Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
PÅ GRÆNSEN er en øjenåbnende, forargende og underholdende historie om et utraditionelt politiliv bag kulisserne i KØBENHAVNS LUFTHAVN. Som veteran fra den navnkundige Uropatrulje mavelandede JOHNNY ROBIN JØRGENSEN i lufthavnen i 1992, på nederste hylde i politiets hierarki. Men han fandt ud af, at man kan gøre den største forskel, der hvor ingen andre gider at være. Han blev en del af den SPECIALENHED I POLITIET, som forvaltede den stramme danske udlændingepolitik i et pivåbent EU. Han blev ekspert i at profilere illegale immigranter og MENNESKESMUGLERE. Han spottede falske pas og papirer. Og fik dyb indsigt i de ofte groteske forhold bag de tonede ruder på DANMARKS MÅSKE VIGTIGSTE POLITISTATION. Bogen er skrevet i samarbejde med journalist Søren Baastrup, der står bag flere true crime-bestsellere.
Databeskyttelsesforordningen og databeskyttelsesloven med kommentarer beskriver reglerne og praksis vedrørende både forordningen og loven, som samlet set fremadrettet vil udgøre reguleringen af databeskyttelsesretten i Danmark.Lovkommentaren er et praktisk redskab for medarbejdere i den offentlige sektor, private virksomheder, foreninger m.v., som er beskæftiget med aktiviteter, der er omfattet af forordningen og loven, og for advokater, revisorer og andre rådgivere. Bogen indeholder relevant praksis fra Datatilsynet og relevante afgørelser fra bl.a. danske domstole, EU-Domstolen og det nye Europæiske Databeskyttelsesråd.
Enorm rigdom og magt er i dag koncentreret i nye markeder, hvor overvågning af og forudsigelser om vores adfærd bliver købt og solgt. Shoshana Zuboff betegner fænomenet overvågningskapitalisme og kalder det for en lige så stor omvæltning af den menneskelige tilværelse i dag, som den industrielle revolution var det i det 20. århundrede. Der er tale om en hidtil uset magtkonstellation karakteriseret ved ekstreme koncentrationer af viden uden demokratisk tilsyn – og prisen er vores frihed. Med begrænset modstand fra lovgivning og samfund truer overvågningskapitalismen vores nutid og vil dominere vores fremtid – hvis vi tillader det. Anmeldelser “Læs den – den er fremragende!” ★★★★★★ - Altinget ”Det hidtil mest ambitiøse forsøg på at tegne det store billede og forklare baggrunden for digitaliseringens følger, som vi oplever dem som individer og som samfundsborgere ... En fortsættelse af traditionen fra Adam Smith, Max Weber, Karl Polanyi og – tør man sige det – Karl Marx.” – The Observer ”En tilbundsgående researchet, fængende skrevet fortælling om overvågningskapitalismens opståen og dens skadelige virkninger for vores samfund... – New York Times Book Review ”... alle bør læse denne bog som et digitalt selvforsvar. Med stort klarsyn og moralsk mod demonstrerer Zuboff ikke alene, hvordan vores hjerner støvsuges for data, men også hvordan de ændres undervejs, hurtigt og radikalt.” – Naomi Klein, forfatter til Intet bliver som før og No Logo Om forfatteren Shoshana Zuboff er amerikansk socialpsykolog, filosof og professor emerita på Harvard Business School samt ekspert i den digitale revolution. Hun har udgivet en lang række bøger i spændingsfeltet mellem teknologi, psykologi, filosofi og økonomi, og i 1988 skrev hun The age of the Smart Machine: the Future of Work and Power, som blev et skelsættende hovedværk om computeriseringen af vores arbejde og liv.
