Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This book provides important new insights into social issues in the rapidly growing field of esports, filling a gap in the literature that has, until now, been dominated by business and management perspectives.
Financial crime is a trillion-dollar industry that is likely to continue to grow exponentially unless new strategies of prevention and control can be developed. This book covers a wide range of topics related to financial crime commission, victimization, prevention, and control.
Investigating the impact of digital technology on contemporary constitutionalism, this book offers an overview of the transformations that are currently occurring at constitutional level, highlighting their link with ongoing societal changes.
The book highlights several aspects of design thinking such as Information Design, Critical Design, the meaning of Culture, Gender and disabilities are discussed. The functions of Information Design are changing, from 'showing the way', instruction manuals and graphic design.
This book advances a theory of a child's right to decisional privacy. It addresses a significant gap in understanding the interconnections between privacy, family law and children's rights, and contextualises the theory through judicial proceedings concerning medical treatment for children experiencing gender dysphoria.
This reference text helps understand how the concepts of explainable artificial intelligence (XAI) are used in the medical and healthcare sectors. The text discusses medical robotic systems using XAI and physical devices having autonomous behaviours for medical operations.
Object Oriented Data Analysis (OODA) provides a useful general framework for the consideration of many types of Complex Data. It is deliberately intended to be particularly useful in the analysis of data in complicated situations which are typically not easily represented as an unconstrained matrix of numbers.
In today's digital world, the words "smart" and intelligent" are now used to label devices, machinery, systems, and even environments. What is a "smart" system? Is "smart" synonymous to "intelligent"? If not, what does an "intelligent system" mean? Are all the smart systems intelligent?
From an Alexa device in our home to an aircraft, Cyber-Physical Systems (CPS) have transformed the living standard of human beings. The data generated from the CPS provide tremendous insights into the behaviour and functioning of organisations.
This book brings together real-world case studies accurately surveyed and assessed through spatial modeling and focuses on the effectiveness of combining remote sensing, GIS, and R. The use of open source software, remote sensing, and GIS, help researchers and practitioners to better understand the phenomena and the prediction of future analyses.
This edited volume analyses leadership in the public relations (PR) industry with a specific focus on women and their leadership styles and preferences.
This book presents a collection of high-quality contributions on the state-of-the-art in Artificial Intelligence and Big Data analysis as it relates to financial risk management applications. It brings together, in one place, the latest thinking on an emerging topic and includes principles, reviews, examples, and research directions.
This is a prestige reference work offering a comprehensive overview of the state of current knowledge and emerging scholarship in the discipline of AIS. It has been updated to capture the changes in technology since the previous edition, including chapters on artificial intelligence, predictive analytics and data visualisation.
This book discusses the use of machine vision and technologies in specific engineering case studies and focuses on how machine vision techniques are impacting every step of industrial processes and how smart sensors and cognitive big data analytics are supporting the automation processes in Industry 4.0 applications.
This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation.
These collected chapters and interviews explore the current issues and debates about how copyright will or should adapt to meet the practices of 21st century creators and internet users.
Your practical handbook for securing cloud-native applications¿DESCRIPTION Security for cloud-native applications is an overview of cloud-native application's characteristics from a security point of view, filled with best practices for securing services based on AWS, Azure, and GCP infrastructure.This book is a practical guide for securing cloud-native applications throughout their lifecycle. It establishes foundational knowledge of cloud services and cloud-native characteristics. It focuses on securing design approaches like APIs, microservices, and event-driven architectures. Specific technologies like containers, Kubernetes, and serverless functions are covered with security best practices. The book emphasizes integrating security throughout development using CI/CD pipelines and IaC tools. It explores policy as code for enforcing security policies and immutable infrastructure for enhanced security posture. Key management and threat detection strategies are also covered. Finally, the book offers a practical example and resources for further learning.By the end of the book, the reader will be able to design and secure modern applications using the public cloud scale, managed services, automation, and built-in security controls.WHAT YOU WILL LEARN¿ How to secure modern design architectures from APIs, event-driven architectures, and microservices.¿ How to secure applications using containers and the Kubernetes platform.¿ How to secure applications using serverless/function-as-a-service.¿ How to implement key and secrets management as part of cloud-native applications.¿ How to implement the 12-factor application methodology and immutable infrastructure in cloud-native applications.WHO THIS BOOK IS FORThis book is for security professionals, software development teams, DevOps and cloud architects, and all those who are designing, maintaining, and securing cloud-native applications.
Unlocking Web3: Build the Future of the Internet, Today!¿DESCRIPTION This book offers a clear, easy-to-understand introduction to the core concepts of Web3 and blockchain technology, setting the stage for anyone looking to dive into the development of decentralized applications (dApps). With a focus on Ethereum blockchain, node infrastructure, wallets, and key management, it lays the essential groundwork for secure and efficient Web3 development.This book explores Web3, a decentralized web powered by blockchain technology. Discover Ethereum's role and tools for building Web3 apps as you dive into DeFi, NFTs, and deploying apps across blockchains. After reading this book, you will be able to unveil the potential of AI integration in Web3. Imagine a web where control is not centralized but distributed across many computers. You will learn Ethereum basics, transaction processing, and node functions. You will be able to securely manage digital assets with crypto wallets and utilize tools like Truffle and Hard Hat for smart contract development. The book teaches how to deploy apps across blockchain networks and understand AI's role in enhancing Web3.Whether you are aiming to transition into Web3 development or looking to deepen your existing skills, this book offers invaluable insights into the latest technologies and trends. WHAT YOU WILL LEARN¿ Grasp the fundamentals of Web3 and blockchain technology clearly.¿ Develop secure, efficient decentralized applications using Ethereum.¿ Utilize essential tools and frameworks for Web3 development.¿ Implement advanced security measures to protect your dApps.¿ Integrate generative AI, like ChatGPT, into Web3 projects.¿ Explore DeFi and NFT markets for innovative dApp creation.WHO THIS BOOK IS FORThis book is tailored for aspiring Web3 developers, software engineers looking to transition into the blockchain space, and tech enthusiasts eager to explore decentralized applications.
This book explores predictive data modeling for biomedical data and imaging in healthcare.
This book details cutting-edge technologies, versatile tools, adaptive processes, integrated platforms, and best practices of digitized systems.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.