Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
Foundations of Trusted Autonomy
This book establishes the foundations needed to realize the ultimate goals for artificial intelligence, such as autonomy and trustworthiness. Aimed at scientists, researchers, technologists, practitioners, and students, it brings together contributions offering the basics, the challenges and the state-of-the-art on trusted autonomous systems in a s...
The Huawei and Snowden Questions
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
A Fair Share of Tax
This book takes a taxpayer's perspective to the relations taxation creates between people and their state. Larsen proposes that in order to understand tax compliance and cheating, we have to look beyond law, psychological experiments and surveys to include tax collectors and taxpayers' practices. The text explores the view of taxes seen as citizen'...
Platform Embedded Security Technology Revealed
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects applicati...
Anti-fragile ICT Systems
This book introduces a novel approach to the design and operation of large ICT systems. It views the technical solutions and their stakeholders as complex adaptive systems and argues that traditional risk analyses cannot predict all future incidents with major impacts. To avoid unacceptable events, it is necessary to establish and operate anti-frag...
Mediation in Collective Labor Conflicts
This book opens up the black box of mediation in collective conflicts through the analyses and comparisons of various systems. Mediation and related third party interventions such as conciliation and facilitation are discussed as effective prevention and regulation tools for different types of collective labor conflicts. These interventions fit in...
Taking the EU to Court
This book provides an exhaustive picture of the role that annulment conflicts play in the EU multilevel system. Based on a rich dataset of annulment actions since the 1960s and a number of in-depth case studies, it explores the political dimension of annulment litigation, which has become an increasingly relevant judicial tool in the struggle over ...
Community-Oriented Policing and Technological Innovations
This Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing efforts. "Community-oriented policing" is an approach that encourages police to develop and maintain personal relationships with citizens and community organizations. By developing these partnerships, the goal is to...
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Promoting Social Dialogue in European Organizations
This volume focuses on describing the social dialogue system in organizations from an Human Resources Management perspective. Based on the NEIRE model for industrial relations, key factors are determined contributing to creative social dialogue in European organizations. Actual data from surveys and interviews from more than 700 CEO and HR managers...
Wellbeing and Devolution
"In this book, Wallace elegantly shows how committed government intervention can improve wellbeing with rigour and impact. It's an essential read for anyone concerned with the future of the UK."Julia Unwin, CBE"As someone who commissioned one of the first attempts to learn from the devolved nations I am delighted to see this publicat...
Societal Implications of Community-Oriented Policing and Technology
This Brief presents new approaches and innovative challenges to address bringing technology into community-oriented policing efforts. "Community-oriented policing" is an approach that encourages police to develop and maintain personal relationships with citizens and community organizations. By developing these partnerships, the goal is to...
Blockchain and Crypt Currency
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Policing and Minority Communities
This insightful book examines the allegations against the professionalism, transparency, and integrity of law enforcement toward minority groups, from a global perspective. It addresses the challenges inherent in maintaining strong ties with members of the community, and draws attention to obstacles in ensuring public confidence and trust in rule o...
The AI Ladder
The processes for gathering, organizing, analyzing, and ultimately infusing AI throughout your organization can be thought of as a ladder. A ladder helps you climb far higher than you could go on your own by turning an impossible leap into a series of steps. Knowing what the ladder looks like helps you evaluate your organization's readiness for AI....
Working with a Personal Assistant
A truly effective assistant knows their manager's priorities, concerns and responsibilities as well as they do themselves. They know how to make their manager more effective, and how to help them add value. They work alongside their manager as part of a tight-knit, high-functioning team, sharing a single purpose and workload. Of all teams, of all w...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Fallibility at Work
'This is an exciting, groundbreaking book. With an astonishing array of examples and a brilliant eye for the essential, Øyvind Kvalnes takes the Socratic motto of knowing yourself to our everyday lives in the workplace. Applied philosophy at its best, the book will affect the way you do your work and live your life.'—Professor Esa Saarinen, Aalt...
Pragmatic Philanthropy
This cutting edge text considers how Asian philanthropists and charitable organizations break with Western philanthropic traditions and examines the key traits and trends that make social investment in Asia unique. Based on 30 case studies of excellent social delivery organizations (SDOs) and social enterprises as well as interviews with ultra-high...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Managing...
Equitable Research Partnerships
This book offers insights into the development of the ground-breaking Global Code of Conduct for Research in Resource-Poor Settings (GCC) and the San Code of Research Ethics. Using a new, intuitive moral framework predicated on fairness, respect, care and honesty, both codes target ethics dumping - the export of unethical research practices from a ...
A Time for Metabolism and Hormones
Recent years have seen spectacular advances in the field of circadian biology. These have attracted the interest of researchers in many fields, including endocrinology, neurosciences, cancer, and behavior. By integrating a circadian view within the fields of endocrinology and metabolism, researchers will be able to reveal many, yet-unsuspected aspe...
Knowledge and Networks
This book discusses a core question in many fields of the social sciences, namely how to create, share and adopt new knowledge. It creates an original space for conversation between two lines of research that have developed largely in parallel for a long time: social network theory and the geography of knowledge. This book considers that relational...
Data-Driven Policy Impact Evaluation
In the light of better and more detailed administrative databases, this book provides statistical tools for evaluating the effects of public policies advocated by governments and public institutions. Experts from academia, national statistics offices and various research centers present modern econometric methods for an efficient data-driven policy...
Multi-dimensional Approaches Towards New Technology
This open access edited book captures the complexities and conflicts arising at the interface of intellectual property rights (IPR) and competition law. To do so, it discusses four specific themes: (a) policies governing functioning of standard setting organizations (SSOs), transparency and incentivising future innovation; (b) issue of royalties fo...
The Third Sector as a Renewable Resource for Europe
This book provides a critical account of the third sector and its future in Europe. It offers an original conceptualization of the third sector in its European manifestations alongside an overview of its major contours, including its structure, sources of support, and recent trends. It also assesses the impact of this sector in Europe which conside...
Reflections on the Fukushima Daiichi Nuclear Accident
This book focuses on nuclear engineering education in the post-Fukushima era. It was edited by the organizers of the summer school held in August 2011 in University of California, Berkeley, as part of a collaborative program between the University of Tokyo and UC Berkeley. Motivated by the particular relevance and importance of social-scientific ap...
Leading in a VUCA World
This book brings together works by specialists from different disciplines and continents to reflect on the nexus between leadership, spirituality and discernment, particularly with regard to a world that is increasingly volatile, uncertain, complex, and ambiguous (VUCA). The book spells out, first of all, what our VUCA world entails, and how it aff...
Observing the Volcano World
This book provides a comprehensive overview of volcanic crisis research, the goal being to establish ways of successfully applying volcanology in practice and to identify areas that need to be addressed for future progress. It shows how volcano crises are managed in practice, and helps to establish best practices. Consequently the book brings toge...

1 2 3