Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Protest Movements in Asylum and Deportation
This book deals with contestations "from below" of legal policies and implementation practices in asylum and deportation. Consequently, it covers three types of mobilization: solidarity protests against the deportation of refused asylum seekers, refugee activism campaigning for residence rights and inclusion, and restrictive protests agai...
Socioeconomics of Agriculture
This book applies for the first time emerging concepts of socioeconomics to analyse an economic sector, namely agriculture. It considers the rational choices of all actors in the system (just as agricultural economists do) and their cultural preferences and constraints (just as rural sociologists do). Socioeconomic concepts are subsequently used to...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
S-BPM in the Wild
This is the first book to present field studies on the application of subject-oriented business process management (S-BPM). Each case presents a specific story and focuses on an essential modeling or implementation issue, and most end with implications or suggestions for further studies. Significant variables and success factors are identified that...
Information Infrastructures within European Health Care
This book consolidates experiences from across Europe on the design, development, implementation and evolution of inter-organisational information infrastructures for healthcare. It provides insights with practical relevance for those involved or interested in the planning and implementation of such infrastructures and includes 11 empirical cases o...
Ukrainian Migration to the European Union
This book brings together research findings from a variety of disciplines in this integrated study of the migration of Ukrainian nationals to the EU. It contextualizes and historicizes this migration against the background of the series of crises experienced by Ukraine and the wider region over the last thirty or so years, from the dissolution of t...
The Pathologisation of Homosexuality in Fascist Italy
This book investigates the pathologisation of homosexuality during the fascist regime in Italy through an analysis of the case of G., a man with "homosexual tendencies" interned in the Collegno mental health hospital in 1928. No systematic study exists on the possibility that Fascism used internment in an asylum as a tool of repression fo...
Do Exclusionary Rules Ensure a Fair Trial?
This open access publication discusses exclusionary rules in different criminal justice systems. It is based on the findings of a research project in comparative law with a focus on the question of whether or not a fair trial can be secured through evidence exclusion. Part I explains the legal framework in which exclusionary rules function in six l...
Promoting Social Dialogue in European Organizations
This volume focuses on describing the social dialogue system in organizations from an Human Resources Management perspective. Based on the NEIRE model for industrial relations, key factors are determined contributing to creative social dialogue in European organizations. Actual data from surveys and interviews from more than 700 CEO and HR managers...
Between Mobility and Migration
This book offers a critical perspective on intra-European mobility and migration by using new empirical data and theoretical discussions. It develops a theoretical and empirical analysis of the consequences of intra-European movement for sending and receiving urban regions in The Netherlands, Sweden, Austria, Turkey, Poland and Czech Republic. The ...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Sensitivity Analysis: Matrix Methods in Demography and Ecology
This book shows how to use sensitivity analysis in demography. It presents new methods for individuals, cohorts, and populations, with applications to humans, other animals, and plants. The analyses are based on matrix formulations of age-classified, stage-classified, and multistate population models. Methods are presented for linear and nonlinear,...
Collective Actions in Europe
This book offers an analytical presentation of how Europe has created its own version of collective actions. In the last three decades, Europe has seen a remarkable proliferation of collective action legislation, making class actions the most successful export product of the American legal scholarship. While its spread has been surrounded by distru...
Between Psychology and Philosophy
This book discusses a variety of important but unprecedented ways in which psychology can be useful to philosophy. The early chapters illustrate this theme via comparisons between Chinese and Western philosophy. It is argued that the Chinese notion of a heart-mind is superior to the Western concept of mind, but then, more even-handedly, the relativ...
Implementation of EU Readmission Agreements
By examining the implementation dynamics of EU Readmission Agreements (EURAs), this book addresses the practical reasons why irregular immigrants cannot be expelled. EURAs are one of the vital legal instruments framing EU external migration law with regard to the expulsion of irregular immigrants, yet their implementation has met with various obsta...
The Golden and Ghoulish Age of the Gibbet in Britain
This book is the first academic study of the post-mortem practice of gibbeting ('hanging in chains'), since the nineteenth century. Gibbeting involved placing the executed body of a malefactor in an iron cage and suspending it from a tall post. A body might remain in the gibbet for many decades, while it gradually fell to pieces. Hanging ...
