Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Guide to Computer Network Security
This definitive text/reference on computer network and information security presents a comprehensive guide to the repertoire of security tools, algorithms and best practices mandated by the rapidly evolving ubiquitous technology we are increasingly dependent on. Fully revised and updated, this timely new edition encompasses the latest developments ...
Travel Marketing, Tourism Economics and the Airline Product
This book provides a comprehensive introduction to travel marketing, tourism economics and the airline product. At the same time, it provides an overview on the political, socio-economic, environmental and technological impacts of tourism and its related sectors.This publication covers both theory and practice in an engaging style, that will spark ...
Business Process Flow Mapping Succinctly
In a company, when the business process is defined, employees feel confident in their roles. They understand expectations and can easily identify when something is amiss or requires escalation. In Business Process Flow Mapping Succinctly, Erica Quigley will show you the activities that should occur in order to completely define a business process s...
React in patterns
This book about common design patterns / techniques used while developing with React. It includes techniques for composition, data flow, dependency management and more....
Microservices Best Practices for Java
Microservices is an architectural style in which large, complex software applications are composed of one or more smaller services. Each of these microservices focuses on completing one task that represents a small business capability. These microservices can be developed in any programming language. This book covers Microservices best practices fo...
Peace and Democratic Society
Recent acts of terrorism and the current unrest in the Middle East remind us how important it is to understand the relationship between violence, peace and democracy. In a challenging and insightful essay, Amartya Sen explores ideas around 'organised violence' (such as war, genocide and terrorism) and violence against the individual. High...
Social Theory after the Internet
The internet has fundamentally transformed society in the past 25 years, yet existing theories of mass or interpersonal communication do not work well in understanding a digital world. Nor has this understanding been helped by disciplinary specialization and a continual focus on the latest innovations. Ralph Schroeder takes a longer-term view, synt...
How the World Changed Social Media
How the World Changed Social Media is the first book in Why We Post, a book series that investigates the findings of anthropologists who each spent 15 months living in communities across the world. This book offers a comparative analysis summarising the results of the research and explores the impact of social media on politics and gender, educatio...
Rhetorical Code Studies
Software developers work rhetorically to make meaning through the code they write. In some ways, writing code is like any other form of communication; in others, it proves to be new, exciting, and unique. In Rhetorical Code Studies, Kevin Brock explores how software code serves as meaningful communication through which software developers construct...
Cultural Crowdfunding
This new book analyses the strategies, usages and wider implications of crowdsourcing and crowdfunding platforms in the culture and communication industries that are reshaping economic, organizational and social logics. Platforms are the object of considerable hype with a growing global presence. Relying on individual contributions coordinated by s...
25 Years of Ed Tech
In this lively and approachable volume based on his popular blog series, Martin Weller demonstrates a rich history of innovation and effective implementation of ed tech across higher education. From Bulletin Board Systems to blockchain, Weller follows the trajectory of education by focusing each chapter on a technology, theory, or concept that has ...
R for Data Science
Learn how to use R to turn raw data into insight, knowledge, and understanding. This book introduces you to R, RStudio, and the tidyverse, a collection of R packages designed to work together to make data science fast, fluent, and fun. Suitable for readers with no previous programming experience, R for Data Science is designed to get you doing data...
XcalableMP PGAS Programming Language
XcalableMP is a directive-based parallel programming language based on Fortran and C, supporting a Partitioned Global Address Space (PGAS) model for distributed memory parallel systems. This open book presents XcalableMP language from its programming model and basic concept to the experience and performance of applications described in XcalableMP.�...
The Science of Citizen Science
This open book discusses how the involvement of citizens into scientific endeavors is expected to contribute to solve the big challenges of our time, such as climate change and the loss of biodiversity, growing inequalities within and between societies, and the sustainability turn. The field of citizen science has been growing in recent decades. Ma...
Data Parallel C++
Learn how to accelerate C++ programs using data parallelism. This open book enables C++ programmers to be at the forefront of this exciting and important new development that is helping to push computing to new levels. It is full of practical advice, detailed explanations, and code examples to illustrate key topics. Data parallelism in C++ enables...
The Evolutionary Dynamics of Discursive Knowledge
This open book have three themes have been central to Leydesdorff's research: (1) the dynamics of science, technology, and innovation; (2) the scientometric operationalization of these concept; and (3) the elaboration in terms of a Triple Helix of university-industry-government relations. In this study, I discuss the relations among these them...
