This textbook focuses on the criminality and victimization of the elderly population. It provides a global perspective on the extent of elderly crime and victimization, with international comparisons for addressing the problem. It explores the extent and types of crimes committed by the elderly, the characteristics of older criminals, and the respo...
Pro Git, 2nd Edition is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro.
Effective and well-implemented v...
This book presents a strong philosophical, theoretical and practical argument for the mainstreaming of indigenous knowledge in curricula development, and in teaching and learning across the African continent. Since the dawn of political independence in Africa, there has been an ongoing search for the kind of education that will create a class of pr...
This book provides an overview of Felix Klein's ideas, highlighting developments in university teaching and school mathematics related to Klein's thoughts, stemming from the last century. It discusses the meaning, importance and the legacy of Klein's ideas today and in the future, within an international, global context. Presenting e...
Missy Maker is a middle school girl who loves math and fashion. She sees math in everything she does. She tries to hide this from her friends, because she thinks it's too geeky. Missy hears that the school math club needs more members, but she's worried about what her friends will think if she joins, and she's already committed to jo...
This book examines the magnitude, causes of, and reactions to white-collar crime, based on the theories and research of those who have uncovered various forms of white-collar crime. It argues that the offenders who are convicted represent only 'the tip of the iceberg' of a much greater problem: because white-collar crime is forced to comp...
"In this book, Wallace elegantly shows how committed government intervention can improve wellbeing with rigour and impact. It's an essential read for anyone concerned with the future of the UK."Julia Unwin, CBE"As someone who commissioned one of the first attempts to learn from the devolved nations I am delighted to see this pub...
With technology standards becoming increasingly common, particularly in the information and communications technology (ICT) sector, the complexities and contradictions at the interface of intellectual property law and competition law have emerged strongly. This book talks about how the regulatory agencies and courts in the United States, European U...
This is the first book-length exploration of the thoughts and experiences expressed by dementia patients in published narratives over the last thirty years. It contrasts third-person caregiver and first-person patient accounts from different languages and a range of media, focusing on the poetical and political questions these narratives raise: wha...
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment.
Too often as deve...
The SQL Server 2016 In-Memory OLTP engine (a.k.a. Hekaton) is designed to exploit terabytes of available memory and high numbers of processing cores. It allows us to work with memory-optimized tables and indexes, and natively compiled stored procedures, in addition to the disk-based tables and indexes, and T-SQL stored procedures, that SQL Server h...
If you've designed your SQL code intelligently and implemented a sensible indexing strategy, there's a good chance your queries will "fly", when tested in isolation. In the real world, however, where multiple processes can access the same data at the same time, SQL Server often has to make one process wait, sacrificing concurren...
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs - the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team ...
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers Subversion 1.7 with a complete introduction and guided tour of its capabilities, along with best practice recommendations.
Version Control with Subve...
This open book provides the first-ever comparative study on criminal policy concerning the illicit trade of tobacco, conducted among four comparatively new EU Member States (Lithuania, Poland, Slovakia and Romania) and two "old" EU countries (Germany and Italy). The book addresses the national legal frameworks, current criminological situ...
It took me a pretty long time to really get Git. As I've continued to use Git more and more where I work, I've found myself trying to teach people what it is and why we use it over and over again, and the reality is that Git generally has a pretty steep learning curve compared to many other systems. I've seen case after case of devel...