This book explores the legacies of suffering in relation to ‘those who come after’ – the descendants of victims, survivors and perpetrators of traumatic events. It draws on recent discussions of ‘postmemory’ and ‘haunting’ that are concerned mainly with the transgenerational impact of...
Information and communication technologies can provide new paradigms in healthcare provision. In particular, new Pervasive Healthcare technologies can revolutionise the dynamics of healthcare, enabling people to remain at home for longer with lower costs to health and welfare organisations. This book reveals how pervasive healthcare technologies...
Social thinkers in all fields are faced with one unavoidable question: what does it mean to be 'human' in the 21st century? As definitions between what is 'animal' and what is 'human' break down, and as emerging technologies such as artificial intelligence and nano- and bio- technologies develop, accepted...
Cutting-edge techniques for finding and fixing critical security flaws
Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s...
Business Process Outsourcing (BPO) is becoming the new revolution as company's of all sizes are seeking to take advantage of this source of competitive advantage.
This book provides a step-by-step approach to understanding the application of Business Process Outsourcing, assessing the BPO opportunity in the company, and then managing...
The Metasploit framework is an exploit development framework. It has evolved as a one stop shop for all the needs of ethical hacking. For a beginner who wishes to learn the framework and domain, Metasploit provides everything to make your life easier and secure your world from attackers.
Principles of Big Data helps readers avoid the common mistakes that endanger all Big Data projects. By stressing simple, fundamental concepts, this book teaches readers how to organize large volumes of complex data, and how to achieve data permanence when the content of the data is constantly changing. General methods for data...
Burgess fine book … is a well-articulated introduction to a corpus of guiding principles for systems administrators … I consider this an important book … I think that Burgess will become part of the required reading for future (and current) systems administrators. Peter Salus, Usenix Association Features
This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and...
Data Mining techniques are gradually becoming essential components of corporate intelligence systems and progressively evolving into a pervasive technology within activities that range from the utilization of historical data to predicting the success of an awareness campaign. In reality, data mining is becoming an interdisciplinary field driven by...
Joomla! is one of the most powerful open-source content management systems used to build websites and other powerful online applications. While Joomla! itself is inherently safe, misconfigurations, vulnerable components, poorly configured hosts, and weak passwords can all contribute to the downfall of your site. So,...