|
Books > Computing & IT
Digital transformation in organizations optimizes the business
processes but also brings additional challenges in the form of
security threats and vulnerabilities. Cyberattacks incur financial
losses for organizations and can affect their reputations. Due to
this, cybersecurity has become critical for business enterprises.
Extensive technological adoption in businesses and the evolution of
FinTech applications require reasonable cybersecurity measures to
protect organizations from internal and external security threats.
Recent advances in the cybersecurity domain such as zero trust
architecture, application of machine learning, and quantum and
post-quantum cryptography have colossal potential to secure
technological infrastructures. Cybersecurity Issues and Challenges
for Business and FinTech Applications discusses theoretical
foundations and empirical studies of cybersecurity implications in
global digital transformation and considers cybersecurity
challenges in diverse business areas. Covering essential topics
such as artificial intelligence, social commerce, and data leakage,
this reference work is ideal for cybersecurity professionals,
business owners, managers, policymakers, researchers, scholars,
academicians, practitioners, instructors, and students.
Small and medium-sized enterprises (SMEs) are recognized as the
backbone of today's world economy. However, SMEs are well known for
having limitations and acceptance barriers in adopting new
technology even though the internet and communications channel's
revolution has changed the way people conduct business today.
Further, the COVID-19 pandemic has disturbed the operations of SMEs
and increased the burden on social media application globally. It
is essential that SMEs utilize social media to strengthen their
performance. Strengthening SME Performance Through Social Media
Adoption and Usage explores experiences in different technological,
managerial, organizational, and entrepreneurial environmental
issues. It focuses on different conceptions of factors and
consequences influencing social media usage and SME performance.
Covering topics such as corporate social responsibility, marketing
frameworks, and social media adoption, this premier reference
source is a valuable resource for entrepreneurs, business leaders
and managers, human resource managers, marketers, consultants,
students and educators of higher education, librarians,
researchers, and academicians.
How robots will change our world Some fear that robots could do
half our jobs and even wipe us out. But is that likely? Smart
machines already make our cars and clean our homes. Soon they could
drive us about, teach our children, and keep our parents company.
While dealing with the ethical concerns about Artificial
Intelligence, Bennie Mols and Nieske Vergunst reveal the history,
present and future of robots. They show how moving AI could allow
the lame to walk again, rescue survivors from collapsed buildings,
and boost the global fight against hunger and pollution. Welcome to
a vivid view of our robot future. With 60 colour photos. Topics
From dolls to industrial workers, a history of robots How robots
respond to their surroundings What robots learn about human speech
Why self-driving cars are safer and greener The possibilities of
robots in education Meet the 'cyborgs' who learn to walk again Why
evolution designs the best robots Will rogue robots take over the
world? Using robots as weapons and drones What the future holds:
2100, a Robot Odyssey Table of Contents 1 A short history of
robots, from dolls to androids Machines as man throughout history
Mechanical dolls: forerunners of the robot Enter the working
humanoid robots The next step: android robots that look like you
Uncanny valley: the problem with creepy robots 2. How do robots see
their surroundings? Getting to grips with a new environment Seeing
through the eyes of a robot Training robots to recognise objects
Robots can see what a person cannot see Feeling with whiskers:
sensing the way forward Robots use electronic ears to listen 3. How
does a robot brain work? A robot must learn to think like a human
Keeping it simple with an insect brain Machine learning is trial
and error Robots can learn without supervision The football world
cup for robots Developing robot emotional intelligence 4. Giving
humans a helping hand Robots suck: doing the dirty jobs at home A
robotic arm reaches deep into the supply chain Joseph Engelberger,
father of car factory robots Co-bots will work alongside people
Coping with variation is Amazon's challenge Building a robot car 5.
Learning to speak to people The problem with machine talk SHRDLU!
