Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Human Rights in Child Protection
This book critically explores what child protection policy and professional practice would mean if practice was grounded in human rights standards. This book inspires a new direction in child protection research – one that critically assesses child protection policy and professional practice with regard to human rights in general, and the rights ...
Data Protection for the Hybrid Cloud
If you are responsible for architecting and designing the backup strategy for your organization, especially if you're looking for ways to incorporate cloud backup into your business continuity scenarios, this book is for you. With the increasing trends in virtualization as well as the move to the pubic cloud, IT organizations are headed toward...
Migration and Social Protection in Europe and Beyond (Volume 1)
This first open access book in a series of three volumes provides an in-depth analysis of social protection policies that EU Member States make accessible to resident nationals, non-resident nationals and non-national residents. In doing so, it discusses different scenarios in which the interplay between nationality and residence could lead to ineq...
Migration and Social Protection in Europe and Beyond (Volume 3)
This third and last open volume in the series takes the perspective of non-EU countries on immigrant social protection. By focusing on 12 of the largest sending countries to the EU, the book tackles the issue of the multiple areas of sending state intervention towards migrant populations. Two "mirroring" chapters are dedicated to each of ...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
Institutional Reform for Innovation and Entrepreneurship
The authors of this book advise the economies of the European Union to become more entrepreneurial in promoting innovation and economic growth. The authors propose a reform strategy with respect to several aspects to achieve this goal. Starting with the rule of law and the protection of property rights; the tax system; the authors deal with regulat...
Protecting the Rights of People with Autism in the Fields of Education and Employment
Fundamental rights for all people with disabilities, education and employment are key for the inclusion of people with autism. They play as facilitators for the social inclusion of persons with autism and as multipliers for their enjoyment of other fundamental rights. After outlining the international and European dimensions of the legal protection...
Contemporary Issues in Human Rights Law
This book analyzes issues in human rights law from a variety of perspectives by eminent European and Asian professors of constitutional law, international public law, and European Union law. As a result, their contributions collected here illustrate the phenomenon of cross-fertilization not only in Europe (the EU and its member states and the Counc...
United Nations Peace Operations in a Changing Global Order
This open access volume explores how UN peace operations are adapting to four trends in the changing global order: (1) the rebalancing of relations between states of the global North and the global South; (2) the rise of regional organisations as providers of peace; (3) the rise of violent extremism and fundamentalist non-state actors; and (4) incr...
Managing Protected Areas in Central and Eastern Europe Under Climate Change
Beginning with an overview of data and concepts developed in the EU-project HABIT-CHANGE, this book addresses the need for sharing knowledge and experience in the field of biodiversity conservation and climate change. There is an urgent need to build capacity in protected areas to monitor, assess, manage and report the effects of climate change and...
Child Protection in England, 1960–2000
This book explores how children, parents, and survivors reshaped the politics of child protection in late twentieth-century England. Activism by these groups, often manifested in small voluntary organisations, drew upon and constructed an expertise grounded in experience and emotion that supported, challenged, and subverted medical, social work, l...
Managing the Complexity of Critical Infrastructures
This book summarizes work being pursued in the context of the CIPRNet (Critical Infrastructure Preparedness and Resilience Research Network) research project, co-funded by the European Union under the Seventh Framework Programme (FP7). The project is intended to provide concrete and on-going support to the Critical Infrastructure Protection (CIP) r...
Cultural Heritage Ethics
Theory without practice is empty, practice without theory is blind, to adapt a phrase from Immanuel Kant. The sentiment could not be truer of cultural heritage ethics. This intra-disciplinary book bridges the gap between theory and practice by bringing together a stellar cast of academics, activists, consultants, journalists, lawyers, and museum pr...
Why Should I Care? Mobile Security for The Rest of Us
I've already accepted the fact that Bring-Your-Own-Device (BYOD) is a business trend that's here to stay. According to one report I recently read, just 23 percent of enterprise employees use company-sanctioned mobile devices only - meaning 77 percent of employees are using their own devices in some capacity to do their job. 1 As the Chief...
