0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (121)
  • R250 - R500 (230)
  • R500+ (762)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Social & legal aspects of computing > Privacy & data protection

Open Content Licensing - Cultivating the Creative Commons (Paperback): Brian Fitzgerald Open Content Licensing - Cultivating the Creative Commons (Paperback)
Brian Fitzgerald
R638 Discovery Miles 6 380 Ships in 10 - 15 working days

Open Content Licensing: Cultivating the Creative Commons brings together papers from some of the most prominent thinkers of our time on the internet, law and the importance of open content licensing in the digital age. Drawing on material presented at the Queensland University of Technology conference of January 2005, the text provides a snapshot of the thoughts of over 30 Australian and international experts on topics surrounding the international Creative Commons movement, from the landmark Eldred v Ashcroft copyright term decision to the legalities of digital sampling in a remix world.Open Content Licensing is a joint publication of Sydney University Press, Queensland University of Technology and CCI.

The CISO's Transformation - Security Leadership in a High Threat Landscape (Paperback, 1st ed. 2021): Raj Badhwar The CISO's Transformation - Security Leadership in a High Threat Landscape (Paperback, 1st ed. 2021)
Raj Badhwar
R1,436 Discovery Miles 14 360 Ships in 9 - 17 working days

The first section of this book addresses the evolution of CISO (chief information security officer) leadership, with the most mature CISOs combining strong business and technical leadership skills. CISOs can now add significant value when they possess an advanced understanding of cutting-edge security technologies to address the risks from the nearly universal operational dependence of enterprises on the cloud, the Internet, hybrid networks, and third-party technologies demonstrated in this book. In our new cyber threat-saturated world, CISOs have begun to show their market value. Wall Street is more likely to reward companies with good cybersecurity track records with higher stock valuations. To ensure that security is always a foremost concern in business decisions, CISOs should have a seat on corporate boards, and CISOs should be involved from beginning to end in the process of adopting enterprise technologies. The second and third sections of this book focus on building strong security teams, and exercising prudence in cybersecurity. CISOs can foster cultures of respect through careful consideration of the biases inherent in the socio-linguistic frameworks shaping our workplace language and through the cultivation of cyber exceptionalism. CISOs should leave no stone unturned in seeking out people with unique abilities, skills, and experience, and encourage career planning and development, in order to build and retain a strong talent pool. The lessons of the breach of physical security at the US Capitol, the hack back trend, and CISO legal liability stemming from network and data breaches all reveal the importance of good judgment and the necessity of taking proactive stances on preventative measures. This book will target security and IT engineers, administrators and developers, CIOs, CTOs, CISOs, and CFOs. Risk personnel, CROs, IT, security auditors and security researchers will also find this book useful.

A Practical Guide to Security Engineering and Information Assurance (Hardcover): Debra S. Herrmann A Practical Guide to Security Engineering and Information Assurance (Hardcover)
Debra S. Herrmann
R3,957 Discovery Miles 39 570 Ships in 10 - 15 working days

Today the vast majority of the world's information resides in, is derived from, and is exchanged among multiple automated systems. Critical decisions are made, and critical action is taken based on information from these systems. Therefore, the information must be accurate, correct, and timely, and be manipulated, stored, retrieved, and exchanged safely, reliably, and securely. In a time when information is considered the latest commodity, information security should be top priority.
A Practical Guide to Security Engineering and Information Assurance gives you an engineering approach to information security and information assurance (IA). The book examines the impact of accidental and malicious intentional action and inaction on information security and IA. Innovative long-term vendor, technology, and application-independent strategies show you how to protect your critical systems and data from accidental and intentional action and inaction that could lead to system failure or compromise.
The author presents step-by-step, in-depth processes for defining information security and assurance goals, performing vulnerability and threat analysis, implementing and verifying the effectiveness of threat control measures, and conducting accident and incident investigations. She explores real-world strategies applicable to all systems, from small systems supporting a home-based business to those of a multinational corporation, government agency, or critical infrastructure system.
The information revolution has brought its share of risks. Exploring the synergy between security, safety, and reliability engineering, A Practical Guide to Security Engineering and Information Assurance consolidates and organizes current thinking about information security/IA techniques, approaches, and best practices. As this book will show you, there is considerably more to information security/IA than firewalls, encryption, and virus protection.

Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022,... Web Services - ICWS 2022 - 29th International Conference, Held as Part of the Services Conference Federation, SCF 2022, Honolulu, HI, USA, December 10-14, 2022, Proceedings (Paperback, 1st ed. 2022)
Yuchao Zhang, Liang-Jie Zhang
R1,482 Discovery Miles 14 820 Ships in 18 - 22 working days

This book constitutes the proceedings of the 29th International Conference on Web Services, ICWS 2022, held in Honolulu, USA, as part of SCF 2022, during December 10-14, 2022.The 9 full papers presented in this volume were carefully reviewed and selected from 20 submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.

Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022): Vicenc Torra Guide to Data Privacy - Models, Technologies, Solutions (Paperback, 1st ed. 2022)
Vicenc Torra
R1,191 Discovery Miles 11 910 Ships in 18 - 22 working days

Data privacy technologies are essential for implementing information systems with privacy by design.Privacy technologies clearly are needed for ensuring that data does not lead to disclosure, but also that statistics or even data-driven machine learning models do not lead to disclosure. For example, can a deep-learning model be attacked to discover that sensitive data has been used for its training? This accessible textbook presents privacy models, computational definitions of privacy, and methods to implement them. Additionally, the book explains and gives plentiful examples of how to implement-among other models-differential privacy, k-anonymity, and secure multiparty computation. Topics and features: Provides integrated presentation of data privacy (including tools from statistical disclosure control, privacy-preserving data mining, and privacy for communications) Discusses privacy requirements and tools for different types of scenarios, including privacy for data, for computations, and for users Offers characterization of privacy models, comparing their differences, advantages, and disadvantages Describes some of the most relevant algorithms to implement privacy models Includes examples of data protection mechanisms This unique textbook/guide contains numerous examples and succinctly and comprehensively gathers the relevant information. As such, it will be eminently suitable for undergraduate and graduate students interested in data privacy, as well as professionals wanting a concise overview. Vicenc Torra is Professor with the Department of Computing Science at Umea University, Umea, Sweden.

Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised... Blockchain and Trustworthy Systems - 4th International Conference, BlockSys 2022, Chengdu, China, August 4-5, 2022, Revised Selected Papers (Paperback, 1st ed. 2022)
Davor Svetinovic, Yin Zhang, Xiapu Luo, Xiaoyan Huang, Xingping Chen
R2,226 Discovery Miles 22 260 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022. The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing.

Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.):... Firewalls Don't Stop Dragons - A Step-by-Step Guide to Computer Security and Privacy for Non-Techies (Paperback, 5th ed.)
Carey Parker
R979 R858 Discovery Miles 8 580 Save R121 (12%) Ships in 18 - 22 working days

Rely on this practical, comprehensive guide to significantly improve your cyber safety and data privacy. This book was written expressly for regular, everyday people -- though even technically savvy readers will find many useful tips here. This book contains everything you need to protect yourself-step by step, without judgment, and with as little jargon as possible. Protecting your digital domain is much like defending a medieval castle. Wide moats, towering walls and trained guards provide defense in depth, safeguarding the people and property within against the most common threats. But attempting to dragon-proof your castle would be counterproductive and costly. The goal of this book is to keep your devices and data safe from the most likely and impactful hazards - not a targeted attack by the NSA. Like wearing seat belts and sunscreen in the real world, there are dozens of simple, effective precautions we need to take in the virtual world. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what you need to do, each chapter includes a detailed checklist of expert tips. But the book also explains why you need to do these things, using entertaining analogies and straightforward explanations. This revised and expanded fifth edition includes: Updated for Windows 11, macOS 13 (Ventura), iOS 16 and Android 13. Updated recommendations for most secure and private products. Over 200 tips with complete step-by-step instructions and screenshots. What You Will Learn Maximize your computer and smartphone security. Minimize your vulnerabilities and data footprint. Solve your password problems and use two-factor authentication. Browse the web safely and confidently with a secure, private browser. Shop and bank online with maximum security and peace of mind. Defend against identity theft, ransomware and online scams. Safeguard your children online, at home and in school. Block online tracking, data mining and malicious online ads. Send files and messages with end-to-end encryption. Secure your home network and keep your smart devices from spying on you. Create automated backups of all your devices. Learn how to deal with account hacks, data. breaches and viruses. Understand how computers, the internet, VPNs and encryption really work And much more!