Denne bog giver forfatternes bud på, hvilke almindelige forvaltningsretligeregler der er mest relevante at være opmærksom på, når der udvikles digitaleløsninger til forvaltningsmyndigheder. Bogen er tænkt som det første af flere bind om de retlige rammer for den digitale forvaltning, hvorfor f.eks. hjemmels-,tilsyns- og prøvelsesspørgsmål ikke er behandlet.Bogen er skrevet med det sigte at blive anvendt som lærebog på Det Juridiske Fakultet, Københavns Universitet. Formålet er at give de studerende på bacheloruddannelsen en grundlæggende viden om den digitale forvaltning og en introduktion til nogle af de regelsæt, der er relevante, når der udvikles digitale løsninger til det offentlige. Det er dog vores håb, at praktikere og andre med interesse for emnet også vil få gavn af bogen.Vi har modtaget stor hjælp fra en række prominente kollegaer.
I 2016 blev EU's efterhånden så berømte databeskyttelsesforordning vedtaget. I 2018 fik forordningen virkning i dansk ret, og den regulerer i dag store dele af det digitale samfunds databehandling, suppleret af databeskyttelsesloven.Forordningens vagt og upræcist formulerede regler er i dag præciseret i en række retningslinjer, vejledninger, udtalelser og afgørelser fra Det Europæiske Databeskyttelsesråd og Datatilsynet, ligesom en række domme er afsagt siden 2018. Grundlæggende databeskyttelsesret gennemgår de væsentligste dele af den almindelige databeskyttelsesret under inddragelse af dette, nyere materiale.Gennemgangen er struktureret efter en række temaer:· Databeskyttelsesrettens nyere historik, formål og sigte· Databeskyttelsesrettens retskilder· Databeskyttelsesforordningens og –lovens anvendelsesområder· Databeskyttelsesrettens reguleringsmodel og aktører· De grundlæggende behandlingsprincipper· Kravene om behandlingsgrundlag og hjemmel· De registreredes rettigheder· De databeskyttelsesretlige ansvarlighedsregler· Reglerne om overførsler til tredjelande og internationale organisationer· Tilsyn, håndhævelse og sanktioner Bogen er blevet til på baggrund af et ønske om en opdatering af lærebogsmaterialet i databeskyttelsesret på Juridisk Fakultet, Københavns Universitet. Den er skrevet af lektor, ph.d. Hanne Marie Motzfeldt, der har undervist i faget siden 2019.
Kompendiet gennemgår systematisk de centrale dele af IT-retten i oversigtsform:Immaterialret, herunder digitale værker, EDB-programmer, databaser, varemærker og domænenavne,Mellemmandsansvar,Databeskyttelsesret,E-handel, herunder markedsføringsret, digital aftaleindgåelse, den digitale ydelse og digitale betalinger,IT-kontrakter, herunder udviklingsaftaler, driftsaftaler og softwarelicensaftaler.Kompendiet indeholder herudover illustrationer samt dispositioner til opgaveløsning, som er egnet til casebaseret undervisning og/eller eksamen.
PC- og onlinesikkerhed er i stigende grad blevet vigtigt for pc-brugere over hele verden. Der er en lang række trusler, der kan ramme dig, når du er på Internettet. Du har måske hørt om en række former for skadelige programmer, der under ét kaldes for malware, og som kan ramme den intetanende pc- og smartphonebruger. Der kan være tale om: Virus – programmer, der smitter og inficerer ens egen og andre pc’er på netværket. Trojanske heste – programmer, som har en skadelig ladning af malware med sig. Spyware – programmer, der udspionerer din gøren og laden på pc’en, og som f.eks. sender dine indtastede kreditkortoplysninger videre til en bagmand. Keyloggere – programmer der registrerer alt, hvad du taster på tastaturet, og sender det til en bagmand. Zombier – din pc kan blive overtaget af en bagmand og skjult indlemmet i et netværk (botnet) af andre zombie-computere, som sammen angriber hjemmesider eller sender store mængder spam ud i verden. Adware – programmer, der viser reklamer på din pc og på hjemmesider, og som er meget irriterende. Ransomware – du kan blive afkrævet en løsesum for at slippe din pc fri for malware, der krypterer dine filer, så du ikke kan læse dem igen. Du lærer om: Identitetstyveri – pas på ikke at få stjålet