|
Books > Computing & IT
Cybersecurity is vital for all businesses, regardless of sector.
With constant threats and potential online dangers, businesses must
remain aware of the current research and information available to
them in order to protect themselves and their employees.
Maintaining tight cybersecurity can be difficult for businesses as
there are so many moving parts to contend with, but remaining
vigilant and having protective measures and training in place is
essential for a successful company. The Research Anthology on
Business Aspects of Cybersecurity considers all emerging aspects of
cybersecurity in the business sector including frameworks, models,
best practices, and emerging areas of interest. This comprehensive
reference source is split into three sections with the first
discussing audits and risk assessments that businesses can conduct
to ensure the security of their systems. The second section covers
training and awareness initiatives for staff that promotes a
security culture. The final section discusses software and systems
that can be used to secure and manage cybersecurity threats.
Covering topics such as audit models, security behavior, and
insider threats, it is ideal for businesses, business
professionals, managers, security analysts, IT specialists,
executives, academicians, researchers, computer engineers, graduate
students, and practitioners.
Opinion Mining and Text Analytics on Literary Works and Social
Media introduces the use of artificial intelligence and big data
analytics techniques which can apply opinion mining and text
analytics on literary works and social media. This book focuses on
theories, method and approaches in which data analytic techniques
can be used to analyze data from social media, literary books,
novels, news, texts, and beyond to provide a meaningful pattern.
The subject area of this book is multidisciplinary; related to data
science, artificial intelligence, social science and humanities,
and literature. This is an essential resource for scholars,
Students and lecturers from various fields of data science,
artificial intelligence, social science and humanities, and
literature, university libraries, new agencies, and many more.
From climate change forecasts and pandemic maps to Lego sets and
Ancestry algorithms, models encompass our world and our lives. In
her thought-provoking new book, Annabel Wharton begins with a
definition drawn from the quantitative sciences and the philosophy
of science but holds that history and critical cultural theory are
essential to a fuller understanding of modeling. Considering
changes in the medical body model and the architectural model, from
the Middle Ages to the twenty-first century, Wharton demonstrates
the ways in which all models are historical and political.
Examining how cadavers have been described, exhibited, and visually
rendered, she highlights the historical dimension of the modified
body and its depictions. Analyzing the varied reworkings of the
Holy Sepulchre in Jerusalem-including by monumental commanderies of
the Knights Templar, Alberti's Rucellai Tomb in Florence,
Franciscans' olive wood replicas, and video game renderings-she
foregrounds the political force of architectural representations.
And considering black boxes-instruments whose inputs we control and
whose outputs we interpret, but whose inner workings are beyond our
comprehension-she surveys the threats posed by such opaque
computational models, warning of the dangers that models pose when
humans lose control of the means by which they are generated and
understood. Engaging and wide-ranging, Models and World Making
conjures new ways of seeing and critically evaluating how we make
and remake the world in which we live.
Advances in healthcare technologies have offered real-time guidance
and technical assistance for diagnosis, monitoring, operation, and
interventions. The development of artificial intelligence, machine
learning, internet of things technology, and smart computing
techniques are crucial in today's healthcare environment as they
provide frictionless and transparent financial transactions and
improve the overall healthcare experience. This, in turn, has
far-reaching effects on economic, psychological, educational, and
organizational improvements in the way we work, teach, learn, and
provide care. These advances must be studied further in order to
ensure they are adapted and utilized appropriately. Mathematical
Modeling for Smart Healthcare Systems presents the latest research
findings, ideas, innovations, developments, and applications in the
field of modeling for healthcare systems. Furthermore, it presents
the application of innovative techniques to complex problems in the
case of healthcare. Covering a range of topics such as artificial
intelligence, deep learning, and personalized healthcare services,
this reference work is crucial for engineers, healthcare
professionals, researchers, academicians, scholars, practitioners,
instructors, and students.
Drawing on rich, empirical case studies this innovative book
provides a contemporary and comprehensive exploration of the
plural, dynamic and precarious processes, materials, practices,
interventions and relationships on social network sites, and their
resultant power effects, when copyright and data privacy rights are
at stake. In pursuit of this objective, chapters develop a
cutting-edge conceptual power lens that brings together
Actor-Network theory and Foucauldian scholarship on power. Applying
this analytical framework to the case studies of Facebook (data
protection) and YouTube (copyright), Asma Vranaki draws critical
attention to underexplored and novel matters in digital regulation.
