Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Microfinance 3.0
This book focuses on the achievements, current trends and further potential of microfinance to scale-up and serve many more clients with financial services that enable them to improve their living conditions. The book asks what it takes to achieve sustainable impact: to know your clients and to understand their needs, to treat them in a fair and tr...
Ranaviruses
The first book of its kind, this work discusses the global extent of ranaviruses, principles of ranavirus ecology and evolution. The research included provides guidance on designing ranavirus surveillance studies to determine risk. Ranaviruses are are double-stranded DNA viruses that cause hemorrhagic disease in amphibians, reptiles, and fish. Rana...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Man...
Greening the Financial Sector
Given the manifold challenges of financial sectors in developing and transition countries, one might be tempted to believe that embarking on "green" finance is not a priority for financial systems development. However, there are a number of arguments against this view. Environmental finance, particularly energy efficiency and renewable en...
Semiotics in Mathematics Education
This volume discusses semiotics in mathematics education as an activity with a formal sign system, in which each sign represents something else. Theories presented by Saussure, Peirce, Vygotsky and other writers on semiotics are summarized in their relevance to the teaching and learning of mathematics. The significance of signs for mathematics educ...
Global Business Strategy
This book presents theories and case studies for corporations in developed nations, including Japan, for designing strategies to maximize opportunities and minimize threats in business expansion into developing nations. The case studies featured here focus on Asia, including China and India, and use examples of Japanese manufacturers. Five case st...
The Gene Ontology Handbook
This book provides a practical and self-contained overview of the Gene Ontology (GO), the leading project to organize biological knowledge on genes and their products across genomic resources. Written for biologists and bioinformaticians, it covers the state-of-the-art of how GO annotations are made, how they are evaluated, and what sort of analyse...
Re-engineering the Uptake of ICT in Schools
This book reports on a novel and comprehensive approach to the uptake of ICT in Schools. It focuses on key questions, pedagogically sound ways of introducing ICT, new technical artifacts supporting the approach, the evaluation in a large-scale validator, and future work. While many innovations in Technology Enhanced Learning (TEL) have emerged over...
Reconsidering Constitutional Formation II Decisive Constitutional Normativity
This second volume of ReConFort, published open access, addresses the decisive role of constitutional normativity, and focuses on discourses concerning the legal role of constitutional norms. Taken together with ReConFort I (National Sovereignty), it calls for an innovative reassessment of constitutional history drawing on key categories to convey ...
The Hindu Kush Himalaya Assessment
This open access volume is the first comprehensive assessment of the Hindu Kush Himalaya (HKH) region. It comprises important scientific research on the social, economic, and environmental pillars of sustainable mountain development and will serve as a basis for evidence-based decision-making to safeguard the environment and advance people's w...
The Privacy Engineer's Manifesto
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy. The authors, a uniquely skilled team of...
Surveying Human Vulnerabilities across the Life Course
This book details tools and procedures for data collections of hard-to-reach, hard-to-survey populations. Inside, readers will discover first-hand insights from experts who share their successes as well as their failures in their attempts to identify and measure human vulnerabilities across the life course. Coverage first provides an introduction o...
Scaling of Differential Equations
The book serves both as a reference for various scaled models with corresponding dimensionless numbers, and as a resource for learning the art of scaling. A special feature of the book is the emphasis on how to create software for scaled models, based on existing software for unscaled models. Scaling (or non-dimensionalization) is a mathematical...
Compendium for Early Career Researchers in Mathematics Education
The purpose of this Open Access compendium, written by experienced researchers in mathematics education, is to serve as a resource for early career researchers in furthering their knowledge of the state of the field and disseminating their research through publishing. To accomplish this, the book is split into four sections: Empirical Methods, Impo...
Contemporary Perspectives on Ageism
This book provides a comprehensive European perspective on the concept of ageism, its origins, the manifestation and consequences of ageism, as well as ways to respond to and research ageism. The book represents a collaborative effort of researchers from over 20 countries and a variety of disciplines, including, psychology, sociology, gerontology, ...