dine personlige oplysninger, som kriminelle så kan misbruge. Fupbutikker – lær at spotte falske netbutikker, som sælger kopivarer under dække af at være ægte eller sælger dine kreditkortoplysninger. Digitalt selvforsvar – hvordan sikrer du din anonymitet på nettet? Lær om browseranonymitet og andre værktøjer såsom TOR-netværket, der øger din grad af anonymitet på både pc og smartphone. Dine børns onlinesikkerhed – Windows stiller en række værktøjer til rådighed for forældres styring af deres børns brug af pc’en. Læs også hvordan du sikrer dine børns smartphones og tablets. Adgangskoder – hvordan gør man dem sikre? Hvor mange skal man have? Lær også om farerne ved uopfordret tilsendte e-mails: At der kan følge malware med i en vedhæftet fil (bilag) i en e-mail. At du har vundet millioner i et lotteri, uden at du har deltaget i det. At en person har arvet en millionsum, men har brug for en udlænding (dig) til at overføre pengene til sig – mod betaling af en procentdel af arven. At blive mellemmand (muldyr) med en bankkonto til at modtage penge og sende dem videre for et udenlandsk firma – mod at beholde nogle få procent af beløbet. At dit NemID er midlertidigt suspenderet – indtil du oplyser dit NemID-log-ind og uploader et billede af dit nøglekort. Læs om farerne for og hvordan du sikrer dit NemID og netbank. At din PayPal-konto er blevet kompromitteret, og at du derfor skal bekræfte dit log-ind. At du skal sende din Verified-by-Visa-SMS-kode videre per SMS til en bagmand. At en person, du har fået kontakt med via en dating-hjemmeside, akut har brug for mange penge. Heldigvis kan man med oplysning og uddannelse og de rette sikkerhedsprogrammer gardere sig mod disse farer og færdes ret sikkert på nettet alligevel. Denne bog med mange illustrationer beskriver disse farer indgående og oplyser om, hvilke faresignaler du skal være agtpågivende overfor. Der er sammenligninger af antivirusprogrammer med firewall, så du kan se hvilke programmer, der er gode lige nu. Hvis du skulle være blevet ramt af malware, er der også beskrevet nogle fremgangsmåder, hvormed du kan fjerne den igen. Desuden lærer du om sikkerhedskopiering, så du ikke behøver at miste dine filer, hvis du rammes af ransomware.
Beskyttelse af personoplysninger har fået stadig større betydning i nutidens samfund, men det er kontroversielt hvor omfattende og intensiv beskyttelsen bør være. I bogen beskrives de almindelige hensyn og værdier, der har betydning ved udformningen og anvendelsen af den retlige regulering.Fremstillingen er baseret på den nye persondataret, som følger af persondataforordningen og databeskyttelsesloven. Den er derfor væsentligt revideret i forhold til forrige udgave af bogen.I bogens kapitler behandles:Personen og det privateRetskilder og aktørerDet teknologiske og retlige miljøPersondatarettens grundtrækRettighederDen offentlige sektorDen private sektorInternationale dataoverførslerInternettetPrivatliv v. informationsfrihedOvervågningDatabeskyttelsens fremtid Peter Blume er professor ved Det Juridiske Fakultet, Københavns Universitet.
ALT OM MOMSKARRUSELLER, FAKTURAFABRIKKER OG ORGANISERET SVINDEL I MILLIARDKLASSENEngang stod der respekt om kongens mønt. Men nu trækker staten de store sedler tilbage. Udenlandske banker afviser at tage imod danske kroner. Og står du i Netto og langer en 500-kroneseddel over kassebåndet, kan du nærmest føle dig som en forbryder. Hvordan kunne det gå til?To af Danmarks mest garvede journalister fortæller i denne bog om et netværk af danske og udenlandske svindlere, som siden midten af 00’erne har forfinet kunsten at forvandle beskidte penge til rede penge. Bogen dissekerer dette kriminelle columbusæg: De mere og mere komplekse metoder – fra momsbedrageri over fakturafabrikation til kryptosvindel. En voksende kriminel økonomi baseret på systematisk tyveri fra den danske statskasse. Og ikke mindst underverdenens nye hierarki af subsistensløse stråmandsdirektører og karusselkonger i Dubai, som det danske politi og retssystem endnu kun bider i haserne.
