Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
3C Customized Cascaded Cryptography for Mobile Application" is an authoritative and comprehensive guide that explores the innovative approach of 3C customized cascaded cryptography for securing mobile applications. Authored by experts in the field of cryptography and mobile security, this book serves as a valuable resource for researchers, mobile app developers, and security professionals interested in enhancing the security of mobile applications using advanced cryptographic techniques.In this book, the authors introduce the concept of 3C customized cascaded cryptography, which combines three fundamental cryptographic components-encryption, hashing, and digital signatures-to provide a robust and tailored security solution for mobile applications. They present a detailed analysis of the architecture, algorithms, and implementation strategies for 3C cryptography, offering practical insights into its benefits and applications.Key topics covered in this book include:Introduction to mobile application security: The authors provide an overview of the security challenges faced by mobile applications, including data breaches, unauthorized access, and malicious activities. They discuss the importance of robust cryptographic techniques in ensuring the confidentiality, integrity, and authenticity of mobile app data.Fundamentals of cryptography: The book explores the fundamental cryptographic components of encryption, hashing, and digital signatures. It explains their purpose, algorithms, and their roles in securing mobile application data.Customized cascaded cryptography: The authors introduce the concept of customized cascaded cryptography, which involves combining the three cryptographic components in a tailored manner to suit the specific security requirements of mobile applications. They outline the advantages of this approach and its ability to provide strong and adaptable security measures.Architecture and implementation strategies: The book presents the architectural framework for integrating 3C cryptography into mobile applications. It discusses the design considerations, key management techniques, and implementation strategies for ensuring seamless integration and efficient performance.Security analysis and evaluation: The authors provide a comprehensive security analysis of 3C cryptography, examining its resistance against various attacks and vulnerabilities. They discuss the strengths and limitations of the approach, offering insights into its effectiveness in protecting mobile application data.Real-world applications and case studies: The book includes practical examples and case studies that demonstrate the application of 3C customized cascaded cryptography in different mobile application scenarios. It covers areas such as mobile banking, secure messaging, e-commerce, and data sharing, showcasing the versatility and effectiveness of the approach.Future directions and emerging trends: The authors discuss the future directions and emerging trends in mobile application security and customized cryptography. They explore areas such as post-quantum cryptography, blockchain integration, and secure decentralized applications, providing insights into the evolving landscape of mobile security.Throughout the book, the authors provide theoretical explanations, algorithmic details, and practical implementation guidelines to facilitate the understanding and adoption of 3C customized cascaded cryptography for mobile applications. By leveraging this innovative approach, "3C Customized Cascaded Cryptography for Mobile Application" enables readers to enhance the security posture of their mobile applications and protect sensitive data in an increasingly connected and vulnerable digital environment.
This book explains the evolution of techniques and strategies in quantum computing, discussing the digital transition towards the quantum computing application in various sectors. The book provides a comprehensive insight into the quantum mechanics and quantum computing techniques and tools and how they have evolved and the impacted in supporting and flourishing business during the quantum computing era. This book includes chapters that discuss the most primitive quantum schemes to the most recent use of Internet, finance and radar technology, thus leveraging greater use of new technologies like security and Internet and others. The content is relevant for an audience that is involved in the research and development of advanced quantum systems. It gives the industry, researchers, and students interested in learning the various quantum computing sectors with the necessary information and tools that can be used to research, design and develop advanced quantum computing systems and techniques.
Are you tired of hearing only about Bitcoin when it comes to cryptocurrency? Do you want to understand the complex world of altcoins and their impact on the crypto landscape? Look no further than "Beyond the Coin: The Untold Stories of Altcoins and Their Impact on the Crypto Landscape."This book takes you on a journey through the rise and fall of altcoins, exploring their impact on the crypto industry and what the future holds for them. You'll learn about the different types of altcoins, their advantages and disadvantages, and how they have evolved over time.But "Beyond the Coin" is more than just a history book. It's a guide to understanding the risks and rewards of investing in altcoins. You'll gain valuable insights into the mistakes made by early altcoin investors, and the lessons learned from their failures. You'll also get an in-depth look at the relationship between altcoins and Bitcoin, and what it means for the future of cryptocurrency.Whether you're a seasoned investor or just getting started in the world of crypto, "Beyond the Coin" is a must-read. With clear and concise explanations, you'll come away with a deep understanding of the complex world of altcoins and their impact on the crypto landscape.Don't let fear or uncertainty hold you back from investing in altcoins. With "Beyond the Coin" as your guide, you'll have the knowledge and confidence to make informed decisions about your investments. Order your copy today and join the ranks of successful altcoin investors.
