Quantum Inspired Computational Intelligence: Research and Applications explores the latest quantum computational intelligence approaches, initiatives, and applications in computing, engineering, …
Learn the skills needed for the most in-demand tech jobHarvard Business Review calls it the sexiest tech job of the …
Superintelligence asks the questions: What happens when machines surpass humans in general intelligence? Will artificial agents save or destroy us? …
In the months leading up to March 2003, fresh from its swift and heady victory in Afghanistan, the Bush administration …
The twentieth century has been fundamentally shaped by changes in Russia, where disaster in the First World War was followed …
What can the study of young monkeys and apes tell us about the minds of young humans? In this fascinating …
Computational Intelligence: An Introduction, Second Edition offers an in-depth exploration into the adaptive mechanisms that enable intelligent behaviour in complex …
A practical introduction to the necessity of competitive intelligence for smarter business decisions-from a leading CI expert and speaker In …
The revised edition of Strategic Intelligence: A Handbook for Practitioners, Managers, and Users is a primer for analysts involved in …
When the Stuxnet computer worm damaged the Iranian nuclear program in 2010, the public got a small glimpse into modern …
Terrorism and Homeland Security: An Introduction with Applications provides a comprehensive overview of terrorism, public and private sector counterterrorism, and …
"The Four Intelligences of the Business Mind" offers practical strategies for business transformation, based on research from organizational psychology, neuroscience, …
A book like this displays something about our culture that few want to admit: for as much as we tout …
A revelatory and timely look at how technology boosts our cognitive abilities—making us smarter, more productive, and more creative than …
This volume, the second of a two volume set, offers a rich and unique collection of global perspectives on data-driven …
This book is designed for security and risk assessment professionals, DevOpsengineers, penetration testers, cloud security engineers, and cloud softwaredevelopers who …
The most feared man in China, Dai Li, was chief of Chiang Kai-shek's secret service during World War II. This …
Issues (Editions)YearIssue2020Volume: 36???Volume: 35???2019Volume: 34???2018Volume: 33???2017Volume: 32???2016Volume: 32???Volume: 31123452015Volume: 3023452014Volume: 312Volume: 303Volume: 292342013Volume: 312Volume: 301Volume: 29135Volume: 2812342012Volume: 2814Volume: 2712342011Volume: 2612342010Volume: …