![]() |
![]() |
Your cart is empty |
||
Books > Professional & Technical > Technology: general issues > General
No longer can executives remain at arm's length when it comes to
making technology decisions. Recently updated Federal Financial
Institutions Examination Council (FFIEC) examination handbooks are
focusing on technology and asking specific questions about the
participation of executive management and the board of directors in
the technology planning and decision making process.
Over the last few decades, the refrain for many activists in technology fields around the globe has been "attraction, promotion, and retention." Yet the secret to accomplishing this task has not been found. Despite the wide variety of theories proposed in efforts to frame and understand the issues, to date none have been accepted as a universally accurate framework, nor been applicable across varying cultures and ethnicities. Gender Inequality and the Potential for Change in Technology Fields provides innovative insights into diversity creation through potential solutions, including the attraction of more women to study technology and to enter technology careers, the navigation of suitable promotional pathways, and the retention of women in these industries. This publication examines women in IT professions, artificial intelligence, and social media. It is designed for gender theorists, government officials, policymakers, educators, individual activists and advocates, recruiters, content developers, managers, women and men in technology fields, academicians, researchers, and students.
Recent advances in array-based detectors and imaging technologies have provided high throughput systems that can operate within a substantially reduced timeframe and other techniques that can detect multiple contaminants at one time. These technologies are revolutionary in terms of food safety assessment in manufacturing, and will also have a significant impact on areas such as public health and food defence. This book summarizes the latest research and applications of sensor technologies for online and high throughput screening of food. The book first introduces high throughput screening strategies and technology platforms, and discusses key issues in sample collection and preparation. The subsequent chapters are then grouped into four sections: Part I reviews biorecognition techniques; Part II covers the use of optical biosensors and hyperspectral imaging in food safety assessment; Part III focuses on electrochemical and mass-based transducers; and finally Part IV deals with the application of these safety assessment technologies in specific food products, including meat and poultry, seafood, fruits and vegetables.
In recent years, the role of information and communications technologies in the development of agriculture and environmental issues has received significant attention in different types of international forums. With new technologies constantly developing, there is a need for research dedicated to technological progress. Innovations and Trends in Environmental and Agricultural Informatics provides emerging research on the design, development, and implementation of complex agricultural and environmental information systems, addressing the integration of several scientific domains including agronomy, mathematics, economics, and computer science. While highlighting topics such as image quality assessment, environmental policy, and supervised classification, this publication explores the applications and progress of various technologies within agricultural and environmental professions. This book is an important resource for researchers, professionals, academics, students, and scientists seeking current research on the rapidly evolving field of technology integration in agricultural production and environmental issues.
Network Security and how to traceback, attack and react to network vulnerability and threats. Concentration on traceback techniques for attacks launched with single packets involving encrypted payloads, chaff and other obfuscation techniques. Due to the development of various tools and techniques to increase the source of network attacks, our interest will include network forensics, with the goal of identifying the specific host which launched the attack and cause denial of services (DoS). Also we will include tracing an attack that would compromise the confidentiality and integrity of information on the Intelligence Community (IC) network, which includes the NIPRNET, SIPRNET, JWICS, and IC enclaves. Deliverables will be technical reports, software, demonstrations, and results of experiments, which will provide evidence and metrics. The emergence of hybrid worm attacks utilizing multiple exploits to breach security infrastructures has forced enterprises to look into solutions that can defend their critical assets against constantly shifting threats.
|
![]() ![]() You may like...
Time-dependent Problems in Imaging and…
Barbara Kaltenbacher, Thomas Schuster, …
Hardcover
R4,265
Discovery Miles 42 650
Stochastic Analysis of Mixed Fractional…
Yuliya Mishura, Mounir Zili
Hardcover
The Nonlinear Schroedinger Equation
Nalan Antar, Ilkay Bakirtas
Hardcover
R3,347
Discovery Miles 33 470
Advances in Complex Analysis and…
Francisco Bulnes, Olga Hachay
Hardcover
R3,331
Discovery Miles 33 310
Fundamentals of Algebraic Graph…
Hartmut Ehrig, Karsten Ehrig, …
Hardcover
R3,428
Discovery Miles 34 280
Infinite Words, Volume 141 - Automata…
Dominique Perrin, Jean-Eric Pin
Hardcover
R4,319
Discovery Miles 43 190
From Social Data Mining and Analysis to…
Mehmet Kaya, OEzcan ErdoGan, …
Hardcover
R4,249
Discovery Miles 42 490
On Meaningful Scientific Laws
Jean-Claude Falmagne, Christopher Doble
Hardcover
Fundamental Problems in Computing…
Sekharipuram S. Ravi, Sandeep Kumar Shukla
Hardcover
R3,187
Discovery Miles 31 870
Mathematical Statistics with…
William Mendenhall, Dennis Wackerly, …
Paperback
|