You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Millets are ancient grains that have been cultivated by humans for centuries, and they have recently emerged as a crucial staple food in numerous cultures owing to their abundant essential nutrients and their resilience to changing climates, requiring fewer resources for growth. In the face of the current climate crisis, the spotlight on millets as a cornerstone of sustainable societies has intensified. The Role of Women in Cultivating Sustainable Societies Through Millets delves into the significance of millets in sustainable agriculture and the indispensable role that women play in their cultivation and promotion. This book seeks to advocate for the cultivation and consumption of millets a...
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
This book presents state-of-the-art intelligent methods and techniques for solving real-world problemsand offers a vision of future research. Featuring 143 papers from the 4th Future Technologies Conference, held in San Francisco, USA, in 2019, it covers a wide range of important topics, including, but not limited to, computing, electronics, artificial intelligence, robotics, security and communications and their applications to the real world. As such, it is an interesting, exciting and inspiring read.
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well—its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.
Health care today is known to suffer from siloed and fragmented data, delayed clinical communications, and disparate workflow tools due to the lack of interoperability caused by vendor-locked health care systems, lack of trust among data holders, and security/privacy concerns regarding data sharing. The health information industry is ready for big leaps and bounds in terms of growth and advancement. This book is an attempt to unveil the hidden potential of the enormous amount of health information and technology. Throughout this book, we attempt to combine numerous compelling views, guidelines, and frameworks to enable personalized health care service options through the successful applicati...
The book contains several new concepts, techniques, applications and case studies for cyber securities in parallel and distributed computing The main objective of this book is to explore the concept of cybersecurity in parallel and distributed computing along with recent research developments in the field. Also included are various real-time/offline applications and case studies in the fields of engineering and computer science and the modern tools and technologies used. Information concerning various topics relating to cybersecurity technologies is organized within the sixteen chapters of this book. Some of the important topics covered include: Research and solutions for the problem of hidd...
"Artificial Intelligence and Cybersecurity are two emerging fields that have phenomenal contribution towards technological advancement. As cyber-attacks increase, there is a need to identify threats and thwart attacks. This book will incorporate the recent developments that artificial intelligence brings to the cybersecurity world. This edited book provides a premier interdisciplinary platform for researchers, practitioners and educators to present and discuss the most recent innovations, trends, and concerns as well as practical challenges encountered, and solutions adopted in the fields of Artificial Intelligence and Cybersecurity"--
This sixth volume of Collected Papers includes 74 papers comprising 974 pages on (theoretic and applied) neutrosophics, written between 2015-2021 by the author alone or in collaboration with the following 121 co-authors from 19 countries: Mohamed Abdel-Basset, Abdel Nasser H. Zaied, Abduallah Gamal, Amir Abdullah, Firoz Ahmad, Nadeem Ahmad, Ahmad Yusuf Adhami, Ahmed Aboelfetouh, Ahmed Mostafa Khalil, Shariful Alam, W. Alharbi, Ali Hassan, Mumtaz Ali, Amira S. Ashour, Asmaa Atef, Assia Bakali, Ayoub Bahnasse, A. A. Azzam, Willem K.M. Brauers, Bui Cong Cuong, Fausto Cavallaro, Ahmet Çevik, Robby I. Chandra, Kalaivani Chandran, Victor Chang, Chang Su Kim, Jyotir Moy Chatterjee, Victor Christia...
The book addresses the challenges in designing blockchain-based secured solutions for Industry 4.0 applications using artificial intelligence. It further provides a comparative analysis of various advanced security approaches such as edge computing, cybersecurity, and cloud computing in the realm of information technology. This book: Address the challenges in designing blockchain-based secured solutions for Industry 4.0 applications using artificial intelligence Provides a comparative analysis of various advanced security approaches such as edge computing, cybersecurity, and cloud computing in the realm of information technology Discusses the evolution of blockchain and artificial intelligen...
This book is the first of its kind to introduce the integration of ethics, laws, risks, and policies in cyberspace. The book provides understanding of the ethical and legal aspects of cyberspace along with the risks involved. It also addresses current and proposed cyber policies, serving as a summary of the state of the art cyber laws in the United States. It also, importantly, incorporates various risk management and security strategies from a number of organizations. Using easy-to-understand language and incorporating case studies, the authors begin with the consideration of ethics and law in cybersecurity and then go on to take into account risks and security policies. The section on risk covers identification, analysis, assessment, management, and remediation. The very important topic of cyber insurance is covered as well—its benefits, types, coverage, etc. The section on cybersecurity policy acquaints readers with the role of policies in cybersecurity and how they are being implemented by means of frameworks. The authors provide a policy overview followed by discussions of several popular cybersecurity frameworks, such as NIST, COBIT, PCI/DSS, ISO series, etc.