Gjør som tusenvis av andre bokelskere
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.Du kan når som helst melde deg av våre nyhetsbrev.
This volume is authored by a mix of global contributors from across the landscape of academia, research institutions, police organizations, and experts in security policy and private industry to address some of the most contemporary challenges within the global security domain.
The book is meant for law enforcement professionals interested in commissioning their own serious games as well as game designers interested in collaborative pedagogy and serious games for the law enforcement and security sector.
This edited volume explores the fundamental aspects of the dark web, ranging from the technologies that power it, the cryptocurrencies that drive its markets, the criminalities it facilitates to the methods that investigators can employ to master it as a strand of open source intelligence.
The book provides a holistic review, presenting a multi-stakeholder, multi-disciplinary, international, and evidence-based approach to Information and Communications Technology (ICT) in migration. The book brings together different views and multifaceted responses to ICT-based migration management, examining their overlap, conflict, and synergies. The book is a major addition to the field, tackling important debates concerning humanitarianism and securitization in the reception of migrants, as well as exploring the role of digital technology in aiding migrant integration. The authors explore contentious areas such as the use of new technologies deployed on borders for migration management and border security under the umbrella of smart border solutions including drones, AI algorithms, and face recognition, which are widely criticized for ignoring the fundamental human rights of migrants. The research presented will depart from the euphoric appraisals that technology has made things easier for migrants and those who assist them, to critically examine the bane and boon, benefits and afflictions, highlighting the barriers, as well as the solutions, including several under-researched aspects of digital surveillance and the digital divide.This edited volume has been developed by the MIICT project, funded under the EU Horizon 2020 Action and Innovation programme, under grant agreement No 822380.Provides a positive approach to the integration of migrants, asylum seekers, and refugees using Information and Communications Technology (ICT) solutionsOffers a strategic approach to providing digital services for migrants at an EU, national and local levelBridges the gap between academia and front-line practitioners' work by providing theoretical, policy, ethical, and methodological recommendations
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.
Abonner på vårt nyhetsbrev og få rabatter og inspirasjon til din neste leseopplevelse.
Ved å abonnere godtar du vår personvernerklæring.