The first experiment in robot conversation Toilets are hidden:
translation problems A robotic teacher never runs out of patience
6. Robots get emotional Emotional robots encourage humans to
interact with them A robot can work out how you are feeling Why am
I afraid? Understanding human emotions Help! My robot looks angry
Establishing a bond with a robot 7. Humans need robots and robots
need humans Meet the robot psychologists Under-promise and
over-deliver performance Silicon Valley utopias vs calm technology
What is the best ratio of robots to humans? In the rubble: the
search and rescue robot The paradox of robotization 8. Humans need
robots and robots need humans Meet the robot psychologists
Under-promise and over-deliver performance * Silicon Valley utopias
vs calm technology What is the best ratio of robots to humans? In
the rubble: the search and rescue robot The paradox of robotization
9. Evolution designs the best robots How robots travel in a bumpy
world Robothand has nature's grip A two-legged walking robot The
first robot baby Working out the best path through evolution 10.
Swarming robots show the wisdom of crowds The power of robots
working together A robot swarm without a boss Goal is mapping a
building about to collapse Predicting how a robot will behave Robot
swarms in the real world A robotic swarm looks for a queen 11. The
importance of building ethical robots Isaac Asimov's three rules
about rogue robots When robots go wrong Responsible roboticists are
planning for the future Robots and the UN's development goals How
will robots change the human race? Killing machines: robots in the
military 12. 2100 - A Robot Odyssey The future of work in a robotic
world Fusing mind and body with soft robotics And then the smart
robot became creative Was that move really creative? Will robots
really take over the world?
This book will help you become the trader you want to be, but it won't
happen automatically. You won't be immediately successful the moment
you finish reading.
Earning money with day trading is possible, but it takes time,
discipline, effort and commitment on your part.Let me explain.
Throughout the book, you will learn key concepts that you can apply to
your trading right away. The knowledge you accumulate is essential
because it is what you base your trading decisions on, the decisions
that will determine your ultimate success or failure.
One of my key goals in this book is to help you expand your
tradingknowledge to make informed decisions. I will provide you with
many valuable resources to help you learn what you need to know.At the
end of each chapter you will find "Action Actions", exercises related
to the topics recently covered. If you want to get the most out of this
book, take a few minutes to complete these Actions. The results you
will get will, in most cases, be directly proportional to the effort
and commitment you invest in creating them.
I am committed to helping you become the best trader you can be, but I
will need your help to do so.
Due to the ubiquity of social media and digital information, the
use of digital images in today's digitized marketplace is
continuously rising throughout enterprises. Organizations that want
to offer their content through the internet confront plenty of
security concerns, including copyright violation. Advanced
solutions for the security and privacy of digital data are
continually being developed, yet there is a lack of current
research in this area. The Handbook of Research on Multimedia
Forensics and Content Integrity features a collection of innovative
research on the approaches and applications of current techniques
for the privacy and security of multimedia and their secure
transportation. It provides relevant theoretical frameworks and the
latest empirical research findings in the area of multimedia
forensics and content integrity. Covering topics such as 3D data
security, copyright protection, and watermarking, this major
reference work is a comprehensive resource for security analysts,
programmers, technology developers, IT professionals, students and
educators of higher education, librarians, researchers, and
academicians.
The path forward to rein in online surveillance, AI, and tech monopolies.
Technology is a gift and a curse. The five Big Tech companies―Meta, Apple, Amazon, Microsoft, and Google―have built innovative products that improve many aspects of our lives. But their intrusiveness and our dependence on them have created pressing threats to our civil rights, economy, and democracy.
Coming from an extensive background building Silicon Valley-based tech startups, Tom Kemp eloquently and precisely weaves together the threats posed by Big Tech:
- the overcollection and weaponization of our most sensitive data
- the problematic ways Big Tech uses AI to process and act upon our data
- the stifling of competition and entrepreneurship due to Big Tech's dominant market position
This richly detailed book exposes the consequences of Big Tech's digital surveillance, exploitative use of AI, and monopolistic and anticompetitive practices. It offers actionable solutions to these problems and a clear path forward for individuals and policymakers to advocate for change. By containing the excesses of Big Tech, we will ensure our civil rights are respected and preserved, our economy is competitive, and our democracy is protected.
