Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Access Denied
A study of Internet blocking and filtering around the world: analyses by leading researchers and survey results that document filtering practices in dozens of countries. Many countries around the world block or filter Internet content, denying access to information that they deem too sensitive for ordinary citizens - most often about politics, b...
Access Controlled
Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China's famous "Great Firewall o...
The Palgrave Handbook of Development Cooperation for Achieving the 2030 Agenda
This open handbook analyses the role of development cooperation in achieving the 2030 Agenda in a global context of 'contested cooperation'. Development actors, including governments providing aid or South-South Cooperation, developing countries, and non-governmental actors (civil society, philanthropy, and businesses) constantly challeng...
Co-creating Digital Public Services for an Ageing Society
This open book attends to the co-creation of digital public services for ageing societies. Increasingly public services are provided in digital form; their uptake however remains well below expectations. In particular, amongst older adults the need for public services is high, while at the same time the uptake of digital services is lower than the ...
Next Generation Supply Chains
This open book explores supply chains strategies to help companies face challenges such as societal emergency, digitalization, climate changes and scarcity of resources. The book identifies industrial scenarios for the next decade based on the analysis of trends at social, economic, environmental technological and political level, and examines how ...
Insurance Distribution Directive
This open volume of the AIDA Europe Research Series on Insurance Law and Regulation offers the first comprehensive legal and regulatory analysis of the Insurance Distribution Directive (IDD). The IDD came into force on 1 October 2018 and regulates the distribution of insurance products in the EU. The book examines the main changes accompanying the ...
Charting Spiritual Care
This open volume is the first academic book on the controversial issue of including spiritual care in integrated electronic medical records (EMR). Based on an international study group comprising researchers from Europe (The Netherlands, Belgium and Switzerland), the United States, Canada, and Australia, this edited collection provides an overview ...
Anticipating and Preparing for Emerging Skills and Jobs
This open book analyzes the main drivers that are influencing the dramatic evolution of work in Asia and the Pacific and identifies the implications for education and training in the region. It also assesses how education and training philosophies, curricula, and pedagogy can be reshaped to produce workers with the skills required to meet the emerg...
Measuring the Business Value of Cloud Computing
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value...
Towards Interoperable Research Infrastructures for Environmental and Earth Sciences
This open access book summarises the latest developments on data management in the EU H2020 ENVRIplus project, which brought together more than 20 environmental and Earth science research infrastructures into a single community. It provides readers with a systematic overview of the common challenges faced by research infrastructures and how a '...
External Collaboration with Azure AD B2B Succinctly
Secure collaboration in your organization's applications and services with outside groups can be tricky, but Azure Active Directory boasts features that make it simple. In External Collaboration with Azure AD B2B Succinctly, author Sjoukje Zaal takes readers step-by-step through creating guest accounts, managing security groups, and adding use...
CI/CD with Docker and Kubernetes
Containers change how developers build, test, and deploy code. Adopting them takes time. Using them the wrong way can slow down your delivery process. But you don't have a team of engineers to dedicate to this like Spotify or Netflix do. Maybe you're a startup CTO with features to ship - you can't spend hundreds of hours on intern...
Application Delivery and Load Balancing in Microsoft Azure
With more and more companies moving on-premises applications to the cloud, software and cloud solution architects alike are busy investigating ways to improve load balancing, performance, security, and high availability for workloads. This practical book describes Microsoft Azure's load balancing options and explains how NGINX can contribute t...
A Complete Guide to Maggot Therapy
Since the revival of maggot therapy in Western wound care approximately thirty years ago, there has been no comprehensive synthesis of what is known about its clinical practice, supply chain management, and social dimensions. This edited volume fills the information vacuum and, importantly, makes the current state of knowledge freely accessible. It...
Redis For Dummies
NoSQL is a modern data persistence storage paradigm that provides data persistence for environments where high performance is a primary requirement. Within NoSQL, data is stored in such a way as to make both writing and reading quite fast, even under heavy load. Redis and Redis Enterprise are market-leading, multi-model NoSQL databases that brin...
Security as Code
DevOps engineers, developers, and security engineers have ever-changing roles to play in today's cloud native world. In order to build secure and resilient applications, you have to be equipped with security knowledge. Enter security as code. In this book, authors BK Sarthak Das and Virginia Chu demonstrate how to use this methodology to se...

1 2