Bemærk: Kan ikke leveres før jul.
The book is a compilation of authoritative perspectives on General Data Protection Regulation (GDPR) of experts from Industry, Law (EU and US), Academia, Banks, Cyber Security, Digital Forensics, eDiscovery, Investigations, and Cyber Insurance.
Bemærk: Kan ikke leveres før jul.
This book investigates the narrativity of some of the most popular survival horror video games and the gender politics implicit in... Læs mere
Bemærk: Kan ikke leveres før jul.
This book provides philosophical depth to debates in digital ethics about online manipulation. The chapters explore the ramifications of our interactions with... Læs mere
Bemærk: Kan ikke leveres før jul.
Machine Learning for Criminology and Crime Research reviews the roots of the intersection between machine learning, Artificial... Læs mere
Bemærk: Kan ikke leveres før jul.
The book offers a fresh perspective on information systems, a field of study and practice currently undergoing substantial upheaval, even as it expands rapidly and widely with new technologies and applications.
Bemærk: Kan ikke leveres før jul.
Information Technology Security and Risk Management: Inductive Cases for Information Security is a... Læs mere
Bemærk: Kan ikke leveres før jul.
Information Technology Security and Risk Management: Inductive Cases for Information Security is a... Læs mere
Bemærk: Kan ikke leveres før jul.
Comparing six different areas of law that have been particularly exposed to global digitality, namely laws regulating consumer contracts, data protection, the media,... Læs mere
Bemærk: Kan ikke leveres før jul.
This book addresses the current and emerging opportunities being utilized to apply modern Artificial Intelligence (AI) technologies to current forensic and investigation practices.
Bemærk: Kan ikke leveres før jul.
This book addresses the current and emerging opportunities being utilized to apply modern Artificial Intelligence (AI) technologies to current forensic and investigation practices.
Bemærk: Kan ikke leveres før jul.
In an increasingly interconnected digital realm, "Ubiquitous and Transparent Security: Challenges and Applications" emerges as a guiding beacon through the intricate web of modern cybersecurity.
Bemærk: Kan ikke leveres før jul.
The book reviews the development process of blockchain algorithms and examples of their applications in different sectors. The opportunities and challenges of blockchain implementations that arise in making technological innovations usable in corporate structures are discussed.