Bemærk: Kan ikke garanteres før jul. Se dato på varen.
This book provides a multi-disciplinary understanding of pathways into and out of... Læs mere
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
Offers a comprehensive exploration of cutting-edge technologies and methodologies at the intersection of cybersecurity and digital innovation.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
This book analyses Artificial Intelligence (AI) and its impact on sustainability, ethics, security, and society. It provides actionable strategies for eco-friendly AI, navigating legal frameworks, and implementing ethical practices.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
This book analyses Artificial Intelligence (AI) and its impact on sustainability, ethics, security, and society. It provides actionable strategies for eco-friendly AI, navigating legal frameworks, and implementing ethical practices.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
This book offers a practical and in-depth exploration of Open-Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
This book offers a practical and in-depth exploration of Open-Source Intelligence (OSINT) tailored for cybersecurity professionals, digital investigators, and threat analysts.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
This book explores how trademark and free speech rights can conflict and proposes speech-protective reforms of trademark law. It also explains why... Læs mere
Bemærk: Kan ikke leveres før jul.
Criminalizing Intimate Image Abuse strives to generate new conceptual and theoretical frameworks to address the legal responses to intimate image abuse by bringing together a number of scholars involved in the study of image abuse over recent years.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
A deep dive into cryptographic hardware architectures, providing a structured approach to secure computing. This book examines the design, optimization, and implementation of crypto engines, ensuring efficiency and robustness in encryption and hashing mechanisms.
Bemærk: Kan ikke garanteres før jul. Se dato på varen.
A deep dive into cryptographic hardware architectures, providing a structured approach to secure computing. This book examines the design, optimization, and implementation of crypto engines, ensuring efficiency and robustness in encryption and hashing mechanisms.
Bemærk: Kan ikke leveres før jul.
This book explores IoMT security and privacy in e-healthcare, addressing vulnerabilities in medical devices that expose patient data to... Læs mere
Bemærk: Kan leveres før jul.
This book offers theoretical and practical insight into posthuman social science research methods, addressing... Læs mere