Phishing is one of the most widely-perpetrated forms of cyber attack, used to gather sensitive information such as credit card numbers, bank account...
Analyzing Social Media Networks with NodeXL: Insights from a Connected World, Second Edition, provides readers with a thorough, practical and updated...
An Industrial IoT Approach for Pharmaceutical Industry Growth, Volume Two uses an innovative approach to explore how the Internet of Things (IoT) and...
Artificial Intelligence for the Internet of Everything considers the foundations, metrics and applications of IoE systems. It covers whether devices...
Blogs and Tweets, Texting and Friending: Social Media and Online Professionalism in Health Care summarizes the most common mistakes — and their legal...
Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy...
One of the challenges of administering and supporting Microsoft® Outlook 2003 is that it stores settings in so many different places - in the Windows...
Data Analysis in the Cloud introduces and discusses models, methods, techniques, and systems to analyze the large number of digital data sources...
User interface (UI) design rules and guidelines, developed by early HCI gurus and recognized throughout the field, were based on cognitive psychology...
Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The...