End-user development (EUD) is creating or modifying software by end users, typically non-programmers. EUD has become popular in recent years due to the rise of user-friendly low-code software development tools and the growing demand for custom softw...Loe edasi...
Crime-Related Events Identification Based on Text Analytics Approach describes the possibilities of extracting crime-related facts from semi-structured information from various Internet sources, so that crime can be combatted. The book is aimed at p...Loe edasi...
This book offers a novel conceptual framework that views information as a form of gossip. It provides a nuanced understanding of the grammar of gossip that permeates both online and real-world environments, and sheds light on the often overused and...Loe edasi...
This book offers a comprehensive overview from diverse perspectives of online gaming technology, policy, and experiments to understand and review the Indian approach. It starts with the technological viewpoint on the governance and regulation of onl...Loe edasi...
Internet of Things (IoT) is expanding at a rapid rate and it is becoming increasingly important for professionals to understand what it is, how it works, and how to harness its power to improve business. Because of this its very important to make su...Loe edasi...
The core of this book is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. This proactive approach ensures the boo...Loe edasi...
The book covers soft computing techniques that provide an optimal solution to the optimization problem using single or multiple objectives. The book focuses on basic design principles and analysis of these techniques. These techniques can be used to...Loe edasi...
As of January 2023 there were over 5 billion users of technology and the internet. We bring to them relatable stories of everyday users, understood by consumers and gadget freaks alike a 200 page reference book of 10 technologies from IoT and AI to...Loe edasi...
Our dependency on digital technology keeps growing. Do we understand the positives and negatives of being so dependent? This book helps everyone answer these questions through stories, pictures, and poems. It is a reflection on how to get the best o...Loe edasi...
Artificial Intelligence and Cybersecurity are two emerging fields that have phenomenal contributions towards technological advancement. As cyber-attacks increase, there is a need to identify threats and thwart attacks. This book will incorporate the...Loe edasi...
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilizes technological means of communication with clie...Loe edasi...
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology, through looking at subjects and experiences the average person will have come into contact with in their life....Loe edasi...
Googles Programmable Search Engines provide search opportunities that are unavailable with any other tool. While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Thi...Loe edasi...
(Ilmumisaeg: 11-May-2021, Kirjastus: Apple Academic Press Inc., ISBN-13: 9781003082033)
This new volume, Cognitive Computing Systems: Applications and Technological Advancements, explores the emerging area of artificial intelligence that encompasses machine self-learning, human-computer interaction, natural language processing, data mi...Loe edasi...
This book is a unique resource in understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology....Loe edasi...
Applied User Data Collection and Analysis Using JavaScript and PHP is designed to provide the technical skills and competency to gather a wide range of user data from web applications in both active and passive methods....Loe edasi...
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensi...Loe edasi...
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs....Loe edasi...
This book will focus on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It will include contributions that discuss the security and privacy issues as well as the opportunities and applications that...Loe edasi...
This book discusses the evolution of security and privacy issues in the Internet of things. The book focuses on bringing all security and privacy related technologies into one single source so that students, researchers, academicians, and those in t...Loe edasi...
In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based...Loe edasi...
This book presents methods to solve emerging problems while mainstreaming adoption of WoT applications. The book emphasis on understanding of WoT and its relation with IoT....Loe edasi...
Advances in data mining and artificial intelligence are now making an active presence after death possible, and the dead remain part of our lives in our digital devices. This book draws together leading experts to present the diverse understandings...Loe edasi...
The digital music revolution and the rise of piracy cultures has transformed the music world as we knew it. This book aims to go beyond the polarized and reductive perception of piracy wars to offer a richer understanding of the paradoxes inherent i...Loe edasi...
The book explains the concepts behind microservices, discovery of microservices and how individual services can be combined to yield composite service(i.e., service composition) and techniques of service composition....Loe edasi...
Educational Institutions do not have an approach for improving awareness among students to increase their knowledge and protection from potential cyber-attacks. This book includes results of several studies aimed to investigate student awareness and...Loe edasi...