This open access book explores the legal aspects of cybersecurity in Poland. The authors are not limited to the framework created by the NCSA (National Cybersecurity System Act – this act was the first attempt to create a legal regulation of…
This open access book addresses the current technical problems of low efficiency of emergency site information collection, lack of flexibility of emergency information interaction, lack of fusion analysis technology and disaster loss prediction…
The field of infant nutrition and feeding has been a long-standing and permanent concern within the field of child health, given the crucial role it plays in the current and future health and development of individuals. Although optimal feeding…
Meat and meat products are among the most nutrient-dense food sources in the human diet. They fulfill most of our bodily requirements, acting as important sources of energy and a variety of essential nutrients needed for metabolic functions. Meat and…
This open access contributed volume examines the ethical and legal foundations of (future) policies on recommender systems and offers a transdisciplinary approach to tackle important issues related to their development, use and integration into…
This open access book provides information how to choose and collect the appropriate metrics for a software project in an organization. There are several kinds of metrics, based on the analysis of source code and developed for different programming…
This open access book. Use this practical guide to understand the concepts behind Intelligent Multi-modal Security Systems (IMSS) and how to implement security within an IMSS system to improve the robustness of the devices and of the end-to-end…
Rarely does a day pass without us being reminded of the social, economic, and environmen-
tal challenges we now face. During 2 years of living with a pandemic that seemed to never
pass, a series of social and economic issues emerged. Businesses…
Urban Informality and the Built Environment demonstrates the value of greater and more diverse forms of engagement of built environment disciplines in what constitutes urban informality and its politics. It brings a multi-disciplinary approach to the…
Configuring an anomaly-based Network Intrusion Detection System for cybersecurity of an industrial system in the absence of information on networking infrastructure and programmed deterministic industrial process is challenging. Within the research…