This monograph contributes to the scientific misconduct debate from an oblique perspective, by analysing seven novels devoted to this issue, namely: Arrowsmith by Sinclair Lewis (1925), The affair by C.P. Snow (1960), Cantor's Dilemma by Carl Djerassi (1989), Perlmann's Silence by Pascal Mercier (1995), Intuition by Allegra Goodman (2006...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
This open access book offers a timely guide to challenges and current practices to permanently plug and abandon hydrocarbon wells. With a focus on offshore North Sea, it analyzes the process of plug and abandonment of hydrocarbon wells through the establishment of permanent well barriers. It provides the reader with extensive knowledge on the type ...
Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment.
Too often as deve...
Database Design, 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
Topics include:The history of databases; Characteristics and benefits of databases; Data models; Data modelling; Classification of database management...
Platform Embedded Security Technology Revealed is an in-depth introduction to Intel's platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management functionalities and protects appl...
The objective of this book is to broadly illustrate the key aspects of water governance, mapping the spectrum of decision-making from techno-centric and eco-centric approaches, to hybrid concepts and people-centric approaches. Topics covered include the challenges for water-governance models, the polycentric model, the integration challenge, water ...
This book offers insights into the development of the ground-breaking Global Code of Conduct for Research in Resource-Poor Settings (GCC) and the San Code of Research Ethics. Using a new, intuitive moral framework predicated on fairness, respect, care and honesty, both codes target ethics dumping - the export of unethical research practices from a ...
This book explores the social history of the anti-vivisection movement in Britain from its nineteenth-century beginnings until the 1960s. It discusses the ethical principles that inspired the movement and the socio-political background that explains its rise and fall. Opposition to vivisection began when medical practitioners complained it was cont...
This book begins with an algorithm - a set of IF...THEN rules used in the development of a new, ethical, video surveillance architecture for transport hubs. Readers are invited to follow the algorithm over three years, charting its everyday life. Questions of ethics, transparency, accountability and market value must be grasped by the algorithm in ...
The InfoSec Handbook offers the reader an organized layout of information that is easily read and understood. Allowing beginners to enter the field and understand the key concepts and ideas, while still keeping the experienced readers updated on topics and concepts.
It is intended mainly for beginners to the field of information security, writte...
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Inte...
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
This book is an open access publication.Forest ecosystems in Central Europe are changing as a result of anthropogenic influences and changing climate conditions. As such, a large-scale monitoring programme was undertaken in order to understand the influence of site modification, deposition of air pollutants, and climate.
This book presents the sci...
This book focuses on the origins, consequences and aftermath of the 1995 and 1999 Western military interventions that led to the end of the most recent Balkan wars. Though challenging problems remain in Bosnia, Macedonia, Kosovo, and Serbia, the conflict prevention and state-building efforts thereafter were partly successful as countries of the reg...
This book features essays written by philosophers, biologists, ecologists and conservation scientists facing the current biodiversity crisis. Despite increasing communication, accelerating policy and management responses, and notwithstanding improving ecosystem assessment and endangered species knowledge, conserving biodiversity continues to be mor...
This free book provides up-to-date information on best practice to improve experimental design and quality of research in non-clinical pharmacology and biomedicine....
Theory without practice is empty, practice without theory is blind, to adapt a phrase from Immanuel Kant. The sentiment could not be truer of cultural heritage ethics. This intra-disciplinary book bridges the gap between theory and practice by bringing together a stellar cast of academics, activists, consultants, journalists, lawyers, and museum pr...
If you've designed your SQL code intelligently and implemented a sensible indexing strategy, there's a good chance your queries will "fly", when tested in isolation. In the real world, however, where multiple processes can access the same data at the same time, SQL Server often has to make one process wait, sacrificing concurren...
This insightful book examines the allegations against the professionalism, transparency, and integrity of law enforcement toward minority groups, from a global perspective. It addresses the challenges inherent in maintaining strong ties with members of the community, and draws attention to obstacles in ensuring public confidence and trust in rule o...
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Social media is at the core of digital transformations in organizations. Facebook, Twitter, LinkedIn, and other social media platforms widen the scope for rapid and effective communication with stakeholders. They also create a range of new and challenging ethical dilemmas.This open access book categorizes the dilemmas organizations across a range o...
Effective Research Data Management (RDM) is a key component of research integrity and reproducible research, and its importance is increasingly emphasised by funding bodies, governments, and research institutions around the world. However, many researchers are unfamiliar with RDM best practices, and research support staff are faced with the difficu...
This open access book offers a practical guide into research ethics for undergraduate students in the social sciences. A step-by-step approach of the most viable issues, in-depth discussions of case histories and a variety of didactical tools will aid the student to grasp the issues at hand and help him or her develop strategies to deal with them.T...
Node.js is built on top of the Google Chrome V8 JavaScript engine, and it's mainly used to create web servers - but it's not limited to that.
The Node.js Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. The author find this approach gives a well-rounded overview....
Academic Success is designed to help students on their university journey. It is divided into four parts, each reflecting different aspects of a student's tertiary experience. Part A: Successful Beginnings addresses what it is like to be a new student at an Australian university. Part B: Successful Foundations introduces basic skills in Englis...
Network and System Administration usually refers only to the traditional skills and recipes for keeping computers and networks running properly. But, in truth, this view omits the most important part of the system: humans. The skill needed to comprehend and tame systems comprising both humans and machines is that of managing complexity. In this boo...
This open textbook supports the learning outcomes of Fanshawe College's Advanced Professional Communications curriculum (COMM 6019). Organized in five major units - Foundational Principles of Business Messaging, The Principles of Business Style, Format, and Composition, The Principles of Social, Cultural and Employment Communication, The Princ...