Crime-Related Events Identification Based on Text Analytics Approach describes the possibilities of extracting crime-related facts from semi-structured information from various Internet sources, so that crime can be combatted. The book is aimed at p...Daugiau...
This book offers a novel conceptual framework that views information as a form of gossip. It provides a nuanced understanding of the grammar of gossip that permeates both online and real-world environments, and sheds light on the often overused and...Daugiau...
This book offers a comprehensive overview from diverse perspectives of online gaming technology, policy, and experiments to understand and review the Indian approach. It starts with the technological viewpoint on the governance and regulation of onl...Daugiau...
Internet of Things (IoT) is expanding at a rapid rate and it is becoming increasingly important for professionals to understand what it is, how it works, and how to harness its power to improve business. Because of this its very important to make su...Daugiau...
The core of this book is its ability to adapt to the evolving nature of web security threats. It prepares the reader not just for the challenges of today but also for the unforeseen complexities of the future. This proactive approach ensures the boo...Daugiau...
The book covers soft computing techniques that provide an optimal solution to the optimization problem using single or multiple objectives. The book focuses on basic design principles and analysis of these techniques. These techniques can be used to...Daugiau...
As of January 2023 there were over 5 billion users of technology and the internet. We bring to them relatable stories of everyday users, understood by consumers and gadget freaks alike a 200 page reference book of 10 technologies from IoT and AI to...Daugiau...
Our dependency on digital technology keeps growing. Do we understand the positives and negatives of being so dependent? This book helps everyone answer these questions through stories, pictures, and poems. It is a reflection on how to get the best o...Daugiau...
Artificial Intelligence and Cybersecurity are two emerging fields that have phenomenal contributions towards technological advancement. As cyber-attacks increase, there is a need to identify threats and thwart attacks. This book will incorporate the...Daugiau...
Translating traditional coaching methods and competencies for use in the online world, this informative and timely guide shows coaches how to transform their face-to-face practice into one that utilizes technological means of communication with clie...Daugiau...
This book intends to develop cyber awareness and technical knowledge in anyone who is interested in technology, through looking at subjects and experiences the average person will have come into contact with in their life....Daugiau...
Googles Programmable Search Engines provide search opportunities that are unavailable with any other tool. While lots of professionals use existing PSEs to source for talent or with other research goals, few people have experience creating them. Thi...Daugiau...
(Išleidimo metai: 11-May-2021, Leidėjas: Apple Academic Press Inc., ISBN-13: 9781003082033)
This new volume, Cognitive Computing Systems: Applications and Technological Advancements, explores the emerging area of artificial intelligence that encompasses machine self-learning, human-computer interaction, natural language processing, data mi...Daugiau...
This book is a unique resource in understanding practical uses of the NB-IoT technology and serves as a handbook for technical and non-technical readers who are looking for practicing and exercising the cellular NB-IoT technology....Daugiau...
Applied User Data Collection and Analysis Using JavaScript and PHP is designed to provide the technical skills and competency to gather a wide range of user data from web applications in both active and passive methods....Daugiau...
This book is designed for readers who have an interest in the cyber security domain, including students and researchers who are exploring different dimensions associated with the DDoS attack, developers and security professionals focusing on defensi...Daugiau...
This book elaborates on various attacks on Social Networks with classifications, countermeasures and consequences. It also highlights some key contributions related to current defensive approaches of various attacks on OSNs....Daugiau...
This book will focus on RFID (Radio Frequency Identification), IoT (Internet of Things), and WSN (Wireless Sensor Network). It will include contributions that discuss the security and privacy issues as well as the opportunities and applications that...Daugiau...
This book discusses the evolution of security and privacy issues in the Internet of things. The book focuses on bringing all security and privacy related technologies into one single source so that students, researchers, academicians, and those in t...Daugiau...
In this book, we consider the most significant and emergent research topics in this domain, addressing major issues and challenges in IoT-based solutions proposed for the smart grid. The chapters provide insight on comprehensive topics in IoT-based...Daugiau...