A consumer's guide to the food system, from local to global: our part as citizens in the interconnected networks, institutions, and organizations that enable our food choices. Everybody eats. We may even consider ourselves experts on the topic, or at least Instagram experts. But are we aware that the shrimp in our freezer may be farmed and frozen in Vietnam, the grapes in our fruit bowl shipped…
Terrorism by means of weapons of mass destruction (WMD) has been studied for decades - since the Cold War and fears of secret agents with suitcase-sized atomic bombs. Although WMD research has accelerated since September 11, 2001, much of this scholarship is hard to find, forcing nonspecialists to fall back on gut instinct and Beltway clich?es. This book provides a review of what scientists and…
An analysis of the effect of public pension schemes on a country's fertility rate and a proposal for policies to reform pension coverage in light of this.The rapidly aging populations of many developed countries--most notably Japan and member countries of the European Union--present obvious problems for the public pension plans of these countries. Not only will there be disproportionately fewer…
Most national security debates concern the outcomes of policies, neglecting the means by which those policies are implemented. This book argues that although the US military is the finest fighting force in the world, the system that supports it is in disrepair. Operating with Cold War-era structures and practices, it is subject to managerial and organizational problems that increasingly threate…
Title from title screen.Includes index.Stefan Brands proposes cryptographic building blocks for the design of digital certificates that preserve privacy without sacrificing security.As paper-based communication and transaction mechanisms are replaced by automated ones, traditional forms of security such as photographs and handwritten signatures are becoming outdated. Most security experts belie…
The two papers that make up the core of this book address what is perhaps the most fundamental question in the current debate over Social Security: whether to shift, in part or even entirely, from today's pay-as-you-go system to one that is not just funded but also privatized in the sense that individuals would retain control over the investment of their funds and, therefore, personally bear th…
Annotation Privacy is the capacity to negotiate social relationships by controlling access to personal information. As laws, policies, and technological design increasingly structure people's relationships with social institutions, individual privacy faces new threats and new opportunities. Over the last several years, the realm of technology and privacy has been transformed, creating a landsca…
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
This book addresses the fundamental concepts in the theory and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. This updated second edition has also been expanded with ne…