![]() |
![]() |
Your cart is empty |
||
The security of information and communication technology is a high priority for any organization. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. Security and Privacy Management, Techniques, and Protocols is a critical scholarly resource that examines emerging protocols and methods for effective management of information security at organizations. Featuring coverage on a broad range of topics such as cryptography, secure routing protocols, and wireless security, this book is geared towards academicians, engineers, IT specialists, researchers, and students seeking current research on security and privacy management.
Using the familiar software Microsoft ® Excel, this book examines the applications of complex variables. Implementation of the included problems in Excel eliminates the “black box†nature of more advanced computer software and programming languages and therefore the reader has the chance to become more familiar with the underlying mathematics of the complex variable problems. This book consists of two parts. In Part I, several topics are covered that one would expect to find in an introductory text on complex variables. These topics include an overview of complex numbers, functions of a complex variable, and the Cauchy integral formula. In particular, attention is given to the study of analytic complex variable functions. This attention is warranted because of the property that the real and imaginary parts of an analytic complex variable function can be used to solve the Laplace partial differential equation (PDE). Laplace's equation is ubiquitous throughout science and engineering as it can be used to model the steady-state conditions of several important transport processes including heat transfer, soil-water flow, electrostatics, and ideal fluid flow, among others. In Part II, a specialty application of complex variables known as the Complex Variable Boundary Element Method (CVBEM) is examined. CVBEM is a numerical method used for solving boundary value problems governed by Laplace's equation. This part contains a detailed description of the CVBEM and a guide through each step of constructing two CVBEM programs in Excel. The writing of these programs is the culminating event of the book. Students of complex variables and anyone with interest in a novel method for approximating potential functions using the principles of complex variables are the intended audience for this book. The Microsoft Excel applications (including simple programs as well as the CVBEM program) covered will also be of interest in the industry, as these programs are accessible to anybody with Microsoft Office.
For any organization, analysis of performance and effectiveness through available data allows for informed decision making. Data envelopment analysis, or DEA, is a popular, effective method that can be used to measure productive efficiency in operations management assessment. Data Envelopment Analysis and Effective Performance Assessment addresses the myriad of practical uses and innovative developments of DEA. Emphasizing the importance of analyzing productivity by measuring inputs, goals, economic growth, and performance, this book covers a wide breadth of innovative knowledge. This book is essential reading for managers, business professionals, students of business and ICT, and computer engineers.
Technology continues to make great strides in society by providing opportunities for advancement, inclusion, and global competency. As new systems and tools arise, novel applications are created as well. Smart Technology Applications in Business Environments is an essential reference source for the latest scholarly research on the risks and opportunities of utilizing the latest technologies in different aspects of society such as education, healthcare systems, and corporations. Featuring extensive coverage on a broad range of topics and perspectives including virtual reality, robotics, and social media, this publication is ideally designed for academicians, researchers, students, and practitioners seeking current research on the improvement and increased productivity from the implementation of smart technologies.
The internet of things (IoT) is quickly growing into a large industry with a huge economic impact expected in the near future. However, the users' needs go beyond the existing web-like services, which do not provide satisfactory intelligence levels. Ambient intelligence services in IoT environments is an emerging research area that can change the way that technology and services are perceived by the users. Ambient Intelligence Services in IoT Environments: Emerging Research and Opportunities is a unique source that systemizes recent trends and advances for service development with such key technological enablers of modern ICT as ambient intelligence, IoT, web of things, and cyber-physical systems. The considered concepts and models are presented using a smart spaces approach with a particular focus on the Smart-M3 platform, which is now shaping into an open source technology for creating ontology-based smart spaces and is shifting towards the development of web of things applications and socio-cyber-physical systems. Containing coverage on a broad range of topics such as fog computing, smart environments, and virtual reality, multitudes of researchers, students, academicians, and professionals will benefit from this timely reference.
Human computer interaction is constantly evolving in many areas and facets of modern society. Analyzing these interactions can provide a more balanced understanding of these technological advances as they pertain to people's lives. Experience-Based Human-Computer Interactions: Emerging Research and Opportunities is a pivotal reference source that provides in-depth discussions on the progression and contemporary applications of human computer interaction. Highlighting relevant topic areas such as semantic support, software intensive systems, ontology applications, and conceptual objects, this publication is ideal for engineers, academicians, students, and researchers that would like to attain more information on recent advances being made to bridge the gap between human and computer interactions.