Convergence of Internet of Things and Blockchain Technologies (Paperback, 1st ed. 2022): H L Gururaj, V. Ravi Kumar, Sam... Convergence of Internet of Things and Blockchain Technologies (Paperback, 1st ed. 2022)
H L Gururaj, V. Ravi Kumar, Sam Goundar, Ahmed A. Elngar, B H Swathi
R3,097 Discovery Miles 30 970 Ships in 18 - 22 working days

This book presents chapters from diverse range of authors on different aspects of how Blockchain and IoT are converging and the impacts of these developments. The book provides an extensive cross-sectional and multi-disciplinary look into this trend and how it affects artificial intelligence, cyber-physical systems, and robotics with a look at applications in aerospace, agriculture, automotive, critical infrastructures, healthcare, manufacturing, retail, smart transport systems, smart cities, and smart healthcare. Cases include the impact of Blockchain for IoT Security; decentralized access control systems in IoT; Blockchain architecture for scalable access management in IoT; smart and sustainable IoT applications incorporating Blockchain, and more. The book presents contributions from international academics, researchers, and practitioners from diverse perspectives. Presents how Blockchain and IoT are converging and the impacts of these developments on technology and its application; Discusses IoT and Blockchain from cross-sectional and multi-disciplinary perspectives; Includes contributions from researchers, academics, and professionals from around the world.

Blockchain Security in Cloud Computing (Paperback, 1st ed. 2022): K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal... Blockchain Security in Cloud Computing (Paperback, 1st ed. 2022)
K.M. Baalamurugan, S Rakesh Kumar, Abhishek Kumar, Vishal Kumar, Sanjeevikumar Padmanaban
R4,702 Discovery Miles 47 020 Ships in 18 - 22 working days

This book explores the concepts and techniques of cloud security using blockchain. Also discussed is the possibility of applying blockchain to provide security in various domains. The authors discuss how blockchain holds the potential to significantly increase data privacy and security while boosting accuracy and integrity in cloud data. The specific highlight of this book is focused on the application of integrated technologies in enhancing cloud security models, use cases, and its challenges. The contributors, both from academia and industry, present their technical evaluation and comparison with existing technologies. This book pertains to IT professionals, researchers, and academicians towards fourth revolution technologies.

Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021): Youyang Qu, Mohammad  Reza Nosouhi, Lei Cui, Shui Yu Personalized Privacy Protection in Big Data (Paperback, 1st ed. 2021)
Youyang Qu, Mohammad Reza Nosouhi, Lei Cui, Shui Yu
R1,709 Discovery Miles 17 090 Ships in 18 - 22 working days

This book presents the data privacy protection which has been extensively applied in our current era of big data. However, research into big data privacy is still in its infancy. Given the fact that existing protection methods can result in low data utility and unbalanced trade-offs, personalized privacy protection has become a rapidly expanding research topic.In this book, the authors explore emerging threats and existing privacy protection methods, and discuss in detail both the advantages and disadvantages of personalized privacy protection. Traditional methods, such as differential privacy and cryptography, are discussed using a comparative and intersectional approach, and are contrasted with emerging methods like federated learning and generative adversarial nets. The advances discussed cover various applications, e.g. cyber-physical systems, social networks, and location-based services. Given its scope, the book is of interest to scientists, policy-makers, researchers, and postgraduates alike.