Office 365
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
TouchDevelop
Mobile devices such as smartphones and tablets are set to become the main computers that virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at Microsoft Research was created to answer a simple question: "It is possible to create interesting apps directly on...
The InfoSec Handbook
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts. It is intended mainly for beginners to the field of information security, writte...
Evolutionary Genomics
This book addresses the challenge of analyzing and understanding the evolutionary dynamics of complex biological systems at the genomic level, and elaborates on some promising strategies that would bring us closer to uncovering of the vital relationships between genotype and phenotype. After a few educational primers, the book continues with sectio...
Tuberculosis in Adults and Children
This work contains updated and clinically relevant information about tuberculosis. It is aimed at providing a succinct overview of history and disease epidemiology, clinical presentation and the most recent scientific developments in the field of tuberculosis research, with an emphasis on diagnosis and treatment. It may serve as a practical resour...
Enhanced Living Environments
This book is the final publication of the COST Action IC1303 "Algorithms, Architectures and Platforms for Enhanced Living Environments (AAPELE)" project.Ambient Assisted Living (AAL) is an area of research based on Information and Communication Technologies (ICT), medical research, and sociological research. AAL is based on the notion tha...
The Bluefin Tuna Fishery in the Bay of Biscay
This book is an original contribution to the knowledge on fishing and research associated with one of the most enigmatic fish of our seas: bluefin tuna, Thunnus thynnus (L.). Based on available evidence, it reconstructs the possible methods used to catch large spawners in the Strait of Gibraltar thousands of years ago and describes the much more re...
Intel Galileo and Intel Galileo Gen 2
Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel Galileo and Intel Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. ...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Model-Driven Development and Operation of Multi-Cloud Applications
This book summarizes work being undertaken within the collaborative MODAClouds research project, which aims to facilitate interoperability between heterogeneous Cloud platforms and remove the constraints of deployment, portability, and reversibility for end users of Cloud services. Experts involved in the project provide a clear overview of the MOD...
White-Collar Crime in the Shadow Economy
This book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime. It argues that the offenders who are convicted represent only 'the tip of the iceberg' of a much greater problem: because white-collar crime is forced to comp...
Automated Machine Learning
This book presents the first comprehensive overview of general methods in Automated Machine Learning (AutoML), collects descriptions of existing systems based on these methods, and discusses the first series of international challenges of AutoML systems. The recent success of commercial ML applications and the rapid growth of the field has created ...
Android on x86
Android on x86: an Introduction to Optimizing for IntelĀ® Architecture serves two main purposes. First, it makes the case for adapting your applications onto Intel's x86 architecture, including discussions of the business potential, the changing landscape of the Android marketplace, and the unique challenges and opportunities that arise from x...
Access to Online Resources
The book offers a concise guide for librarians, helping them understand the challenges, processes and technologies involved in managing access to online resources. After an introduction the book presents cases of general authentication and authorisation. It helps readers understand web based authentication and provides the fundamentals of IP addres...
Regulatory Pathways For Smart Grid Development in China
A series of reforms have greatly improved the efficiency, reliability, and environmental performance of the Chinese power sector. However, significant challenges remain: rapidly rising electricity demand, concerns about power system reliability and energy security, environmental degradation and climate change. China's government explicitly set...
Impacts of the Fukushima Nuclear Accident on Fish and Fishing Grounds
This book presents the results from the Japanese Fisheries Research Agency's 3-year intensive monitoring of radionuclides in a variety of fish, plankton, benthos, and their living environments after the Fukushima Daiichi Nuclear Power Plant (FNPP) accident in March 2011. The book reveals the dynamics of contamination processes in marine and fr...
Evidence Use in Health Policy Making
This book provides a set of conceptual, empirical, and comparative chapters that apply a public policy perspective to investigate the political and institutional factors driving the use of evidence to inform health policy in low, middle, and high income settings. The work presents key findings from the Getting Research Into Policy (GRIP-Health) pro...

1 2 3 4 5 6 ... 11