This collection of eighteen articles on computer security and programming showcases current scholarship in a variety of topics relating to the development of security aware systems and software. Topic
This collection of nineteen articles on information security showcases current scholarship in computer and network security with a focus on the development of situationally aware systems and practices
Researchers and practitioners in computer science, electrical engineering, information, and other fields discuss the current state of cyber security, which encompasses the security of both information
Exploring approaches to security in cloud computing services, computer scientists and software engineers in Spain, elsewhere in Europe, and the Americas cover cloud architecture and patterns; risks an
This collection of fifteen articles on computer networking showcases current scholarship in network security and management in a variety of information technology contexts. Divided into sections cover
"This book discusses embedded systems, communication system engineering, and real-time systems in an integrated manner and covers advancements in the fields of computer science, computer engineering,
Computer and information scientists and engineers review recent developments in scheduling, architecture, security, and applications of the two approaches to computing. The topics include balanced job
Computer scientists, electrical engineers, business scholars and other specialists in computer security describe digital identity and access management (IAM) systems as a framework for protecting onli
Researchers and practitioners in computer network security, but also network administrators might find the recent research reports and reviews useful. Specialists explore such topics as a structured a
Automated face analysis techniques have been applied to fields including biometrics, security and surveillance, clinical psychology and psychiatry, and human-computer interaction. This book surveys re
Academics, researchers, and practitioners in computer science, network architecture, network security, and systems administration examine networking technologies that provide promise for future use in
The text discusses the implementation and success of using computer software to teach English as a foreign language. The software, designed by the author of the text, is a web-based learning system en
To help companies avoid the risk and expense of shifting all its data from a rigid and bulky legacy information system into a modern one, computer scientists and engineers and business researchers exp
As the disciplines of art, technology, and information science collide, computer graphics and multimedia are presenting a myriad of applications and problems to professionals and scholars in Computer
"This book brings together pedagogical and technological methods to address the recent challenges that have developed in computer programming courses and focuses on educational tools, computer science
"This book provides the latest empirical research and theoretical frameworks in the area of information security, presenting research on developing sufficient security measures for new environments by
"This book overviews the possibilities and limitations offered by various types of computer programs, such as database management systems, diagramming software, CAD, and BIM, offering a practical appr
While there are many positive aspects in which RFID devices are useful, there have also been increased concerns over the privacy and security of personal information. Advanced Security and Privacy for
"This book explores the areas of concern in guaranteeing the security and privacy of data and related technologies, including a range of topics in information security and privacy provided for a diver
Tamura (engineering, U. of Fukui, Japan) discusses the requirements for anonymous security technologies designed to obscure the identities of users and the fundamental security components such as encr
Computer scientists, electrical and electronic engineers, and related technical researchers and practitioners explore how simulations are used in designing and analyzing computer networks. Among the t
Electrical engineers and computer and information scientists review current trends in assuring the integrity of information on computer networks. Their approaches are attacks and vulnerabilities, secu
This work is for anyone who teaches, studies, or practices cross-cultural computer-mediated communication, including executives and managers, marketers and service providers, academic and corporate re
Chao (math, computer science, University of Houston-Victoria) discusses design strategies, implementation problems, and the effectiveness of online computer labs for technology-based courses. He provi
Human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive computing systems for human use in a social context, and with the study of major phe
Computer Vision and Pattern Recognition (CVPR) together play an important role in the processes involved in environmental informatics due to their pervasive, non-destructive, effective, and efficient
The recent explosion in complex global networking architectures has spurred a concomitant rise in the need for robust information security. Further, as computing power increases exponentially with eve
"This book addresses real-world problems affecting the security of information communications in modern networks, with a focus on recent developments and solutions, as well as common weaknesses and th
"This book presents the latest methodologies and trends in detecting and preventing network threats, investigating the potential of current and emerging security technologies"--
"This book presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity"--
"This book provides insights from the computer science community on integrated systems research projects taking place in the European region, looking at the diverse range of design principles covered
To ensure its protection from enemies both foreign and domestic, a government must invest resources and personnel toward the goal of homeland security. It is through these endeavors that citizens are
"This book features timely and informative research on the design and development of computer vision and image processing applications in intelligent agents as well as in multimedia technologies"--
"This book compiles the research and views of cloud computing from various individuals around the world, detailing cloud security, regulatory and industry compliance, and trust building in the cloud"-
"This book considers an array of multidisciplinary applications and research developments in the field of cryptology and communication security, offering a comprehensive, in-depth analysis of encrypti
"This book evaluates the risks inherent to nuclear power and methods of preventing accidents through computer control systems and other such emerging technologies"--
"This book examines the current scope of theoretical and practical applications on the security of mobile and wireless communications, covering fundamental concepts of current issues, challenges, and
"This book brings together various research methodologies and trends in emerging areas of application of computer vision and image processing for those interested in the research developments of this
Computer-Assisted Foreign Language Teaching and Learning: Technological Advances highlights new research and an original framework that brings together foreign language teaching, experiments and testi
"This book highlights important approaches to evaluating the creditability of digital sources and techniques used for various digital fields, presenting research in the area of computer mediated commu