From Skirts Ahoy! to M*A*S*H, Private Benjamin, G.I. Jane, and JAG, films and television shows have grappled with the notion that military women are contradictory figures, unable to be both effective soldiers and appropriately feminine. In Soldiers’ Stories, Yvonne Tasker traces this perceived paradox across genres including musicals, screwball comedies, and action thrillers. She explains how…
An investigation into the use of information communication technologies by refugees during flight, displacement and in settlement, this book examines the impact of Australia’s official policy of mandatory detention on how asylum seekers and refugees maintain links to diasporas and networks of support. Given the restricted contact with the world outside of the immigration detention centre, the…
An exciting science fiction collection that looks at what future communication might look like and how our shifting relationships with technology could change this most human of capabilities. In Communications Breakdown, award-winning editor Jonathan Strahan asks some of the world's best science fiction writers to consider how the very idea of communication might change in the future. Rich t…
The political crisis that sneaked up on America—the rise of Trump and Trumpism—has revealed the rot at the core of American exceptionalism. Recent changes in the way words and images are produced and received have made the current surreality possible; communication through social media, by design, maximizes attention and minimizes scrutiny. In Co-Illusion, the noted writer on art, photograp…
This book examines technical aspects of industrial espionage and its impact in modern companies, organizations, and individuals while emphasizing the importance of intellectual property in the information era. The authors discuss the problem itself and then provide statistics and real world cases. The main contribution provides a detailed discussion of the actual equipment, tools and techniques…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
"All the tips, ideas and advice given to, and requested by, MA students in Media and Communications, are brought together in an easy-to-use accessible guide to help students study most effectively. Based upon many years of teaching study skills and hundreds of lecture slides and handouts this introduction covers a range of general and generic skills that the author relates specifically towards …
As science communication has moved online, a range of important new genres have emerged: crowdfunding proposals, blogs, microblogs, databases, and more. Rhetorics of Science Online takes up these genres to explore how scientists are adapting their communications, how publics are increasingly involved in science, and how boundaries between experts and non-experts continue to erode.
This brief examines recent developments in the Heterogeneous Vehicular NETworks (HETVNETs), integrating cellular networks with Dedicated Short-Range Communication (DSRC) for meeting the communications requirements of the Intelligent Transport System (ITS)services. Along with a review of recent literature, a unified framework of the HetVNET is presented. The brief focuses on introducing efficien…
Devoted to information security, this volume begins with a short course on cryptography, mainly based on lectures given by Rudolf Ahlswede at the University of Bielefeld in the mid 1990s. It was the second of his cycle of lectures on information theory which opened with an introductory course on basic coding theorems, as covered in Volume 1 of this series. In this third volume, Shannon’s hist…