Søgning på underkategorier- og emner:
Bemærk: Kan ikke leveres før jul.
A guide for school systems to help them understand why protecting student data privacy is a critical responsibility for the entire organization.
Bemærk: Kan ikke leveres før jul.
A guide for school systems to help them understand why protecting student data privacy is a critical responsibility for the entire organization.
Bemærk: Kan ikke leveres før jul.
This book offers a systematic analysis of the various existing strategic cyber deterrence options and introduces active cyber defense as a... Læs mere
Bemærk: Kan ikke leveres før jul.
This volume analyses the moral and legal foundations of privacy, security, and accountability along with the tensions that arise between these important individual and social values.
Bemærk: Kan ikke leveres før jul.
This book presents methods to solve emerging problems while mainstreaming adoption of WoT applications. The book emphasis on understanding of WoT and its relation with IoT.
Bemærk: Kan leveres før jul.
An in-depth, on-the ground view of how Chinese officials have co-opted technology, infrastructure and the minds of their people to establish the definitive police state.
Bemærk: Kan ikke leveres før jul.
The Home in the Digital Age is a set of multidisciplinary studies exploring the impact digital technologies in the home with a shift of emphasis from technology to the people living and using this in their homes.
Bemærk: Kan leveres før jul.
Bemærk: Kan ikke leveres før jul.
Access and Control in Digital Humanities explores a range of important questions about who controls data, who is permitted to reproduce or manipulate data, and what sort of challenges Digital Humanists face in making their work accessible and useful.
Bemærk: Kan leveres før jul.
Many applications generate large datasets, like social networking and social influence programs, smart cities applications, smart house... Læs mere
Bemærk: Kan ikke leveres før jul.
Cloud Security: Concepts, Applications and Perspectives discusses the state-of-the-art techniques and methodologies, and covers wide range of examples and illustrations to effectively show the principles, algorithms, applications and practices of security in cloud computing.
Bemærk: Kan ikke leveres før jul.
Focused on the latest mobile technologies, this book addresses the specific features (such as IoT) and their adoptions that are aiming to enable the excellence of business in the Industry 4.0.