Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Wellbeing Economics
Economists have long sought to maximise economic growth, believing this to be their best contribution to improving human welfare. That approach is not sustainable in the face of ongoing issues such as global climate change, environmental damage, rising inequality and enduring poverty. Alternatives must be found. This book addresses that challenge....
Service Design Capabilities
This open book discusses service design capabilities in innovation processes, and provides a framework that guides design students, practitioners and researchers towards a better understanding of operational aspects of service design processes. More specifically, it revisits service designers' capabilities in light of the new roles that have o...
Making Medicines in Africa
The importance of the pharmaceutical industry in Sub-Saharan Africa, its claim to policy priority, is rooted in the vast unmet health needs of the sub-continent. Making Medicines in Africa is a collective endeavour, by a group of contributors with a strong African and more broadly Southern presence, to find ways to link technological development, i...
Managing Risk and Information Security
Examine the evolving enterprise security landscape and discover how to manage and survive risk. While based primarily on the author's experience and insights at major companies where he has served as CISO and CSPO, the book also includes many examples from other well-known companies and provides guidance for a management-level audience. Man...
A Philosophical Examination of Social Justice and Child Poverty
This book investigates child poverty from a philosophical perspective. It identifies the injustices of child poverty, relates them to the well-being of children, and discusses who has a moral responsibility to secure social justice for children....
Demystifying Internet of Things Security
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Inte...
Building the Inclusive City
"A landmark study showing how empirical work, through the methodology of the social sciences, can come into contact with political philosophy and disability studies so as to make a meaningful contribution to policy. Dr. Victor Santiago Pineda's work will be read for decades, as a foundation for future research on the application of the ca...
Microsoft Platform and Tools for Mobile App Development
Understanding and creating a mobile app development strategy is an important process for today's development decision-makers opening up new business opportunities or empowering employees to be more productive with new capabilities. Microsoft defines an end-to-end platform for the agile creation of mobile apps that can target any platform (iOS,...
Configuring Microsoft SharePoint Hybrid Capabilities
Microsoft SharePoint hybrid consists of a growing list of advanced hybrid solutions that empowers organizations to consume benefits of the cloud and maintain their on-premises investments. This book is the second in a series of SharePoint hybrid books in which we show you how to configure, troubleshoot, and manage a SharePoint hybrid environment. ...
Planning and Preparing for Microsoft SharePoint Hybrid
Microsoft SharePoint hybrid deployments are rapidly becoming popular with Microsoft's investments on increased SharePoint productivity, not only in your own environment (on-premises) but also collaborating in new ways through the largest and most advanced cloud service platform in the world - Microsoft Office 365 and Microsoft Azure. SharePoin...
Python Data Science Handbook
For many researchers, Python is a first-class tool mainly because of its libraries for storing, manipulating, and gaining insight from data. Several resources exist for individual pieces of this data science stack, but only with the Python Data Science Handbook do you get them all - IPython, NumPy, Pandas, Matplotlib, Scikit-Learn, and other relate...
NL ARMS Netherlands Annual Review of Military Studies 2020
This open volume surveys the state of the field to examine whether a fifth wave of deterrence theory is emerging. Bringing together insights from world-leading experts from three continents, the volume identifies the most pressing strategic challenges, frames theoretical concepts, and describes new strategies. The use and utility of deterrence in...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Sensor Technologies
Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains. ...
Contested Childhoods: Growing up in Migrancy
This book explores specific migration, governance, and identity processes currently involving children and ideas of childhood. Migrancy as a social space allows majority populations to question the capabilities of migrants, and is a space in which an increasing number of children are growing up. In this space, families, nation-states, civil society...
Ray Tracing Gems
This book is a must-have for anyone serious about rendering in real time. With the announcement of new ray tracing APIs and hardware to support them, developers can easily create real-time applications with ray tracing as a core component. As ray tracing on the GPU becomes faster, it will play a more central role in real-time rendering. Ray Tracing...
Limits to the European Union's Normative Power in a Post-conflict Society
By shedding light on EULEX - the EU mission to Kosovo – this book investigates the EU's peacebuilding activities in that country, in the light of the normative power theory in the post-conflict setting and peacebuilding theory. Ten years after the massive engagement of the EU in the country torn by war, the authors critically assess the effe...
