This is the first comprehensive volume to explore and engage with current trends in Geographies of Media research. It reviews how conceptualizations of mediated geographies have evolved. Followed by an examination of diverse media contexts and locales, the book illustrates key issues through the integration of theoretical and empirical case studies, and reflects on the future challenges and opp…
This collection brings together scholarship and pedagogy from multiple perspectives and disciplines, offering nuanced and complex perspectives on Information Literacy in the second decade of the 21st century. Taking as a starting point the concerns that prompted the Association of Research Libraries (ACRL) to review the Information Literacy Standards for Higher Education and develop the Framewo…
This book constitutes the thoroughly refereed post-conference proceedings of the 22nd International Workshop on Fast Software Encryption, held in Istanbul, Turkey, March 8-11, 2015. The 28 revised full papers presented were carefully reviewed and selected from 71 initial submissions. The papers are organized in topical sections on block cipher cryptanalysis; understanding attacks; implementatio…
This book constitutes the thoroughly refereed post-conference proceedings of the 21st International Workshop on Fast Software Encryption, held in London, UK, March 3-5, 2014. The 31 revised full papers presented were carefully reviewed and selected from 99 initial submissions. The papers are organized in topical sections on designs; cryptanalysis; authenticated encryption; foundations and theor…
As well as updating the manifesto for an audio photography technology and practice, this book addresses issues in design history, the social shaping of technology and the management of innovation. In particular, it reveals the very different timescales over which design and innovation operate, and the way in which design ideas evolve across different research groups, companies and application a…
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
The book discusses novel visualization techniques driven by the needs in medicine and life sciences as well as new application areas and challenges for visualization within these fields. It presents ideas and concepts for visual analysis of data from scientific studies of living organs or to the delivery of healthcare. Target scientific domains include the entire field of biology at all scales …
Modern imaging techniques and computational simulations yield complex multi-valued data that require higher-order mathematical descriptors. This book addresses topics of importance when dealing with such data, including frameworks for image processing, visualization and statistical analysis of higher-order descriptors. It also provides examples of the successful use of higher-order descriptors …
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…