International contributors look at technical, social, and regulatory challenges related to computer security when governments and businesses wok collaboratively. Some specific topics include collabora
Computer scientists specializing in network security discuss security issues regarding the Internet of Things for students, researchers, and practitioners. Their topics include the Internet of Thin
Computer scientists and electrical engineers present a reference on designing secure wireless networks in the context of current network and security technologies. Their topics include a framework
Computer scientists and communications engineers review the current methodologies and mechanisms in the theory and practice of security, privacy, intrusion detection, and applied cryptography in sm
Computer scientists and electrical engineers survey concepts and various techniques that are used to combat security breaches and criminal activities in the digital sphere for the benefit of researche
Computer and information scientists seek to increase evolutionary computation awareness in network security by providing a clear direction for monitoring, analyzing, and detecting network attacks. Amo
This collection of eighteen articles on cyber-security showcases current scholarship in computer crime and forensics from both technical and policy making perspectives. The work is divided into three
Academics and professionals in the fields of computer science and informatics present twenty-three papers on contemporary issues in information and data security and privacy in networking technologies
For students and practitioners in the new field of information assurance and security, computer scientists, philosophers, and other scholars deliberate a selection of ethical and social issues in the
Ding (University of Illinois) combines ideas from cognitive science, mathematical modeling, and computer simulation to establish a theoretical framework for addressing homeland security issues related
Researchers in computer science, electronics, and information explore algorithms for detecting and describing features in video and image processing in such fields as computer video, security monit
In addition to end-user issues, this work also looks at computer security within the context of human activity and user issues. The book's 18 chapters are written by international contributors, mainly
This collection of twelve scholarly articles examines the technological, social and public policy aspects of hacking and network security as it relates to business and computer crime. Divided into thr
Computer-mediated communication (CMC) is an interdisciplinary subject area that spans fields as diverse as computer science, information technology, communication studies, linguistics, law, and educat
"This book examines the relationship between critical literacy and citizenship. It also provides practical ways for educators to encourage responsible citizenship in their content classrooms"--
"This book explores how information literacy skills are used by the library and information science professionals on the job the ability to find, evaluate, use and share information is an essential sk
"This book explores the development of intelligent techniques for the information security in the area of biomedical image and signal processing. It emphasizes on data security and content protection
Educators from the US provide 14 chapters on how coaches can conduct evaluations and facilitate professional development experiences in literacy programs from preschool through 12th grade. The chapter
Computer scientists with a philosophical bent and philosophers with a computer bent explore the overlap between the two realms. The overall themes are the philosophy of information, the philosophy of
Reddick (public administration, U. of Texas-San Antonio) describes the organizational, collaboration, and management elements of homeland security, and examines the implementation of homeland security
Of interest to academics and practitioners in computing and security, this collection of current international work explores solutions to problems in cyber security from both national and global persp
"This book explores theory and practice of information security and privacy. It deals with a wide range of issues, ranging from technical, legal, regulatory, organizational, managerial, cultural, ethi
"This book explores migration, asylum and security in the European Union, the USA and developing countries while providing for further research opportunities in this dynamically changing field. It pro
"This book discusses the advances of Detecting and Mitigating Robotic Cyber Security Risks. Moreover, it aims to address how new innovation will cater to the demands of human beings and how it will he
Specialists in extension services and other aspects of agriculture explore links between agricultural development, food security, and economic development, particularly in the Caribbean and Africa.
This volume reprints 14 articles originally published in the International Journal of Games and Computer-mediated Simulations in 2012 and 2013. The opening chapters describe the role of the Micros
"This book evaluates the different approaches and issues faced in integrating games into computer education settings, featuring emergent trends on the application of gaming to pedagogical strategies a
Munir presents a collection of academic and professional perspectives on current and emerging trends in the security management of mobile cloud computing devices and networks. The eight selections tha
Researchers from Greece, Portugal, and Canada present 10 chapters on digital tools for computer music production and distribution, covering audiovisual tools for rich multimedia interaction, including
This collection of twenty-two articles drawn from the inaugural volume of the journal International Journal of Mobile Human Computer Interaction highlights current scholarship in user interface design
This collection of thirteen articles on network security showcases current scholarship in privacy and security in relation to both social relations and programming for virtual environments. Topics dis
In the preface this book notes how computer vision is still at an "immature" stage of development and how much research, until recently, has only been devoted to specific tasks. This volume is intende
Computer and information scientists, electrical engineers, and similar professionals discuss requirement specifications, modeling, and implementing features peripheral to the core functions in softwar
For instructors, educational technologists, software developers, students, and staff at educational institutions, Magoulas (computer science, U. of London, UK) brings together engineers, computer scie
This collection introduces higher order neural network (HONN) group models and adaptive HONNs for simulating nonlinear data. The computer science chapters describe adaptive tolerance trees for transla
International contributors in IT security engineering, semantic web, web services, and service-oriented architecture (SOA) present keys theoretical and practical approaches, research lines, and challe
Utilizing Information Technology Systems Across Disciplines: Advancements in the Application of Computer Science provides original material concerned with all aspects of information resources managem
Researchers in the human-computer interaction community are developing new methods for describing user behavior, analyzing user needs and expectations, and designing and evaluating user-friendly compu
The role of computer-aided designs in modern manufacturing process is examined by Xu (mechanical engineering, U. of Auckland, New Zealand), who maintains that the integration of technology is absolute