This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This book discusses the characteristics of virtualized cloud networking, identifies the requirements of cloud network management, and illustrates the challenges in deploying virtual clusters in multi-tenant cloud data centers. The book also introduces network partitioning techniques to provide contention-free allocation, topology-invariant reallocation, and highly efficient resource utilization…
Entrepreneurship is the result of various contextual factors in the community, which are shaped by social challenges and business needs. Recent research efforts have focused on the dynamics of communities and how they facilitate entrepreneurship among a diverse group of people and organizations. This book highlights research on the importance of communities and their role in providing an entrep…
"In Silencing the Past: Power and the Production of History, Michel-Rolph Trouillot writes that by examining the process of history we can “discover the differential exercise of power that makes some narratives possible and silences others.” Alternative Historiographies of the Digital Humanities examines the process of history in the narrative of the digital humanities and deconstructs its …
"What does it mean to be media literate in today’s world? How are we transformed by the many media infrastructures around us? We are immersed in a world mediated by information and communication technologies (ICTs). From hardware like smartphones, smartwatches, and home assistants to software like Facebook, Instagram, Twitter, and Snapchat, our lives have become a complex, interconnected netw…
This book discusses a broad range of cyber security issues, addressing global concerns regarding cyber security in the modern era. The growth of Information and Communication Technology (ICT) and the prevalence of mobile devices make cyber security a highly topical and relevant issue. The transition from 4G to 5G mobile communication, while bringing convenience, also means cyber threats are gro…
This book constitutes the refereed proceedings of the 16th International Conference on Verification, Model Checking, and Abstract Interpretation, VMCAI 2015, held in Mumbai, India, in January 2015. The 24 revised full papers presented were carefully reviewed and selected from 53 submissions. The papers cover a wide range of topics including program verification, model checking, abstract interpr…
This book presents vehicular ad-hoc networks (VANETs) from the their onset, gradually going into technical details, providing a clear understanding of both theoretical foundations and more practical investigation. The editors gathered top-ranking authors to provide comprehensiveness and timely content; the invited authors were carefully selected from a list of who’s who in the respective fiel…
Vehicular communication is a key technology in intelligent transportation systems. For many years now, the academic and industrial research communities have been investigating these communications in order to improve efficiency and safety of future transportation. Vehicular networking offers a wide variety of applications, including safety applications as well as infotainment applications. T…
This book addresses the vector control of three-phase AC machines, in particular induction motors with squirrel-cage rotors (IM), permanent magnet synchronous motors (PMSM) and doubly-fed induction machines (DFIM), from a practical design and development perspective. The main focus is on the application of IM and PMSM in electrical drive systems, where field-orientated control has been successf…