 |
|
 |
 |
  |
 |
 |

 |
Beyond data: reclaiming human rights at the dawn of the metaverse This book is a short, focused essay on data security and privacy. The author makes it clear that these are two separate matters that are often in conflict both in practice and in law. Each of the book’s three major sections emphasizes a different stage in the evolution of the... more
|
|
 |
|
 |
 |
 |
 |
 |
Somewhere the saving and putting away had to begin again and someone had to do the saving and keeping, one way or another, in books, in records, in... more |
 |
- Ray Bradbury (1953) |
|
 |
|
 |
|
 |
 |
 |
 |
 |
 |
Deep learning for cognitive computing systems: technological advancements and applications

Deep learning for cognitive computing systems is a bird’s-eye view of deep learning and the neighboring, whether loosely or strongly coupled, areas. It is a collection of several authors’ publications.
The first chapter... more
Health (J.3...) | Jun 9 23

Computer security fundamentals (5th ed.)

Computer security fundamentals, by Chuck Easttom, is a compilation of concepts and tools used in computer security. The book is composed of 15 chapters that can be gathered into four distinct distinct parts. Chapters 1 through 5 expose the main computer security attacks and the different ways they may occur. A... more
Security & Protection (K.6.5) | Jun 7 23

Law and artificial intelligence: regulating AI and applying AI in legal practice

Artificial intelligence (AI) has a significant impact on various legal issues, and several books have been written on the subject. These books often explore the intersection between AI and law, discussing topics such as the legal implications of AI, ethics in AI... more
Law (J.1...) | Jun 6 23

Protecting privacy through homomorphic encryption

With the growing use of sensitive personal information, which also corresponds to the term “personally identifiable information (PII)” in information and communications technology (ICT) environments, the requirements for privacy protection are also increasing as a basis... more
Data Encryption (E.3) | Jun 2 23

Data analysis for social science: a friendly and practical introduction

Earl Babbie’s classic textbook The practice of social research, which went to its 15th edition in 2021 [1], is a standard reference for social science students and researchers. Its comprehensive review of research methods is still of great value even to modern... more
General (E.0) | May 31 23

Big data and public policy: course, content, and outcome

Big data and public policy: course, content, and outcome, by Rebecca Moody and Victor Bekkers, is an excellent book for those who are involved in policy-making processes and looking to learn how big data and public policy are strengthened together. The... more
Public Policy Issues (K.4.1) | May 25 23

Artificial intelligence, machine learning, and optimization tools for smart cities: designing for sustainability

The book’s 11 chapters deal with digital “vitalism” in cities, unbuildable cities, smart cities and identities, services and data representation of information and communication technology (ICT), strategies for... more
Architecture (J.5...) | May 22 23

Applied probability and stochastic processes

Natural phenomena are very complicated, and statistical analysis, which is categorized in the stochastic conceptual framework, is an effective tool to formulate, estimate, and predicate their nature, behaviors, and functionalities. Stochastic processes are useful... more
Stochastic Programming (G.1.6...) | May 16 23

Beyond data: reclaiming human rights at the dawn of the metaverse

This book is a short, focused essay on data security and privacy. The author makes it clear that these are two separate matters that are often in conflict both in practice and in law. Each of the book’s three major sections emphasizes a different stage in the... more
General (K.4.0) | May 11 23

Applied linear analysis for chemical engineers: a multi-scale approach with Mathematica

This 750-plus-page book on applied linear analysis is the culmination of the authors’ more than three decades of experience teaching graduate students in chemical engineering, as well as a continuation of their own mentors’... more
General (G.1.0) | May 2 23

|
 |
|
|
|
 |