Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every...
Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field...
W książce zawarto opis badań różnych aspektów twórczości i recepcji dzieł Szekspira na świecie i w Polsce. Jako wynik samodzielnych dociekań są one...
Social Network Analytics: Computational Research Methods and Techniques focuses on various technical concepts and aspects of social network analysis...
Social Network Analysis of Disaster Response, Recovery, and Adaptation covers systematic social network analysis and how people and institutions...
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and...
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise...
With the rapid growth of Cloud computing, the size of Cloud data is expanding at a dramatic speed. A huge amount of data is generated and processed by...
Continuing a tradition of excellent training on open source tools, Penetration Tester’s Open Source Toolkit, Fourth Edition is a great reference to...
Participatory Health through Social Media explores how traditional models of healthcare can be delivered differently through social media and online...