Network Security -- Risk Assessment of Production Networks Using Honeynets – Some Practical Experience -- POSSET – Policy-Driven Secure Session Transfer -- Modeling and Evaluation of Security Architecture for Wireless Local Area Networks by Indexing Method: A Novel Approach -- Robust Routing in Malicious Environment for Ad Hoc Networks -- Cryptographic Techniques I -- Short Linkable Ring Si…
Chapter 1 Situating Participatory Video in Theories -- Chapter 2 Participatory Video in Practice -- Chapter 3 Participatory Video in the Framework of Adult Education -- Chapter 4 Power, Positionality, and Participation -- Chapter 5 Participatory Video and Ethics -- Chapter 6 Conclusion.This book highlights participatory video as an instrument for community-based adult education and focuses in p…