Am 25.05.2018 ist die europäische Datenschutz-Grundverordnung (DSGVO) in Kraft getreten. Mit Artikel 15 DSGVO wurde ein Auskunftsrecht für betroffene Personen hinsichtlich der sie betreffenden personenbezogenen Daten, welche durch einen Verantwortlichen verarbeitet werden, eingeführt. Bereits kurze Zeit nach Inkrafttreten der DSGVO entstanden ¿ insbesondere auch im arbeitsrechtlichen Kontext ¿ grundsätzliche Fragestellungen zur rechtlichen Reichweite und praktischen Umsetzung des Auskunftsrechts nach Art. 15 DSGVO. Unter Heranziehung der aktuell existierenden Rechtsprechung sowie Meinungen innerhalb der juristischen Literatur setzt sich der Autor vertieft mit diesen grundsätzlichen Fragestellungen auseinander. Ziel des Autors war es hierbei, die juristische Methodik mit stetigem Blick auf eine praxisfreundliche Lösungsfindung anzuwenden.
This book provides an analysis of social media and women¿s resistance in Iran with relevance to similar polities. The author examines how Iranian women continue to fight against the regime¿s gender discriminatory laws and protest the government in public squares and in virtual spaces. The book presents a critical approach to technology¿s role in politics and society and an in-depth analysis of authoritarianism and its relationship to social media harms and state violence. With a particular focus on images, hashtags, and other digital content, it calls for a rethinking of the concepts of crime, culture, and control in the technosocial world. The author draws on conceptual contributions from the fields of criminology, philosophy, psychology, technology and media studies.
This book represents an interdisciplinary academic endeavour intended to provide readers with a comprehensive, balanced, and nuanced examination of critical issues at the intersection of cyberspace, cyberterrorism, and national and international security. It draws insights from a range of diverse fields, including Computer Science, Social Science, Political Science, International Relations, Criminology, and Law. Furthermore, the book investigates the field of Artificial Intelligence (AI) and related technologies, exploring their dual role in this dynamic landscape of contemporary cyberthreats, with both constructive and malicious implications.The book comprises four distinct themes, with each theme represented by a dedicated Part. Within this organisational framework, each overarching theme is systematically explored through a series of chapters, providing readers with a clear and thematic roadmap for their journey through the content.Part I, Understanding Terrorism and Counter-Terrorism Strategies, of the book explores complexities surrounding contemporary global security challenges. It serves as the foundational segment of the book, consisting of three chapters that critically analyse various dimensions of terrorism and the strategies implemented to combat it.Part II, Cyberterrorism Landscape, of the book offers an in-depth assessment of the current cyberterrorism landscape. This section comprises two critical chapters, each contributing to a comprehensive understanding of the contemporary threats posed by cyberterrorism and their implications for national security.Part III, Countering Cyberterrorism with Technology, of the book forms the core of the book's exploration into leveraging technology to mitigate the threats of cyberterrorism. This section includes four critical chapters, collectively providing an in-depth understanding of the intersection between technology and counterterrorism strategies.Part IV, Artificial Intelligence and National and International Security, of the book delves into the complex relationship between AI technology and the broader security landscape. Comprising three pivotal chapters, this section provides a detailed understanding of AI's transformative role in shaping the future of national and international security.
