|
Showing 1 - 13 of
13 matches in All Departments
Rural-urban migration within China has transformed and reshaped
rural people's lives during the past few decades, and has been one
of the most visible phenomena of the economic reforms enacted since
the late 1970s. Whilst Feminist scholars have addressed rural
women's experience of struggle and empowerment in urban China, in
contrast, research on rural men's experience of migration is a
neglected area of study. In response, this book seeks to address
the absence of male migrant workers as a gendered category within
the current literature on rural-urban migration. Examining Chinese
male migrant workers' identity formation, this book explores their
experience of rural-urban migration and their status as an emerging
sector of a dislocated urban working class. It seeks to understand
issues of gender and class through the rural migrant men's
narratives within the context of China's modernization, and
provides an in-depth analysis of how these men make sense of their
new lives in the rapidly modernizing, post-Mao China with its
emphasis on progress and development. Further, this book uses the
men's own narratives to challenge the elite assumption that rural
men's low status is a result of their failure to adopt a modern
urban identity and lifestyle. Drawing on interviews with 28 male
rural migrants, Xiaodong Lin unpacks the gender politics of Chinese
men and masculinities, and in turn contributes to a greater
understanding of global masculinities in an international context.
This book will be of great interest to students and scholars
working in the fields of Chinese culture and society, gender
studies, migration studies, sociology and social anthropology.
Shortlisted for this year's BSA Philip Abrams Memorial Prize.
Rural-urban migration within China has transformed and reshaped
rural people's lives during the past few decades, and has been one
of the most visible phenomena of the economic reforms enacted since
the late 1970s. Whilst Feminist scholars have addressed rural
women's experience of struggle and empowerment in urban China, in
contrast, research on rural men's experience of migration is a
neglected area of study. In response, this book seeks to address
the absence of male migrant workers as a gendered category within
the current literature on rural-urban migration. Examining Chinese
male migrant workers' identity formation, this book explores their
experience of rural-urban migration and their status as an emerging
sector of a dislocated urban working class. It seeks to understand
issues of gender and class through the rural migrant men's
narratives within the context of China's modernization, and
provides an in-depth analysis of how these men make sense of their
new lives in the rapidly modernizing, post-Mao China with its
emphasis on progress and development. Further, this book uses the
men's own narratives to challenge the elite assumption that rural
men's low status is a result of their failure to adopt a modern
urban identity and lifestyle. Drawing on interviews with 28 male
rural migrants, Xiaodong Lin unpacks the gender politics of Chinese
men and masculinities, and in turn contributes to a greater
understanding of global masculinities in an international context.
This book will be of great interest to students and scholars
working in the fields of Chinese culture and society, gender
studies, migration studies, sociology and social anthropology.
Shortlisted for this year's BSA Philip Abrams Memorial Prize.
This book provides a fresh and contemporary take on the study of
men and masculinity. It highlights new and exciting approaches to
sexuality, desire, men and masculinity in East Asian contexts,
focusing on the interconnections between them. In doing so, it
re-examines the key concepts that underpin studies of masculinity,
such as homophobia, homosociality and heteronormativity. Developing
new ways of thinking about masculinity in local contexts, it fills
a significant lacuna in contemporary scholarship. This
thought-provoking work will appeal to students and scholars of
gender studies, cultural studies and the wider social sciences.
|
Security and Privacy in Communication Networks - SecureComm 2017 International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
|
R1,575
Discovery Miles 15 750
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of two workshops
held at the 13th International Conference on Security and Privacy
in Communications Networks, SecureComm 2017, held in Niagara Falls,
ON, Canada, in October 2017: the 5th International Workshop on
Applications and Techniques in Cyber Security, ATCS 2017, and the
First Workshop on Security and Privacy in the Internet Of Things,
SePrIoT 2017.The 22 revised regular papers were carefully reviewed
and selected from 105 submissions. The topics range from access
control; language-based security; malicious software; network
security; cloud security; software security; operating system
security; privacy protection, database security, security models;
and many more.The SePrIoT workshop targets to address novel
approaches in security and privacy. The papers focuse, amongst
others, on novel models, techniques, protocols, algorithms, or
architectures.