In this comprehensive guide, you'll discover the power of Ripple and XRP, two game-changing forces that are revolutionizing the financial industry. As the world of finance continues to evolve, it's crucial to stay ahead of the curve, and this book is your roadmap to doing just that.You'll learn about the history of Ripple and XRP and their potential to transform the way we transact and transfer money. The book explores the benefits of using XRP over traditional banking methods, including faster transaction times, lower fees, and greater security.But it's not all sunshine and rainbows. "Beyond the Horizon" also dives into the criticisms of Ripple and XRP, such as their centralization, privacy concerns, and environmental impact. Understanding both the pros and cons of this revolutionary technology is key to making informed investment decisions.With its clear and concise language, "Beyond the Horizon" is perfect for anyone looking to get started with Ripple and XRP. You'll gain a deep understanding of how this technology works and what sets it apart from other cryptocurrencies on the market.But this book is not just for beginners. Even seasoned investors will benefit from the insights and analysis provided, as well as a glimpse into the future of Ripple and XRP. As the financial landscape continues to shift, understanding the potential of Ripple and XRP is more important than ever.So if you're looking to stay ahead of the curve and be part of the Ripple revolution, "Beyond the Horizon" is the must-read book of the year. Whether you're a seasoned investor or just getting started in the world of finance, this book will provide you with the knowledge and insights you need to succeed. Don't miss out on the opportunity to transform the financial landscape with Ripple and XRP. Get your copy of "Beyond the Horizon" today!
This book explores how digital technologies have proved to be a useful and necessary tool to help ensure that local and regional governments on the frontline of the emergency can continue to provide essential public services during the COVID-19 crisis. Indeed, as the demand for digital technologies grows, local and regional governments are increasingly committed to improving the lives of their citizens under the principles of privacy, freedom of expression and democracy.The Digital Revolution began between the late 1950s and 1970s and represents the evolution of technology from the mechanical and analog to the digital. The advent of digital technology has also changed how humans communicate - today using computers, smartphones and the internet. Further, the digital revolution has made a tremendous wealth of information accessible to virtually everyone. In turn, the book focuses on key challenges for local and regional governments concerning digital technologies during this crisis, e.g. the balance between privacy and security, the digital divide, and accessibility. Privacy is a challenge in the mitigation of COVID-19, as governments rely on digital technologies like contact-tracking apps and big data to help trace peoples' patterns and movements. While these methods are controversial and may infringe on rights to privacy, they also appear to be effective measures for rapidly controlling and limiting the spread of the virus. Next, the book discusses the 10 technology trends that can help build a resilient society, as well as their effects on how we do business, how we work, how we produce goods, how we learn, how we seek medical services and how we entertain ourselves. Lastly, the book addresses a range of diversified technologies, e.g. Online Shopping and Robot Deliveries, Digital and Contactless Payments, Remote Work, Distance Learning, Telehealth, Online Entertainment, Supply Chain 4.0, 3D Printing, Robotics and Drones, 5G, and Information and Communications Technology (ICT).
Wir alle kennen Hacking-Gadgets aus diversen Filmen und Serien - kurz ein Gerät am PC angebracht und schon ist das System übernommen. In diesem Buch beschäftigen wir uns damit welche derartigen Tools es tatsächlich gibt und was man damit alles anstellen kann. Wir lernen neben einigen sehr bekannten Hak5-Produkten auch diverse Eigenbau-Projekte und günstige Gadgets aus Fernost kennen.Dabei konzentriere ich mich vor allem auf Angriffe auf Windows-Systeme und Powershell-Scripting, zeige aber am Ende des Buches ebenfalls wie gut diese Angriffe auf Mac OS X oder Linux funktionieren.Damit ist dieses Buch gleichzeitig ein Mahnmal dafür wie wichtig physische Sicherheit ist denn mit den im Buch gezeigten Techniken und Tools ist nicht einmal ein System hinter einer Air Gap sicher!Lernen Sie zu hacken wie Jack Bauer und James Bond...
