|
Books > Computing & IT
The security of an organizational information system with the
invention of next-generation technologies is a prime focus these
days. The industries and institutions in the field of computing and
communication, especially in internet of things, cloud computing,
mobile networks, next-generation networks, the energy market,
banking sector, government sector, and many more, are primarily
focused on these security and privacy issues. Blockchain is a new
technology that has changed the scenario when it comes to
addressing security concerns and resolving traditional safety
issues. These industries have started developing applications based
on the blockchain underlying platform to tap into this unlimited
potential. Blockchain technologies have a great future, but there
are still many challenges and issues to resolve for optimal design
and utilization of the technology. Revolutionary Applications of
Blockchain-Enabled Privacy and Access Control focuses on the recent
challenges, design, and issues in the field of blockchain
technologies-enabled privacy and advanced security practices in
computing and communication. This book provides the latest research
findings, solutions, and relevant theoretical frameworks in
blockchain technologies, information security, and privacy in
computing and communication. While highlighting the technology
itself along with its applications and future outlook, this book is
ideal for IT specialists, security analysts, cybersecurity
professionals, researchers, academicians, students, scientists, and
IT sector industry practitioners looking for research exposure and
new ideas in the field of blockchain.
Computer-Aided Oral and Maxillofacial Surgery: Developments,
Applications, and Future Perspectives is an ideal resource for
biomedical engineers and computer scientists, clinicians and
clinical researchers looking for an understanding on the latest
technologies applied to oral and maxillofacial surgery. In facial
surgery, computer-aided decisions supplement all kind of treatment
stages, from a diagnosis to follow-up examinations. This book gives
an in-depth overview of state-of-the-art technologies, such as deep
learning, augmented reality, virtual reality and intraoperative
navigation, as applied to oral and maxillofacial surgery. It covers
applications of facial surgery that are at the interface between
medicine and computer science. Examples include the automatic
segmentation and registration of anatomical and pathological
structures, like tumors in the facial area, intraoperative
navigation in facial surgery and its recent developments and
challenges for treatments like zygomatic implant placement.
The Destiny Grimoire Anthology is a must-have collectible lore
compendium assembled for Destiny's devoted and enlightened scholars
and lore lovers, as well as fans of fantasy and science fiction
storytelling. The Destiny Grimoire Anthology weaves tales from
multiple sources together for the first time, casting new light on
Destiny's most legendary heroes, infamous villains, and their
greatest moments of triumph and tragedy.
As the videogame industry has grown up, the need for better stories
and characters has dramatically increased, yet traditional
screenwriting techniques alone cannot equip writers for the unique
challenges of writing stories where the actions and decisions of a
diverse range of players are at the centre of every narrative
experience. Game Writing: Narrative Skills for Videogames was the
first book to demystify the emerging field of game writing by
identifying and explaining the skills required for creating
videogame narrative. Through the insights and experiences of
professional game writers, this revised edition captures a snapshot
of the narrative skills employed in today's game industry and
presents them as practical articles accompanied by exercises for
developing the skills discussed. The book carefully explains the
foundations of the craft of game writing, detailing all aspects of
the process from the basics of narrative to guiding the player and
the challenges of nonlinear storytelling. Throughout the book there
is a strong emphasis on the skills developers and publishers expect
game writers to know. This second edition brings the material up to
date and adds four new chapters covering MMOs, script formats,
narrative design for urban games, and new ways to think about
videogame narrative as an art form. Suitable for both beginners and
experienced writers, Game Writing is the essential guide to all the
techniques of game writing. There's no better starting point for
someone wishing to get into this exciting field, whether they are
new game writers wishing to hone their skills, or screenwriters
hoping to transfer their skills to the games industry.
Intelligence Science: Leading the Age of Intelligence covers the
emerging scientific research on the theory and technology of
intelligence, bringing together disciplines such as neuroscience,
cognitive science, and artificial intelligence to study the nature
of intelligence, the functional simulation of intelligent behavior,
and the development of new intelligent technologies. The book
presents this complex, interdisciplinary area of study in an
accessible volume, introducing foundational concepts and methods,
and presenting the latest trends and developments. Chapters cover
the Foundations of neurophysiology, Neural computing, Mind models,
Perceptual intelligence, Language cognition, Learning, Memory,
Thought, Intellectual development and cognitive structure, Emotion
and affect, and more. This volume synthesizes a very rich and
complex area of research, with an aim of stimulating new lines of
enquiry.
The technology of Artificial Intelligence is here, and moving fast,
without ethical standards in place. A Blueprint for the Regulation
of Artificial Intelligence Technologies leans on classical western
philosophy for its ethical grounding. Values such as conscience,
rights, equity, and discrimination, establish a basis for
regulatory standards. Multiple international agencies with
governing interests are compared. The development of ethical
standards is suggested through two new non-governmental
organizations (NGOs). The first is to develop standards that evolve
from practice, while the second acts as an ombudsman to settle
abuse. Both NGOs are envisioned to cooperate with regulators. More
than seeking a perfect solution, the book aims to balance the
tension between conflicting interests, with the goal to keep this
dangerously wonderful technology under global human control. For
that to materialize, the technology needs to have a seat on the
table of global ethics. The final chapter lists fourteen thinking
points to achieve an ethics balance for new technologies.
Data analytics is proving to be an ally for epidemiologists as they
join forces with data scientists to address the scale of crises.
Analytics examined from many sources can derive insights and be
used to study and fight global outbreaks. Pandemic analytics is a
modern way to combat a problem as old as humanity itself: the
proliferation of disease. Machine Learning and Data Analytics for
Predicting, Managing, and Monitoring Disease explores different
types of data and discusses how to prepare data for analysis,
perform simple statistical analyses, create meaningful data
visualizations, predict future trends from data, and more by
applying cutting edge technology such as machine learning and data
analytics in the wake of the COVID-19 pandemic. Covering a range of
topics such as mental health analytics during COVID-19, data
analysis and machine learning using Python, and statistical model
development and deployment, it is ideal for researchers,
academicians, data scientists, technologists, data analysts,
diagnosticians, healthcare professionals, computer scientists, and
students.
For computer-security courses that are taught at the undergraduate
level and that have as their sole prerequisites an introductory
computer science sequence (e.g., CS 1/CS 2). A new Computer
Security textbook for a new generation of IT professionals. Unlike
most other computer security textbooks available today,
Introduction to Computer Security, 1e does NOT focus on the
mathematical and computational foundations of security, and it does
not assume an extensive background in computer science. Instead it
looks at the systems, technology, management, and policy side of
security, and offers students fundamental security concepts and a
working knowledge of threats and countermeasures with "just-enough"
background in computer science. The result is a presentation of the
material that is accessible to students of all levels.
Today, network technology is ubiquitous. Whether at home or on the
move, at work or at play, the modern data network is a part of our
daily lives. Streaming video, social media and web browsing are
just a few of the popular applications that rely on the network,
and this list will continue to grow with autonomous vehicles,
virtual reality and others, each with their own unique needs. To
address the challenges of the demand for these services, the
network must continually evolve with new technologies. However,
determining which technologies are worth focusing on today is
difficult, and the issues which they represent, and address are
often complex. In Network Horizons Emerging Technologies and
Applications 2018 - 2019 Edition, the author highlights key areas
of interest for network technology, helping the reader to identify
those of the highest importance by explaining the what, why and
when of each of these important areas of development to make sure
they and their business are prepared for the future.
|
|