|
Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Niagara Falls, ON, Canada, October 22-25, 2017, Proceedings (Paperback, 1st ed. 2018)
Xiaodong Lin, Ali Ghorbani, Kui Ren, Sencun Zhu, Aiqing Zhang
|
R3,980
Discovery Miles 39 800
|
Ships in 10 - 15 working days
|
This book constitutes the thoroughly refereed roceedings of the
13th International Conference on Security and Privacy in
Communications Networks, SecureComm 2017, held in Niagara Falls,
ON, Canada, in October 2017.The 31 revised regular papers and 15
short papers were carefully reviewed and selected from 105
submissions. The topics range from security and privacy in machine
learning to differential privacy, which are currently hot research
topics in cyber security research.
|
Testbeds and Research Infrastructures for the Development of Networks and Communities - 11th International Conference, TRIDENTCOM 2016, Hangzhou, China, June 14-15, 2016, Revised Selected Papers (Paperback, 1st ed. 2017)
Song Guo, Guiyi Wei, Yang Xiang, Xiaodong Lin, Pascal Lorenz
|
R1,841
Discovery Miles 18 410
|
Ships in 10 - 15 working days
|
This book constitutes the refereed proceedings of the 11th
International Conference on Testbeds and Research Infrastructures
for the Development of Networks and Communities, TridentCom 2016,
held in Hangzhou, China, in June 2016. The 16 papers were carefully
selected from 25 submissions and provide a forum about technologies
of big data, cyber physical systems and computer communications.
The papers cover future Internet and software defined networks,
network testbed design and implementation, testbed for network
applications, and QoS/QoE in networks.
This book provides a fresh and contemporary take on the study of
men and masculinity. It highlights new and exciting approaches to
sexuality, desire, men and masculinity in East Asian contexts,
focusing on the interconnections between them. In doing so, it
re-examines the key concepts that underpin studies of masculinity,
such as homophobia, homosociality and heteronormativity. Developing
new ways of thinking about masculinity in local contexts, it fills
a significant lacuna in contemporary scholarship. This
thought-provoking work will appeal to students and scholars of
gender studies, cultural studies and the wider social sciences.
This book focuses on three emerging research topics in mobile
social networks (MSNs): privacy-preserving profile matching (PPM)
protocols, privacy-preserving cooperative data forwarding (PDF)
protocols, and trustworthy service evaluation (TSE) systems. The
PPM helps two users compare their personal profiles without
disclosing the profiles. The PDF helps users forward data to their
friends via multiple cooperative relay peers while preserving their
identity and location privacy. The TSE enables users to locally
share service reviews on the vendors such that users receive more
valuable information about the services not only from vendors but
also from their trusted social friends. The authors address both
theoretic and practical aspects of these topics by introducing the
system model, reviewing the related works, and presenting the
solutions. Security and Privacy for Mobile Social Networks further
provides the security analysis and the performance evaluation based
on real-trace simulations. It also summarizes the future research
directions for this rapidly growing area of research. The book will
be valuable for researchers and practitioners who work with mobile
social networks, communication platforms, wireless communication
techniques, and internet applications. "Suitable for any type of
reader as an introduction to the topic... The chapters are well
motivated and presented... It is recommended for researchers." -ACM
Computing Reviews, 21 July 2014
Networking for Big Data supplies an unprecedented look at
cutting-edge research on the networking and communication aspects
of Big Data. Starting with a comprehensive introduction to Big Data
and its networking issues, it offers deep technical coverage of
both theory and applications. The book is divided into four
sections: introduction to Big Data, networking theory and design
for Big Data, networking security for Big Data, and platforms and
systems for Big Data applications. Focusing on key networking
issues in Big Data, the book explains network design and
implementation for Big Data. It examines how network topology
impacts data collection and explores Big Data storage and resource
management. Addresses the virtual machine placement problem
Describes widespread network and information security technologies
for Big Data Explores network configuration and flow scheduling for
Big Data applications Presents a systematic set of techniques that
optimize throughput and improve bandwidth for efficient Big Data
transfer on the Internet Tackles the trade-off problem between
energy efficiency and service resiliency The book covers
distributed Big Data storage and retrieval as well as security,
trust, and privacy protection for Big Data collection, storage, and
search. It discusses the use of cloud infrastructures and
highlights its benefits to overcome the identified issues and to
provide new approaches for managing huge volumes of heterogeneous
data. The text concludes by proposing an innovative user data
profile-aware policy-based network management framework that can
help you exploit and differentiate user data profiles to achieve
better power efficiency and optimized resource management.
