Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Perspectives on Elderly Crime and Victimization
This textbook focuses on the criminality and victimization of the elderly population. It provides a global perspective on the extent of elderly crime and victimization, with international comparisons for addressing the problem. It explores the extent and types of crimes committed by the elderly, the characteristics of older criminals, and the respo...
Pro Git
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented v...
Indigenous Knowledge and Education in Africa
This book presents a strong philosophical, theoretical and practical argument for the mainstreaming of indigenous knowledge in curricula development, and in teaching and learning across the African continent. Since the dawn of political independence in Africa, there has been an ongoing search for the kind of education that will create a class of pr...
The Legacy of Felix Klein
This book provides an overview of Felix Klein's ideas, highlighting developments in university teaching and school mathematics related to Klein's thoughts, stemming from the last century. It discusses the meaning, importance and the legacy of Klein's ideas today and in the future, within an international, global context. Presenting e...
Fashion Figures
Missy Maker is a middle school girl who loves math and fashion. She sees math in everything she does. She tries to hide this from her friends, because she thinks it's too geeky. Missy hears that the school math club needs more members, but she's worried about what her friends will think if she joins, and she's already committed to jo...
White-Collar Crime in the Shadow Economy
This book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime. It argues that the offenders who are convicted represent only 'the tip of the iceberg' of a much greater problem: because white-collar crime is forced to comp...
Wellbeing and Devolution
"In this book, Wallace elegantly shows how committed government intervention can improve wellbeing with rigour and impact. It's an essential read for anyone concerned with the future of the UK."Julia Unwin, CBE"As someone who commissioned one of the first attempts to learn from the devolved nations I am delighted to see this pub...
Complications and Quandaries in the ICT Sector
With technology standards becoming increasingly common, particularly in the information and communications technology (ICT) sector, the complexities and contradictions at the interface of intellectual property law and competition law have emerged strongly. This book talks about how the regulatory agencies and courts in the United States, European U...
The Poetics and Politics of Alzheimer's Disease Life-Writing
This is the first book-length exploration of the thoughts and experiences expressed by dementia patients in published narratives over the last thirty years. It contrasts third-person caregiver and first-person patient accounts from different languages and a range of media, focusing on the poetical and political questions these narratives raise: wha...
Defensive Database Programming with SQL Server
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as deve...
SQL Server Internals: In-Memory OLTP
The SQL Server 2016 In-Memory OLTP engine (a.k.a. Hekaton) is designed to exploit terabytes of available memory and high numbers of processing cores. It allows us to work with memory-optimized tables and indexes, and natively compiled stored procedures, in addition to the disk-based tables and indexes, and T-SQL stored procedures, that SQL Server h...
SQL Server Concurrency
If you've designed your SQL code intelligently and implemented a sensible indexing strategy, there's a good chance your queries will "fly", when tested in isolation. In the real world, however, where multiple processes can access the same data at the same time, SQL Server often has to make one process wait, sacrificing concurren...
Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
The Security Development Lifecycle
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
Version Control with Subversion
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.7 with a complete introduction and guided tour of its capabilities, along with best practice recommendations. Version Control with Subve...
Combatting Illicit Trade on the EU Border
This open book provides the first-ever comparative study on criminal policy concerning the illicit trade of tobacco, conducted among four comparatively new EU Member States (Lithuania, Poland, Slovakia and Romania) and two "old" EU countries (Germany and Italy). The book addresses the national legal frameworks, current criminological situ...
Git Internals
It took me a pretty long time to really get Git. As I've continued to use Git more and more where I work, I've found myself trying to teach people what it is and why we use it over and over again, and the reality is that Git generally has a pretty steep learning curve compared to many other systems. I've seen case after case of devel...