Computing is transforming our society in ways that are as profound as the changes wrought
by physics and chemistry in the previous two centuries. Indeed, there is hardly an aspect of
our lives that hasn't already been influenced, or even revolutionized, by digital technology.
Given the importance of computing to modern society,...
Osteoarthritis (OA), the most common form of arthritis, is generally characterized by a slowly progressive degeneration of articular cartilage, particularly in the weight-bearing joints. It has a stronger prevalence in women, and its incidence increases with age. OA is a major and growing health concern in developed countries, owing to...
Applebaum offers beginning university students the perfect introduction to the age of the scientific revolution from 1500 to 1800. Many scientific ideas and much medical information improved dramatically during those times as investigators began a relentless drive, which continues today, toward a better understanding of the natural world....One...
In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping
and electronic fraud, there is indeed no time at which security does not matter.Two
trends have come together to make the topic of this book of vital interest. First, the explosive
growth in computer systems and their interconnections...
We live today in a global web of interdependence, connected technologically, economically, politically, and socially. As a result of these expanding and deepening interdependencies, it has become impossible fully to control -- or foretell -- the effects of our actions. The world is rife with unintended consequences. The first law of human...
The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what...
This book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that...
This is a unique resource: Nothing is comparable with this much depth or numbers that covers so many 20th century events.??AAGreat Events from History: The Twentieth Century, 1941-1970??AA, is the ninth installment in Salem Press' ongoing ??AAGreat Events from History??AA series. This six-volume set contains 1,112 essays on more than 1,100...
Hundreds of millions of Americans are using social media (SM), and already some 70% of businesses have joined them there, using Facebook and other SM platforms to connect with their customers, and attract new ones. So the real question isn’t whether to take your business onto social media platforms—but how to do it quickly,...
How can you design technology that becomes a part of a user’s life and not a distraction from it? This practical book explores the concept of calm technology, a method for smoothly capturing a user’s attention only when necessary, while calmly remaining in the background most of the time. You’ll learn how to design...
MobiSec was the second ICST conference on security and privacy for mobile information and communication systems. It was held in front of the beautiful historic backdrop of Catania, the Sicilian town with marvelous views of Mt. Etna. The never fully dormant volcano provided appropriate scenery, metaphorically relating to the security threats...