Dieses Buch beschreibt, unter welchen Bedingungen das in der DDR am weitesten verbreitete Fernschreibchiffriergerät sowie der dazugehörige Algorithmus vor etwa 50 Jahren zum Schutz von Staatsgeheimnissen entwickelt wurden. So können die damaligen Methoden und Ergebnisse mit den aktuellen Möglichkeiten der kryptologischen Analyse verglichen werden ¿ insbesondere unter dem Aspekt der heute zur Verfügung stehenden Computertechnik.Es wird herausgearbeitet, dass die konsequente Anwendung von Methoden der Gruppen- und Automatentheorie in der Analyse eine zentrale Rolle spielte. Dieser algebraische Analyseansatz aus der sowjetischen Schule wird bis heute unterschätzt ¿ die Betrachtungsweisen können auch für Nichtkryptologen von Nutzen sein. Darüber hinaus werden die Unterschiede dargestellt zwischen der Analyse des Chiffrieralgorithmus, der Sicherheitsanalyse des Geräts und der Chiffrierverfahren, in denen es zum Einsatz kommt.Die Ergänzungen in der zweiten Auflage beruhen auf Informationen früherer Mitarbeiter und auf Dokumenten aus den 80er Jahren, die erst nach Erscheinen der Erstauflage zugänglich wurden: Auf der Basis von Originaldokumenten wird nun die Historie der T-310-Entwicklung ausgehend vom Vorläuferalgorithmus SKS genauer dargestellt. Außerdem gelang es den Autoren, einige zuvor nicht lösbare Probleme mit der heute zur Verfügung stehenden Computertechnik zu bearbeiten ¿ daran wird deutlich, wie begrenzt die Rechenkapazität in den 70er und 80er Jahren war. Schließlich wird der letzte Einsatz der T-310 zur Realisierung von gesicherten Fernschreibverbindungen zwischen Ministerien der BRD und der DDR rekonstruiert.
Für die IT- oder Cybersecurity von IT-Dienstleistungen (IT-Services) zu sorgen, kann ein komplexes Unterfangen sein. Als Anwender das erreichte Maß an IT-Sicherheit adäquat einzuschätzen nicht minder.Dieses Buch bringt Ordnung in das Dickicht von Prozessen, Aktivitäten und Informationen, indem neue Begriffe eingeführt sowie existierende geschärft und in den Zusammenhang gesetzt werden. Es liefert konkrete Anleitungen und ein Gesamtkonzept für das Management der IT-Service-Sicherheit im Sinne von Organisieren, Orchestrieren und Optimieren. Es zeigt, wie man die vielen Themen gleichzeitig bearbeiten und erfolgreich am internen oder externen Markt bestehen kann. Die Methoden und Konzeptionen sind die Essenz aus mehr als fünfzehn Jahren Forschung und Lehre und aus mehr als zwölf Jahren in zentraler Verantwortlichkeit in einem der großen international tätigen IT-Dienstleister. Die Aufteilung der an sich komplexen Materie in einzelne Begriffe ermöglicht es dem Leser, sich jeweils auf eine Fragestellung zu konzentrieren. Das Buch richtet sich an Anwender (Anwenderorganisationen) und an IT-Dienstleister (IT-Abteilungen und Firmen in der IT-Industrie) und ist hilfreich für Hersteller, die beide Parteien zufriedenstellen müssen.
