Cybervetting

Cybervetting

Researching an individual’s, firm’s or brand’s online presence has become standard practice for many employers, investigators, and intelligence officers, including...

Pervasive Computing

Pervasive Computing

This book introduces fundamental concepts and theories in pervasive computing as well as its key technologies and applications. It explains...

Cognitive Networks

Cognitive Networks

A cognitive network makes use of the information gathered from the network in order to sense the environment, plan actions...

Cybersecurity

Cybersecurity

This book examines the legal and policy aspects of cyber-security. It takes a much needed look at cyber-security from a...

Distributed Networks

Distributed Networks

For many civilian, security, and military applications, distributed and networked coordination offers a more promising alternative to centralized command and...

Ergonomics in Design

Ergonomics in Design

Currently people deal with various entities (such as hardware, software, buildings, spaces, communities and other people), to meet specific goals...