The Places Where Community Is Practiced
In this open access publication, the social cohesion of urban neighborhoods and their residents is examined, which is often viewed as vulnerable since increased mobility, individualization, wider socio-economic and demographic changes have fundamentally altered the basis for everyday social interaction in urban neighborhoods. Anna Steigemann gives ...
Fundamentals of Business
Fundamentals of Business, 2nd Edition is an 372-page open education resource intended to serve as a no-cost, faculty customizable primary text for one-semester undergraduate introductory business courses. It covers the following topics in business: Teamwork; economics; ethics; entrepreneurship; business ownership, management, and leadership; organi...
Cultural Heritage Ethics
Theory without practice is empty, practice without theory is blind, to adapt a phrase from Immanuel Kant. The sentiment could not be truer of cultural heritage ethics. This intra-disciplinary book bridges the gap between theory and practice by bringing together a stellar cast of academics, activists, consultants, journalists, lawyers, and museum pr...
Exploring Business
Exploring Business introduces students to business roles and concepts in an exciting way. This text will help you decide whether business is right for you and, if so, what areas of business you'd like to study further. Exploring Business is adapted from a work produced by a publisher who has requested that they and the original author not receiv...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Grey Area
Coffeeshops are the most famous example of Dutch tolerance. But in fact, these cannabis distributors are highly regulated. Coffeeshops are permitted to break the law, but not the rules. On the premises, there cannot be minors, hard drugs or more than 500 grams. Nor can a coffeeshop advertise, cause nuisance or sell over five grams to a person in a ...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of long...
Office 365
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Public Health Ethics: Cases Spanning the Globe
This book highlights the ethical issues and dilemmas that arise in the practice of public health. It is also a tool to support instruction, debate, and dialogue regarding public health ethics. Although the practice of public health has always included consideration of ethical issues, the field of public health ethics as a discipline is a relatively...
Rethinking the Internet of Things
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book. Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
Agricultural and Forestry Reconstruction After the Great East Japan Earthquake
This book summarizes the results of 3 years of agricultural and forestry reconstructive efforts and applied research conducted directly in the affected areas of Fukushima following the Great East Japan Earthquake. It describes fast and effective revival methods and technologies from tsunami and radiation damages, demonstrated through the collaborat...
Norwegian Shipping in the 20th Century
This book discusses how Norwegian shipping companies played a crucial role in global shipping markets in the 20th century, at times transporting more than ten per cent of world seaborne trade. Chapters explore how Norway managed to remain competitive, despite being a high labour-cost country in an industry with global competition. Among the feature...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Designing Sustainable Energy for All
This book addresses the issue of diffusing sustainable energy access inlow- and middle-income contexts. Access to energy is one of the greatest challenges for many people living in low-income and developing contexts, as around 1.4 billion people lack access to electricity.Distributed Renewable Energy systems (DRE) are considered a promising approa...
Indigenous Life Projects and Extractivism
Exploring indigenous life projects in encounters with extractivism, the present open access volume discusses how current turbulences actualise questions of indigeneity, difference and ontological dynamics in the Andes and Amazonia. While studies of extractivism in South America often focus on wider national and international politics, this contribu...
Digital Technology and the Practices of Humanities Research
How does technology impact research practices in the humanities? How does digitisation shape scholarly identity? How do we negotiate trust in the digital realm? What is scholarship, what forms can it take, and how does it acquire authority? This diverse set of essays demonstrate the importance of asking such questions, bringing together establis...
Digital Transformation of the Design, Construction and Management Processes of the Built Environment
This open access book focuses on the development of methods, interoperable and integrated ICT tools, and survey techniques for optimal management of the building process. The construction sector is facing an increasing demand for major innovations in terms of digital dematerialization and technologies such as the Internet of Things, big data, advan...
Entreprenerd: Marketing <for> Programmers
A modern web-marketing book that outlines a multi-modal system for growing a website with SEO, Google AdWords/Facebook Ads, Conversion Optimisation, Copywriting/Classic Persuasion/Behavioural Psychology, Google Analytics, Statistical Significance, Email Marketing, and Remarketing. When I launched my first web application it started off with zero tr...
Security Infrastructure Technology for Integrated Utilization of Big Data
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
Introduction to Programming with Fortran
This fourth Edition presents new examples on submodules, derived type i/o, object oriented programming, abstract interfaces and procedure pointers, C interop, sorting and searching, statistics and converting to more modern versions of Fortran.Key FeaturesHighlights the core language features of modern Fortran including data typing, array processing...
Introduction to Law
This book is exceptional in the sense that it provides an introduction to law in general rather than the law of one specific jurisdiction, and it presents a unique way of looking at legal education. It is crucial for lawyers to be aware of the different ways in which societal problems can be solved and to be able to discuss the advantages and disad...
Creating a Production Launch Plan
In this book, we describe the components of a launch plan at Google and offer practical methods you might apply to reduce production launch risks for your own products. We include lessons we have learned about what works well for launching Google products, including large products, new features for existing products, and even small products. The le...
Cryptography in .NET Succinctly
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinctly, ...
Estimating Illicit Financial Flows
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...