. A
company needs a well-thought-out cybersecurity strategy to secure
its critical infrastructure and information systems in order to
overcome these challenges. Cross-Industry Applications of Cyber
Security Frameworks provides an understanding of the specific,
standards-based security controls that make up a best practice
cybersecurity program. It is equipped with cross-industry
applications of cybersecurity frameworks, best practices for common
practices, and suggestions that may be highly relevant or
appropriate in every case. Covering topics such as legal
frameworks, cybersecurity in FinTech, and open banking, this
premier reference source is an essential resource for executives,
business leaders, managers, entrepreneurs, IT professionals,
government officials, hospital administrators, educational
administrators, privacy specialists, researchers, and academicians.
Revealing the unfolding story of Artificial Intelligence, Richard Susskind presents a short non-technical guide that challenges us to think differently about AI. Susskind brings AI out of computing laboratories, big tech companies, and start-ups - and into everyday life.
In recent years, and certainly since the launch of ChatGPT, there has been massive public and professional interest in Artificial Intelligence. But people are confused about what AI is, what it can and cannot do, what is yet to come, and whether AI is good or bad for humanity and civilisation - whether it will provide solutions to mankind's major challenges or become our gravest existential threat. There is also confusion about how we should regulate AI and where we should draw moral boundaries on its use.
In How To Think About AI, Richard Susskind draws on his experience of working on AI since the early 1980s. For Susskind, balancing the benefits and threats of artificial intelligence is the defining challenge of our age. He explores the history of AI and possible scenarios for its future. His views on AI are not always conventional. He positions ChatGPT and generative AI as no more than the latest chapter in the ongoing story of AI and claims we are still at the foothills of developments. He argues that to think responsibly about the impact of AI requires us to look well beyond todayâs technologies, suggesting that not-yet-invented technologies will have far greater impact on us in the 2030s than the tools we have today. This leads Susskind to discuss the possibility of conscious machines, magnificent new AI-enabled virtual worlds, and the impact of AI on the evolution of biological humans.
Multinational organizations have begun to realize that sentiment
mining plays an important role for decision making and market
strategy. The revolutionary growth of digital marketing not only
changes the market game, but also brings forth new opportunities
for skilled professionals and expertise. Currently, the
technologies are rapidly changing, and artificial intelligence (AI)
and machine learning are contributing as game-changing
technologies. These are not only trending but are also increasingly
popular among data scientists and data analysts. New Opportunities
for Sentiment Analysis and Information Processing provides
interdisciplinary research in information retrieval and sentiment
analysis including studies on extracting sentiments from textual
data, sentiment visualization-based dimensionality reduction for
multiple features, and deep learning-based multi-domain sentiment
extraction. The book also optimizes techniques used for sentiment
identification and examines applications of sentiment analysis and
emotion detection. Covering such topics as communication networks,
natural language processing, and semantic analysis, this book is
essential for data scientists, data analysts, IT specialists,
scientists, researchers, academicians, and students.
The proliferation of wireless communications has led to mobile
computing, a new era in data communication and processing allowing
people to access information anywhere and anytime using lightweight
computer devices. Aligned with this phenomenon, a vast number of
mobile solutions, systems, and applications have been continuously
developed. However, despite the opportunities, there exist
constraints, challenges, and complexities in realizing the full
potential of mobile computing, requiring research and
experimentation. Algorithms, Methods, and Applications in Mobile
Computing and Communications is a critical scholarly publication
that examines the various aspects of mobile computing and
communications from engineering, business, and organizational
perspectives. The book details current research involving mobility
challenges that hinder service applicability, mobile money transfer
services and anomaly detection, and mobile fog environments. As a
resource rich in information about mobile devices, wireless
broadcast databases, and machine communications, it is an ideal
source for computer scientists, IT specialists, service providers,
information technology professionals, academicians, and researchers
interested in the field of mobile computing.
Changing business environments and information technology
advancements fundamentally reshaped the traditional information
landscape in our contemporary society, urging companies to seek
innovative ways to diffuse and manage assets on a global scale. It
is crucial for society to understand the new methodologies and
common practices that organizations can utilize to leverage their
knowledge into practice. Global Information Diffusion and
Management in Contemporary Society is an essential reference source
featuring research on the development and implementation of
contemporary global information management initiatives in
organizations. Including coverage on a multitude of topics such as
data security, global manufacturing, and information governance,
this book explores the importance of information management in a
global context. This book is ideally designed for managers,
information systems specialists, professionals, researchers, and
administrators seeking current research on the theories and
applications of global information management.