Originating from papers presented at the 18th International
Conference on Railway Engineering Design and Operation, this book
provides up-to-date research on the use of advanced systems,
promoting their general awareness throughout the management,
design, manufacture and operation of railways and other emerging
passenger, freight and transit systems. A key emphasis is placed on
the use of computer systems in advanced railway engineering. The
included works are compiled from a variety of specialists
interested in the development of railways, including managers,
consultants, railway engineers, designers of advanced train control
systems and computer specialists. Topics covered include: Traffic
safety, security and monitoring; Train and railways analysis;
Operation of rail networks; Advanced train control;
Energy-efficient design; Traffic modelling and simulation.
Elgar Advanced Introductions are stimulating and thoughtful
introductions to major fields in the social sciences and law,
expertly written by the world's leading scholars. Designed to be
accessible yet rigorous, they offer concise and lucid surveys of
the substantive and policy issues associated with discrete subject
areas. Woodrow Barfield and Ugo Pagallo present a succinct
introduction to the legal issues related to the design and use of
artificial intelligence (AI). Exploring human rights,
constitutional law, data protection, criminal law, tort law, and
intellectual property law, they consider the laws of a number of
jurisdictions including the US, the European Union, Japan, and
China, making reference to case law and statutes. Key features
include: a critical insight into human rights and constitutional
law issues which may be affected by the use of AI discussion of the
concept of legal personhood and how the law might respond as AI
evolves in intelligence an introduction to current laws and
statutes which apply to AI and an identification of the areas where
future challenges to the law may arise. This Advanced Introduction
is ideal for law and social science students with an interest in
how the law applies to AI. It also provides a useful entry point
for legal practitioners seeking an understanding of this emerging
field.
Cyber security is a key focus in the modern world as more private
information is stored and saved online. In order to ensure vital
information is protected from various cyber threats, it is
essential to develop a thorough understanding of technologies that
can address cyber security challenges. Artificial intelligence has
been recognized as an important technology that can be employed
successfully in the cyber security sector. Due to this, further
study on the potential uses of artificial intelligence is required.
The Handbook of Research on Cyber Security Intelligence and
Analytics discusses critical artificial intelligence technologies
that are utilized in cyber security and considers various cyber
security issues and their optimal solutions supported by artificial
intelligence. Covering a range of topics such as malware, smart
grid, data breachers, and machine learning, this major reference
work is ideal for security analysts, cyber security specialists,
data analysts, security professionals, computer scientists,
government officials, researchers, scholars, academicians,
practitioners, instructors, and students.
This bestselling on-the-job reference and test preparation guide
has been fully revised for new 2022 exam objectives This fully
revised and updated resource offers complete coverage of the latest
release of CompTIA A+ exams 220-1101 & 220-1102. You'll find
learning objectives at the beginning of each chapter, exam tips,
practice exam questions, and in-depth explanations. Designed to
help you pass the CompTIA A+ exams with ease, this definitive guide
also serves as an essential on-the-job IT reference. Covers all
exam topics, including how to: Work with CPUs, RAM, BIOS,
motherboards, power supplies, and other personal computer
components Install, configure, and maintain hard drives Manage
input devices and removable media Set up, upgrade, and maintain
Microsoft Windows Troubleshoot and fix computer problems Install
printers and other peripherals Configure and secure mobile devices
>Connect to the Internet Set up wired and wireless networks
Protect your personal computer and your network Implement
virtualization and cloud-based technologies Online content
includes: Practice exams for 1101 & 1102 with hundreds of
questions One hour of video training from Mike Meyers TotalSim
simulations of performance-based questions A collection of Mike
Meyers' favorite shareware and freeware PC tools and utilities
|
|