Homes that contain devices that can be controlled by smart speakers, voice commands and apps are becoming a reality for an increasing number of people. What was once the stuff of science fiction is now firmly established as part of the real world and is easily accessible for anyone who wants to add an exciting new dimension to their home. 100 Top ......
One of the biggest issues for all users in the online world is security and privacy. Whether it is browsing the web, using email or communicating via social media, people are increasingly aware of the threats that are ever-present in the online world. However, recognizing these threats is the first step to preventing them, and a good understanding ......
Privacy, Mass Surveillance, and the Struggle to Reform the NSA
America's mass surveillance programs, once secret, can no longer be ignored. While Edward Snowden began the process in 2013 with his leaks of top secret documents, the Obama administration's own reforms have also helped bring the National Security Agency and its programs of signals intelligence collection out of the shadows. The real question is: ......
This book is designed for use as a primary textbook for a course in cloud computing or as a resource for professionals in industry seeking to explore cloud services. The book highlights the recent developments in distributed computing and details the architecture, virtualization concepts, and security concerns of cloud computing. It also provides ......
The transformation of society brought about by the wide dispersion of computers has given rise to moral dilemmas. This is a collection of twenty-six essays, which offer answers to the ethical questions raised by the interaction of people and computers.
Designed for students and professionals, this text introduces the major concepts of cybersecurity using numerous examples and practical applications. As the field of cybersecurity has moved beyond computer networks and the Internet into phones, the Internet of Things, and autonomous vehicles, it advocates a comprehensive approach to security that ......
How vulnerable are the internet and world wide web to malicious cyber hackers? What are the limits of privacy online? How real is internet addiction and to what extent is the news media responsible for this phenomenon? This book is suitable for anyone who wants to know where the new digital economy is heading.
A Leader's Guide from Deepfakes to Breaking Deep Learning
Sheds light on the ability to hack AI and the technology industry’s lack of effort to secure vulnerabilities.
We are accelerating towards the automated future. But this new future brings new risks. It is no surprise that after years of development and recent breakthroughs, artificial intelligence is rapidly transforming businesses, ......