As the world is becoming more digital and entwined together, the cybersecurity threat landscape has no doubt become a daunting one. For example, typical threat variants of the past, especially those……続きを見る
The Art of Cyber Defense: From Risk Assessment to Threat Intelligence offers a comprehensive exploration of cybersecurity principles, strategies, and technologies essential for safeguarding digital ……続きを見る
This book investigates how digital technologies, such as social media and artificial intelligence, can contribute to combatting corruption in Brazil.
Brazil, with its long history of scandals and ab……続きを見る
This book provides a thorough exploration of the intersection between gender-based healthcare disparities and the transformative potential of artificial intelligence (AI) and machine learning (ML). ……続きを見る
Fostering Women's Engagement in STEM Through Education: A Cross-Cultural Academic-Industry Journey uniquely intertwines academic rigour with real-world impact, offering a comprehensive exploration o……続きを見る
The book explores the regulatory and institutional aspects of global governance of space cybersecurity.
Focusing on the regulatory aspects, this book argues that the current international law cannot……続きを見る
The Complete Guide to Cybersecurity Risks and Controls presents the fundamental concepts of information and communication technology (ICT) governance and control. In this book, you will learn how to……続きを見る
Online platforms and their ecosystems are the cornerstone of the digital economy. They have brought forth positive network effects. But they are also known for their information asymmetries, their p……続きを見る
Cybersecurity is set to be one of the dominant themes in EU governance in the coming years, and EU law has begun to adapt to the challenges presented by security with the adoption of the Network and……続きを見る
Artificial Intelligence and Ethics is a general and wide-ranging survey of the benefits and ethical dilemmas of artificial intelligence (AI). The rise of AI and super-intelligent AI has created an u……続きを見る
This book reboots the conversation about all technologies relating to robot safety. It covers key features of industry standards, relevant government regulations, hardware devices, physical safeguar……続きを見る
Developing robots to interact with humans is a complex interdisciplinary effort. While engineering and social science perspectives on designing human–robot interactions (HRI) are readily available, ……続きを見る
Blockchain technology is a digital ledger system that allows for secure, transparent and tamper-proof transactions. It is essentially an often decentralized, distributed, peer-to-peer database that ……続きを見る
This book studies the evolution of sustainable green smart cities and demonstrates solutions for green environmental issues using modern industrial IoT solutions. It is a ready reference with guidel……続きを見る
Interactive media are a human-machine interface that allows people to connect with each other by making them active participants in the media they consume through text, graphics, audio and video. Th……続きを見る
In a world increasingly driven by technology, this book explores the intersection of artificial intelligence (AI), IoT, and Cloud Computing and women's safety, highlighting the transformative potent……続きを見る
Wireless Body Area Networks (WBANs) are vulnerable to cyberattacks and security breaches that could unlock the door for cybercriminals to penetrate hospital networks. This book covers the fundamenta……続きを見る
¿Nuestros datos personales se encuentran debidamente protegidos cuando son recolectados, procesados y almacenados por los organismos estatales? ¿Qué tipos de datos se recolectan? ¿Son los datos biom……続きを見る
Brain Technology in Augmented Cognition: Current and Future Trends informs engineers interested in human-computer interaction about the current state of augmented cognition. Its scope includes recen……続きを見る
In today’s world, cybersecurity attacks and security breaches are becoming the norm. Unfortunately, we are not immune to it, and any individual and entity is at dire risk. The best and only thing th……続きを見る
This book examines the applications, trends and challenges of 5G Enabled technologies for Smart City and Urbanization systems. It addresses the challenges to bringing such capabilities of 5G-enabled……続きを見る
Information security primarily serves these six distinct purposesーauthentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiat……続きを見る
In The Closing of the Auditor’s Mind?, author David J. O’Regan describes internal auditing as an important "binding agent" of social cohesion, for the accountability of individuals and organizations……続きを見る
The idea of creating artificial humans can be found at the beginning of the human culture. Ancient myths contain the stories of artificial humans brought to life by gods. The word robot originates f……続きを見る
IntroducciónEl 17 de marzo de 2018, el escándalo estalló. Los medios de comunicación se hicieron eco de cómo se había manipulado la privacidad de millones de usuarios, sacudiendo la confianza públic……続きを見る
Este livro é um estudo obrigatório para todos os envolvidos no alucinante mundo do mais poderoso meio de comunicação da atualidade – a internet. O século XXI sofreu imensas transformações devido à e……続きを見る
DESAFIOS E POSSIBILIDADES SOB AS LENTES DA RESPONSABILIDADE CIVIL DOS PROVEDORES "(...) Ademais, é essencial ressaltar que a discussão sobre responsabilidade civil vai além de um simples enquadramen……続きを見る
Zero to Hero: Your Guide to a Career in Cybersecurity is an essential roadmap for anyone aiming to penetrate the vibrant and ever-expanding domain of cybersecurity. In an era where digital threats l……続きを見る
著者:Ana Inés Perea
出版社: Editorial Universidad Católica de Córdoba
発売日: 2024年10月09日
La presente publicación es una valiosa contribución a un debate introductorio sobre la inteligencia artificial y los desafíos éticos que la temática requiere, considerando múltiples problemáticas y ……続きを見る
This practical book introduces open-source intelligence (OSINT) and explores how it can be executed in different intelligence scenarios. It covers varying supporting topics, such as online tracking ……続きを見る