With the leverage of digital reproducibility, historical messages
of hate are finding new recipients with breathtaking speed and
scope. The rapid growth in popularity of right-wing extremist
groups in response to transnational economic crises underscores the
importance of examining in detail the language and political
mobilization strategies of the New Right. In Europe, for example,
populist right-wing activists organized around an anti-immigration
agenda are becoming more vocal, providing pushback against the
increase in migration flows from North Africa and Eastern Europe
and countering support for integration with a categorical rejection
of multiculturalism. In the United States, anti-immigration
sentiment provides a rallying point for political and personal
agendas that connect the rhetoric of borders with national, racial,
and security issues. Digital Media Strategies of the Far Right in
Europe and the United States is an effort to examine and understand
these issues, informed by the conviction that an interdisciplinary
and transnational approach can allow productive comparison of
far-right propaganda strategies in Europe and the United States.
With a special emphasis on performing ideology in the far-right
music scene, on violent anti-immigrant stances, and on the far
right's skillful creation and manipulation of virtual communities,
the contributions foreground the cultural shibboleths that are
exchanged among far-right supporters on the Internet, which serve
to generate a sense of group belonging and the illusion of power
far greater that the known numbers of neo-Nazis in any one country
might suggest. Moreover, with attention to transatlantic right-wing
movements and their use of particularly digital media, the essays
in this volume put pressure on the similarities among the various
national agents, while accommodating differences in the virtual and
sometimes violent identities created and nurtured online.
Harden your business against internal and external cybersecurity
threats with a single accessible resource. In 8 Steps to Better
Security: A Simple Cyber Resilience Guide for Business,
cybersecurity researcher and writer Kim Crawley delivers a grounded
and practical roadmap to cyber resilience in any organization.
Offering you the lessons she learned while working for major tech
companies like Sophos, AT&T, BlackBerry Cylance, Tripwire, and
Venafi, Crawley condenses the essence of business cybersecurity
into eight steps. Written to be accessible to non-technical
businesspeople as well as security professionals, and with insights
from other security industry leaders, this important book will walk
you through how to: Foster a strong security culture that extends
from the custodial team to the C-suite Build an effective security
team, regardless of the size or nature of your business Comply with
regulatory requirements, including general data privacy rules and
industry-specific legislation Test your cybersecurity, including
third-party penetration testing and internal red team specialists
Perfect for CISOs, security leaders, non-technical businesspeople,
and managers at any level, 8 Steps to Better Security is also a
must-have resource for companies of all sizes, and in all
industries.
In a world dependent on digital technologies, business corporations
continually try to stay ahead of their competitors by adopting the
most updated technology into their business processes. Many
companies are adopting digital transformation models, data
analytics, big data, data empowerment, and data sharing as key
strategies and as service disruptors for information delivery and
record management. Higher education institutions have adopted
digital service innovation as a core to driving their business
processes. Such services are key to ensuring efficiency and
improving organizational performance. Digital Transformation and
Innovative Services for Business and Learning is a collection of
innovative research on the latest digital services and their role
in supporting the digital transformation of businesses and
education. While highlighting topics including brand equality,
digital banking, and generational workforce, this book is ideally
designed for managers, executives, IT consultants, industry
professionals, academicians, researchers, and students.
The digital transformation of healthcare delivery is in full swing.
Health monitoring is increasingly becoming more effective,
efficient, and timely through mobile devices that are now widely
available. This, as well as wireless technology, is essential to
assessing, diagnosing, and treating medical ailments. However,
systems and applications that boost wellness must be properly
designed and regulated in order to protect the patient and provide
the best care. Optimizing Health Monitoring Systems With Wireless
Technology is an essential publication that focuses on critical
issues related to the design, development, and deployment of
wireless technology solutions for healthcare and wellness.
Highlighting a broad range of topics including solution evaluation,
privacy and security, and policy and regulation, this book is
ideally designed for clinicians, hospital directors, hospital
managers, consultants, health IT developers, healthcare providers,
engineers, software developers, policymakers, researchers,
academicians, and students.