"A sweeping exposâe of the U.S. government's alliance with data brokers, tech companies, and advertisers, and how their efforts are reshaping surveillance and privacy as we know it. Our modern world is awash in surveillance. Most of us are dimly aware of this-ever get the sense that an ad is "following" you around the internet?-but we don't understand the extent to which the technology embedded in our phones, computers, cars, and homes is part of a vast ecosystem of data collection. Our public spaces are blanketed by cameras put up in the name of security. And pretty much everything that emits a wireless signal of any kind-routers, televisions, Bluetooth devices, chip-enabled credit cards, even the tires of every car manufactured since the mid-2000s-can be and often is covertly monitored. All of this surveillance has produced an extraordinary amount of data about every citizen-and the biggest customer is the U.S. government. Reporter Byron Tau has been digging deep inside the growing alliance between business, tech, and government for years, piecing together a secret story: how the whole of the internet and every digital device in the world have become a mechanism of intelligence, surveillance, and monitoring. Tau traces the unlikely tale of how the government came to view commercial data as a principal asset of national security in the years after 9/11, working with scores of anonymous companies, many scattered across bland Northern Virginia suburbs, to build a foreign and domestic surveillance capacity of such breathtaking scope that it could peer into the lives of nearly everyone on the planet. The result is a cottage industry of data brokers and government bureaucrats with one directive-"get everything you can"-and, as Tau observes, a darkly humorous world in which defense contractors have marketing subsidiaries, and marketing companies have defense contractor subsidiaries. Sobering and revelatory, Means of Control is our era's defining story of the dangerous grand bargain we've made: ubiquitous, often cheap technology, but at what price to our privacy?"--
Are you curious about the future of money and the role of cryptocurrency in it? Look no further than "The Future of Money," an illuminating exploration of the world of Bitcoin and its impact on technology, culture, and social justice.From its humble beginnings as an alternative to traditional banking systems to its current status as a major player in the financial world, Bitcoin has captivated the imagination of entrepreneurs, developers, and thinkers around the globe. This book takes a deep dive into the evolution of Bitcoin, from its mysterious founder Satoshi Nakamoto to its potential to revolutionize the way we think about money and power.Through engaging and informative chapters, readers will learn about the technological innovations that make Bitcoin possible, the cultural significance of this decentralized currency, and the potential for social justice movements to utilize cryptocurrency to level the playing field.But the book doesn't stop there. "The Future of Money" also looks to the future, exploring emerging technologies in the world of crypto and the possibilities for decentralization and transparency. What will the financial world look like in 5, 10, or 20 years, and how will Bitcoin and other cryptocurrencies fit into that future?Whether you're an entrepreneur looking to invest in the next big thing or simply curious about the potential of this exciting new technology, "The Future of Money" is a must-read. With clear and accessible writing, in-depth research, and expert insights, this book is the definitive guide to the world of cryptocurrency and its impact on the future of money.So don't wait any longer. Invest in your knowledge and understanding of the world of money and cryptocurrency. Get your copy of "The Future of Money" today and be at the forefront of this exciting new frontier.
The modern web is inherently global-and if we want to design successfully for it, we must be ready to meet the needs, perspectives, and expectations of multifaceted, multicultural audiences.With utmost timeliness, Senongo Akpem shares a clear and accessible methodology for designing across cultures: from performing socially conscious research, to building culturally responsive experiences, to developing meaningful internationalization and localization approaches. Expand your craft, and your mindset-and start creating a richer experience for everyone on the web, regardless of location, language, or identity.
We humans are messy, illogical creatures who like to imagine we're in control-but we blithely let our biases lead us astray. In Design for Cognitive Bias, David Dylan Thomas lays bare the irrational forces that shape our everyday decisions and, inevitably, inform the experiences we craft. Once we grasp the logic powering these forces, we stand a fighting chance of confronting them, tempering them, and even harnessing them for good. Come along on a whirlwind tour of the cognitive biases that encroach on our lives and our work, and learn to start designing more consciously.¿¿THIS BOOK EXPLORES:Why our brains take shortcuts-and why that matters in our workHow bias influences everything from user behavior to stakeholder decision-making to team dynamicsTechniques for noticing your own biases, and using them for good where you canMaking more humane and conscientious products and experiences
This monograph explores the potential of blockchain technology to facilitate the transition in the oil and gas (O&G) industry.As the world shifts towards a sustainable energy future, the oil and gas industry faces significant challenges and opportunities. Focusing on the development of a sustainable O&G industry, the book delves into the role of climate and financial markets in the energy sector, applications of blockchain in sustainable energy development, and the challenges of legal and regulatory issues in applying blockchain technology. It provides insight into how the energy industry is already working on reducing carbon emissions and paving the way to a sustainable future with detailed examples of reducing methane emissions, carbon credit markets, sustainable aviation fuels, and plastics. The book also examines how O&G companies could further their sustainability initiatives using blockchain technology for emission data monitoring, carbon capture, utilization, storage, and supply-chain management to develop clean products.
This collection of essays has been curated with the goal of providing a framework for understanding personal security data in the modern age. A wide range of relevant topics are discussed and analyzed including anonymity, privacy breaches, and biometric data collection. Recent real-life examples and events are frequently discussed to further provide context to the content discussed. The content of this book will provide the reader with a better understanding of how to protect their personal data in the digital reality the world faces.
