Everything we do online, and increasingly in the real world, is tracked, logged, analyzed, and often packaged and sold on to the highest bidder. Every...
Wireless Public Safety Networks, Volume Two: A Systematic Approach presents the latest advances in the wireless Public Safety Networks (PSNs) field...
Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in...
This book de-mystifies the technology behind video conferencing and provides single users and small enterprises with the information they need to...
User-Generated Content and its Impact on Web-Based Library Services examines the impact of user-generated content on web-based library services. It...
Social Network Analytics: Computational Research Methods and Techniques focuses on various technical concepts and aspects of social network analysis...
Social Network Analysis of Disaster Response, Recovery, and Adaptation covers systematic social network analysis and how people and institutions...
This book is divided into four parts. Part I begins with several chapters on the basics of Skype. Here the reader learns how to install and configure...
The aim of Sentiment Analysis is to define automatic tools able to extract subjective information from texts in natural language, such as opinions and...
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise...