|
Showing 1 - 16 of
16 matches in All Departments
The Internet is making our daily lives as digital as possible, and
this new era is called the Internet of Everything (IoE). The key
force behind the rapid growth of the Internet is the technological
advancement of enterprises. The digital world we live in is
facilitated by these enterprises' advances and business
intelligence. These enterprises need to deal with gazillions of
bytes of data, and in today's age of General Data Protection
Regulation, enterprises are required to ensure privacy and security
of large-scale data collections. However, the increased
connectivity and devices used to facilitate IoE are continually
creating more room for cybercriminals to find vulnerabilities in
enterprise systems and flaws in their corporate governance.
Ensuring cybersecurity and corporate governance for enterprises
should not be an afterthought or present a huge challenge. In
recent times, the complex diversity of cyber-attacks has been
skyrocketing, and zero-day attacks, such as ransomware, botnet, and
telecommunication attacks, are happening more frequently than
before. New hacking strategies would easily bypass existing
enterprise security and governance platforms using advanced,
persistent threats. For example, in 2020, the Toll Group firm was
exploited by a new crypto-attack family for violating its data
privacy, where an advanced ransomware technique was launched to
exploit the corporation and request a huge figure of monetary
ransom. Even after applying rational governance hygiene,
cybersecurity configuration and software updates are often
overlooked when they are most needed to fight cyber-crime and
ensure data privacy. Therefore, the threat landscape in the context
of enterprises has become wider and far more challenging. There is
a clear need for collaborative work throughout the entire value
chain of this network. In this context, this book addresses the
cybersecurity and cooperate governance challenges associated with
enterprises, which will provide a bigger picture of the concepts,
intelligent techniques, practices, and open research directions in
this area. This book serves as a single source of reference for
acquiring the knowledge on the technology, process, and people
involved in next-generation privacy and security.
This book will address the cyber security challenges associated
with edge computing, which will provide a bigger picture on the
concepts, techniques, applications, and open research directions in
this area. The book will serve as a single source of reference for
acquiring the knowledge on the technology, process and people
involved in the next generation computing and security. It will be
a valuable aid for researchers, higher level students and
professionals working in the area.
Large data sets arriving at every increasing speeds require a new
set of efficient data analysis techniques. Data analytics are
becoming an essential component for every organization and
technologies such as health care, financial trading, Internet of
Things, Smart Cities or Cyber Physical Systems. However, these
diverse application domains give rise to new research challenges.
In this context, the book provides a broad picture on the concepts,
techniques, applications, and open research directions in this
area. In addition, it serves as a single source of reference for
acquiring the knowledge on emerging Big Data Analytics
technologies.
This book presents a psychotherapy intervention model called
Multimodal Integrative Cognitive Stimulation Therapy (MICST). It is
grounded in information processing and cognitive stimulation
techniques and operates out of a positive psychology framework.
This model, designed for group work with clients with
schizophrenia, can be easily tailored to working with clients in
individual therapy sessions. The three core MICST group activities
include: 1) body movement-mindfulness-relaxation (BMR); 2)
cognitive stimulation using group discussions; and 3) cognitive
stimulation using paper-pencil cognitive exercises and
self-reflection exercises. A chapter is devoted to each of these
core areas with actual case vignettes to illustrate ways that these
activities can be implemented in clinical practice. Homework
recommendations are included at the end of each chapter, devoted to
a core MICST group activity and providing suggestions on ways to
practice various skills and exercises in between group sessions.
Also provided are several handouts and worksheets which can be used
with clients.
This book presents a psychotherapy intervention model called
Multimodal Integrative Cognitive Stimulation Therapy (MICST). It is
grounded in information processing and cognitive stimulation
techniques and operates out of a positive psychology framework.
This model, designed for group work with clients with
schizophrenia, can be easily tailored to working with clients in
individual therapy sessions. The three core MICST group activities
include: 1) body movement-mindfulness-relaxation (BMR); 2)
cognitive stimulation using group discussions; and 3) cognitive
stimulation using paper-pencil cognitive exercises and
self-reflection exercises. A chapter is devoted to each of these
core areas with actual case vignettes to illustrate ways that these
activities can be implemented in clinical practice. Homework
recommendations are included at the end of each chapter, devoted to
a core MICST group activity and providing suggestions on ways to
practice various skills and exercises in between group sessions.
Also provided are several handouts and worksheets which can be used
with clients.
Using Diagrams in Psychotherapy presents the Visually Enhanced
Therapy framework, a unique approach to communicating information
in psychotherapy. The framework brings visual information
processing principles and techniques into the practice of
psychotherapy to help therapists communicate more effectively with
clients. Replete with illustrations and therapist thought boxes
designed to help readers translate theory to practice, the book
presents visual strategies that enable clients to become more
actively engaged in therapy sessions and to better retain
information. This is a thorough, user-friendly resource with
numerous diagrams and worksheets for implementing visually oriented
interventions across a broad range of clients, clinical settings,
and clinical problems.
Using Diagrams in Psychotherapy presents the Visually Enhanced
Therapy framework, a unique approach to communicating information
in psychotherapy. The framework brings visual information
processing principles and techniques into the practice of
psychotherapy to help therapists communicate more effectively with
clients. Replete with illustrations and therapist thought boxes
designed to help readers translate theory to practice, the book
presents visual strategies that enable clients to become more
actively engaged in therapy sessions and to better retain
information. This is a thorough, user-friendly resource with
numerous diagrams and worksheets for implementing visually oriented
interventions across a broad range of clients, clinical settings,
and clinical problems.