"Understanding Mass Communication in the Digital Age: Shaping Perspectives and Identities" is an insightful exploration of the dynamic and evolving landscape of media in our contemporary world. This book delves into the transformative impact of digital technologies on mass communication, providing readers with insights into how media shapes our perceptions and influences identities.From the rise of social media to the challenges posed by the digital revolution, this book navigates the complexities of modern communication. It examines how mass media, both traditional and digital, play a pivotal role in shaping cultural narratives, constructing identities, and influencing societal norms.Readers will gain a deep understanding of key concepts, theories, and ethical considerations in mass communication. The book goes beyond a mere examination of technologies; it explores the profound implications of media on our individual and collective identities. Through engaging examples and case studies, readers will discover the power dynamics at play in media, the impact on diverse communities, and the role of media literacy in navigating this ever-changing landscape."Understanding Mass Communication in the Digital Age" is an essential guide for students, professionals, and anyone seeking a nuanced grasp of the forces that shape our media-saturated world. Whether exploring the influence of news media, social media dynamics, or the challenges of media convergence, this book provides a thought-provoking journey into the heart of mass communication, offering a fresh perspective on its profound effects on how we perceive ourselves and others in the 21st century.
In the computerized age, QR codes have become pervasive, consistently coordinated into our regular routines. From item marks to café menus, these high contrast squares guarantee effectiveness and accommodation. Notwithstanding, underneath the outer layer of this innovative simplicity lies a developing danger - QR code cheats. "Examining Risk" digs into the many-sided snare of misdirection turned by noxious entertainers taking advantage of the clueless public through controlled QR codes. The account starts by disentangling the harmless beginnings of QR codes, intended for proficient information stockpiling and recovery. As these codes acquired prevalence, so did their abuse. The book explores through the advancing scene of cybercrime, where hoodlums exploit the trust set in QR codes for accursed purposes. Alina Hazel, the focal figure in this investigation, arises as a casualty turned-advocate, her own experience enhancing the direness to uncover the underside of QR code cheats. The creator carefully takes apart different procedures utilized by tricksters - from making fake QR codes that divert clients to phishing sites to infusing malware into apparently innocuous codes. Through genuine contextual analyses and meetings with network safety specialists, "Checking Risk" reveals insight into the refinement and size of these fake exercises. The book fills in as a reminder, encouraging perusers to move toward QR codes with an insightful eye and an uplifted consciousness of likely dangers. While describing Alina Hazel's excursion of succumbing to a QR code trick, the story entwines with functional tips and methodologies to try not to turn into another measurement. From instructing perusers on checking the authenticity of QR codes to advancing the utilization of secure filtering applications, the book enables people to safeguard themselves against the approaching danger. "Checking Risk" rises above the domain of simple useful examples. It investigates the cultural ramifications of QR code fakes, from monetary misfortunes caused by people to the disintegration of confidence in computerized exchanges. The story likewise digs into the endeavors of policing and online protection experts to battle these developing dangers, furnishing perusers with an exhaustive comprehension of the more extensive scene. In a world progressively dependent on computerized interfaces, "Examining Risk" arises as an ideal report, encouraging society to defy the secret perils sneaking behind the harmless exterior of QR codes. Through a mix of individual stories, master experiences, and a source of inspiration, the book fills in as a significant asset for people trying to securely explore the computerized scene.
This book explores the current impasse that global regulators face in the digital sphere. Computer technology has advanced human civilization tenfold, but the freedom to interact with others in cyberspace has made individuals, discrete communities, organizations and governments more vulnerable to abuse. In consequence, political decision-makers are seriously considering granting limited legal immunity to victims who decide to `hack- back.¿ Many victims frustrated by the slow pace of law enforcement in cyberspace have chosen to `take the law into their own hands,¿ retaliating against those who have stolen valuable data and damaged network operations. Political deliberations about limited immunity for hackbacks usually ignore global justice and moral justifications for `active defense¿ policies. Typically, cyber security policies balance deterrence against two different understandings of morality and the `good life¿ : fairness or welfare. This book proposes a third moral rationale for cyber security policies : capability theory, developed principally by Amartya Sen and Martha Nussbaum. Properly formulated, a capability-based defense of retaliatory hackbacks can minimize attribution and cyber-escalation risks, deter bad behavior by casual computer users, disingenuous security experts, big tech companies, criminals and rogue governments, and satisfy calls for more retributive and distributive justice in the `open world¿. This book will appeal to legal theorists, political philosophers, social activists, investors, international relations scholars and businesspeople in the tech community.A. Jean Thomas is a lawyer and former programmer who has taught at two law schools. She has a BA from Swarthmore College, JD from University of Connecticut Law School and LL.M and S.J.D. from Harvard Law School.
Organizations face increasing cybersecurity attacks that threaten their sensitive data, systems, and existence; but there are solutions. Experts recommend cybersecurity training and general awareness learning experiences as strategic necessities; however, organizations lack cybersecurity training planning, implementation, and optimization guidance. Cybersecurity Training: A Pathway to Readiness addresses the demand to provide cybersecurity training aligned with the normal flow of IT project delivery and technology operations.Cybersecurity Training combines best practices found in standards and frameworks like ITIL technology management, NIST Cybersecurity Framework, ISO risk, quality and information security management systems, and the Guide to the Project Management Body of Knowledge. Trainers will appreciate the approach that builds on the ADDIE model of instructional design, Bloom's Taxonomy of Cognitive Thought, and Kirkpatrick's Model of Evaluation, a trilogy of training best practices.Readers learn to apply this proven project-oriented training approach to improve the probability of successful cybersecurity awareness and role-based training experiences. The reader is guided to initiate, plan, design, develop, pilot, implement and evaluate training and learning, followed by continual improvement sprints and projects.Cybersecurity Training prepares trainers, project managers, and IT security professionals to deliver and optimize cybersecurity training so that organizations and its people are ready to prevent and mitigate cybersecurity threats leading to more resilient organizations.
"Safeguarding Against Crime in Everyday Life" is a comprehensive guide that equips readers with essential knowledge and practical strategies to enhance personal safety and security. The book explores the multifaceted landscape of crime, providing insights into its definition and societal impact. Organized into twenty insightful chapters, the book delves into various aspects of crime prevention, from assault and robbery to identity theft and digital security. Readers will learn to recognize and avoid potentially dangerous situations, acquire self-defense techniques, and adopt safe practices for handling valuables. The book also covers topics such as road rage management, responsible drinking, fraud awareness, and community initiatives for violence prevention. With a focus on empowering individuals, the concluding chapter emphasizes the importance of community involvement and awareness, inspiring a culture of responsibility and safety for a more secure future. Whether in public spaces, online, or at home, this book provides a holistic approach to safeguarding against crime in our daily lives.
The rapid growth and reliance on cyber systems have permeated our society, government, and military which is demonstrated in this book. The authors discuss how AI-powered cyber systems are designed to protect against cyber threats and ensure the security and reliability of digital systems using artificial intelligence (AI) technologies. As AI becomes more integrated into various aspects of our lives, the need for reliable and trustworthy AI systems becomes increasingly important. This book is an introduction to all of the above-mentioned areas in the context of AI Embedded Assurance for Cyber Systems.This book has three themes. First, the AI/ML for digital forensics theme focuses on developing AI and ML powered forensic tools, techniques, software, and hardware. Second, the AI/ML for cyber physical system theme describes that AI/ML plays an enabling role to boost the development of cyber physical systems (CPS), especially in strengthening the security and privacy ofCPS. Third, the AI/ML for cyber analysis theme focuses on using AI/ML to analyze tons of data in a timely manner and identify many complex threat patterns.This book is designed for undergraduates, graduate students in computer science and researchers in an interdisciplinary area of cyber forensics and AI embedded security applications. It is also useful for practitioners who would like to adopt AIs to solve cyber security problems.
