Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Profiling Hackers
  • Language: en
  • Pages: 288

Profiling Hackers

  • Type: Book
  • -
  • Published: 2008-12-11
  • -
  • Publisher: CRC Press

Complex and controversial, hackers possess a wily, fascinating talent, the machinations of which are shrouded in secrecy. Providing in-depth exploration into this largely uncharted territory, Profiling Hackers: The Science of Criminal Profiling as Applied to the World of Hacking offers insight into the hacking realm by telling attention-grabbing ta

Universal Access in Human-Computer Interaction: Design and Development Methods for Universal Access
  • Language: en
  • Pages: 591

Universal Access in Human-Computer Interaction: Design and Development Methods for Universal Access

  • Type: Book
  • -
  • Published: 2014-05-15
  • -
  • Publisher: Springer

The four-volume set LNCS 8513-8516 constitutes the refereed proceedings of the 8th International Conference on Universal Access in Human-Computer Interaction, UAHCI 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014, jointly with 14 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-comp...

HCI in Business
  • Language: en
  • Pages: 814

HCI in Business

  • Type: Book
  • -
  • Published: 2014-06-02
  • -
  • Publisher: Springer

This volume constitutes the refereed proceedings of the First International Conference on HCI in Business, HCIB 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI International 2014, in Heraklion, Crete, Greece, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from numerous submissions. The papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. They thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 76 papers included in this volume deal with the following topics: enterprise systems; social media for business; mobile and ubiquitous commerce; gamification in business; B2B, B2C, C2C e-commerce; supporting collaboration, business and innovation and user experience in shopping and business.

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications
  • Language: en
  • Pages: 1743

Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications

  • Type: Book
  • -
  • Published: 2018-05-04
  • -
  • Publisher: IGI Global

Cyber security has become a topic of concern over the past decade as private industry, public administration, commerce, and communication have gained a greater online presence. As many individual and organizational activities continue to evolve in the digital sphere, new vulnerabilities arise. Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications contains a compendium of the latest academic material on new methodologies and applications in the areas of digital security and threats. Including innovative studies on cloud security, online threat protection, and cryptography, this multi-volume book is an ideal source for IT specialists, administrators, researchers, and students interested in uncovering new ways to thwart cyber breaches and protect sensitive digital information.

Cross-Cultural Design
  • Language: en
  • Pages: 822

Cross-Cultural Design

  • Type: Book
  • -
  • Published: 2014-06-02
  • -
  • Publisher: Springer

This volume constitutes the refereed proceedings of the 6th International Conference on Cross-Cultural Design, CCD 2014, held as part of the 16th International Conference on Human-Computer Interaction, HCI International 2014, held in Heraklion, Crete, Greece, jointly with 13 other thematically similar conferences. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from numerous submissions. The papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. They thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas. The 76 papers included in this volume deal with the following topics: cross-cultural product and service design; cross-cultural issues in interaction; social aspects and implications of cross-cultural design; cross-cultural issues in e-commerce, marketing and branding; cross-cultural design for knowledge sharing and learning; cross-cultural design for the smart city and cross-cultural design for creativity.

Virtual, Augmented and Mixed Reality: Designing and Developing Augmented and Virtual Environments
  • Language: en
  • Pages: 417

Virtual, Augmented and Mixed Reality: Designing and Developing Augmented and Virtual Environments

  • Type: Book
  • -
  • Published: 2013-06-12
  • -
  • Publisher: Springer

Here is the first of a two-volume set (LNCS 8021 and 8022) that constitutes the refereed proceedings of the 5th International Conference on Virtual, Augmented and Mixed Reality, VAMR 2013, held as part of the 15th International Conference on Human-Computer Interaction, HCII 2013, held in Las Vegas, USA in July 2013, jointly with 12 other thematically similar conferences. The total of 1666 papers and 303 posters presented at the HCII 2013 conferences was carefully reviewed and selected from 5210 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers accepted for presentation thoroughly co...

Information Security Management
  • Language: en
  • Pages: 870

Information Security Management

  • Type: Book
  • -
  • Published: 2010-01-29
  • -
  • Publisher: CRC Press

Information security cannot be effectively managed unless secure methods and standards are integrated into all phases of the information security life cycle. And, although the international community has been aggressively engaged in developing security standards for network and information security worldwide, there are few textbooks available that

Violence and Society: Breakthroughs in Research and Practice
  • Language: en
  • Pages: 993

Violence and Society: Breakthroughs in Research and Practice

  • Type: Book
  • -
  • Published: 2016-11-02
  • -
  • Publisher: IGI Global

Violent behavior is an unavoidable aspect of human nature, and as such it has become deeply integrated into modern society. Examining violence through a critical and academic perspective can lead to a better understanding of its foundations and implications. Violence and Society: Breakthroughs in Research and Practice explores the social and cultural influences of violence on human life and activity. Focusing on emerging research perspectives, case studies, and future outlooks, this comprehensive collection is an essential reference source for graduate-level students, sociologists, researchers, professionals, and practitioners interested in the effects of violence in contemporary culture.

Human-Computer Interaction. Applications and Services
  • Language: en
  • Pages: 816

Human-Computer Interaction. Applications and Services

  • Type: Book
  • -
  • Published: 2014-06-09
  • -
  • Publisher: Springer

The 3-volume set LNCS 8510, 8511 and 8512 constitutes the refereed proceedings of the 16th International Conference on Human-Computer Interaction, HCII 2014, held in Heraklion, Crete, Greece in June 2014. The total of 1476 papers and 220 posters presented at the HCII 2014 conferences was carefully reviewed and selected from 4766 submissions. These papers address the latest research and development efforts and highlight the human aspects of design and use of computing systems. The papers thoroughly cover the entire field of human-computer interaction, addressing major advances in knowledge and effective use of computers in a variety of application areas.

Understanding and Applying Cryptography and Data Security
  • Language: en
  • Pages: 667

Understanding and Applying Cryptography and Data Security

  • Type: Book
  • -
  • Published: 2009-04-09
  • -
  • Publisher: CRC Press

A How-to Guide for Implementing Algorithms and Protocols Addressing real-world implementation issues, Understanding and Applying Cryptography and Data Security emphasizes cryptographic algorithm and protocol implementation in hardware, software, and embedded systems. Derived from the author’s teaching notes and research publications, the text is designed for electrical engineering and computer science courses. Provides the Foundation for Constructing Cryptographic Protocols The first several chapters present various types of symmetric-key cryptographic algorithms. These chapters examine basic substitution ciphers, cryptanalysis, the Data Encryption Standard (DES), and the Advanced Encrypti...