Data is now one of the world’s most valuable resources. The adoption of data-driven applications across economic sectors has made data and the flow of data so pervasive that it has become integral t……続きを見る
The book explores the creation of digital personalities that mimic human behaviour and cognition, authored by AI and computer science experts. It covers the technical foundations needed to develop a……続きを見る
With the rapid rise in the ubiquity and sophistication of Internet technology and the accompanying growth in the number of network attacks, network intrusion detection has become increasingly import……続きを見る
As a legal professional in the 21st century, you have to figure out how to stand out from the crowd. Times have changed, and it has never been this difficult for legal professionals to cut through t……続きを見る
Information security primarily serves these six distinct purposesーauthentication, authorization, prevention of data theft, sensitive data safety / privacy, data protection / integrity, non-repudiat……続きを見る
Risiko & Recht macht es sich zur Aufgabe, Rechtsfragen der modernen Risikogesellschaft zu analysieren. Berücksichtigung finden Entwicklungen in verschiedensten Gebieten, von denen Sicherheitsrisiken……続きを見る
Traditionally, software engineers have defined security as a non-functional requirement. As such, all too often it is only considered as an afterthought, making software applications and services vu……続きを見る
Prompt engineering engages as a transformative approach to enhancing interaction, creativity, and innovation. From business and healthcare to education, law, and beyond, prompt engineering is a vers……続きを見る
著者:Yassine Maleh
出版社: River Publishers
発売日: 2024年12月27日
This is an essential resource for navigating the complex, high-stakes world of cybersecurity. It bridges the gap between foundational cybersecurity knowledge and its practical application in web app……続きを見る
This book examines the uses and potential risks of location-based services (LBS) in the context of big data, with a focus on location privacy protection methods.
The growth of the mobile Internet an……続きを見る
The attacks on computers and business networks are growing daily, and the need for security professionals who understand how malfeasants perform attacks and compromise networks is a growing requirem……続きを見る
DDoS Attacks: Evolution, Detection, Prevention, Reaction, and Tolerance discusses the evolution of distributed denial-of-service (DDoS) attacks, how to detect a DDoS attack when one is mounted, how ……続きを見る
This book addresses the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. It first reviews security issues and challenges in conte……続きを見る
The aim of this book is to explore the definitions and fundamentals of offensive security versus defensive security and describe the different tools and technologies for protecting against cyber thr……続きを見る
In today's dynamic workplace environment, ensuring the safety and well-being of employees has never been more critical. This book explores cutting-edge technologies intersecting with workplace safet……続きを見る
The monetization of personal data has become an increasingly common business practice, igniting global debate on the interface between data privacy law and competition law. Data Privacy and Competit……続きを見る
Design for security and meet real-time requirements with this must-have book covering basic theory, hardware design and implementation of cryptographic algorithms, and side channel analysis. Present……続きを見る
Understanding the financial motivations behind white collar crime is often the key to the apprehension and successful prosecution of these individuals. Now in its second edition, this volume provide……続きを見る
This book provides a thorough comparative analysis of copyright protection of spatial data across Australia, the United States of America (USA), and the European Union.
With the emergence of terrest……続きを見る
The text covers the fundamentals of Python programming and the implementation of data structures using Python programming with the help of worked-out examples. It provides a learning tool for engine……続きを見る
En un mundo cada vez más dominado por la inteligencia artificial (IA), las fronteras entre tecnología y derecho se vuelven cada vez más difusas. El derecho y la tecnología en la era de la inteligenc……続きを見る
A computer that imbibes human characteristics is considered to have a digital personality. The character is akin to real-life human with his/her distinguishing characteristics such as history, moral……続きを見る
This book discusses the fundamentals of wireless sensor networks,and the prevailing method and trends of smart sensor applications. It presents analytical modelling to foster the understanding of ne……続きを見る
Governing Cross-Border Data Flows explores how the European Union can simultaneously reconcile and pursue two important legal and policy objectives, namely: protecting fundamental rights guaranteed ……続きを見る
Delving into the deeply enigmatic nature of Artificial Intelligence (AI), AI: Unexplainable, Unpredictable, Uncontrollable explores the various reasons why the field is so challenging. Written by on……続きを見る
This book delves into the very core of our digital existence, unearthing the essence of a digital persona. It's a realm where authenticity meets multiplicity, as we decipher the nuanced art of craft……続きを見る
As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm……続きを見る
Emergency managers and public safety professionals are more frequently being called on to address increasingly challenging and complex critical incidents, with a wider variety and intensity of hazar……続きを見る
Embark on a riveting odyssey into the whirlwind of futuristic law enforcement with Jayanth Murali, the acclaimed author of "42 MONDAYS." With a career steeped in law enforcement, Murali propels read……続きを見る
Die digitale Transformation ist im Rechtsmarkt angekommen. Wie Kanzleien und Rechtsabteilungen die Digitalisierung für ihre tägliche Arbeit bestmöglich nutzen, welche Fallstricke dabei zu beachten s……続きを見る