|
Books > Computing & IT > Social & legal aspects of computing
The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour
Intelligent technologies have emerged as imperative tools in
computer science and information security. However, advanced
computing practices have preceded new methods of attacks on the
storage and transmission of data. Developing approaches such as
image processing and pattern recognition are susceptible to
breaches in security. Modern protection methods for these
innovative techniques require additional research. The Handbook of
Research on Intelligent Data Processing and Information Security
Systems provides emerging research exploring the theoretical and
practical aspects of cyber protection and applications within
computer science and telecommunications. Special attention is paid
to data encryption, steganography, image processing, and
recognition, and it targets professionals who want to improve their
knowledge in order to increase strategic capabilities and
organizational effectiveness. As such, this book is ideal for
analysts, programmers, computer engineers, software engineers,
mathematicians, data scientists, developers, IT specialists,
academicians, researchers, and students within fields of
information technology, information security, robotics, artificial
intelligence, image processing, computer science, and
telecommunications.
Society is continually transforming into a digitally powered
reality due to the increased dependence of computing technologies.
The landscape of cyber threats is constantly evolving because of
this, as hackers are finding improved methods of accessing
essential data. Analyzing the historical evolution of cyberattacks
can assist practitioners in predicting what future threats could be
on the horizon. Real-Time and Retrospective Analyses of Cyber
Security is a pivotal reference source that provides vital research
on studying the development of cybersecurity practices through
historical and sociological analyses. While highlighting topics
such as zero trust networks, geopolitical analysis, and cyber
warfare, this publication explores the evolution of cyber threats,
as well as improving security methods and their socio-technological
impact. This book is ideally designed for researchers,
policymakers, strategists, officials, developers, educators,
sociologists, and students seeking current research on the
evolution of cybersecurity methods through historical analysis and
future trends.
Cyber-attacks are rapidly becoming one of the most prevalent issues
globally, and as they continue to escalate, it is imperative to
explore new approaches and technologies that help ensure the
security of the online community. Beyond cyber-attacks, personal
information is now routinely and exclusively housed in cloud-based
systems. The rising use of information technologies requires
stronger information security and system procedures to reduce the
risk of information breaches. Advanced Methodologies and
Technologies in System Security, Information Privacy, and Forensics
presents emerging research and methods on preventing information
breaches and further securing system networks. While highlighting
the rising concerns in information privacy and system security,
this book explores the cutting-edge methods combatting digital
risks and cyber threats. This book is an important resource for
information technology professionals, cybercrime researchers,
network analysts, government agencies, business professionals,
academicians, and practitioners seeking the most up-to-date
information and methodologies on cybercrime, digital terrorism,
network security, and information technology ethics.
Sustainable Work in Europe brings together a strong core of Swedish
working life research, with additional contributions from across
Europe, and discussion of current issues such as digitalisation,
climate change and the Covid pandemic. It bridges gaps between
social science and medicine, and adds emphasis on age and gender.
The book links workplace practice, theory and policy, and is
intended to provide the basis for ongoing debate and dialogue.
In the modern era each new innovation poses its own special ethical
dilemma. How can human society adapt to these new forms of
expression, commerce, government, citizenship, and learning while
holding onto its ethical and moral principles? The Changing Scope
of Technoethics in Contemporary Society is a critical scholarly
resource that examines the existing intellectual platform within
the field of technoethics. Featuring coverage on a broad range of
topics such as ethical perspectives on internet safety,
technoscience, and ethical hacking communication, this book is
geared towards academicians, researchers, and students seeking
current research on domains of technoethics.
As a popular and powerful medium, mobile use has increased
significantly across the world. The effects of these communication
devices have not only transformed how we communicate but also how
we gather and distribute information in a variety of industries
including healthcare, business, and education. Impacts of Mobile
Use and Experience on Contemporary Society provides
cross-disciplinary research that examines mobile use and its impact
through 16 different stages of life, ranging from pre-birth through
after-death. Featuring research on topics such as academic
application, economic value, and mobile learning, scholars from
different disciplines identify the crucial implications behind one
of the leading communication tools from all over the world.
Included amongst the targeted audience are educators, policymakers,
healthcare professionals, managers, academicians, researchers, and
practitioners.
|
|