This book constitutes revised selected papers from the refereed proceedings of the First Human Centered Computing Conference, HCC 2014, that consolidated and further develops the successful ICPCA/SWS conferences on Pervasive Computing and the Networked World. The 54 full papers and 30 short papers presented in this volume were carefully reviewed and selected from 152 submissions. These proceedi…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
Government policies, marketing campaigns of banks, insurance companies, and other financial institutions, and consumers' protective actions all depend on assumptions about consumer financial behavior. Unfortunately, many consumers have no or little knowledge of budgeting, financial products, and financial planning. It is therefore important that organizations and market authorities know why con…
This book constitutes the refereed proceedings of the 11th International Joint Conference on E-Business and Telecommunications, ICETE 2014, held in Vienna, Austria, in August 2014. ICETE is a joint international conference integrating four major areas of knowledge that are divided into six corresponding conferences: International Conference on Data Communication Networking, DCNET; International…
This book deals with a number of fundamental issues related to the practical implementation of ultrasonic NDT techniques in an industrial environment. The book discusses advanced academic research results and their application to industrial procedures. The text covers the choice and generation of the signals energizing the system to probe position optimization, from quality assessment evaluati…
This book provides readers with a state-of-the-art description of techniques to be used for ultra-low-power (ULP) and ultra-low-cost (ULC), short-range wireless receivers. Readers will learn what is required to deploy these receivers in short-range wireless sensor networks, which are proliferating widely to serve the internet of things (IoT) for “smart cities.” The authors address key chall…
This book constitutes the refereed proceedings of the 9th International Conference on Ubiquitous Computing and Ambient Intelligence, UCAmI 2015, held in Puerto Varas, Chile, in December 2015. The 36 full papers presented together with 11 short papers were carefully reviewed and selected from 62 submissions. The papers are grouped in topical sections on adding intelligence for environment adapt…
IT changes everyday’s life, especially in education and medicine. The goal of ITME 2014 is to further explore the theoretical and practical issues of Ubiquitous Computing Application and Wireless Sensor Network. It also aims to foster new ideas and collaboration between researchers and practitioners. The organizing committee is soliciting unpublished papers for the main conference and its spe…
Normal 0 false false false EN-US X-NONE X-NONE This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Trusted Systems, INTRUST 2014, held in Beijing, China, in December 2014. The conference brings together academic and industrial researchers, designers, and implementers with end-users of trusted systems, in order to foster the exchan…
This book constitutes the refereed proceedings of the 12th International Conference on Trust, Privacy and Security in Digital Business, TrustBus 2015, held in Valencia, Spain, in September 2015 in conjunction with DEXA 2015. The 17 revised full papers presented were carefully reviewed and selected from 45 submissions. The papers are organized in the following topical sections: access control; t…