Protecting Privacy through Homomorphic Encryption (Paperback, 1st ed. 2021): Kristin Lauter, Wei Dai, Kim Laine Protecting Privacy through Homomorphic Encryption (Paperback, 1st ed. 2021)
Kristin Lauter, Wei Dai, Kim Laine
R3,079 Discovery Miles 30 790 Ships in 18 - 22 working days

This book summarizes recent inventions, provides guidelines and recommendations, and demonstrates many practical applications of homomorphic encryption. This collection of papers represents the combined wisdom of the community of leading experts on Homomorphic Encryption. In the past 3 years, a global community consisting of researchers in academia, industry, and government, has been working closely to standardize homomorphic encryption. This is the first publication of whitepapers created by these experts that comprehensively describes the scientific inventions, presents a concrete security analysis, and broadly discusses applicable use scenarios and markets. This book also features a collection of privacy-preserving machine learning applications powered by homomorphic encryption designed by groups of top graduate students worldwide at the Private AI Bootcamp hosted by Microsoft Research. The volume aims to connect non-expert readers with this important new cryptographic technology in an accessible and actionable way. Readers who have heard good things about homomorphic encryption but are not familiar with the details will find this book full of inspiration. Readers who have preconceived biases based on out-of-date knowledge will see the recent progress made by industrial and academic pioneers on optimizing and standardizing this technology. A clear picture of how homomorphic encryption works, how to use it to solve real-world problems, and how to efficiently strengthen privacy protection, will naturally become clear.

Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on... Cybersecurity, Privacy and Freedom Protection in the Connected World - Proceedings of the 13th International Conference on Global Security, Safety and Sustainability, London, January 2021 (Paperback, 1st ed. 2021)
Hamid Jahankhani, Arshad Jamal, Shaun Lawson
R1,459 Discovery Miles 14 590 Ships in 18 - 22 working days

This book provides an opportunity for investigators, government officials, systems scientists, strategists, assurance researchers, owners, operators and maintainers of large, complex and advanced systems and infrastructures to update their knowledge with the state of best practice in the challenging domains whilst networking with the leading representatives, researchers and solution providers. Drawing on 12 years of successful events on information security, digital forensics and cyber-crime, the 13th ICGS3-20 conference aims to provide attendees with an information-packed agenda with representatives from across the industry and the globe. The challenges of complexity, rapid pace of change and risk/opportunity issues associated with modern products, systems, special events and infrastructures. In an era of unprecedented volatile, political and economic environment across the world, computer-based systems face ever more increasing challenges, disputes and responsibilities, and whilst the Internet has created a global platform for the exchange of ideas, goods and services, it has also created boundless opportunities for cyber-crime. As an increasing number of large organizations and individuals use the Internet and its satellite mobile technologies, they are increasingly vulnerable to cyber-crime threats. It is therefore paramount that the security industry raises its game to combat these threats. Whilst there is a huge adoption of technology and smart home devices, comparably, there is a rise of threat vector in the abuse of the technology in domestic violence inflicted through IoT too. All these are an issue of global importance as law enforcement agencies all over the world are struggling to cope.

Blockchain Systems and Communication Networks: From Concepts to Implementation (Paperback, 1st ed. 2021): Mubashir Husain... Blockchain Systems and Communication Networks: From Concepts to Implementation (Paperback, 1st ed. 2021)
Mubashir Husain Rehmani
R1,608 Discovery Miles 16 080 Ships in 18 - 22 working days

This book provides extensive insights on blockchain systems, starting from a historical perspective and moving towards building foundational knowledge, with focus on communication networks. It covers blockchain applications, algorithms, architectures, design and implementation, and security and privacy issues, providing the reader with a comprehensive overview. Further, it discusses blockchain systems and its integration to communication networks. The book includes hands-on, practical tutorials, self-assessment exercises, and review questions; tips and sample programs are also provided throughout. Complementary supporting material for instructors, including open source programming code for practical tutorials and exercises, is also available. The target audience includes graduate students, professionals, and researchers working in the areas of blockchain systems, distributed ledger technology, computer networks and communications, artificial intelligence, and cybersecurity.

Doing Research In and On the Digital - Research Methods across Fields of Enquiry (Hardcover): Cristina Costa, Jenna Condie Doing Research In and On the Digital - Research Methods across Fields of Enquiry (Hardcover)
Cristina Costa, Jenna Condie
R4,491 Discovery Miles 44 910 Ships in 10 - 15 working days

As a social space, the web provides researchers both with a tool and an environment to explore the intricacies of everyday life. As a site of mediated interactions and interrelationships, the 'digital' has evolved from being a space of information to a space of creation, thus providing new opportunities regarding how, where and, why to conduct social research. Doing Research In and On the Digital aims to deliver on two fronts: first, by detailing how researchers are devising and applying innovative research methods for and within the digital sphere, and, secondly, by discussing the ethical challenges and issues implied and encountered in such approaches. In two core Parts, this collection explores: content collection: methods for harvesting digital data engaging research informants: digital participatory methods and data stories . With contributions from a diverse range of fields such as anthropology, sociology, education, healthcare and psychology, this volume will particularly appeal to post-graduate students and early career researchers who are navigating through new terrain in their digital-mediated research endeavours.

