You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Parallel to the physical space in our world, there exists cyberspace. In the physical space, there are human and nature interactions that produce products and services. On the other hand, in cyberspace there are interactions between humans and computer that also produce products and services. Yet, the products and services in cyberspace don’t materialize—they are electronic, they are millions of bits and bytes that are being transferred over cyberspace infrastructure.
The influx of data in the world today needs analysis that no one method can handle. Some reports estimated the influx of data would reach 163 zitabytes by 2025, hence the need for simulation and modeling theory and practice. Simulation and modeling tools and techniques are most important in this day and age. While simulation carries the needed work, tools for visualizing the results help in the decision-making process. Simulation ranges from a simple queue to molecular dynamics, including seismic reliability analysis, structural integrity assessment, games, reliability engineering, and system safety. This book will introduce practitioners, researchers, and novice users to simulation and modeling, and to the world of imagination.
Provides original material concerned with all aspects of information resources management, managerial and organizational applications, as well as implications of information technology.
"This book offers insight into the computer science aspect of simulation and modeling while integrating the business practices of SM. It includes current issues related to simulation, such as: Web-based simulation, virtual reality, augmented reality, and artificial intelligence, combining different methods, views, theories, and applications of simulations in one volume"--Provided by publisher.
The internet is established in most households worldwide and used for entertainment purposes, shopping, social networking, business activities, banking, telemedicine, and more. As more individuals and businesses use this essential tool to connect with each other and consumers, more private data is exposed to criminals ready to exploit it for their gain. Thus, it is essential to continue discussions involving policies that regulate and monitor these activities, and anticipate new laws that should be implemented in order to protect users. Cyber Law, Privacy, and Security: Concepts, Methodologies, Tools, and Applications examines current internet and data protection laws and their impact on user experience and cybercrime, and explores the need for further policies that protect user identities, data, and privacy. It also offers the latest methodologies and applications in the areas of digital security and threats. Highlighting a range of topics such as online privacy and security, hacking, and online threat protection, this multi-volume book is ideally designed for IT specialists, administrators, policymakers, researchers, academicians, and upper-level students.
Fast advances in information technology have led to a smarter world vision with ubiquitous interconnection and intelligence. Smart Manufacturing Innovation and Transformation: Interconnection and Intelligence covers both theoretical perspectives and practical approaches to smart manufacturing research and development triggered by ubiquitous interconnection and intelligence. This reference work discusses the transformation of manufacturing, the latest developments in smart manufacturing innovation, current and emerging technology opportunities, and market imperatives that enable manufacturing innovation and transformation, useful tools for readers in industry, academia, and government.
The rapid evolution of technology continuously changes the way people interact, work, and learn. By examining these advances from a sociological perspective, researchers can further understand the impact of cyberspace on human behavior, interaction, and cognition. Multigenerational Online Behavior and Media Use: Concepts, Methodologies, Tools, and Applications is a vital reference source covering the impact of social networking platforms on a variety of relationships, including those between individuals, governments, citizens, businesses, and consumers. The publication also highlights the negative behavioral, physical, and mental effects of increased online usage and screen time such as mental health issues, internet addiction, and body image. Showcasing a range of topics including online dating, smartphone dependency, and cyberbullying, this multi-volume book is ideally designed for sociologists, psychologists, computer scientists, engineers, communication specialists, academicians, researchers, and graduate-level students seeking current research on media usage and its behavioral effects.
The tactical organization and protection of resources is a vital component for any governmental entity. Effectively managing national security through various networks ensures the highest level of protection and defense for citizens and classified information. National Security: Breakthroughs in Research and Practice is an authoritative resource for the latest research on the multiple dimensions of national security, including the political, physical, economic, ecological, and computational dimensions. Highlighting a range of pertinent topics such as data breaches, surveillance, and threat detection, this publication is an ideal reference source for government officials, law enforcement, professionals, researchers, IT professionals, academicians, and graduate-level students seeking current research on the various aspects of national security.
"This book disseminates supply chain management and applied logistic theories, technology development, innovation, and transformation in various economy sectors upon current, advancing technological opportunities and market imperatives"--Provided by publisher.
This book constitutes the refereed proceedings of the First International Conference on Intelligent Cloud Computing, ICC 2019, held in Riyadh, Saudi Arabia, in December 2019. The two-volume set presents 53 full papers, which were carefully reviewed and selected from 174 submissions. The papers are organized in topical sections on Cyber Security; Data Science; Information Technology and Applications; Network and IoT.