Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a s...
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do co...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
This open book is about the perception of the independence of the judiciary in Europe. Do citizens and judges see its independence in the same way? Do judges feel that their independence is respected by the users of the courts, by the leadership of the courts and by politicians? Does the population trust the judiciary more than other public institu...
This book takes a taxpayer's perspective to the relations taxation creates between people and their state. Larsen proposes that in order to understand tax compliance and cheating, we have to look beyond law, psychological experiments and surveys to include tax collectors and taxpayers' practices. The text explores the view of taxes seen a...
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-frag...
This book opens up the black box of mediation in collective conflicts through the analyses and comparisons of various systems. Mediation and related third party interventions such as conciliation and facilitation are discussed as effective prevention and regulation tools for different types of collective labor conflicts. These interventions fit in...
This book provides an exhaustive picture of the role that annulment conflicts play in the EU multilevel system. Based on a rich dataset of annulment actions since the 1960s and a number of in-depth case studies, it explores the political dimension of annulment litigation, which has become an increasingly relevant judicial tool in the struggle over ...
This Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing efforts. "Community-oriented policing" is an approach that encourages police to develop and maintain personal relationships with citizens and community organizations. By developing these partnerships, the goal is to...
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Inte...
This volume focuses on describing the social dialogue system in organizations from an Human Resources Management perspective. Based on the NEIRE model for industrial relations, key factors are determined contributing to creative social dialogue in European organizations. Actual data from surveys and interviews from more than 700 CEO and HR managers...
"In this book, Wallace elegantly shows how committed government intervention can improve wellbeing with rigour and impact. It's an essential read for anyone concerned with the future of the UK."Julia Unwin, CBE"As someone who commissioned one of the first attempts to learn from the devolved nations I am delighted to see this pub...
This Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing efforts. "Community-oriented policing" is an approach that encourages police to develop and maintain personal relationships with citizens and community organizations. By developing these partnerships, the goal is to...
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
This insightful book examines the allegations against the professionalism, transparency, and integrity of law enforcement toward minority groups, from a global perspective. It addresses the challenges inherent in maintaining strong ties with members of the community, and draws attention to obstacles in ensuring public confidence and trust in rule o...
The processes for gathering, organizing, analyzing, and ultimately infusing AI throughout your organization can be thought of as a ladder. A ladder helps you climb far higher than you could go on your own by turning an impossible leap into a series of steps. Knowing what the ladder looks like helps you evaluate your organization's readiness fo...
A truly effective assistant knows their manager's priorities, concerns and responsibilities as well as they do themselves. They know how to make their manager more effective, and how to help them add value. They work alongside their manager as part of a tight-knit, high-functioning team, sharing a single purpose and workload. Of all teams, of ...
So you're a manager, or at least you want to be, and you're looking for a good roadmap to help you prepare. If you want to be the kind of manager people really admire, this ebook is a good place to start. Instead of tactics and solutions, author Robert Hoekman, Jr. provides you with a belief system - an approach to solutions that you can ...
Collaboration is often seen as a palliative for the many wicked problems challenging our communities. These problems affect some of the most vulnerable and unempowered people in our community. They also carry significant implications for policy processes, programs of service and, ultimately, the budgets and resourcing of national and sub-national g...
This open book introduces the reader to the foundations of AI and ethics. It discusses issues of trust, responsibility, liability, privacy and risk. It focuses on the interaction between people and the AI systems and Robotics they use. Designed to be accessible for a broad audience, reading this book does not require prerequisite technical, legal o...
In a world where information has never been so accessible, and answers are available at the touch of a fingertip, we are hungrier for the facts than ever before - something the Covid-19 crisis has brought to light. And yet, paywalls put in place by multi-billion dollar publishing houses are still preventing millions from accessing quality, scientif...
This collection of essays is the result of the joint efforts of colleagues and students of the leading social anthropology and post-socialism theorist, Professor Chris Hann. With the thirtieth anniversary of the collapse of the Berlin Wall in 2019 as their catalyst, the authors reflect upon Chris Hann's lifelong fieldwork in the discipline, sp...
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
'This is an exciting, groundbreaking book. With an astonishing array of examples and a brilliant eye for the essential, Øyvind Kvalnes takes the Socratic motto of knowing yourself to our everyday lives in the workplace. Applied philosophy at its best, the book will affect the way you do your work and live your life.'—Professor Esa Saar...
This cutting edge text considers how Asian philanthropists and charitable organizations break with Western philanthropic traditions and examines the key traits and trends that make social investment in Asia unique. Based on 30 case studies of excellent social delivery organizations (SDOs) and social enterprises as well as interviews with ultra-high...
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience.
Man...
This book offers insights into the development of the ground-breaking Global Code of Conduct for Research in Resource-Poor Settings (GCC) and the San Code of Research Ethics. Using a new, intuitive moral framework predicated on fairness, respect, care and honesty, both codes target ethics dumping - the export of unethical research practices from a ...
Recent years have seen spectacular advances in the field of circadian biology. These have attracted the interest of researchers in many fields, including endocrinology, neurosciences, cancer, and behavior. By integrating a circadian view within the fields of endocrinology and metabolism, researchers will be able to reveal many, yet-unsuspected aspe...
This book discusses a core question in many fields of the social sciences, namely how to create, share and adopt new knowledge. It creates an original space for conversation between two lines of research that have developed largely in parallel for a long time: social network theory and the geography of knowledge. This book considers that relational...