Arbejder du eller skal du arbejde med cybersikkerhed, it-drift og udvikling? Denne bog giver dig det nødvendige overblik over de gældende love, direktiver og best practices, der er en forudsætning for enhver organisation i Europa i dag.Særligt NIS2 stiller store krav til organisationer – både strategisk, taktisk og operationelt, og i denne bog gennemgår Karsten Dahl Vandrup og James Brinkmann de essentielle sikkerhedskrav og paragraffer, man skal kende og implementere for at være NIS2-compliant. Bogen gennemgår de grundlæggende sikkerhedsprincipper og den grundlæggende sikkerhedsorganisation – og giver et fundament i form af ISO27001-rammeværket, som NIS2 kan opsættes på.NIS2. Strategisk, taktisk, operationelt klæder samtidig læsere læseren på til at forstå, implementere og arbejde med it-sikkerhedsstandarder, så organisationen generelt kan opnå en modenhed, der ikke bare efterlever sikkerhedskrav til ISO27001, GDPR, NIS2 m.v., men også er med til reelt at øge sikkerhedsniveauet gennem struktureret adfærd, rutiner og teknologi.Der er samtidig fokus på governance og compliance for at sikre, at direktion, ledere og andre beslutningstagere er klædt på til at stå i spidsen for strategien, og til at initiere de efterfølgende taktiske implementeringer gennem operationelle retningslinjer, regler og procedurer.Bogen er et nyttigt redskab for folk, der beskæftiger sig med cybersikkerhed, it-drift og udvikling, og den er desuden velegnet som håndbog til arbejdet med kommunikation mellem medarbejdere og it-specialister inden for administration, drift og cybersikkerhed.
This book presents a compilation of case studies from practitioners, educators, and researchers working in the area of digital violence, along with methodologies to prevent it using cyber security. The book contains three basic sections namely: the concept of digital violence in policy and practice; the impact of digital violence; and the implication of cyber security to curb such violence. The intention of this book is to equip researchers, practitioners, faculties, and students with critical, practical, and ethical resources to use cyber security and related technologies to help curb digital violence and to support victims. It brings about the needs of technological based education in order to combat gendered crimes like cyberbullying, body-shaming, and trolling that are a regular phenomenon on social media platforms. Topics include societal implications of cyber feminism; technology aided communication in education; cyber security and human rights; governance of cyber law throughinternational laws; and understanding digital violence.
- A comprehensive overview of the various fields of application of data science and artificial intelligence.- Case studies from practice to make the described concepts tangible.- Practical examples to help you carry out simple data analysis projects.- BONUS in print edition: E-Book insideData Science, Big Data, Artificial Intelligence and Generative AI are currently some of the most talked-about concepts in industry, government, and society, and yet also the most misunderstood. This book will clarify these concepts and provide you with practical knowledge to apply them.Using exercises and real-world examples, it will show you how to apply data science methods, build data platforms, and deploy data- and ML-driven projects to production. It will help you understand - and explain to various stakeholders - how to generate value from such endeavors. Along the way, it will bring essential data science concepts to life, including statistics, mathematics, and machine learning fundamentals, and explore crucial topics like critical thinking, legal and ethical considerations, and building high-performing data teams.Readers of all levels of data familiarity - from aspiring data scientists to expert engineers to data leaders - will ultimately learn: how can an organization become more data-driven, what challenges might it face, and how can they as individuals help make that journey a success.The team of authors consists of data professionals from business and academia, including data scientists, engineers, business leaders and legal experts. All are members of the Vienna Data Science Group (VDSG), an NGO that aims to establish a platform for exchanging knowledge on the application of data science, AI and machine learning, and raising awareness of the opportunities and potential risks of these technologies.WHAT'S INSIDE //- Critical Thinking and Data Culture: How evidence driven decision making is the base for effective AI.- Machine Learning Fundamentals: Foundations of mathematics, statistics, and ML algorithms and architectures- Natural Language Processing and Computer Vision: How to extract valuable insights from text, images and video data, for real world applications.- Foundation Models and Generative AI: Understand the strengths and challenges of generative models for text, images, video, and more.- ML and AI in Production: Turning experimentation into a working data science product.- Presenting your Results: Essential presentation techniques for data scientists.
This book provides the foundational aspects of malware attack vectors and appropriate defense mechanisms against malware. The book equips readers with the necessary knowledge and techniques to successfully lower the risk against emergent malware attacks. Topics cover protections against malware using machine learning algorithms, Blockchain and AI technologies, smart AI-based applications, automated detection-based AI tools, forensics tools, and much more. The authors discuss theoretical, technical, and practical issues related to cyber malware attacks and defense, making it ideal reading material for students, researchers, and developers.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.