Information and communication technologies have increased their share of services in contemporary economic exchanges. We are witnessing a transformation of modern economies characterized by a predominant role of information and knowledge in the production of wealth. In order to make this intangible resource bear fruit, organizations are looking for ways, methods, procedures, processes and technica…
This book argues for a prospective turn in ergonomics to challenge the established fields of strategic design (SD) and management. Its multi-disciplinary outlook builds upon concepts derived from Management, Innovation and Design Science. Differences, similarities and relationships between strategic design and prospective ergonomics are reviewed using existing theories and frameworks from design, …
The definitive guide to developing robust content delivery networks This book examines the real-world engineering challenges of developing robust content delivery networks (CDNs) and provides the tools required to overcome those challenges and to ensure high-quality content delivery that fully satisfies operators’ and consumers' commercial objectives. It is informed by the author’s two decades of …
This book aims at exploring and illustrating the different ways in which hypermedia systems and tools are designed according to those aspects. The design and visualization schemes included in any system will be related to the variety of social and technical complexities confronted by researchers in social, communication, humanities, art and design.
Digital practices are shaped by graphical representations that appear on the computer screen, which is the principal surface for designing, visualizing, and interacting with digital information. Before any digital image or graphical interface is rendered on the screen there is a series of layers that affect its visual properties. To discover such processes it is necessary to investigate software a…
Presents an Cyber-Assurance approach to the Internet of Things (IoT) This book discusses the cyber-assurance needs of the IoT environment, highlighting key information assurance (IA) IoT issues and identifying the associated security implications. Through contributions from cyber-assurance, IA, information security and IoT industry practitioners and experts, the text covers fundamental and advance…
This book discusses the media, beliefs, the news, the Internet, etc. but it should not be seen as yet another critique of the media system, exploring with indignant fascination the idea of a machination against truth set up to serve a society of domination. These kinds of theories, whether they pertain to conspiracy theories or, more subtly, to a self-styled «critical» way of thinking, have always…
In this book, the authors focus on the concrete aspects of IoT (Internet of Things): the daily operation, on the ground, of this domain, including concrete and detailed discussion of the designs, applications and realizations of Secure Connected Things and IoT. As experts in the development of RFID and IoT technologies, the authors offer the reader a highly technical discussion of these topics, in…
Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A comparative analysis from both consumers' and producers' perspectives. It uniquely combines economics, geology, international relations, business, histo…
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to present and analyze concrete examples of collective intelligence at the service of digital archives.
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and resul…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this f…
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of such applications. Throughout this book, the author focuses on allowing young students to manipulate, observe and modify 3D scenes using new technolog…
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also controversial issues. From a general standpoint, these debates concern “performative science and performative society”. But one emerges and strengthens …
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to …