You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The unique approaches proposed in this book are ‘glocal’ in character, as they draw on the experiences of South Africans to address the global issue of ‘smart communities’. The book blends together social and technical aspects, and presents the experiences from a range of community practitioners, academics, architects and engineers.
Planning under Pressure offers managers, planners, consultants and students a comprehensive and authoritative guide to the Strategic Choice Approach, which has gradually been attracting worldwide recognition as a fresh, versatile and practical approach to collaborative decision-making under uncertainty. Starting from basic principles, the book uses helpful diagrams and clear explanations to demonstrate practical ways of approaching daunting decision problems; of devising possible ways forward; and of working effectively towards agreed courses of action. Along he way, decision makers are helped to cope with diverse sources of uncertainty – technical, political, managerial – in a strategic manner. In this extended third edition, the authors have added short contributions from 21 users from seven countries. These new contributors present lessons from their varied experiences in adapting the Strategic Choice Approach to guide decision-making and learning in settings ranging from the re-routing of a controversial city carnival procession to national policy for the management of nuclear waste.
These proceedings represent the work of researchers participating in the 13th International Conference on Cyber Warfare and Security (ICCWS 2018) which is being hosted this year by the National Defense University in Washington DC, USA on 8-9 March 2018.
Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.
The tactical organization and protection of resources is a vital component for any governmental entity. Effectively managing national security through various networks ensures the highest level of protection and defense for citizens and classified information. National Security: Breakthroughs in Research and Practice is an authoritative resource for the latest research on the multiple dimensions of national security, including the political, physical, economic, ecological, and computational dimensions. Highlighting a range of pertinent topics such as data breaches, surveillance, and threat detection, this publication is an ideal reference source for government officials, law enforcement, professionals, researchers, IT professionals, academicians, and graduate-level students seeking current research on the various aspects of national security.
This book constitutes Part IV of the refereed four-volume post-conference proceedings of the 4th IFIP TC 12 International Conference on Computer and Computing Technologies in Agriculture, CCTA 2010, held in Nanchang, China, in October 2010. The 352 revised papers presented were carefully selected from numerous submissions. They cover a wide range of interesting theories and applications of information technology in agriculture, including simulation models and decision-support systems for agricultural production, agricultural product quality testing, traceability and e-commerce technology, the application of information and communication technology in agriculture, and universal information service technology and service systems development in rural areas.
This book constitutes the refereed proceedings of the 4th IFIP WG 5.5/SOCOLNET Doctoral Conference on Computing, Electrical and Industrial Systems, DoCEIS 2013, held in Costa de Caparica, Portugal, in April 2013. The 69 revised full papers were carefully reviewed and selected from numerous submissions. They cover a wide spectrum of topics ranging from collaborative enterprise networks to microelectronics. The papers are organized in the following topical sections: collaborative enterprise networks; service orientation; intelligent computational systems; computational systems; computational systems applications; perceptional systems; robotics and manufacturing; embedded systems and Petri nets; control and decision; integration of power electronics systems with ICT; energy generation; energy distribution; energy transformation; optimization techniques in energy; telecommunications; electronics: devices design; electronics: amplifiers; electronics: RF applications; and electronics: applications.
This book constitutes the thoroughly refereed post-conference proceedings of the 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6 International Summer School, held in Trento, Italy, in September 2011. The 20 revised papers were carefully selected from numerous submissions during two rounds of reviewing. The book also contains two invited talks. The papers are organized in topical sections on privacy metrics and comparison, policies, privacy transparency in the age of cloud computing, privacy for mobile applications, consumer privacy, privacy for online communities, privacy for eHealth and eID applications, privacy attacks and problems, and ethics.
This book constitutes the refereed proceedings of the 27th IFIP TC 11 International Information Security Conference, SEC 2012, held in Heraklion, Crete, Greece, in June 2012. The 42 revised full papers presented together with 11 short papers were carefully reviewed and selected from 167 submissions. The papers are organized in topical sections on attacks and malicious code, security architectures, system security, access control, database security, privacy attitudes and properties, social networks and social engineering, applied cryptography, anonymity and trust, usable security, security and trust models, security economics, and authentication and delegation.