Cyber-Physical Systems: A Model-Based Approach
In this concise yet comprehensive open book, future inventors are introduced to the key concepts of Cyber-Physical Systems (CPS). Using modeling as a way to develop deeper understanding of the computational and physical components of these systems, one can express new designs in a way that facilitates their simulation, visualization, and analysis. ...
The Impact of Digital Technologies on Public Health in Developed and Developing Countries
This open access book constitutes the refereed proceedings of the 18th International Conference on String Processing and Information Retrieval, ICOST 2020, held in Hammamet, Tunisia, in June 2020.* The 17 full papers and 23 short papers presented in this volume were carefully reviewed and selected from 49 submissions. They cover topics such as: Io...
Simplified Signs, Volume 2
Simplified Signs presents a system of manual sign communication intended for special populations who have had limited success mastering spoken or full sign languages. It is the culmination of over twenty years of research and development by the authors. The Simplified Sign System has been developed and tested for ease of sign comprehension, memoriz...
The Vue.js Handbook
Vue.js is a very impressive project. It's a very popular JavaScript framework, one that's experiencing a huge growth. It is simple, tiny and very performant. The Vue.js Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. The author find this approach gives a well-rounded overview....
Arab Media Systems
This open volume provides a comparative analysis of media systems in the Arab world, based on criteria informed by the historical, political, social, and economic factors influencing a country's media. Reaching beyond classical western media system typologies, Arab Media Systems brings together contributions from experts in the field of media ...
The Power of Our Words
Do you know that an empowering word can spark ideas, open doors, change attitudes, and create solutions? Words can do all these things and much more. They have the potency to redefine personalities, lives, and entire communities. Just think of some of the things words are used for every day: - To communicate a message - To express a feeling -...
Tutorials of Visual Graphic Communication Programs for Interior Design
This open book is for the beginning level of both architecture and interior design students who learn computer graphic communication software. The author developed multiple tutorials to teach three computer graphic applications, AutoCAD, Revit, and Enscape. AutoCAD is an essential computer drafting software which is 2D drawing software. Revit is a ...
Defend Dissent
Defend Dissent is an introduction to cryptography paired with the social impacts of surveillance and the protective potential of encryption, with a focus on US social movements. Each chapter ends with a story that brings social context to the material - from surveillance used against contemporary US protests to the African National Congress's ...
HackSpace Magazine: Issue 54
What could be more satisfying than building a whole computer, from scratch? You might think it's impossible these days, but we've found a band of makers who are re-creating the clicky switches and flashing LEDs of a bygone age. Have a go yourself! - Design, sustainability and ethics with Jude Pullen; - Add much-needed safety features ...
Project Management
The world has become more complicated with the introduction and development of new technologies and methods, and novel risks such as Covid-19 pandemic. Competition has been tougher than it used to be. Organizations strive to keep up with the changes in the internal and external environment. In the light of unprecedented changes, project managers mu...
Policy-Oriented Technology Assessment Across Europe: Expanding Capacities
Policy-making to address grand challenges faces greater complexity than any previous project of modernization. Future scenarios are haunted by uncertainty and there is real ambivalence as to the values that policy should strive for. In this situation decision-makers look to research and innovation to provide answers and solutions. But neither can t...
Managing Risk and Information Security
Managing Risk and Information Security: Protect to Enable, an ApressOpen title, describes the changing risk environment and why a fresh approach to information security is needed. Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while m...
Fallibility at Work
'This is an exciting, groundbreaking book. With an astonishing array of examples and a brilliant eye for the essential, Øyvind Kvalnes takes the Socratic motto of knowing yourself to our everyday lives in the workplace. Applied philosophy at its best, the book will affect the way you do your work and live your life.'—Professor Esa Saar...
Manifesto of the New Economy
How do social networking services earn money?What is the "second hand of the market" and how does it operate? Why does society need so many different kinds of goods? What does happiness economics not reveal about happiness?What is the link between talent, success and "stardom"? What is the business development model for the ent...
Environmental Leadership Capacity Building in Higher Education
The Graduate Program in Sustainability Science under the Department of Urban Engineering of The University of Tokyo has been running an environmental leadership education program at the graduate student level since 2007 called the Asian Program for Incubation of Environmental Leaders (APIEL). This book describes the University's experiences in...
A History of Self-Harm in Britain
This book fall of various self-harming behaviours in twentieth-century Britain. It puts self-cutting and overdosing into historical perspective, linking them to the huge changes that occur in mental and physical healthcare, social work and wider politics....

1 2 3 4 5 ... 9