Security of Energy supply is a major concern for all modern societies, intensified by skyrocketing demand in India and China and increasing international competition over fossil fuel deposits. Energy Security: An Interdisciplinary Approach gives A comparative analysis from both consumers' and producers' perspectives. It uniquely combines economics, geology, international relations, business, histo…
The digitalization of archives produces a huge mass of structured documents (Big Data). Due to the proactive approach of public institutions (libraries, archives, administrations …), this data is more and more accessible. This book aims to present and analyze concrete examples of collective intelligence at the service of digital archives.
This book is a complete, single information source of techniques for complex security and privacy issues in vehicular ad hoc networks Take a cooperative approach towards addressing the technology’s challenges of security and privacy issues Explores interdisciplinary methods by combining social science, cryptography, and privacy enhancing technique Richly illustrated with detailed designs and resul…
Now updated—your expert guide to twenty-first century information security Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data. Featuring a wide array of new information on the most current security issues, this f…
Over the last few years, multi-touch mobile devices have become increasingly common. However, very few applications in the context of 3D geometry learning can be found in app stores. Manipulating a 3D scene with a 2D device is the main difficulty of such applications. Throughout this book, the author focuses on allowing young students to manipulate, observe and modify 3D scenes using new technolog…
There is a great transformation of the production of knowledge and intelligibility. The «digital fold of the world» (with the convergence of NBIC) affects the collective assemblages of “thought”, of research. The aims of these assemblages are also controversial issues. From a general standpoint, these debates concern “performative science and performative society”. But one emerges and strengthens …
This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity vulnerabilities and threats. This book provides a scientific modeling approach for conducting metrics-based quantitative risk assessments of cybersecurity threats. The author builds from a common understanding based on previous class-tested works to introduce the reader to …
This book will cover network management security issues and currently available security mechanisms by discussing how network architectures have evolved into the contemporary NGNs which support converged services (voice, video, TV, interactive information exchange, and classic data communications). It will also analyze existing security standards and their applicability to securing network managem…
This book is devoted to the most used methodologies for performance evaluation: simulation using specialized software and mathematical modeling. An important part is dedicated to the simulation, particularly in its theoretical framework and the precautions to be taken in the implementation of the experimental procedure. These principles are illustrated by concrete examples achieved through operati…
Introductory textbook in the important area of network security for undergraduate and graduate students Comprehensively covers fundamental concepts with newer topics such as electronic cash, bit-coin, P2P, SHA-3, E-voting, and Zigbee security Fully updated to reflect new developments in network security Introduces a chapter on Cloud security, a very popular and essential topic Uses everyday exampl…
More and more organizations are becoming aware of the importance of tacit and explicit knowledge owned by their members which corresponds to their experience and accumulated knowledge about the firm activities. However, considering the large amount of knowledge created and used in the organization, especially with the evolution of information and communications technologies, the firm must first de…
Written by one of the few top internationally recognized experts in the field, this book concentrates on those topics that will remain fundamental, such as low power computing, reversible programming languages, and applications in thermodynamics. It describes reversible computing from various points of view: Boolean algebra, group theory, logic circuits, low-power electronics, communication, softw…
Brain–computer interfaces (BCI) are devices which measure brain activity and translate it into messages or commands, thereby opening up many possibilities for investigation and application. This book provides keys for understanding and designing these multi-disciplinary interfaces, which require many fields of expertise such as neuroscience, statistics, informatics and psychology. This second volu…
During the reception of a piece of information, we are never passive. Depending on its origin and content, from our personal beliefs and convictions, we bestow upon this piece of information, spontaneously or after reflection, a certain amount of confidence. Too much confidence shows a degree of naivety, whereas an absolute lack of it condemns us as being paranoid. These two attitudes are symmetri…
Alternative techniques and tools for analyzing biomolecular networks With the recent rapid advances in molecular biology, high-throughput experimental methods have resulted in enormous amounts of data that can be used to study biomolecular networks in living organisms. With this development has come recognition of the fact that a complicated living organism cannot be fully understood by merely ana…