Blockchain for 5G-Enabled IoT - The new wave for Industrial Automation (Paperback, 1st ed. 2021): Sudeep Tanwar Blockchain for 5G-Enabled IoT - The new wave for Industrial Automation (Paperback, 1st ed. 2021)
Sudeep Tanwar
R2,523 Discovery Miles 25 230 Ships in 18 - 22 working days

This book addresses one of the most overlooked practical, methodological, and moral questions in the journey to secure and handle the massive amount of data being generated from smart devices interactions: the integration of Blockchain with 5G-enabled IoT. After an overview, this book discusses open issues and challenges, which may hinder the growth of Blockchain technology. Then, this book presents a variety of perspectives on the most pressing questions in the field, such as: how IoT can connect billions of objects together; how the access control mechanisms in 5G-enabled industrial environment works; how to address the real-time and quality-of-service requirements for industrial applications; and how to ensure scalability and computing efficiency. Also, it includes a detailed discussions on the complexity of adoption of Blockchain for 5G-Enabled IoT and presents comparative case studies with respect to various performance evaluation metrics such as scalability, data management, standardization, interoperability and regulations, accessibility, human-factors engineering and interfaces, reliability, heterogeneity, and QoS requirements. This book acts as a professional guide for the practitioners in information security and related topics.

Security Issues and Privacy Threats in Smart Ubiquitous Computing (Paperback, 1st ed. 2021): Parikshit N. Mahalle, Gitanjali R.... Security Issues and Privacy Threats in Smart Ubiquitous Computing (Paperback, 1st ed. 2021)
Parikshit N. Mahalle, Gitanjali R. Shinde, Nilanjan Dey, Aboul Ella Hassanien
R4,685 Discovery Miles 46 850 Ships in 18 - 22 working days

This book extends the work from introduction of ubiquitous computing, to the Internet of things to security and to privacy aspects of ubiquitous computing. The uniqueness of this book is the combination of important fields like the Internet of things and ubiquitous computing. It assumes that the readers' goal is to achieve a complete understanding of IoT, smart computing, security issues, challenges and possible solutions. It is not oriented towards any specific use cases and security issues; privacy threats in ubiquitous computing problems are discussed across various domains. This book is motivating to address privacy threats in new inventions for a wide range of stakeholders like layman to educated users, villages to metros and national to global levels. This book contains numerous examples, case studies, technical descriptions, scenarios, procedures, algorithms and protocols. The main endeavour of this book is threat analysis and activity modelling of attacks in order to give an actual view of the ubiquitous computing applications. The unique approach will help readers for a better understanding.

Guide to Differential Privacy Modifications - A Taxonomy of Variants and Extensions (Paperback, 1st ed. 2022): Balazs Pejo,... Guide to Differential Privacy Modifications - A Taxonomy of Variants and Extensions (Paperback, 1st ed. 2022)
Balazs Pejo, Damien Desfontaines
R1,469 Discovery Miles 14 690 Ships in 18 - 22 working days

Shortly after it was first introduced in 2006, differential privacy became the flagship data privacy definition. Since then, numerous variants and extensions were proposed to adapt it to different scenarios and attacker models. In this work, we propose a systematic taxonomy of these variants and extensions. We list all data privacy definitions based on differential privacy, and partition them into seven categories, depending on which aspect of the original definition is modified. These categories act like dimensions: Variants from the same category cannot be combined, but variants from different categories can be combined to form new definitions. We also establish a partial ordering of relative strength between these notions by summarizing existing results. Furthermore, we list which of these definitions satisfy some desirable properties, like composition, post-processing, and convexity by either providing a novel proof or collecting existing ones.