This book constitutes the refereed post-conference proceedings of the 15th International Conference on Innovative Security Solutions for Information Technology and Communications, SecITC 2022, held as a virtual event, during December 8¿9, 2022.The 19 revised full papers presented together with 1 invited talk were carefully reviewed and selected from 53 submissions. The papers cover topics such as cryptographic algorithms, digital forensics and cyber security and much more.
This book features selected papers from the 9th International Conference on Mathematics and Computing (ICMC 2023), organized at BITS Pilani K. K. Birla Goa Campus, India, during 6¿8 January 2023. It covers recent advances in the field of mathematics, statistics, and scientific computing. The book presents innovative work by leading academics, researchers, and experts from industry in mathematics, statistics, cryptography, network security, cybersecurity, machine learning, data analytics, and blockchain technology in computer science and information technology.
This book presents high-quality research papers presented at the Second International Conference on Smart Computing and Cyber Security: Strategic Foresight, Security Challenges and Innovation (SMARTCYBER 2021) held during June 16-17, 2021, in the Department of Smart Computing, Kyungdong University, Global Campus, South Korea. The book includes selected works from academics and industrial experts in the field of computer science, information technology, and electronics and telecommunication. The content addresses challenges of cyber security.
The contemporary IT landscape is littered with various technologies that vendors claim will ¿solve¿ an organization¿s cybersecurity challenges. These technologies are powerful and, in the right context, can be very effective. But misunderstood and misused, they either do not provide effective protection or do not protect the right things. This results in unnecessary expenditures, false beliefs of security, and interference with an organization¿s mission.This book introduces major technologies that are employed in today¿s cybersecurity landscape and the fundamental principles and philosophies behind them. By grasping these core concepts, professionals in every organization are better equipped to know what kind of technology they need, ask the right questions of vendors, and better interface with their CISO and security organization. The book is largely directed at beginners, including non-technical professionals such as policy makers, compliance teams, and business executives.What You Will LearnAuthentication technologies, including secure password storage and how hackers ¿crack¿ password listsAccess control technology, such as BLP, BIBA, and more recent models such as RBAC and ABACCore cryptography technology, including AES encryption and public key signaturesClassical host security technologies that protect against malware (viruses, trojans, ransomware)Classical network security technologies, such as border security (gateways, firewalls, proxies), network IDS and IPS, and modern deception systemsWeb security technologies, including cookies, state, and session defenses, and threats that try to subvert themEmail and social media security threats such as spam, phishing, social media, and other email threatsWho This Book Is ForProfessionals with no technicaltraining in engineering, computers, or other technology; those who want to know things at a technical level but have no previous background; professionals with a background in policy, compliance, and management; technical professionals without a background in computer security who seek an introduction to security topics; those with a security background who are not familiar with this breadth of technology.
Das Lehrbuch richtet sich vor allem an Studierende und Rechtsanwälte mit dem Schwerpunktbereich Urheber- und Medienrecht. Das Lehrbuch behandelt die neuen unionsrechtlichen Vergütungsregelungen, die Bildungs- und Wissenschaftsschranken, erlaubte Nutzungen von Kunstformen, die Verlegerbeteiligung, das Leistungsschutzrecht der Presseverleger, Regelungen über Mediation, die Haftung von Intermediären und Fragen zur Umgestaltung und Bearbeitung von Kunstwerken. Die Neuauflage befasst sich zusätzlich mit den Herausforderungen für das Urheberrecht durch Künstliche Intelligenz, z.B. ChatGPT. Wiederholungsfragen sowie ein Anhang zu den höchstrichterlichen Entscheidungen runden das Lehrbuch ab. Außerdem bietet es Rechtsanwälten, die eine Masterausbildung abschließen wollen, eine solide Grundlage für die urheber- und medienrechtliche Ausbildung.
This volume represents the 19th International Conference on Information Technology - New Generations (ITNG), 2022. ITNG is an annual event focusing on state of the art technologies pertaining to digital information and communications. The applications of advanced information technology to such domains as astronomy, biology, education, geosciences, security, and health care are the among topics of relevance to ITNG. Visionary ideas, theoretical and experimental results, as well as prototypes, designs, and tools that help the information readily flow to the user are of special interest. Machine Learning, Robotics, High Performance Computing, and Innovative Methods of Computing are examples of related topics. The conference features keynote speakers, a best student award, poster award, and service award. . This publication is unique as it captures modern trends in IT with a balance of theoretical and experimental work. Most other work focus either on theoretical or experimental, but not both. Accordingly, we do not know of any competitive literature.
