Ambient Intelligence: A Novel Paradigm If the space around us could adapt to our needs and intentions, then our lives
would be much simpler. We would have to spend less time on our daily chores,
we would be more productive and, hopefully, we would live in a less worrisome
and, most likely, more secure world.
Ideally, it would be great if we could live our lives...
Nanotechnology and Human Health
Addressing medium- and long-term expectations for human health, this book reviews current scientific and technical developments in nanotechnology for biomedical, agrofood, and environmental applications. This collection of perspectives on the ethical, legal, and societal implications of bionanotechnology provides unique insight into...
Aggressive Network Self-Defense I'm Mad As Hell, and I'm Not Gonna Take it Anymore!
- Analyze the technical, legal, and financial ramifications of revolutionary and controversial network strike-back and active defense techniques.
- Follow the travails of eight system administrators who take cyber law into their own hands.
CEH: Certified Ethical Hacker Version 8 Study Guide
Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide
Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...
The Cambridge Handbook of Information and Computer Ethics
Information and Communication Technologies (ICTs) have profoundly changed many aspects of life, including the nature of entertainment, work, communication, education, healthcare, industrial production and business, social relations and conflicts. They have had a radical and widespread impact on our moral lives and hence on contemporary...
Network Security Essentials: Applications and Standards (4th Edition)
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections...
|Result Page: 31 30 29 28 27 26 25 24 23 22 |