This SpringerBrief covers the security and privacy challenges in
fog computing, and proposes a new secure and privacy-preserving
mechanisms to resolve these challenges for securing fog-assisted
IoT applications. Chapter 1 introduces the architecture of
fog-assisted IoT applications and the security and privacy
challenges in fog computing. Chapter 2 reviews several promising
privacy-enhancing techniques and illustrates examples on how to
leverage these techniques to enhance the privacy of users in fog
computing. Specifically, the authors divide the existing
privacy-enhancing techniques into three categories: identity-hidden
techniques, location privacy protection and data privacy enhancing
techniques. The research is of great importance since security and
privacy problems faced by fog computing impede the healthy
development of its enabled IoT applications. With the advanced
privacy-enhancing techniques, the authors propose three secure and
privacy-preserving protocols for fog computing applications,
including smart parking navigation, mobile crowdsensing and smart
grid. Chapter 3 introduces identity privacy leakage in smart
parking navigation systems, and proposes a privacy-preserving smart
parking navigation system to prevent identity privacy exposure and
support efficient parking guidance retrieval through road-side
units (fogs) with high retrieving probability and security
guarantees. Chapter 4 presents the location privacy leakage, during
task allocation in mobile crowdsensing, and propose a strong
privacy-preserving task allocation scheme that enables
location-based task allocation and reputation-based report
selection without exposing knowledge about the location and
reputation for participators in mobile crowdsensing. Chapter 5
introduces the data privacy leakage in smart grid, and proposes an
efficient and privacy-preserving smart metering protocol to allow
collectors (fogs) to achieve real-time measurement collection with
privacy-enhanced data aggregation. Finally, conclusions and future
research directions are given in Chapter 6. This brief validates
the significant feature extension and efficiency improvement of IoT
devices without sacrificing the security and privacy of users
against dishonest fog nodes. It also provides valuable insights on
the security and privacy protection for fog-enabled IoT
applications. Researchers and professionals who carry out research
on security and privacy in wireless communication will want to
purchase this SpringerBrief. Also, advanced level students, whose
main research area is mobile network security will also be
interested in this SpringerBrief.
Networking for Big Data supplies an unprecedented look at
cutting-edge research on the networking and communication aspects
of Big Data. Starting with a comprehensive introduction to Big Data
and its networking issues, it offers deep technical coverage of
both theory and applications. The book is divided into four
sections: introduction to Big Data, networking theory and design
for Big Data, networking security for Big Data, and platforms and
systems for Big Data applications. Focusing on key networking
issues in Big Data, the book explains network design and
implementation for Big Data. It examines how network topology
impacts data collection and explores Big Data storage and resource
management. Addresses the virtual machine placement problem
Describes widespread network and information security technologies
for Big Data Explores network configuration and flow scheduling for
Big Data applications Presents a systematic set of techniques that
optimize throughput and improve bandwidth for efficient Big Data
transfer on the Internet Tackles the trade-off problem between
energy efficiency and service resiliency The book covers
distributed Big Data storage and retrieval as well as security,
trust, and privacy protection for Big Data collection, storage, and
search. It discusses the use of cloud infrastructures and
highlights its benefits to overcome the identified issues and to
provide new approaches for managing huge volumes of heterogeneous
data. The text concludes by proposing an innovative user data
profile-aware policy-based network management framework that can
help you exploit and differentiate user data profiles to achieve
better power efficiency and optimized resource management.