This book presents that explainable artificial intelligence (XAI)
is going to replace the traditional artificial, machine learning,
deep learning algorithms which work as a black box as of today. To
understand the algorithms better and interpret the complex networks
of these algorithms, XAI plays a vital role. In last few decades,
we have embraced AI in our daily life to solve a plethora of
problems, one of the notable problems is cyber security. In coming
years, the traditional AI algorithms are not able to address the
zero-day cyber attacks, and hence, to capitalize on the AI
algorithms, it is absolutely important to focus more on XAI. Hence,
this book serves as an excellent reference for those who are
working in cyber security and artificial intelligence.
Ensuring cybersecurity for smart cities is crucial for a
sustainable cyber ecosystem. Given the undeniable complexity of
smart cities, fundamental issues such as device configurations and
software updates should be addressed when it is most needed to
fight cyber-crime and ensure data privacy. This book addresses the
cybersecurity challenges associated with smart cities, aiming to
provide a bigger picture of the concepts, intelligent techniques,
practices and research directions in this area. Furthermore, this
book serves as a single source of reference for acquiring knowledge
on the technology, processes and people involved in the
next-generation of cyber-smart cities.
This book presents that explainable artificial intelligence (XAI)
is going to replace the traditional artificial, machine learning,
deep learning algorithms which work as a black box as of today. To
understand the algorithms better and interpret the complex networks
of these algorithms, XAI plays a vital role. In last few decades,
we have embraced AI in our daily life to solve a plethora of
problems, one of the notable problems is cyber security. In coming
years, the traditional AI algorithms are not able to address the
zero-day cyber attacks, and hence, to capitalize on the AI
algorithms, it is absolutely important to focus more on XAI. Hence,
this book serves as an excellent reference for those who are
working in cyber security and artificial intelligence.
Large data sets arriving at every increasing speeds require a new
set of efficient data analysis techniques. Data analytics are
becoming an essential component for every organization and
technologies such as health care, financial trading, Internet of
Things, Smart Cities or Cyber Physical Systems. However, these
diverse application domains give rise to new research challenges.
In this context, the book provides a broad picture on the concepts,
techniques, applications, and open research directions in this
area. In addition, it serves as a single source of reference for
acquiring the knowledge on emerging Big Data Analytics
technologies.
The research has been done in the Department of Pharmacy,
University of Asia Pacific, Dhaka, Bangladesh as continuing its
research activities science its inception in different fields
likely Pharmaceutical Technology, Pharmaceutical Microbiology,
Pharmaceutical Biotechnology, Phytochemistry etc. Every year a
number of research articles are being published in different
reputed journals both national and internationally. The main author
Mohammad Shahriar has published a number of research articles in
national and international journals in the field of Biotechnology,
Molecular Biology, Phytochemistry and Pharmaceutical Technology.The
second author Prof. Dr. Mohiuddin Ahmed Bhuiyan, has also published
research articles in the field of Pharmaceutical Technology,
Biotechnology, Phytochemistry and Pharmaceutical Microbiology in
different reputed journals around the world. Farzana Anwar Sharmin
was a research student in the Master program of the department
under the supervision of Mohammad Shahriar and Dr. Bhuiyan.
The authors have done their research in the Department of Pharmacy,
University of Asia Pacific, Dhaka, Bangladesh. This department is
continuing its research activities since its inception in different
fields, likely, Pharmaceutical Technology, Pharmaceutical
Microbiology, Pharmaceutical Biotechnology, Phytochemistry etc.
Every year a number of research articles are being published in
different reputed journals from this department. The main author
Prof. Dr. Mohiuddin Ahmed Bhuiyan has published a number of
research articles in national and international journals in the
field of Biotechnology, Molecular Biology, Pharmaceutical
Technology, Phytochemistry etc. The second author, Mr. Mohammad
Shahriar, has also published research articles in the field of
Biotechnology, Phytochemistry and Microbiology. Mr. Robin Kumar
Aich was a research student in the Master program of the department
under the supervision of Dr. Bhuiyan and Mr. Shahriar.
The authors have done their research in the Department of Pharmacy,
University of Asia Pacific, Dhaka, Bangladesh. This department is
continuing its research activities since its inception in different
fields, likely, Pharmaceutical Technology, Pharmaceutical
Microbiology, Pharmaceutical Biotechnology, Phytochemistry etc.
Every year a number of research articles are being published in
different reputed journals from this department. The main author
Prof. Dr. Mohiuddin Ahmed Bhuiyan has published a number of
research articles in national and international journals in the
field of Pharmaceutical Technology, Biotechnology, Molecular
Biology, Phytochemistry etc. The third author, Prof. Dr. Md. Selim
Reza is a professor of the Department of Pharmaceutical Technology,
Faculty of Pharmacy, University of Dhaka, Bangladesh who is an
expert of Pharmaceutical Technology. He has a number of publication
in this field. The second author, Ms. Syeda Amina Toufique was a
research student in the Master program of the department under the
supervision of Dr. Bhuiyan and Dr. Reza.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R398
R330
Discovery Miles 3 300
|