These matters include resistance; the materiality of regulation;
complex, contingent, fragile and dynamic digital 'regulatory
spaces'; the contingency of power; law as a heterogenous
'assemblage'; the unintended consequence of local orderings; and
the links between power and spaces. Ultimately, the author
demonstrates that power effects are highly localised, precarious
and contingent outcomes of manifold, complex and fluid alliances
between diverse humans and non-humans. Advancing various
contentions on how social network sites can be successfully
regulated, the empirical analyses and multi-disciplinary approaches
in this book will prove invaluable to students, scholars and
practitioners of law, particularly those interested in regulation,
data protection and copyright in social network sites.
Crypto is red-hot right now.
Media outlets are giving crypto unprecedented airtime while the general
public has been captivated by the staggering price rises seen across
the board. When measured in US dollar terms, Bitcoin ballooned by over
10 times in the 2017 calendar year alone.
Beyond the tremendous increases in value, crypto has received so much
attention because of the challenging questions it raises about money
and the role of central authorities such as banks and governments -
roles which were taken for granted in the past.Before the start of the
crypto revolution, government-issued banknotes and coins seemed to be
the only conceivable forms of money. We had never known any other way
in our lifetime, nor in that of our parents.
Fast-forward to today, and many members of the crypto community
ardently believe that crypto is destined to replace government-issued
money, just as the personal computer replaced the typewriter. If this
vision is even halfright, the implications are hard to overstate. At
the very least, crypto promises to substantially weaken the monopoly
power of centralized institutions.
But these are still early days for crypto. And most members of the
public find crypto to be, well, cryptic. As United States Senator
Thomas Carper said: "Virtual currencies, perhaps most notably Bitcoin,
have captured the imagination of some, struck fear among others, and
confused the heck out of the rest of us."1 Perhaps some readers can
relate to that sentiment.
Truthfully, few people have an accurate understanding of how crypto
works, and many are highly skeptical. The Crypto Intro has been written
to explain everything and respond to the tough crypto questions.But we
may be getting ahead of ourselves. Before taking a look at how crypto
functions, let's make sure we understand what we're talking about.
Weather forecasting and climate behavioral analysis have
traditionally been done using complicated physics models and
accompanying atmospheric variables. However, the traditional
approaches lack common tools, which can lead to incomplete
information about the weather and climate conditions, in turn
affecting the prediction accuracy rate. To address these problems,
the advanced technological aspects through the spectrum of
artificial intelligence of things (AIoT) models serve as a budding
solution. Further study on artificial intelligence of things and
how it can be utilized to improve weather forecasting and climatic
behavioral analysis is crucial to appropriately employ the
technology. Artificial Intelligence of Things for Weather
Forecasting and Climatic Behavioral Analysis discusses practical
applications of artificial intelligence of things for
interpretation of weather patterns and how weather information can
be used to make critical decisions about harvesting, aviation, etc.
This book also considers artificial intelligence of things issues
such as managing natural disasters that impact the lives of
millions. Covering topics such as deep learning, remote sensing,
and meteorological applications, this reference work is ideal for
data scientists, industry professionals, researchers, academicians,
scholars, practitioners, instructors, and students.
The definitive anthology of Tank Girl, collecting the classic,
newly colored stories from original creators Alan Martin and Jamie
Hewlett! Includes three exclusive art! All three volumes of the
cult-classic Tank Girl comics (1988-1995) from legendary creators
Alan Martin and Jamie Hewlett (Gorillaz). Dive into the twisted and
chaotic world of Tank Girl, Jet Girl, Sub Girl and Booga, and
experience the original stories that captured the hearts of readers
everywhere, then shot them to oblivion (by accident of course)!
With all new colouring, this is the complete Tank Girl collection
you won't want to miss.
Most people were not familiar with Bitcoin when it was initially
released in the year 2009. But as of now, Bitcoin is the most popular
type of cryptocurrency available in the world. This decentralized
digital currency gained a lot of value over the years and increased a
lot in value compared to its value in the beginning.
