Computer Science | The Wiley Network

Discover in-depth articles covering topics in computer science


Computer Science | Professional Development

Limitless? What Can We Really Expect from 5G?

Join Rahim Tafazolli to learn more about the impact of 5G on digital transformation across industries, including energy and utilities, manufacturing, media and entertainment, healthcare, and more.

How Machine Learning Can Combat Errors and Fraud

Learn how data analytics and AI have started to change the nature of how we assess accounting data.

New Generation Cybersecurity Threats

An overview of some of the latest threats in the cybersecurity landscape.

What is Healthy Computer and Human Interaction? FrontRunner Podcast Series

In this podcast, James Bowen and his guests discuss an interdisciplinary approach to produce a measurable human health improvement when using computer displays.

[Webinar] Applying Technology for Education

Applying Technology for Education

Embracing a Digital Future: The Role of Digital-Led Advancements in Published Research

The impact of digitalization on scholarly publishing includes the emergence of new content formats, the role of social media on content discovery, and the increased transparency of research.

Embracing Digital Teaching and Learning at Mapúa Group of Company and its Subsidiaries

Embracing Digital Teaching and Learning at Mapúa Group of Company and its Subsidiaries

Key New Titles in Cybersecurity

Stay up to date with the latest Wiley titles in Cybersecurity to manage your risk and develop tools and techniques for detecting cyberattacks

AI System Voted Entrepreneur of the Year?

Alibaba founder Jack Ma predicted that an Artificial Intelligence (AI) system would be voted CEO of the year within 30 years. But can an AI system win Entrepreneur of the Year in the next 50 years?

We Ask an Expert about Cybersecurity

We asked Cynthia Brumfield, a veteran communications and technology expert focused on cybersecurity to shed some light on the challenges faced in cybersecurity risk management. Here's what she said.

Cybersecurity Risk Management

Covering risk management, network infrastructure planning, and detection techniques and tools, technology analyst Cynthia Brumfield discusses cybersecurity risk planning and management.