Protecting SQL Server Data
In Protecting SQL Server Data, John Magnabosco demonstrates how sensitive data, stored in SQL Server, can be protected using an efficient and maintainable encryption-based data architecture. He explains how to assess and categorize data elements according to sensitivity, regulate access to the various categories of data using database roles, vie...
Mesoscale Analysis of Hydraulics
This open book presents a series of complicated hydraulic phenomena and related mechanism of high-speed flows in head-head dam. According to the basic hydraulic theory, detailed experiments and numerical simulations, microscopic scale analysis on cavitation bubbles, air bubbles, turbulent eddy vortices and sand grains are examined systemically. The...
GDPR and Biobanking
This open book focuses on the discrepancies in biobank research regulations that are among the most significant hurdles to effective research collaboration. The General Data Protection Regulation (GDPR) has established stringent requirements for the processing of health and genetic data, while simultaneously allowing considerable multi-level except...
One Hundred Years of Social Protection
While the rise of social protection in the global North has been widely researched, we know little about the history of social protection in the global South. This open book investigates the experiences of four middle-income countries - Brazil, India, China and South Africa - from 1920 to 2020, analysing if, when, and how these countries articulate...
Governing Social Protection in the Long Term
This open book examines the comparative evolution of social protection in Australia and New Zealand from 1890 to the present day, focusing on the relationship between employment relations and social policy. Utilising longstanding and more recent developments in historical institutionalist methodology, Ramia investigates the relationship between the...
From Colonialism to International Aid
This open volume addresses the role of external actors in social protection in the Global South, from the Second World War until today, analysing the influence of colonial powers, superpowers during the Cold War and contemporary donor agencies.Following an introduction to the analysis of external actors in social policy making in the Global South, ...
Governance of Arctic Shipping
This open book is a result of the Dalhousie-led research project Safe Navigation and Environment Protection, supported by a grant from the Ocean Frontier Institute's the Canada First Research Excellent Fund (CFREF). The book focuses on Arctic shipping and investigates how ocean change and anthropogenic impacts affect our understanding of risk,...
Migration and Social Protection in Europe and Beyond (Volume 2)
This 2nd open book in a series of three volumes examines the repertoire of policies and programmes led by EU Member States to engage with their nationals residing abroad. Focusing on sending states' engagement in the area of social protection, this book shows how a series of emigration-related policies that go beyond the realm of social securi...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Man...
From Bilateral Arbitral Tribunals and Investment Courts to a Multilateral Investment Court
This book considers the potential setup for a future Multilateral Investment Court (MIC). The option of an MIC was first discussed by the EU Commission in 2016 and has since been made an official element of the EU Common Commercial Policy. In 2017, UNCITRAL also decided to discuss the possibility of an MIC, and on 20 March 2018, the Council of the ...
Collaborating Against Child Abuse
This edited collection explores the background and implementation of the Nordic Barnahus (or 'Children's House') model – recognised as one of the most important reforms related to children who are the victims of crime in the Nordic region. This book discusses both its potential to affect change and the challenges facing it. The mod...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of...
Wetlands and Water Framework Directive
This book compares the lessons learned from a wetland-perspective approach to the changing climate and the requirements of the Water Framework Directive (WFD) with regard to environmental conservation. Examples from Germany and Poland are discussed due to the efficiency of their respective implementations of water conservation policies. Although th...
Office 365
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
Radiation Monitoring and Dose Estimation of the Fukushima Nuclear Accident
This book provides comprehensive research findings related to the environmental monitoring of radiation, levels of radioactive nuclides in various environments, and dose estimation in residents after the Fukushima nuclear power plant accident caused severe environmental contamination with radioactive nuclides. At the beginning of the book, a techni...
Paths to the Emerging State in Asia and Africa
This book addresses the issue of how a country, which was incorporated into the world economy as a periphery, could make a transition to the emerging state, capable of undertaking the task of economic development and industrialization. It offers historical and contemporary case studies of transition, as well as the international background under wh...

1 2 3 ... 6