The Perils of Social Media: Cyberbullying Shame and Fame provides an in-depth examination of cyberbullying, characterized by persistent hostile behavior conducted through electronic or digital media.
As more and more devices become interconnected through the Internet of Things (IoT), there is an even greater need for this book,which explains the technology, the internetworking, and applications that are making IoT an everyday reality.
Interaction for Designers shows you how to connect a product with its users, whether it's a simple toaster, a complex ecosystem of intelligent devices, or a single app on your smartphone.
Interaction for Designers shows you how to connect a product with its users, whether it's a simple toaster, a complex ecosystem of intelligent devices, or a single app on your smartphone.
As multimedia applications have become part of contemporary daily life, numerous paradigm-shifting technologies in multimedia processing have emerged over the last decade.
Establishing adaptive control as an alternative framework to design and analyze Internet congestion controllers, End-to-End Adaptive Congestion Control in TCP/IP Networks employs a rigorously mathematical approach coupled with a lucid writing style to provide extensive background and introductory material on dynamic systems stability and neural network approximation; alongside future internet requests for congestion control architectures.
Rapid progress in software, hardware, mobile networks, and the potential of interactive media poses many questions for researchers, manufacturers, and operators of wireless multimedia communication systems.
Broad in scope, Semantic Multimedia Analysis and Processing provides a complete reference of techniques, algorithms, and solutions for the design and the implementation of contemporary multimedia systems.
Addresses a wide selection of multimedia applications, programmable and custom architectures for the implementations of multimedia systems, and arithmetic architectures and design methodologies.
Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses.
Internet Infrastructure: Networking, Web Services, and Cloud Computing provides a comprehensive introduction to networks and the Internet from several perspectives: the underlying media, the protocols, the hardware, the servers, and their uses.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes.
Online Terrorist Propaganda, Recruitment, and Radicalization is most complete treatment of the rapidly growing phenomenon of how terrorists' online presence is utilized for terrorism funding, communication, and recruitment purposes.
Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour.
Human interaction with technology is constantly evolving, with rapid developments in online interaction, gaming, and artificial intelligence all impacting upon and altering our behaviour.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.
Mobile Cloud Computing: Models, Implementation, and Security provides a comprehensive introduction to mobile cloud computing, including key concepts, models, and relevant applications.
Providing comprehensive coverage of cyberspace and cybersecurity, this textbook not only focuses on technologies but also explores human factors and organizational perspectives and emphasizes why asset identification should be the cornerstone of any information security strategy.