Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account...
Analyzing Social Media Networks with NodeXL: Insights from a Connected World, Second Edition, provides readers with a thorough, practical and updated...
An Industrial IoT Approach for Pharmaceutical Industry Growth, Volume Two uses an innovative approach to explore how the Internet of Things (IoT) and...
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices...
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy...
Data Analysis in the Cloud introduces and discusses models, methods, techniques, and systems to analyze the large number of digital data sources...
The most prominent Web applications in use today are data-intensive. Scores of database management systems across the Internet access and maintain...
User interface (UI) design rules and guidelines, developed by early HCI gurus and recognized throughout the field, were based on cognitive psychology...
Development of Online Hybrid Testing: Theory and Applications to Structural Engineering provides comprehensive treatments of several topics pertinent...
In the past four decades, information technology has altered chains of value production, distribution, and information access at a significant rate...