In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
The book explores how universities can harness the power of artificial intelligence (AI) while safeguarding privacy, equity, and academic values. Focusing on China’s rapidly evolving higher education sector, this book examines the op...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
Disinformation has become one of the most dangerous threats to modern businesses. In this book, communications expert Uwe Wolff reveals how false narratives, digital smear campaigns, deepfakes, bots and state-sponsored influence operations are used...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
The book explores the intricate nexus between biometric systems and the need for preserving data integrity as well as security needed during the data communication. It offers a systematic and insightful journey through the multifaceted landscape o...Loe edasi...
The use of intelligent technologies to enhance instruction and learning is introduced in pedagogy-based learning-teaching perspective. It covers digital library resources, AI-based tools, data analysis techniques, and NLP and NLU-powered smart ass...Loe edasi...
The objective of this publication AI Modernisation Techniques for Contemporary Trends is to offer a comprehensive and practical framework for engineers, technicians, and individuals interested in converting conventional electromechanical sy...Loe edasi...
This book presents a comprehensive, research-driven framework for implementing cost-effective cybersecurity solutions through the integration of open-source security tools within a structured, multi-tiered defense model. Addressing the growing chall...Loe edasi...
This book outlines a practical framework for implementing a resilient circular economy principle across ten major industries in a developed country. It focuses on integrating circular thinking into supply chain management and applying digital transf...Loe edasi...
This volume gathers selected, peer-reviewed papers presented at the Sixth Scientific Days of the Doctoral School of Mathematics and Computer Sciences (S2DSMCS), held from December 1719, 2024, at Cheikh Anta Diop University in Dakar, Senegal. The wor...Loe edasi...
This book offers a comprehensive exploration of federated learning (FL), a novel approach to decentralized, privacy-preserving machine learning. This book delves into the resilience and security challenges inherent to FL, such as model poisoning and...Loe edasi...
This book provides a structured, practical exploration of modern computer networking concepts and the transformative role of artificial intelligence in cybersecurity. This book begins by introducing the foundational principles of computer networks,...Loe edasi...
Whether youre a student stepping into the world of cybersecurity or a self-taught learner eager to build real-world skills, this book is your gateway to understanding and mastering Linux from both offensive and defensive perspectives. Designed for...Loe edasi...
This book investigates novel privacy-preserving and accountable approaches for blockchain-based financial services. The authors start by providing an overview of blockchain technology and the types of blockchains. The book then reviews the privacy-p...Loe edasi...
This book explores the impact of AI, blockchain, and machine learning on African industries, highlighting their role in sustainable development and addressing global challenges. This book is for scholars, professionals, and policymakers....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse, and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing, and governing safer digital ecosystems....Loe edasi...
The promise of the internet was open knowledge and connection; the reality includes manipulation, abuse and mistrust. This book confronts that gap with a practice-oriented guide to designing, analysing and governing safer digital ecosystems....Loe edasi...
In a digital world saturated with synthetic media and AI-shaped narratives, the quest for trustworthy public information has never been more urgent. Governing Public Information in the Age of AI explores how blockchain can strengthen the integrity o...Loe edasi...
In the age of continuous delivery and microservices, the difference between resilient software and production chaos lies in proactive fault detection. This book shows how to harness the power of predictive analytics and DevSecOps to find weaknesses...Loe edasi...
The book explores how universities can harness the power of artificial intelligence (AI) while safeguarding privacy, equity, and academic values. Focusing on China’s rapidly evolving higher education sector, this book examines the op...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book integrates innovative theoretical research with practical application, providing a comprehensive and in-depth guide for practitioners, researchers in the field of intelligent manufacturing, and readers from all walks of life who are curiou...Loe edasi...
AI-Powered Cybersecurity Essentials: Protecting Enterprise Networks explores how modern AI and machine learning safeguard complex, hybrid enterprise environments. The book progresses from cybersecurity and ML foundations to applied defenses: AI-enha...Loe edasi...
Secure identities across clouds and streamline DevOps workflows with real-world IAM strategies Key Features Master IAM across Azure, AWS, and GCP with platform-specific tools and best practices Secure CI/CD pipelines by automat...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security. In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental improve...Loe edasi...
Transform your approach to digital defence by discovering the profound beauty in scientific principles that govern modern security.In an era where cyber threats evolve exponentially while defenses lag behind, we need more than incremental i...Loe edasi...
With cybercrime costs exceeding 10.5 trillion annually and ransomware attacks predicted every two seconds by 2031, traditional signature-based security has reached critical breaking points. Guide to AI for Cybersecurity provides the essential roadm...Loe edasi...
This book presents selected papers from the 21st International Conference on Intelligent Information Hiding and Multimedia Signal Processing, in conjunction with the 5th SSIM 2025, held on October 1517, 2025, in Taichung City, Taiwan. It is divided...Loe edasi...
This book offers a machine-generated literature overview of the legal and ethical considerations, in the context of technological growth, over implementing privacy and data protection measures in the last three decades. It showcases the expectati...Loe edasi...
The digital forensics research community develops new solutions daily to advance its subfields, including cloud and network forensics and security. However, a substantial amount of such research requires greater experimental rigor. A few works have...Loe edasi...
This book discusses how artificial intelligence, machine learning, and digital technology are being used to re-engineer the manufacturing industry. With a particular emphasis on small- and medium-sized enterprises (SMEs), this book debunks the myth...Loe edasi...
Disinformation has become one of the most dangerous threats to modern businesses. In this book, communications expert Uwe Wolff reveals how false narratives, digital smear campaigns, deepfakes, bots and state-sponsored influence operations are used...Loe edasi...
This book is a comprehensive and approachable guide designed to help learners master the skills required for the CompTIA Network+ (N10-009) exam and succeed in real-world networking roles. Authored with clarity and structured for progressive learnin...Loe edasi...
The book explores the intricate nexus between biometric systems and the need for preserving data integrity as well as security needed during the data communication. It offers a systematic and insightful journey through the multifaceted landscape o...Loe edasi...
The use of intelligent technologies to enhance instruction and learning is introduced in pedagogy-based learning-teaching perspective. It covers digital library resources, AI-based tools, data analysis techniques, and NLP and NLU-powered smart ass...Loe edasi...
The objective of this publication AI Modernisation Techniques for Contemporary Trends is to offer a comprehensive and practical framework for engineers, technicians, and individuals interested in converting conventional electromechanical sy...Loe edasi...