Ex. Consultant (Statistics), College of Fisheries, Central
Agricultural University, Lembucherra Tripura West, Ex. Computer
Specialist, SAARC Agricultural Information Centre, Dhaka,
Bangladesh, Ex Pr. Head, Social Science, CIFA, ICAR, Bhubaneswar,
Ex Co-ordinator, Bioinformatics Centre, CIFA, ICAR, Bhubaneswar,
All the 42 book s constitute the following focus areas like
Biotechnology, Bioinformatics, Nanotechnology, Expert System Neural
Network, Applied Technologies, Database, Modeling, Analytics and
Business Intelligence Software, IPR & Social Issues. s on
Emerging digital technologies, Information and communication
Technology Tools, skill and technologies for 21st century
Education, Big data, Business intelligence softwares, GIS, IPR and
Knowledge/Patenting/Indigenous and Traditional Knowledge Management
(KM) challenges are also included in the book. The book is divided
into 5 broad sections covering the whole gamut of emerging
technologies in the fields: 01. Biotechnology, 02. Nanotechnology,
03. Expert System Neural Network, 04. Applied Technologies, 05.
Database, Modeling, Analytics and Business Intelligence Software,
It is expected that the book will be very much useful because with
the emergence of new technologies and application through software
tools are becoming very important in the 21st Century society.
This fifth edition continues to improve on the features that have
made it the market leader. The text offers a flexible organization,
enabling instructors to adapt the book to their particular courses.
The book is both complete and careful, and it continues to maintain
its emphasis on algorithms and applications. Excellent exercise
sets allow students to perfect skills as they practice. This new
edition continues to feature numerous computer science
applications-making this the ideal text for preparing students for
advanced study.
For courses in Logic and Computer design. Understanding Logic and
Computer Design for All Audiences Logic and Computer Design
Fundamentals is a thoroughly up-to-date text that makes logic
design, digital system design, and computer design available to
students of all levels. The Fifth Edition brings this widely
recognised source to modern standards by ensuring that all
information is relevant and contemporary. The material focuses on
industry trends and successfully bridges the gap between the much
higher levels of abstraction students in the field must work with
today than in the past. Broadly covering logic and computer design,
Logic and Computer Design Fundamentals is a flexibly organised
source material that allows instructors to tailor its use to a wide
range of student audiences.
A fully updated version of Pearson's bestselling Brilliant Windows
titles, covering Windows 10 - the latest release of the widely-used
Microsoft operating system. Brilliant Windows 10 gives you the
information you need easily and without fuss. It guides you through
all tasks and applications using a highly visual, full-colour,
step-by-step approach and tells you exactly what you need to know,
when you need to know it. For the first time, this book comes with
FREE downloadable bonus material. An extra 140 pages, which cover
chapters on advanced subjects like customising Windows, maintaining
your computer and managing your hardware as well as the key, new
features of Office 2016. Spend less time reading and more time
doing with a simple step-by-step approach to beginner and
intermediate level tasks. Brilliant guides provide the quick,
easy-to-access information that you need: Numbered steps guide you
through each task or problem Numerous colour screenshots illustrate
each step Cross reference boxes point you to related tasks and
information in the book "Did you know ?..." sections alert you to
relevant expert tips, tricks and advice
Computational Intelligence for Multimedia Big Data on the Cloud
with Engineering Applications covers timely topics, including the
neural network (NN), particle swarm optimization (PSO),
evolutionary algorithm (GA), fuzzy sets (FS) and rough sets (RS),
etc. Furthermore, the book highlights recent research on
representative techniques to elaborate how a data-centric system
formed a powerful platform for the processing of cloud hosted
multimedia big data and how it could be analyzed, processed and
characterized by CI. The book also provides a view on how
techniques in CI can offer solutions in modeling, relationship
pattern recognition, clustering and other problems in
bioengineering. It is written for domain experts and developers who
want to understand and explore the application of computational
intelligence aspects (opportunities and challenges) for design and
development of a data-centric system in the context of multimedia
cloud, big data era and its related applications, such as smarter
healthcare, homeland security, traffic control trading analysis and
telecom, etc. Researchers and PhD students exploring the
significance of data centric systems in the next paradigm of
computing will find this book extremely useful.
|
You may like...
Oracle 12c - SQL
Joan Casteel
Paperback
(1)
R1,406
R1,302
Discovery Miles 13 020
|