This textbook provides an introduction to digital forensics, a
rapidly evolving field for solving crimes. Beginning with the basic
concepts of computer forensics, each of the book's 21 chapters
focuses on a particular forensic topic composed of two parts:
background knowledge and hands-on experience through practice
exercises. Each theoretical or background section concludes with a
series of review questions, which are prepared to test students'
understanding of the materials, while the practice exercises are
intended to afford students the opportunity to apply the concepts
introduced in the section on background knowledge. This
experience-oriented textbook is meant to assist students in gaining
a better understanding of digital forensics through hands-on
practice in collecting and preserving digital evidence by
completing various exercises. With 20 student-directed,
inquiry-based practice exercises, students will better understand
digital forensic concepts and learn digital forensic investigation
techniques. This textbook is intended for upper undergraduate and
graduate-level students who are taking digital-forensic related
courses or working in digital forensics research. It can also be
used by digital forensics practitioners, IT security analysts, and
security engineers working in the IT security industry, particular
IT professionals responsible for digital investigation and incident
handling or researchers working in these related fields as a
reference book.
Wireless networking technologies are witnessed to become the
integral part of industry, business, entertainment and daily life.
Encyclopedia of Wireless Networks is expected to provide
comprehensive references to key concepts of wireless networks,
including research results of historical significance, areas of
current interests, and growing directions in the future wireless
networks. It can serve as a valuable and authoritative literature
for students, researchers, engineers, and practitioners who need a
quick reference to the subjects of wireless network technology and
its relevant applications. Areas covered: 5G Network | Editors:
Rahim Tafazolli, Rose Hu Ad hoc Network | Editor: Cheng Li Big Data
for Networking | Editor: Song Guo Cellular Network, 2G/3G Network,
4G/LTE Network | Editor: Hsiao-hwa Chen Cognitive Radio Network |
Editor: Ning Zhang Cooperative Communications | Editor: Kaoru Ota
Cyber Physical Systems | Editor: Shiyan Hu Data Center Network |
Editor: Lei Lei Delay Tolerant and Opportunistic Network | Editor:
Yuanguo Bi Equalization, Synchronization and Channel Estimation |
Editor: Yingying Chen Future Network Architecture | Editor: Wei
Quan Game Theory in Wireless Network | Editor: Dusit Niyato
Interference Characterization and Mitigation | Editor: Lin Cai
Internet of Things | Editors: Xiuzhen Cheng, Wei Cheng Internet of
Things and its Applications | Editor: Phone Lin Interworking
Heterogeneous Wireless Network | Editor: Ping Wang Medium Access
Control | Editors: Hassan Omar, Qiang Ye Millimeter-wave
Communications | Editor: Ming Xiao MIMO-based Network | Editor:
Prof. Wei Zhang Mobility Management and Models | Editors: Sandra
Cespedes, Sangheon Pack Molecular, Biological and Multi-scale
Communications | Editor: Adam Noel Network Economics and pricing |
Editors: Jianwei Huang, Yuan Luo Network Forensics and
surveillance, Fault Tolerance and Reliability | Editor: Hongwei Li
Network Measurement and Virtualization | Editor: Yusheng Ji Quality
of Service, Quality of Experience and Quality of Protection |
Editors: Rui Luis Aguiar, Yu Cheng Resource Allocation and
Management | Editors: Junshan Zhang, Nan Cheng Routing and
Multi-cast, Router and Switch Design | Editor: Richard Yu Scaling
Laws and Fundamental Limits | Editor: Ning Lu Security, Privacy and
Trust | Editor: Kui Ren Short Range Communications, RFID and NFC |
Editor: Zhiguo Shi Smart Grid Communications | Editor: Vincent W.
S. Wong Vehicular Network | Editors: Lian Zhao, Qing Yang Video
Streaming | Editor: Zhi Liu Wireless Body Area Network and
e-healthcare | Editor: Honggang Wang Wireless Security | Editors:
Haojin Zhu, Jian Shen Wireless Sensor Network | Editors: Jiming
Chen, Ruilong Deng WLAN and OFDM | Editor: Xianbin Wang
|
You may like...
Michael K
Nthikeng Mohlele
Paperback
R299
R234
Discovery Miles 2 340
The Hunter
Tana French
Paperback
R380
R297
Discovery Miles 2 970
Day One
Abigail Dean
Paperback
R390
R260
Discovery Miles 2 600
The Child
Alistair Mackay
Paperback
R335
R245
Discovery Miles 2 450
|