Air Quality Integrated Assessment
This book reports on the results of an extended survey conducted across Europe within the framework of the APPRAISAL FP7 project to determine the extent to which an integrated assessment approach to air quality is being adopted, on the one hand, by regional and local authorities to develop air quality plans and, on the other, by researchers. Follow...
White-Collar Crime in the Shadow Economy
This book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime. It argues that the offenders who are convicted represent only 'the tip of the iceberg' of a much greater problem: because white-collar crime is forced to comp...
Designing Sustainable Energy for All
This book addresses the issue of diffusing sustainable energy access inlow- and middle-income contexts. Access to energy is one of the greatest challenges for many people living in low-income and developing contexts, as around 1.4 billion people lack access to electricity.Distributed Renewable Energy systems (DRE) are considered a promising approa...
Society - Water - Technology
This book presents the results of the Interdisciplinary Research Group "Society – Water – Technology" of the Berlin-Brandenburg Academy of Sciences and Humanities. It describes interdisciplinary evaluation criteria for major water engineering projects (MWEPs) and portrays an application to the Lower Jordan Valley (Middle East) and th...
Diseases of the Abdomen and Pelvis 2018-2021
This book deals with imaging of the abdomen and pelvis, an area that has seen considerable advances over the past several years, driven by clinical as well as technological developments. The respective chapters, written by internationally respected experts in their fields, focus on imaging diagnosis and interventional therapies in abdominal and pel...
Investigating the Body in the Victorian Asylum
This book explores how the body was investigated in the late nineteenth-century asylum in Britain. As more and more Victorian asylum doctors looked to the bodily fabric to reveal the 'truth' of mental disease, a whole host of techniques and technologies were brought to bear upon the patient's body. These practices encompassed the cli...
Living with Disfigurement in Early Medieval Europe
This book examines social and medical responses to the disfigured face in early medieval Europe, arguing that the study of head and facial injuries can offer a new contribution to the history of early medieval medicine and culture, as well as exploring the language of violence and social interactions. Despite the prevalence of warfare and conflict ...
eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...
Remembering and Disremembering the Dead
This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and when is death, affects how we understand the possibility of posthumous harm and redemption. Whilst it is impossible to hurt the dead, it is possible to harm the wishes, beliefs and memories of persons that once lived. In this wa...
Access to Online Resources
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP addres...
Evidence Use in Health Policy Making
This book provides a set of conceptual, empirical, and comparative chapters that apply a public policy perspective to investigate the political and institutional factors driving the use of evidence to inform health policy in low, middle, and high income settings. The work presents key findings from the Getting Research Into Policy (GRIP-Health) pro...
Evaluating Evidence of Mechanisms in Medicine
This book is the first to develop explicit methods for evaluating evidence of mechanisms in the field of medicine. It explains why it can be important to make this evidence explicit, and describes how to take such evidence into account in the evidence appraisal process. In addition, it develops procedures for seeking evidence of mechanisms, for eva...
Complications and Quandaries in the ICT Sector
With technology standards becoming increasingly common, particularly in the information and communications technology (ICT) sector, the complexities and contradictions at the interface of intellectual property law and competition law have emerged strongly. This book talks about how the regulatory agencies and courts in the United States, European U...
The Future of Software Quality Assurance
This book, published to mark the 15th anniversary of the International Software Quality Institute (iSQI), is intended to raise the profile of software testers and their profession. It gathers contributions by respected software testing experts in order to highlight the state of the art as well as future challenges and trends. In addition, it covers...
Cloud Native Applications
Cloud computing is a game changer. Being able to automate and constantly adjust infrastructure is one important reason to use cloud computing for your clients. And developing and operating systems that are able to recover from failure automatically has never been easier. Cloud providers offer you the needed infrastructure for a very reasonable pric...
Graph Databases
Discover how graph databases can help you manage and query highly connected data. With this practical book, you'll learn how to design and implement a graph database that brings the power of graphs to bear on a broad range of problem domains. Whether you want to speed up your response to user queries or build a database that can adapt as your ...

1 2 3 4 5 6 ... 8