Privacy-Preserving in Edge Computing (Paperback, 1st ed. 2021): Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang Privacy-Preserving in Edge Computing (Paperback, 1st ed. 2021)
Longxiang Gao, Tom H. Luan, Bruce Gu, Youyang Qu, Yong Xiang
R3,967 Discovery Miles 39 670 Ships in 18 - 22 working days

With the rapid development of big data, it is necessary to transfer the massive data generated by end devices to the cloud under the traditional cloud computing model. However, the delays caused by massive data transmission no longer meet the requirements of various real-time mobile services. Therefore, the emergence of edge computing has been recently developed as a new computing paradigm that can collect and process data at the edge of the network, which brings significant convenience to solving problems such as delay, bandwidth, and off-loading in the traditional cloud computing paradigm. By extending the functions of the cloud to the edge of the network, edge computing provides effective data access control, computation, processing and storage for end devices. Furthermore, edge computing optimizes the seamless connection from the cloud to devices, which is considered the foundation for realizing the interconnection of everything. However, due to the open features of edge computing, such as content awareness, real-time computing and parallel processing, the existing problems of privacy in the edge computing environment have become more prominent. The access to multiple categories and large numbers of devices in edge computing also creates new privacy issues. In this book, we discuss on the research background and current research process of privacy protection in edge computing. In the first chapter, the state-of-the-art research of edge computing are reviewed. The second chapter discusses the data privacy issue and attack models in edge computing. Three categories of privacy preserving schemes will be further introduced in the following chapters. Chapter three introduces the context-aware privacy preserving scheme. Chapter four further introduces a location-aware differential privacy preserving scheme. Chapter five presents a new blockchain based decentralized privacy preserving in edge computing. Chapter six summarize this monograph and propose future research directions. In summary, this book introduces the following techniques in edge computing: 1) describe an MDP-based privacy-preserving model to solve context-aware data privacy in the hierarchical edge computing paradigm; 2) describe a SDN based clustering methods to solve the location-aware privacy problems in edge computing; 3) describe a novel blockchain based decentralized privacy-preserving scheme in edge computing. These techniques enable the rapid development of privacy-preserving in edge computing.

Web Services - ICWS 2021 - 28th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual... Web Services - ICWS 2021 - 28th International Conference, Held as Part of the Services Conference Federation, SCF 2021, Virtual Event, December 10-14, 2021, Proceedings (Paperback, 1st ed. 2022)
Cheng Zhong Xu, Yunni Xia, Yuchao Zhang, Liang-Jie Zhang
R1,478 Discovery Miles 14 780 Ships in 18 - 22 working days

This book constitutes the proceedings of the 28th International Conference on Web Services, ICWS 2021, held virtually as part of SCF 2021, during December 10-14, 2021. The 7 full papers presented in this volume were carefully reviewed and selected from numerous submissions. The papers cover aspects of services computing and applications. Centered around services computing, it covers various systems and networking research pertaining to cloud, edge and Internet-of-Things (IoT), as well as technologies for intelligent computing, learning, big data and blockchain applications.

Technology-Augmented Perception and Cognition (Paperback, 1st ed. 2021): Tilman Dingler, Evangelos Niforatos Technology-Augmented Perception and Cognition (Paperback, 1st ed. 2021)
Tilman Dingler, Evangelos Niforatos
R4,013 Discovery Miles 40 130 Ships in 18 - 22 working days

Tools and technologies have long complemented and extended our physical abilities: from pre-historic spearheads to steam-propelled ploughs and high-tech prosthetics. While the development of lenses granted us insights into the micro and macrocosms, new sensors and technologies increasingly augment our cognitive abilities, including memory and perception. This book integrates current research efforts, results, and visions from the fields of computer science, neuroscience, and psychology. It provides a comprehensive overview of the state-of-the-art and future applications of how technologies assist and augment human perception and cognition. Experts in the field share their research and findings on: Working memory enhancements Digitization of memories through lifelog archives The consequences of technology-induced disruptions and forgetting The creation and utilization of new human senses Ethical and security concerns that arise with augmentation technologies. As technology weaves itself ever deeper into our lives, careful examination of its capabilities, risks and benefits is warranted. While this book focuses on the complementation and augmentation of human capabilities, it serves as a foundation for students, researchers and designers of technologies that push the boundaries of perception and cognition.

Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021): Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis,... Handbook of Reinforcement Learning and Control (Paperback, 1st ed. 2021)
Kyriakos G. Vamvoudakis, Yan Wan, Frank L. Lewis, Derya Cansever
R6,654 Discovery Miles 66 540 Ships in 18 - 22 working days

This handbook presents state-of-the-art research in reinforcement learning, focusing on its applications in the control and game theory of dynamic systems and future directions for related research and technology. The contributions gathered in this book deal with challenges faced when using learning and adaptation methods to solve academic and industrial problems, such as optimization in dynamic environments with single and multiple agents, convergence and performance analysis, and online implementation. They explore means by which these difficulties can be solved, and cover a wide range of related topics including: deep learning; artificial intelligence; applications of game theory; mixed modality learning; and multi-agent reinforcement learning. Practicing engineers and scholars in the field of machine learning, game theory, and autonomous control will find the Handbook of Reinforcement Learning and Control to be thought-provoking, instructive and informative.

Blockchain and Trustworthy Systems - Third International Conference, BlockSys 2021, Guangzhou, China, August 5-6, 2021, Revised... Blockchain and Trustworthy Systems - Third International Conference, BlockSys 2021, Guangzhou, China, August 5-6, 2021, Revised Selected Papers (Paperback, 1st ed. 2021)
Hong-Ning Dai, Xuanzhe Liu, Daniel Xiapu Luo, Jiang,Xiao, Xiangping Chen
R2,980 Discovery Miles 29 800 Ships in 18 - 22 working days

This book constitutes the thoroughly refereed post conference papers of the Third International Conference on Blockchain and Trustworthy Systems, Blocksys 2021, held in Guangzhou, China, in August 2021.*The 38 full papers and the 12 short papers were carefully reviewed and selected from 98 submissions. The papers are organized in topical sections: Contents Blockchain and Data Mining; Performance Optimization of Blockchain; Blockchain Security and Privacy; Theories and Algorithms for Blockchain; Blockchain and Internet of Things; Blockchain and Smart Contracts; Blockchain Services and Applications; Trustworthy System Development.*

Perspectives on Digital Humanism (Paperback, 1st ed. 2022): Hannes Werthner, Erich Prem, Edward A. Lee, Carlo Ghezzi Perspectives on Digital Humanism (Paperback, 1st ed. 2022)
Hannes Werthner, Erich Prem, Edward A. Lee, Carlo Ghezzi
R1,313 Discovery Miles 13 130 Ships in 18 - 22 working days

This open access book aims to set an agenda for research and action in the field of Digital Humanism through short essays written by selected thinkers from a variety of disciplines, including computer science, philosophy, education, law, economics, history, anthropology, political science, and sociology. This initiative emerged from the Vienna Manifesto on Digital Humanism and the associated lecture series. Digital Humanism deals with the complex relationships between people and machines in digital times. It acknowledges the potential of information technology. At the same time, it points to societal threats such as privacy violations and ethical concerns around artificial intelligence, automation and loss of jobs, ongoing monopolization on the Web, and sovereignty. Digital Humanism aims to address these topics with a sense of urgency but with a constructive mindset. The book argues for a Digital Humanism that analyses and, most importantly, influences the complex interplay of technology and humankind toward a better society and life while fully respecting universal human rights. It is a call to shaping technologies in accordance with human values and needs.

New Dimensions of Information Warfare (Paperback, 1st ed. 2021): Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano... New Dimensions of Information Warfare (Paperback, 1st ed. 2021)
Roberto Di Pietro, Simone Raponi, Maurantonio Caprolu, Stefano Cresci
R4,231 Discovery Miles 42 310 Ships in 18 - 22 working days

