Understanding Cryptography: A Textbook for Students and Practitioners
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...
Web Design and Marketing Solutions for Business Websites
The Internet encompasses all types of websites, from social media monoliths to individual
blogs, from Justin Timberlake fan sites to Fortune 500 businesses. Everyone has a voice, and
the medium has become the ultimate level playing field for those seeking to interact with
the world through an always-on, instantly available, nearly...
Context-Aware Pervasive Systems: Architectures for a New Breed of Applications
The concept of aware systems is one of the most exciting trends in computing today, fueled by recent developments in pervasive computing. This book introduces a new breed of computer applications that are termed "context-aware pervasive systems" and provides architectural blueprints for building context-aware behavior into...
Pervasive Information Architecture: Designing Cross-Channel User Experiences
I knew the Internet before it got famous. There were places but no paths, no
maps, no search engines. Entry required a key in the form of an IP address
and an incantation in the language of UNIX. It was a small world that felt big
because it was so easy to get lost in the shadowy realm of texts and data, completely
devoid of color....
Human Centered Design: Second International Conference, HCD 2011, Held as Part of HCI International 2011
The 14th International Conference on Human–Computer Interaction, HCI International
2011, was held in Orlando, Florida, USA, July 9–14, 2011, jointly
with the Symposium on Human Interface (Japan) 2011, the 9th International
Conference on Engineering Psychology and Cognitive Ergonomics, the 6th International
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
|Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |