Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

Strong Starts, Supported Transitions and Student Success
  • Language: en
  • Pages: 295

Strong Starts, Supported Transitions and Student Success

The shift to mass participation in higher education is a welcome international trend. In Australia the number of young adults attempting a degree course at university has increased by close to twenty five percent in less than a decade. Campuses are becoming more culturally and linguistically diverse. More university students are coming from poorer families and disadvantaged educational backgrounds. The authors of Strong Starts, Supported Transitions and Student Success celebrate the diversity of new university learning communities while recognising the challenges faced by many commencing students. This book presents research findings, strategic thinking and innovative approaches to student t...

Wearable Technologies: Concepts, Methodologies, Tools, and Applications
  • Language: en
  • Pages: 1602

Wearable Technologies: Concepts, Methodologies, Tools, and Applications

  • Type: Book
  • -
  • Published: 2018-04-06
  • -
  • Publisher: IGI Global

Advances in technology continue to alter the ways in which we conduct our lives, from the private sphere to how we interact with others in public. As these innovations become more integrated into modern society, their applications become increasingly relevant in various facets of life. Wearable Technologies: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on the development and implementation of wearables within various environments, emphasizing the valuable resources offered by these advances. Highlighting a range of pertinent topics, such as assistive technologies, data storage, and health and fitness applications, this multi-volume book is ideally designed for researchers, academics, professionals, students, and practitioners interested in the emerging applications of wearable technologies.

Advances in Network-Based Information Systems
  • Language: en
  • Pages: 1195

Advances in Network-Based Information Systems

  • Type: Book
  • -
  • Published: 2017-08-21
  • -
  • Publisher: Springer

This book highlights the latest research findings, innovative research results, methods and development techniques from both theoretical and practical perspectives related to the emerging areas of information networking and their applications. It includes the Proceedings of the 20th International Conference on Network-Based Information Systems (NBiS-2017), held on August 24–26, 2017 in Toronto, Canada. Today’s networks and information systems are evolving rapidly. Further, there are dynamic new trends and applications in information networking such as wireless sensor networks, ad hoc networks, peer-to-peer systems, vehicular networks, opportunistic networks, grid and cloud computing, pervasive and ubiquitous computing, multimedia systems, security, multi-agent systems, high-speed networks, and web-based systems. These networks are expected to manage the increasing number of users, provide support for a range of services, guarantee the quality of service (QoS), and optimize their network resources. In turn, these demands are the source of various research issues and challenges that have to be overcome – and which these Proceeding address.

Digital Forensics and Cyber Crime
  • Language: en
  • Pages: 339

Digital Forensics and Cyber Crime

  • Type: Book
  • -
  • Published: 2013-10-01
  • -
  • Publisher: Springer

This book contains a selection of thoroughly refereed and revised papers from the Fourth International ICST Conference on Digital Forensics and Cyber Crime, ICDF2C 2012, held in October 2012 in Lafayette, Indiana, USA. The 20 papers in this volume are grouped in the following topical sections: cloud investigation; malware; behavioral; law; mobile device forensics; and cybercrime investigations.

Advances in Communications, Computing, Networks and Security Volume 10
  • Language: en
  • Pages: 241

Advances in Communications, Computing, Networks and Security Volume 10

  • Type: Book
  • -
  • Published: 2013-11-04
  • -
  • Publisher: Lulu.com

This book is the tenth in a series presenting research papers arising from MSc/MRes research projects undertaken by students of the School of Computing and Mathematics at Plymouth University. The publications in this volume are based upon research projects that were undertaken during the 2011/12 academic year. A total of 25 papers are presented, covering many aspects of modern networking and communication technology, including security, mobility, coding schemes and quality measurement. The expanded topic coverage compared to earlier volumes in this series reflects the broadening of our range of MSc programmes. Specifically contributing programmes are: Communications Engineering and Signal Processing, Computer and Information Security, Network Systems Engineering, and Robotics.

Demonic County Durham: Axe Murder in Ferry-Hill near Durham, 1682
  • Language: en
  • Pages: 115

Demonic County Durham: Axe Murder in Ferry-Hill near Durham, 1682

“25th January 1682(3). A sad cruel murther comitted by a boy about eighteen or nineteen years of age, nere Ferryhill, nere Durham, being Thursday, at night….” Over 300 years ago, Ferryhill, an obscure town in the south of County Durham, played host to one of the most horrid and tragic murders in the county’s history. A farm servant murdered the three children of his master in cold blood with an axe. It was described in a London print as the “most horrid and barbarous murder that ever was heard of in the North or elsewhere”. There was no motive for the crime, and nothing in the murderer’s character to suggest that such an event could take place, and yet in his later confession, the perpetrator said that he acted only on the “suggestion of the enemy” – The Devil. For the first time since the murders, all of the evidence leading up to, at the time of, and after the event is collected together as one of the most intriguing investigations into this sad and macabre event, and lays bare some interesting information that have never been known to the public before. Did the Devil come to Ferryhill? Read on, if you dare…

Artificial Intelligence and Blockchain in Digital Forensics
  • Language: en
  • Pages: 297

Artificial Intelligence and Blockchain in Digital Forensics

  • Type: Book
  • -
  • Published: 2023-02-06
  • -
  • Publisher: CRC Press

Digital forensics is the science of detecting evidence from digital media like a computer, smartphone, server, or network. It provides the forensic team with the most beneficial methods to solve confused digital-related cases. AI and blockchain can be applied to solve online predatory chat cases and photo forensics cases, provide network service evidence, custody of digital files in forensic medicine, and identify roots of data scavenging. The increased use of PCs and extensive use of internet access, have meant easy availability of hacking tools. Over the past two decades, improvements in the information technology landscape have made the collection, preservation, and analysis of digital ev...

Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities
  • Language: en
  • Pages: 336

Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities

  • Type: Book
  • -
  • Published: 2016-11-22
  • -
  • Publisher: IGI Global

Technology provides numerous opportunities for positive developments in modern society; however, these venues inevitably increase vulnerability to threats in online environments. Addressing issues of security in the cyber realm is increasingly relevant and critical to society. Threat Mitigation and Detection of Cyber Warfare and Terrorism Activities is a comprehensive reference source for the latest scholarly perspectives on countermeasures and related methods to enhance security and protection against criminal activities online. Highlighting a range of topics relevant to secure computing, such as parameter tampering, surveillance and control, and digital protests, this book is ideally designed for academics, researchers, graduate students, professionals, and practitioners actively involved in the expanding field of cyber security.

Last Flight for Whiskey Mike
  • Language: en
  • Pages: 384

Last Flight for Whiskey Mike

When the childhood friend and secret adviser to the president of the United States pilots his plane to Washington at the request of "the man" himself, he sets off a chain of events that will take him across the country and into the wilderness as he runs for his life. Despite promising his wife that he had quit the DC scene, Scott Piquard is once again answering the call because of looming war in Central America. Straying into the secret tunnels deep below the White House with the security card given to him by President Brady, he overhears high-ranking officers plotting against Brady's life. Spotting him, they fire on him and make a radio transmission identifying Scott as a would-be assassin....

Securing Government Information and Data in Developing Countries
  • Language: en
  • Pages: 325

Securing Government Information and Data in Developing Countries

  • Type: Book
  • -
  • Published: 2017-02-27
  • -
  • Publisher: IGI Global

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.