Information Security and Ethics: Social and Organizational Issues brings together examples of the latest research from a number of international scholars addressing a wide range of issues significant to this important and growing field of study. These issues are relevant to the wider society, as well as to the individual, citizen, educator, student and industry professional. With individual chapters focusing on areas including web accessibility; the digital divide; youth protection and surveillance; Information security; education; ethics in the Information professions and Internet voting; this book provides an invaluable resource for students, scholars and professionals currently working in information Technology related areas.
This is a rigorous and complete textbook for a first course on information retrieval from the computer science perspective. It provides an up-to-date student oriented treatment of information retrieval including extensive coverage of new topics such as web retrieval, web crawling, open source search engines and user interfaces. From parsing to indexing, clustering to classification, retrieval to ranking, and user feedback to retrieval evaluation, all of the most important concepts are carefully introduced and exemplified. The contents and structure of the book have been carefully designed by the two main authors, with individual contributions coming from leading international authorities in the field, including Yoelle Maarek, Senior Director of Yahoo Research Israel; Dulce Ponceleon IBM Research; and Malcolm Slaney, Yahoo Research USA. This completely reorganized, revised and enlarged second edition of "Modern Information Retrieval" contains many new chapters and double the number of pages and bibliographic references of the first edition, and a companion website www.mir2ed.org with teaching material. It will prove invaluable to students, professors, researchers, practitioners, and scholars of this fascinating field of information retrieval.
a) Provides basic concepts of Natural Language Processing for getting started from scratch. b) Introduces advanced concepts for scaling, deep learning and real-world issues seen in the industry. c) Provides applications of Natural Language Processing over a diverse set of 15 industry verticals. d) Shares practical implementation including Python code, tools and techniques for a variety of Natural Language Processing applications and industrial products for a hands-on experience. e) Gives readers a sense of all there is to build successful Natural Language Processing projects: the concepts, applications, opportunities and hands-on material.
Revealing the unfolding story of Artificial Intelligence, Richard Susskind presents a short non-technical guide that challenges us to think differently about AI. Susskind brings AI out of computing laboratories, big tech companies, and start-ups - and into everyday life. In recent years, and certainly since the launch of ChatGPT, there has been massive public and professional interest in Artificial Intelligence. But people are confused about what AI is, what it can and cannot do, what is yet to come, and whether AI is good or bad for humanity and civilisation - whether it will provide solutions to mankind's major challenges or become our gravest existential threat. There is also confusion about how we should regulate AI and where we should draw moral boundaries on its use. In How To Think About AI, Richard Susskind draws on his experience of working on AI since the early 1980s. For Susskind, balancing the benefits and threats of artificial intelligence is the defining challenge of our age. He explores the history of AI and possible scenarios for its future. His views on AI are not always conventional. He positions ChatGPT and generative AI as no more than the latest chapter in the ongoing story of AI and claims we are still at the foothills of developments. He argues that to think responsibly about the impact of AI requires us to look well beyond todayâs technologies, suggesting that not-yet-invented technologies will have far greater impact on us in the 2030s than the tools we have today. This leads Susskind to discuss the possibility of conscious machines, magnificent new AI-enabled virtual worlds, and the impact of AI on the evolution of biological humans.
With the continued progression of technologies such as mobile computing and the internet of things (IoT), cybersecurity has swiftly risen to a prominent field of global interest. This has led to cyberattacks and cybercrime becoming much more sophisticated to a point where cybersecurity can no longer be the exclusive responsibility of an organization's information technology (IT) unit. Cyber warfare is becoming a national issue and causing various governments to reevaluate the current defense strategies they have in place. Cyber Security Auditing, Assurance, and Awareness Through CSAM and CATRAM provides emerging research exploring the practical aspects of reassessing current cybersecurity measures within organizations and international governments and improving upon them using audit and awareness training models, specifically the Cybersecurity Audit Model (CSAM) and the Cybersecurity Awareness Training Model (CATRAM). The book presents multi-case studies on the development and validation of these models and frameworks and analyzes their implementation and ability to sustain and audit national cybersecurity strategies. Featuring coverage on a broad range of topics such as forensic analysis, digital evidence, and incident management, this book is ideally designed for researchers, developers, policymakers, government officials, strategists, security professionals, educators, security analysts, auditors, and students seeking current research on developing training models within cybersecurity management and awareness.
In the very near future, "smart" technologies and "big data" will
allow us to make large-scale and sophisticated interventions in
politics, culture, and everyday life. Technology will allow us to
solve problems in highly original ways and create new incentives to
get more people to do the right thing. But how will such
"solutionism" affect our society, once deeply political, moral, and
irresolvable dilemmas are recast as uncontroversial and easily
manageable matters of technological efficiency? What if some such
problems are simply vices in disguise? What if some friction in
communication is productive and some hypocrisy in politics
necessary? The temptation of the digital age is to fix
everything--from crime to corruption to pollution to obesity--by
digitally quantifying, tracking, or gamifying behavior. But when we
change the motivations for our moral, ethical, and civic behavior
we may also change the very nature of that behavior. Technology,
Evgeny Morozov proposes, can be a force for improvement--but only
if we keep solutionism in check and learn to appreciate the
imperfections of liberal democracy. Some of those imperfections are
not accidental but by design.
