Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Audacious Education Purposes
This book offers a comparative study of eight ambitious national reforms that sought to create opportunities for students to gain the necessary breath of skills to thrive in a rapidly changing world. It examines how national governments transform education systems to provide students opportunities to develop such skills. It analyses comprehensive e...
The Archaeology of Europe’s Drowned Landscapes
This open access volume provides for the first time a comprehensive description and scientific evaluation of underwater archaeological finds referring to human occupation of the continental shelf around the coastlines of Europe and the Mediterranean when sea levels were lower than present. These are the largest body of underwater finds worldwide, a...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Open Source Systems
This book constitutes the refereed proceedings of the 16th IFIP WG 2.13 International Conference on Open Source Systems, OSS 2020, held in Innopolis, Russia, in May 2020.* The 12 revised full papers and 8 short papers presented were carefully reviewed and selected from 42 submissions. The papers cover a wide range of topics in the field of free/l...
Life Cycle Assessment
This book is a uniquely pedagogical while still comprehensive state-of-the-art description of LCA-methodology and its broad range of applications. The five parts of the book conveniently provide: I) the history and context of Life Cycle Assessment (LCA) with its central role as quantitative and scientifically-based tool supporting society’s trans...
WSES Handbook of Mass Casualties Incidents Management
This manual, written by world opinion leaders in the field, is designed to provide readily accessible, step-by-step guidance on all aspects of the management of mass casualty incidents. Readers will find a wealth of helpful practical suggestions as well as information on the latest relevant scientific advances and their implications. Globally, mass...
Prevention and Control of Infections in Hospitals
This volume offers extensive information on preventive and infection surveillance procedures, routines and policies adapted to the optimal infection control level needed to tackle today's microbes in hospital practice. It especially focuses on preventive measures for serious hospital infections. Each chapter includes a practical section that a...
Digital Business Models
The spread of the Internet into all areas of business activities has put a particular focus on business models. The digitalization of business processes is the driver of changes in company strategies and management practices alike. This textbook provides a structured and conceptual approach, allowing students and other readers to understand the com...
Concepts, Methods and Practical Applications in Applied Demography
This textbook offers a comprehensive overview of applied demography by presenting both basic concepts and methodological techniques. It allows students from the social and human sciences, demographers, consultants and anyone interested in applied demography to gain an understanding of a wide range of practical applications of demographic concepts, ...
Applied Bioinformatics
This book introduces readers to the basic principles of bioinformatics and the practical application and utilization of computational tools, without assuming any prior background in programming or informatics. It provides a coherent overview of the complex field and focuses on the implementation of online tools, genome databases and software that c...
Eye Tracking Methodology
Focusing on recent advances in analytical techniques, this third edition of Andrew Duchowski’s successful guide has been revised and extended. It includes new chapters on calibration accuracy, precision and correction; advanced eye movement analysis; binocular eye movement analysis; practical gaze analytics; eye movement synthesis. Eye Tracking ...
Criminal Justice and Mental Health
This textbook provides an overview for students in Criminology and Criminal Justice about the overlap between the criminal justice system and mental health. It provides an accessible overview of basic signs and symptoms of major mental illnesses and size of scope of justice-involved individuals with mental illness.In the United States, the cri...
International Humanitarian Action
This textbook examines a wide range of humanitarian action issues in five parts, presented by specialists from different academic fields. The respective parts reflect the five core modules of the International NOHA Joint Master’s Programme “International Humanitarian Action”: a) World Politics, b) International Law, c) Public Health, d) Anthr...
Research Methods for the Digital Humanities
This volume introduces the reader to the wide range of methods that digital humanities employ, and offers a practical guide to the study, interpretation, and presentation of cultural material and practices. In this instance, the editors consider digital humanities to include both the use of computing to understand cultural material in new ways, and...
Fundamentals of Business Process Management
This book covers the entire Business Process Management (BPM) lifecycle, from process identification to process monitoring, covering along the way process modelling, analysis, redesign and automation. Concepts, methods and tools from business management, computer science and industrial engineering are blended into one comprehensive and inter-discip...
