Welcome to our book review site www.go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Introduction to Digital Humanism
  • Language: en
  • Pages: 631

Introduction to Digital Humanism

This open access textbook introduces and defines digital humanism from a diverse range of disciplines. Following the 2019 Vienna Manifesto, the book calls for a digital humanism that describes, analyzes, and, most importantly, influences the complex interplay of technology and humankind, for a better society and life, fully respecting universal human rights. The book is organized in three parts: Part I “Background” provides the multidisciplinary background needed to understand digital humanism in its philosophical, cultural, technological, historical, social, and economic dimensions. The goal is to present the necessary knowledge upon which an effective interdisciplinary discourse on dig...

Business Transformation through Blockchain
  • Language: en
  • Pages: 372

Business Transformation through Blockchain

  • Type: Book
  • -
  • Published: 2018-12-30
  • -
  • Publisher: Springer

The second volume of this edited collection offers a number of contributions from leading scholars investigating Blockchain and its implications for business. Focusing on the transformation of the overall value chain, the sections cover the foundations of Blockchain and its sustainability, social and legal applications. It features a variety of use cases, from tourism to healthcare. Using a number of theoretical and methodological approaches, this innovative publication aims to further the cause of this ground-breaking technology and its use within information technology, supply chain and wider business management research.

Bitcoin: A Game-Theoretic Analysis
  • Language: en
  • Pages: 344

Bitcoin: A Game-Theoretic Analysis

The definitive guide to the game-theoretic and probabilistic underpinning for Bitcoin’s security model. The book begins with an overview of probability and game theory. Nakamoto Consensus is discussed in both practical and theoretical terms. This volume: Describes attacks and exploits with mathematical justifications, including selfish mining. Identifies common assumptions such as the Market Fragility Hypothesis, establishing a framework for analyzing incentives to attack. Outlines the block reward schedule and economics of ASIC mining. Discusses how adoption by institutions would fundamentally change the security model. Analyzes incentives for double-spend and sabotage attacks via stock-flow models. Overviews coalitional game theory with applications to majority takeover attacks Presents Nash bargaining with application to unregulated environments This book is intended for students or researchers wanting to engage in a serious conversation about the future viability of Bitcoin as a decentralized, censorship-resistant, peer-to-peer electronic cash system.

Die Fakultät für Informatik/The Faculty of Informatics
  • Language: en
  • Pages: 150

Die Fakultät für Informatik/The Faculty of Informatics

The Faculty of Informatics at the TU Wien stands for excellence in research, quality in teaching, and passion for innovation. Its core is formed by application-oriented fundamental research, the topics of which are inspired by practical problems. The Faculty of Informatics is characterised by ongoing top achievements in research, and by its relentless dedication to providing students with the best possible learning environment. The strategic focus of the degree programmes is on the comprehensive interconnection of research and teaching, thus ensuring the absolute topicality and relevance of course contents. Another goal of the faculty is to provide innovative problem-solving solutions which meet the challenges of the information and knowledge society.

Enterprise Information Systems V
  • Language: en
  • Pages: 339

Enterprise Information Systems V

This book comprises a set of papers selected from those presented at the fifth « International Conference on Enterprise Information Systems », (ICEIS’2003) held in Angers, France, from 23 to 26 April 2003. The conference was organised by École Supérieure d’Électronique de l’Ouest (ESEO) of Angers, France and the Escola Superior de Tecnologia of Setúbal, Portugal. Since its first edition in 1999, ICEIS focuses on real world applications and aims at bringing together researchers, engineers and practitioners interested in the advances and business applications of information systems. As in previous years, ICEIS’2003 held four simultaneous tracks covering different aspects of enter...

Internet of Things Security
  • Language: en
  • Pages: 121

Internet of Things Security

  • Type: Book
  • -
  • Published: 2022-09-01
  • -
  • Publisher: CRC Press

Internet of Things (IoT) security deals with safeguarding the devices and communications of IoT systems, by implementing protective measures and avoiding procedures which can lead to intrusions and attacks. However, security was never the prime focus during the development of the IoT, hence vendors have sold IoT solutions without thorough preventive measures. The idea of incorporating networking appliances in IoT systems is relatively new, and hence IoT security has not always been considered in the product design. To improve security, an IoT device that needs to be directly accessible over the Internet should be segmented into its own network, and have general network access restricted. The network segment should be monitored to identify potential anomalous traffic, and action should be taken if a problem arises. This has generated an altogether new area of research, which seeks possible solutions for securing the devices, and communication amongst them.

Database and Expert Systems Applications
  • Language: en
  • Pages: 1023

Database and Expert Systems Applications

  • Type: Book
  • -
  • Published: 2003-05-15
  • -
  • Publisher: Springer

The Database and Expert Systems Applications (DEXA) conferences have established themselves as a platform for bringing together researchers and practitioners from various backgrounds and all regions of the world to exchange ideas, experiences and opinions in a friendly and stimulating environment. The papers presented at the conference represent recent developments in the field and important steps towards shaping the future of applied computer science and information systems. DEXA covers a broad field: all aspects of databases, knowledge based systems, knowledge management, web-based systems, information systems, related technologies and their applications. Once again there were a good numbe...

Information Security and Ethics
  • Language: en
  • Pages: 842

Information Security and Ethics

  • Type: Book
  • -
  • Published: 2008
  • -
  • Publisher: Unknown

"This compilation serves as the ultimate source on all theories and models associated with information privacy and safeguard practices to help anchor and guide the development of technologies, standards, and best practices to meet these challenges."--Provided by publisher.

The Handbook of Computer Networks, Key Concepts, Data Transmission, and Digital and Optical Networks
  • Language: en
  • Pages: 1064

The Handbook of Computer Networks, Key Concepts, Data Transmission, and Digital and Optical Networks

A complete and in-depth introduction to computer networks and networking In this first volume of The Handbook of Computer Networks, readers will get a complete overview of the key concepts of computers networks, data transmission, and digital and optical networks. Providing a comprehensive examination of computer networks, the book is designed for both undergraduate students and professionals working in a variety of computer network-dependent industries. With input from over 270 experts in the field, the text offers an easy-to-follow progression through each topic and focuses on fields and technologies that have widespread application in the real world.

The Handbook of Computer Networks, LANs, MANs, WANs, the Internet, and Global, Cellular, and Wireless Networks
  • Language: en
  • Pages: 1304

The Handbook of Computer Networks, LANs, MANs, WANs, the Internet, and Global, Cellular, and Wireless Networks

  • Type: Book
  • -
  • Published: 2007-12-10
  • -
  • Publisher: Wiley

A comprehensive look at computer networking, from LANs to wireless networks In this second volume of The Handbook of Computer Networks, readers will get a complete overview of the types of computer networks that are most relevant to real-world applications. Offering a complete view of computer networks, the book is designed for both undergraduate students and professionals working in a variety of computer network-dependent industries. With input from over 270 experts in the field and with over 1,000 peer reviewers, the text covers local and wide area networks, the Internet, wireless networks, voice over IP, global networks, and more.