This book aims to explore the aspects of strategic leadership in a digital context together with the cyber-physical relationships whilst performing business activities. Furthermore, this book looks to investigate the interactions from both the organization strategy including the cross-functional actors/stakeholders whom are operating within the organization and the various characteristics of operating in a cyber secure ecosystem.The book provides a valuable reference for IT directors, strategic leaders, cybersecurity experts, network security professionals. It is also aimed at researchers seeking to obtain a more profound knowledge of machine learning and deep learning in the context of cybersecurity. Furthermore, the book is an exceptional advanced text for Ph.D. and master's degree programs in cybersecurity, network security and computer science. Each chapter is written by an internationally renowned expert who has extensive experience in law enforcement, industry or academia. Furthermore, this book blends advanced research findings with practice-based methods to provide the reader with advanced understanding and relevant skills.
This book is a collection of best selected research papers presented at 7th International Conference on Computing in Engineering and Technology (ICCET 2022), organized by Dr. Babasaheb Ambedkar Technological University, Lonere, India, during February 12 ¿ 13, 2022. Focusing on frontier topics and next-generation technologies, it presents original and innovative research from academics, scientists, students, and engineers alike. The theme of the conference is Applied Information Processing System.
Ihr Unternehmen hat sich für KI entschieden. Glückwunsch, was nun? Dieses praktische Buch bietet einen ganzheitlichen Plan für die Implementierung von KI aus der Perspektive der IT und des IT-Betriebs im Unternehmen. Sie erfahren etwas über die Fähigkeiten, das Potenzial, die Grenzen und die Herausforderungen von KI. In diesem Buch erfahren Sie, welche Rolle KI im Kontext etablierter Bereiche wie Design Thinking und DevOps, Governance und Change Management, Blockchain und Quantum Computing spielt, und diskutieren die Konvergenz von KI in diesen Schlüsselbereichen des Unternehmens.Deploying AI in the Enterprise bietet Anleitungen und Methoden zur effektiven Bereitstellung und Operationalisierung nachhaltiger KI-Lösungen. Sie lernen die Herausforderungen bei der Implementierung kennen, wie z. B. Probleme bei der KI-Operationalisierung und Hindernisse bei der Umsetzung von Erkenntnissen in umsetzbare Prognosen. Sie werden auch lernen, wie Sie die Schlüsselkomponenten der KI-Informationsarchitektur erkennen und welche Rolle sie für eine erfolgreiche und nachhaltige KI-Implementierung spielt. Und Sie werden verstehen, wie Sie KI effektiv einsetzen können, um die Nutzung von Kerninformationen in Master Data Management (MDM)-Lösungen zu verbessern.Was Sie lernen werdenVerstehen der wichtigsten KI-Konzepte, einschließlich maschinelles Lernen und Deep LearningBefolgen von Best Practices und Methoden zur erfolgreichen Bereitstellung und Operationalisierung von KI-LösungenErkennen der kritischen Komponenten der KI-Informationsarchitektur und der Bedeutung eines PlansIntegration von KI in bestehende Initiativen innerhalb einer OrganisationErkennen der aktuellen Grenzen von KI und wie sich dies auf Ihr Unternehmen auswirken könnteBewusstsein für wichtige und aktuelle KI-Forschung schaffenIhre Denkweise anpassen, um KI von einem ganzheitlichen Standpunkt aus zu betrachtenMachen Sie sich mit den Möglichkeiten von KI in verschiedenen Branchen vertraut.Für wen ist dieses Buch gedacht?IT-Profis, Datenwissenschaftler und Architekten, die sich mit den Herausforderungen bei der Implementierung und dem Betrieb von KI auseinandersetzen müssen und einen umfassenden Überblick darüber benötigen, wie sich KI auf andere geschäftskritische Bereiche auswirkt. Es ist keine Einführung, sondern richtet sich an Leser, die nach Beispielen für die Nutzung von Daten suchen, um daraus verwertbare Erkenntnisse und Vorhersagen abzuleiten, und die die aktuellen Risiken und Grenzen von KI verstehen und berücksichtigen müssen und wissen wollen, was dies in einem branchenrelevanten Kontext bedeutet.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.