This book revises the strategic objectives of Information Warfare, interpreting them according to the modern canons of information age, focusing on the fabric of society, the economy, and critical Infrastructures. The authors build plausible detailed real-world scenarios for each entity, showing the related possible threats from the Information Warfare point of view. In addition, the authors dive into the description of the still open problems, especially when it comes to critical infrastructures, and the countermeasures that can be implemented, possibly inspiring further research in the domain. This book intends to provide a conceptual framework and a methodological guide, enriched with vivid and compelling use cases for the readers (e.g. technologists, academicians, military, government) interested in what Information Warfare really means, when its lenses are applied to current technology. Without sacrificing accuracy, rigor and, most importantly, the big picture of Information Warfare, this book dives into several relevant and up-to-date critical domains. The authors illustrate how finance (an always green target of Information Warfare) is intertwined with Social Media, and how an opponent could exploit these latter ones to reach its objectives. Also, how cryptocurrencies are going to reshape the economy, and the risks involved by this paradigm shift. Even more compelling is how the very fabric of society is going to be reshaped by technology, for instance how our democratic elections are exposed to risks that are even greater than what appears in the current public discussions. Not to mention how our Critical Infrastructure is becoming exposed to a series of novel threats, ranging from state-supported malware to drones. A detailed discussion of possible countermeasures and what the open issues are for each of the highlighted threats complete this book. This book targets a widespread audience that includes researchers and advanced level students studying and working in computer science with a focus on security. Military officers, government officials and professionals working in this field will also find this book useful as a reference.

Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021): Wei Chang, Jie Wu Fog/Edge Computing For Security, Privacy, and Applications (Paperback, 1st ed. 2021)
Wei Chang, Jie Wu
R4,047 Discovery Miles 40 470 Ships in 18 - 22 working days

This book provides the state-of-the-art development on security and privacy for fog/edge computing, together with their system architectural support and applications. This book is organized into five parts with a total of 15 chapters. Each area corresponds to an important snapshot. The first part of this book presents an overview of fog/edge computing, focusing on its relationship with cloud technology and the future with the use of 5G communication. Several applications of edge computing are discussed. The second part of this book considers several security issues in fog/edge computing, including the secure storage and search services, collaborative intrusion detection method on IoT-fog computing, and the feasibility of deploying Byzantine agreement protocols in untrusted environments. The third part of this book studies the privacy issues in fog/edge computing. It first investigates the unique privacy challenges in fog/edge computing, and then discusses a privacy-preserving framework for the edge-based video analysis, a popular machine learning application on fog/edge. This book also covers the security architectural design of fog/edge computing, including a comprehensive overview of vulnerabilities in fog/edge computing within multiple architectural levels, the security and intelligent management, the implementation of network-function-virtualization-enabled multicasting in part four. It explains how to use the blockchain to realize security services. The last part of this book surveys applications of fog/edge computing, including the fog/edge computing in Industrial IoT, edge-based augmented reality, data streaming in fog/edge computing, and the blockchain-based application for edge-IoT. This book is designed for academics, researchers and government officials, working in the field of fog/edge computing and cloud computing. Practitioners, and business organizations (e.g., executives, system designers, and marketing professionals), who conduct teaching, research, decision making, and designing fog/edge technology will also benefit from this book The content of this book will be particularly useful for advanced-level students studying computer science, computer technology, and information systems, but also applies to students in business, education, and economics, who would benefit from the information, models, and case studies therein.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
EU General Data Protection Regulation…
It Governance Privacy Team Paperback R762 Discovery Miles 7 620
Broken Code - Inside Facebook And The…
Jeff Horwitz Paperback R485 R265 Discovery Miles 2 650
Your Safety and Privacy Online - The CIA…
Siggi Bjarnason Hardcover R520 R489 Discovery Miles 4 890
Handbook of Research on Advanced…
Ahmed J. Obaid, Ghassan H Abdul-Majeed, … Hardcover R7,311 Discovery Miles 73 110
Information And Communications…
Dana van der Merwe Paperback R1,320 R1,208 Discovery Miles 12 080
A Corporate Librarian's Guide to…
Phyllis L. Elin Paperback R604 R548 Discovery Miles 5 480
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
Pegasus - The Story Of The World's Most…
Laurent Richard, Sandrine Rigaud Paperback R401 Discovery Miles 4 010
Permanent Record
Edward Snowden Paperback R299 R271 Discovery Miles 2 710
Elementary... the Art and Science of…
Miguel Fernandez, Alan Millington, … Hardcover R1,097 Discovery Miles 10 970

 

Partners