As the internet and its applications grow more sophisticated and widespread, so too do the strategies of modern terrorist groups. The existence of the dark web adds to the online arsenal of groups using digital networks and sites to promulgate ideology or recruit supporters. It is necessary to understand how terrorist cells are using and adapting online tools in order to counteract their efforts. Utilization of New Technologies in Global Terror: Emerging Research and Opportunities is an informative resource that explores new developments in technological advancements and the progression of terror organizations while also examining non-government activist organizations and their new role in protecting internet freedom and combating cyberterrorism. Featuring relevant topics such as social media, cyber threats, and counterterrorism, this publication will benefit government officials, political scientists, policymakers, researchers, academicians, and graduate students interested in political science, mass communication, and cyberwarfare.
An integral element of software engineering is model engineering. They both endeavor to minimize cost, time, and risks with quality software. As such, model engineering is a highly useful field that demands in-depth research on the most current approaches and techniques. Only by understanding the most up-to-date research can these methods reach their fullest potential. Advancements in Model-Driven Architecture in Software Engineering is an essential publication that prepares readers to exercise modeling and model transformation and covers state-of-the-art research and developments on various approaches for methodologies and platforms of model-driven architecture, applications and software development of model-driven architecture, modeling languages, and modeling tools. Highlighting a broad range of topics including cloud computing, service-oriented architectures, and modeling languages, this book is ideally designed for engineers, programmers, software designers, entrepreneurs, researchers, academicians, and students.
As the world has adapted to the age of digital technology, present day business leaders are required to change with the times as well. Addressing and formatting their business practices to not only encompass digital technologies, but expand their capabilities, the leaders of today must be flexible and willing to familiarize themselves with all types of global business practices. Global Business Leadership Development for the Fourth Industrial Revolution is a collection of advanced research on the methods and tactics utilized to succeed as a leader in the digital age. While highlighting topics including data privacy, corporate governance, and risk management, this book is ideally designed for business professionals, administrators, managers, executives, researchers, academicians, and business students who want to improve their understanding of the strategic role of digital technologies in the global economy, in networks and organizations, in teams and work groups, in information systems, and at the level of individuals as actors in digitally networked environments.
As big data becomes increasingly pervasive and cloud computing utilization becomes the norm, the security and privacy of our systems and data becomes more critical with emerging security and privacy threats and challenges. This book presents a comprehensive view on how to advance security and privacy in big data, cloud computing, and their applications. Topics include cryptographic tools, SDN security, big data security in IoT, privacy preserving in big data, security architecture based on cyber kill chain, privacy-aware digital forensics, trustworthy computing, privacy verification based on machine learning, and chaos-based communication systems. This book is an essential reading for networking, computing, and communications professionals, researchers, students and engineers, working with big data and cloud computing.
4 zettabytes (4 billion terabytes) of data generated in 2013, 44 zettabytes predicted for 2020 and 185 zettabytes for 2025. These figures are staggering and perfectly illustrate this new era of data deluge. Data has become a major economic and social challenge. The speed of processing of these data is the weakest link in a computer system: the storage system. It is therefore crucial to optimize this operation. During the last decade, storage systems have experienced a major revolution: the advent of flash memory. Flash Memory Integration: Performance and Energy Issues contributes to a better understanding of these revolutions. The authors offer us an insight into the integration of flash memory in computer systems, their behavior in performance and in power consumption compared to traditional storage systems. The book also presents, in their entirety, various methods for measuring the performance and energy consumption of storage systems for embedded as well as desktop/server computer systems. We are invited on a journey to the memories of the future.
|
![]() ![]() You may like...
Systemics of Incompleteness and…
Gianfranco Minati, Mario R. Abram, …
Hardcover
R2,930
Discovery Miles 29 300
Concept Parsing Algorithms (CPA) for…
Uri Shafrir, Masha Etkind
Hardcover
R3,550
Discovery Miles 35 500
Data Science and Internet of Things…
Giancarlo Fortino, Antonio Liotta, …
Hardcover
R4,234
Discovery Miles 42 340
Advances in Interdisciplinary Research…
P.K. Kapur, Gurinder Singh, …
Hardcover
R2,967
Discovery Miles 29 670
|