Exploring various aspects of cyber terrorism, and cyber crime in today's society, scholars of computer science and information technology specializing in computer security provide insights into the negative uses of technology and review associated vulnerabilities and mitigation. Among their topics are the case for cyber-security-hardened mobile systems, a comparative survey of methods and techniques to provide security in wireless ad hoc networks, managing trust to enhance quality of service in mobile ad hoc networks, identifying the author's native language for the forensic analysis of weblog authorship, and the innovation and promise of STEM (science, technology, engineering, mathematics)-oriented cybersecurity charter schools in urban minority communities in the US as a tool to create a critical business workforce.
– ProtoView Book Abstracts (formerly Book News, Inc.)