Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Best of 2016 Recommended by Editor Recommended by Reviewer Recommended by Reader
Search
Reviewers have found these items notable and have self-selected them for review.
 
Options:
 
  1-10 of 6828 results Date Reviewed  
  Intellectual property and access to im/material goods
Dominicé A., Lai J.,  Edward Elgar Publishing, Incorporated, Northampton, MA, 2016. 360 pp. Type: Book (978-1-784716-61-5)

Reciting once-famous cases, strange doctrines expose ongoing adventures of intellectual property (IP) rights. For example, Charles Dickens bequeathed one of his manuscripts to a female relative, and concurrently (1870) left all of the rest of his ...

Oct 18 2017  
  Security-aware design for cyber-physical systems: a platform-based approach
Lin C., Sangiovanni-Vincentelli A.,  Springer International Publishing, New York, NY, 2017. 102 pp. Type: Book (978-3-319513-27-0)

Our daily life and the objects that surround us are becoming more and more intertwined in networks of computers and algorithms, in a manner so pervasive that often we fail to appreciate how much we depend on them and to what extent we end up becom...

Oct 13 2017  
  Introduction to computer networking
Robertazzi T.,  Springer International Publishing, New York, NY, 2017. 154 pp. Type: Book (978-3-319531-02-1)

Gigabit Ethernet? That’s the same as fast Ethernet, with faster clock speeds, isn’t it? Actually it’s not; depending on the physical media, there may be differences in encoding schemes and signaling logic levels. This book is ful...

Oct 12 2017  
  Advanced persistent security
Winkler I., Gomes A.,  Syngress Publishing, Cambridge, MA, 2017.Type: Book (9780128093160)

Winkler and Gomes define “advanced persistent security” as “defense in depth” (multilayered attack protection) that is enhanced by a comprehensive methodology for integrating attack detection capabilities and proactively im...

Oct 12 2017  
  4G: LTE-Advanced Pro and the road to 5G (3rd ed.)
Dahlman E., Parkvall S., Sköld J.,  Academic Press, San Diego, CA, 2016. 616 pp. Type: Book (978-0-128045-75-6)

Long-term evolution (LTE) and 4G are the state of the art in mobile telecommunications, and the latest in a three-decade journey of technological innovation and development. We have moved from voice-centric systems with 1G and 2G, to mobile broadb...

Oct 12 2017  
  Simulating prehistoric and ancient worlds
Barceló J., Del Castillo F.,  Springer International Publishing, New York, NY, 2016. 404 pp. Type: Book (978-3-319314-79-2)

Regardless of location of archaeological finds--royal tombs to refuse dumps--questions of how the people who left objects lived persist among both professionals and interested laypeople. If written records have been preserved, much of th...

Oct 11 2017  
  Nine steps to success: an ISO27001 2013 implementation overview (3rd ed.)
Calder A.,  It Governance Ltd, Ely, UK, 2016. 130 pp. Type: Book (978-1-849288-23-1)

Executive management is becoming increasingly aware of their obligations to shareholders, partners, customers, and regulators to ensure that their organizations are defended against, and can recover from, cyber attack. Cyber security threats are i...

Oct 10 2017  
  Kalman filtering: with real-time applications (5th ed.)
Chui C., Chen G.,  Springer International Publishing, New York, NY, 2017. 247 pp. Type: Book (978-3-319476-10-0)

Kalman filtering (KF) is a wide class of algorithms designed, in words selected from this outstanding book, “to obtain an optimal estimate” of the state of a system from information in the presence of noise....

Oct 9 2017  
  Towards authentication using multi-modal online activities
Gomi H., Yamaguchi S., Tsubouchi K., Sasaya N.  UbiComp 2017 (Proceedings of the 2017 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2017 ACM International Symposium on Wearable Computers, Maui, Hawaii,  Sep 11-15, 2017) 37-40, 2017. Type: Proceedings

Authentication is an important aspect of day-to-day life. This paper shows the accuracy of activity-based authentication (ABA) for 1000 users accessing Yahoo! Japan websites. The authors claim this is the first evaluation of ABA under a large user...

Oct 5 2017  
  Social dimensions of organised crime: modelling the dynamics of extortion rackets
Elsenbroich C., Anzola D., Gilbert N.,  Springer International Publishing, New York, NY, 2016. 250 pp. Type: Book (978-3-319451-67-1)

Sixteen European-based academics take a multi-disciplinary approach to understanding extortion rackets, such as those of the Sicilian Mafia and German predatory extortion, based upon the Global Dynamics of Extortion Racket Systems (GLODERS) projec...

Oct 5 2017  
 
 
 
Display per page
 
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright © 2000-2017 ThinkLoud, Inc.
Terms of Use
| Privacy Policy