TouchDevelop
Mobile devices such as smartphones and tablets are set to become the main computers that virtually all people will own and carry with them at all times. And yet,mobile devices are not yet used for all computing tasks. A project at Microsoft Research was created to answer a simple question: "It is possible to create interesting apps directly on...
Intel Xeon Phi Coprocessor Architecture and Tools
Intel Xeon Phi Coprocessor Architecture and Tools: The Guide for Application Developers provides developers a comprehensive introduction and in-depth look at the Intel Xeon Phi coprocessor architecture and the corresponding parallel data structure tools and algorithms used in the various technical computing applications for which it is suitable. It...
Synchronized Factories
The objective of this report is to examine the extent to which countries in Latin America and the Caribbean participate in global value chains and what are the drivers of such participation. Production processes have been increasingly fragmented worldwide. For example, the production of the Boeing 787 Dreamliner involves 43 suppliers located in 13...
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
eIoT
This book explores the collision between the sustainable energy transition and the Internet of Things (IoT). In that regard, this book's arrival is timely. Not only is the Internet of Things for energy applications, herein called the energy Internet of Things (eIoT), rapidly developing but also the transition towards sustainable energy to abat...
S-BPM in the Production Industry
This volume presents several case studies highlighting the latest findings in Industry 4.0 projects utilizing S-BPM features. Their potential is explored in detail, while the limits of engineering a company from a communication-centred perspective are also discussed. After a general introduction and an overview of the book in chapter 1, chapter 2 ...
Mobile Professional Voluntarism and International Development
This book explores the impact that professional volunteers have on the low resource countries they choose to spend time in. Whilst individual volunteering may be of immediate benefit to individual patients, this intervention may have detrimental effects on local health systems; distorting labour markets, accentuating dependencies and creating oppor...
Energy Efficient Servers
Energy Efficient Servers: Blueprints for Data Center Optimization introduces engineers and IT professionals to the power management technologies and techniques used in energy efficient servers. The book includes a deep examination of different features used in processors, memory, interconnects, I/O devices, and other platform components. It outline...
Solar Particle Radiation Storms Forecasting and Analysis
Solar energetic particles (SEPs) emitted from the Sun are a major space weather hazard motivating the development of predictive capabilities. This book presents the results and findings of the HESPERIA (High Energy Solar Particle Events forecasting and Analysis) project of the EU HORIZON 2020 programme. It discusses the forecasting operational tool...
Software Above the Level of a Single Device
When considering "the Internet of Things," it's easy to miss the bigger pattern: we are no longer just building software for individual devices, but creating networks of intelligence and action that make it possible to completely rethink how we organize work, play, and society itself. This report provides the complete text of Tim O&#...
Migrating Big Data Analytics into the Cloud
Just how strong is the movement of big data analytics to the cloud? This report, based on a survey by O'Reilly data analyst John King, reveals that the desire among corporations to adopt big data-as-a-service is gaining momentum-and that many organizations with big data cloud experience are likely to expand their use. King's recent sur...
RavenDB in Action
The data you encounter in the real world is usually easier to think of as objects or documents than as the tables and rows required by a standard RDBMS. RavenDB, a modern document-oriented database written in .NET, requires no schema to be declared and enables developers to work with data more naturally. RavenDB applications are high-performance, l...
Exploring .NET Core
Windows developers have always enjoyed the productivity boost you get with the .NET platform, tools like Entity Framework and ASP.NET, and the amazingly-powerful C# language. Now, .NET Core extends those same benefits to Linux-based systems, offering a true cross-platform solution for enterprise application development. The .NET Core tools, includi...
Wellbeing, Freedom and Social Justice
How do we evaluate ambiguous concepts such as wellbeing, freedom, and social justice? How do we develop policies that offer everyone the best chance to achieve what they want from life? The capability approach, a theoretical framework pioneered by the philosopher and economist Amartya Sen in the 1980s, has become an increasingly influential way to ...
International Cooperation for Enhancing Nuclear Safety, Security, Safeguards and Non-proliferation–60 Years of IAEA and EURATOM
This book examines key aspects of international cooperation to enhance nuclear safety, security, safeguards, and non-proliferation, thereby assisting in development and maintenance of the verification regime and fostering progress toward a nuclear weapon-free world. The book opens by addressing important political, institutional, and legal dimensio...

1 2 3