Business Process Management Cases
This book is the first to present a rich selection of over 30 real-world cases of how leading organizations conduct Business Process Management (BPM). The cases stem from a diverse set of industry sectors and countries on different continents, reporting on best practices and lessons learned. The book showcases how BPM can contribute to both exploit...
Multimedia Big Data Computing for IoT Applications
This book considers all aspects of managing the complexity of Multimedia Big Data Computing (MMBD) for IoT applications and develops a comprehensive taxonomy. It also discusses a process model that addresses a number of research challenges associated with MMBD, such as scalability, accessibility, reliability, heterogeneity, and Quality of Service (...
Teaching Medicine and Medical Ethics Using Popular Culture
This book demonstrates how popular culture can be successfully incorporated into medical and health science curriculums, capitalising on the opportunity fictional media presents to humanise case studies. Studies show that the vast majority of medical and nursing students watch popular medical television dramas and comedies such as Grey’s Anatomy,...
Building Cloud Apps with Microsoft Azure
This book walks you through a patterns-based approach to building real-world cloud solutions. The patterns apply to the development process as well as to architecture and coding practices. Developers who are curious about developing for the cloud, are considering a move to the cloud, or are new to cloud development will find here a concise overv...
Windows 10 IT Pro Essentials: Support Secrets
That group includes full-time professional trainers, of course, but it also includes IT pros and those brave souls who staff the help desk in corporations. Most of all, it includes the incredibly large population of people who have earned a reputation for being "the person who knows Windows." With that knowledge comes a seemingly endle...
Introducing Microsoft Power BI
Introducing Microsoft Power BI enables you to evaluate when and how to use Power BI. Get inspired to improve business processes in your company by leveraging the available analytical and collaborative features of this environment. This book is targeted to a variety of readers. There are information workers and people who are totally new to the B...
Introducing Windows Server 2016
Windows Server has powered a generation of organizations, from small businesses to large enterprises. No matter what your role in IT, you can be guaranteed you that have touched Windows Server at some point in your career or at very least you have seen it from afar! This book introduces you to Windows Server 2016, which is the next version of Windo...
HTML5 Notes for Professionals
The HTML5 Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
PostgreSQL for Beginners
PostgreSQL for Beginners book is intended for those who only start getting acquainted with the world of PostgreSQL. It contains some basic information about this DBMS and its main features, history of its creation and development roadmap, step-by-step installation instructions and a getting started guide....
Linux commands Notes for Professionals
The Linux Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Microsoft SQL Server Notes for Professionals
The Microsoft SQL Server Notes for Professionals book is compiled from Stack Overflow Documentation, the content is written by the beautiful people at Stack Overflow....
Agency: Moral Identity and Free Will
There is agency in all we do: thinking, doing, or making. We invent a tune, play, or use it to celebrate an occasion. Or we make a conceptual leap and ask more abstract questions about the conditions for agency. They include autonomy and self-appraisal, each contested by arguments immersing us in circumstances we don't control. But can it be t...
The Piracy Crusade
In the decade and a half since Napster first emerged, forever changing the face of digital culture, the claim that "internet pirates killed the music industry" has become so ubiquitous that it is treated as common knowledge. Piracy is a scourge on legitimate businesses and hard-working artists, we are told, a "cybercrime" simila...
Hippocrates Now
This book will challenge widespread assumptions about Hippocrates (and, in the process, about the history of medicine in ancient Greece and beyond) and will also explore the creation of modern myths about the ancient world. Why do we continue to use Hippocrates, and how are new myths constructed around his name? How do news stories and the internet...
The Web as History
he World Wide Web has now been in use for more than 20 years. From early browsers to today's principal source of information, entertainment and much else, the Web is an integral part of our daily lives, to the extent that some people believe 'if it's not online, it doesn't exist.' While this statement is not entirely true, ...
The Art of Insight in Science and Engineering
This book shows us that the way to master complexity is through insight rather than precision. Precision can overwhelm us with information, whereas insight connects seemingly disparate pieces of information into a simple picture. Unlike computers, humans depend on insight. Based on the author's fifteen years of teaching at MIT, Cambridge Unive...

1 ... 5 6 7 8 9 ... 32