You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
With the explosive growth in mobile phone usage and rapid rise in search engine technologies over the last decade, augmented reality (AR) is poised to be one of this decade's most disruptive technologies, as the information that is constantly flowing around us is brought into view, in real-time, through augmented reality. In this cutting-edge book, the authors outline and discuss never-before-published information about augmented reality and its capabilities. With coverage of mobile, desktop, developers, security, challenges, and gaming, this book gives you a comprehensive understanding of what augmented reality is, what it can do, what is in store for the future and most importantly: how to benefit from using AR in our lives and careers. - Educates readers how best to use augmented reality regardless of industry - Provides an in-depth understanding of AR and ideas ranging from new business applications to new crime fighting methods - Includes actual examples and case studies from both private and government application
Investigators within the law enforcement and cyber forensics communities are generally aware of the concept of steganography, but their levels of expertise vary dramatically depending upon the incidents and cases that they have been exposed to. Now there is a book that balances the playing field in terms of awareness, and serves as a valuable refer
Security is always a concern with any new technology. When we think security we typically think of stopping an attacker from breaking in or gaining access. From short text messaging to investigating war, this book explores all aspects of wireless technology, including how it is used in daily life and how it might be used in the future. It provides a one-stop resource on the types of wireless crimes that are being committed and the forensic investigation techniques that are used for wireless devices and wireless networks. The author provides a solid understanding of modern wireless technologies, wireless security techniques, and wireless crime techniques, and shows how to conduct forensic analysis on wireless devices and networks. Each chapter, while part of a greater whole, is self-contained for quick comprehension.
The Investigator's Guide to Steganography provides a comprehensive look at this unique form of hidden communication from its beginnings to modern uses. It begins by exploring the past; providing insight into how this steganography began and evolved from ancient times to present day. It continues with an in-depth look at the workings of digital steganography and watermarking methods, available tools on the Internet, and the companies who are providing cutting edge steganography and watermarking services. The third section outlines real world uses of steganography. The book concludes by reviewing steganography detection methods and what can be expected in the future.
The Evolution of Horror in the Twenty-First Century examines the intimate connections between the horror genre and its audience’s experience of being in the world at a particular historical and cultural moment. This book not only provides frameworks with which to understand contemporary horror, but it also speaks to the changes wrought by technological development in creation, production, and distribution, as well as the ways in which those who are traditionally underrepresented positively within the genre- women, LGBTQ+, indigenous, and BAME communities - are finally being seen and finding space to speak.
Augmented Reality: Innovative Perspectives Across Art, Industry, and Academia includes a mix of critical/theoretical essays from humanities scholars, augmented reality (AR) artwork (with accompanying reflections) by leading digital artists, and interviews with AR software developers and other industry insiders. Augmented Reality is used in the design of the printed book, effectively linking appropriate pages to relevant digital materials on the Web or physical spaces. Contributors bring critical reflection and artistic ingenuity into conversation with current design thinking and project development across the AR industry.
Managing an Information Security and Privacy Awareness and Training Program provides a starting point and an all-in-one resource for infosec and privacy education practitioners who are building programs for their organizations. The author applies knowledge obtained through her work in education, creating a comprehensive resource of nearly everything involved with managing an infosec and privacy training course. This book includes examples and tools from a wide range of businesses, enabling readers to select effective components that will be beneficial to their enterprises. The text progresses from the inception of an education program through development, implementation, delivery, and evaluation.
HIPAA is very complex. So are the privacy and security initiatives that must occur to reach and maintain HIPAA compliance. Organizations need a quick, concise reference in order to meet HIPAA requirements and maintain ongoing compliance. The Practical Guide to HIPAA Privacy and Security Compliance is a one-stop resource for real-world HIPAA
Fintech Law and Practice in Nigeria provides a comprehensive exploration of the rapidly evolving fintech landscape in Nigeria. Written by Davidson Oturu, this book offers an in-depth analysis of the legal, regulatory, and operational frameworks that govern fintech businesses in one of Africa’s largest economies. From payment systems to cryptocurrency, mobile banking, and digital lending, this book covers key aspects of the Nigerian fintech ecosystem. It delves into the various laws, guidelines, and regulations shaping the industry, offering practical insights for fintech founders, legal practitioners, regulators, and investors. Whether you are navigating the complexities of licensing requi...
Information Security Architecture, Second Edition incorporates the knowledge developed during the past decade that has pushed the information security life cycle from infancy to a more mature, understandable, and manageable state. It simplifies security by providing clear and organized methods and by guiding you to the most effective resources available. In addition to the components of a successful Information Security Architecture (ISA) detailed in the previous edition, this volume also discusses computer incident/emergency response. The book describes in detail every one of the eight ISA components. Each chapter provides an understanding of the component and details how it relates to the other components of the architecture. The text also outlines how to establish an effective plan to implement each piece of the ISA within an organization. The second edition has been modified to provide security novices with a primer on general security methods. It has also been expanded to provide veteran security professionals with an understanding of issues related to recent legislation, information assurance, and the latest technologies, vulnerabilities, and responses.