Surveillance is a central organizing practice. Gathering personal data and processing them in searchable databases drives administrative efficiency but also raises questions about security, governance, civil liberties and privacy. Surveillance is both globalized in cooperative schemes, such as sharing biometric data, and localized in the...
Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...
You're beyond the basics - so dive right in and really put your PC to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds for Windows 8.1. Plus, you get access to two and half hours of video training and a companion ebook.
The development of low-cost, compact digital storage, sensors and radio modules allows us to embed digital memories into products to record key events. Such computationally enhanced products can perceive and control their environment, analyze their observations, and communicate with other smart objects and human users. Digital product...
If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share...
The quick way to learn Microsoft Word 2016!This is learning made easy. Get more done quickly with Word 2016. Jump in wherever you need answers--brisk lessons and colorful screenshots show you exactly what to do, step by step.
Get easy-to-follow guidance from a certified Microsoft Office Specialist Master
This brief considers the various stakeholders in today's mobile device ecosystem, and analyzes why widely-deployed hardware security primitives on mobile device platforms are inaccessible to application developers and end-users. Existing proposals are also evaluated for leveraging such primitives, and proves that they can indeed...
Updated as of August 2014, this practical book will demonstrate proven methods for anonymizing health data to help your organization share meaningful datasets, without exposing patient identity. Leading experts Khaled El Emam and Luk Arbuckle walk you through a risk-based methodology, using case studies from their efforts to...
Due to the rapid increase in the number of mobile device users worldwide, location-based services (LBSs) have become pervasive, and the demand for them will continue to grow. Exploring recent changes in the technology and its uses, Advanced Location-Based Technologies and Services takes an in-depth look at new and existing...
The introduction was composed by Jennifer L. Bayuk, the editor of this volume. It
briefly describes the history of the cyberforensics field and places the subsequent
chapters into context. The last section of the introduction, Expert Explanations,
describes the format of the following sections and also how the sections complement...
This book aims at giving an introduction to the principles and techniques
of quantum cryptography, including secret-key distillation, as well as some
more advanced topics. As quantum cryptography is now becoming a practical
reality with products available commercially, it is important to focus not
only on the theory of quantum...