Most people still are confused about the concepts of Blockchain,
Cryptocurrency, and specifically Bitcoin. Even though some people are
enthusiastic to know everything about Bitcoin, they find it hard
because of the comprehensive terminology used by experts to describe
it.For example, let us say that Bitcoin is a form of cryptocurrency
that has been verified by network nodes with the help of cryptography
and is recorded in a public ledger known as a blockchain. You might
find it extremely hard to understand.
This book is a simple, easy and fast way to understand digital
currency. Bitcoin is all the rage now but there is so much mystery
behind it. Want to get to know what this is all about? This book has it
all. You get a beginners guide to Bitcoin and cryptocurrency. No longer
will the terms Blockchain, Mining, and Satoshi confuse you.
'Ground-breaking and ambitious' - Nick Srnicek, author of Platform
Capitalism Whoever controls the platforms, controls the future.
Platform Socialism sets out an alternative vision and concrete
proposals for a digital economy that expands our freedom. Powerful
tech companies now own the digital infrastructure of twenty-first
century social life. Masquerading as global community builders,
these companies have developed sophisticated new techniques for
extracting wealth from their users. James Muldoon shows how
grassroots communities and transnational social movements can take
back control from Big Tech. He reframes the technology debate and
proposes a host of new ideas, from the local to the international,
for how we can reclaim the emancipatory possibilities of digital
platforms. Drawing on sources from forgotten histories to
contemporary prototypes, he proposes an alternative system and
charts a roadmap for how we can get there.
During the COVID-19 era, the functions of social policy and public
administration have undergone a meaningful change, especially with
the advancement of digital elements and online and virtual
functions. Cyber developments, cyber threats, and the effects of
cyberwar on the public administrations of countries have become
critical research subjects, and it is important to have resources
that can introduce and guide users through the current best
practices, laboratory methods, policies, protocols, and more within
cyber public administration and social policy. The Handbook of
Research on Cyber Approaches to Public Administration and Social
Policy focuses on the post-pandemic changes in the functions of
social policy and public administration. It also examines the
implications of the cyber cosmos on public and social policies and
practices from a broad perspective. Covering topics such as
intersectional racism, cloud computing applications, and public
policies, this major reference work is an essential resource for
scientists, laboratory technicians, professionals, technologists,
computer scientists, policymakers, students, educators,
researchers, and academicians.
Developing nations have seen many technological advances in the
last decade. Although beneficial and progressive, they can lead to
unsafe mobile devices, system networks, and internet of things
(IoT) devices, causing security vulnerabilities that can have
ripple effects throughout society. While researchers attempt to
find solutions, improper implementation and negative uses of
technology continue to create new security threats to users.
Cybersecurity Capabilities in Developing Nations and Its Impact on
Global Security brings together research-based chapters and case
studies on systems security techniques and current methods to
identify and overcome technological vulnerabilities, emphasizing
security issues in developing nations. Focusing on topics such as
data privacy and security issues, this book is an essential
reference source for researchers, university academics, computing
professionals, and upper-level students in developing countries
interested in the techniques, laws, and training initiatives
currently being implemented and adapted for secure computing.
This book is not deep research work, as I am not a Ph.D. professor at
any international university.
I was a teacher. I was also a real estate investor. And now I am a
fulltime writer. Nevertheless, I am also research addicted reading two
books per month.
Moreover, as I studied Macroeconomics, I found out that the world has
been threatened by a new virus, the decentralized digital virus.
Metaverse, Decentraland, blockchain, bitcoin standard, smart contracts,
protocols, nodes, tokens, and halvings suddenly invaded my eyes with
such a power that I had to understand what the hell was that about. If
you do not know what these concepts are, you are in the right place.
Some of these articles are controversial, others you might agree with,
but most of them try to explain how the world is shifting into a fully
digital mode.
Central banks and governments are trying to keep the boat afloat in a
perfect MMT style, while politicians still do not quite understand how
the moneyprinting machine works. They keep saying we need raise taxes
to pay the debt when the government is the only issuer, so it cannot
become insolvent.
With deflationary pressure from technological innovations, the need for
fresh money puts central banks in the red to control inflation.
Covid-19 hit hard on every economy, but only the issuers can control
the orchestra. Straightforwardly, as a non-native writer, I will try to
give you a perspective about how the world is changing, from analog to
digital, from the real world to the metaverse, with a fascinating
silent war between centralized money printing power and decentralized
fully digital crypto ecosystems.
|
|