In this open access publication, the social cohesion of urban neighborhoods and their residents is examined, which is often viewed as vulnerable since increased mobility, individualization, wider socio-economic and demographic changes have fundamentally altered the basis for everyday social interaction in urban neighborhoods. Anna Steigemann gives ...
Fundamentals of Business, 2nd Edition is an 372-page open education resource intended to serve as a no-cost, faculty customizable primary text for one-semester undergraduate introductory business courses. It covers the following topics in business: Teamwork; economics; ethics; entrepreneurship; business ownership, management, and leadership; organi...
Theory without practice is empty, practice without theory is blind, to adapt a phrase from Immanuel Kant. The sentiment could not be truer of cultural heritage ethics. This intra-disciplinary book bridges the gap between theory and practice by bringing together a stellar cast of academics, activists, consultants, journalists, lawyers, and museum pr...
Exploring Business introduces students to business roles and concepts in an exciting way. This text will help you decide whether business is right for you and, if so, what areas of business you'd like to study further.
Exploring Business is adapted from a work produced by a publisher who has requested that they and the original author not r...
This book contributes to the creation of a cyber ecosystem supported by blockchain technology in which technology and people can coexist in harmony. Blockchains have shown that trusted records, or ledgers, of permanent data can be stored on the Internet in a decentralized manner. The decentralization of the recording process is expected to signific...
Coffeeshops are the most famous example of Dutch tolerance. But in fact, these cannabis distributors are highly regulated. Coffeeshops are permitted to break the law, but not the rules. On the premises, there cannot be minors, hard drugs or more than 500 grams. Nor can a coffeeshop advertise, cause nuisance or sell over five grams to a person in a ...
This open book presents recent research and hot topics in the field of real estate science in Japan. It features carefully selected English translations of peer-reviewed papers and excellent articles published in the Japanese Journal of Real Estate Sciences, as well as papers presented at the Japan Association of Real Estate Sciences (JARES) annual...
This open volume provides a comparative analysis of media systems in the Arab world, based on criteria informed by the historical, political, social, and economic factors influencing a country's media. Reaching beyond classical western media system typologies, Arab Media Systems brings together contributions from experts in the field of media ...
Drawing on Indigenous peoples' struggles against settler colonialism, Theft Is Property! reconstructs the concept of dispossession as a means of explaining how shifting configurations of law, property, race, and rights have functioned as modes of governance, both historically and in the present. Through close analysis of arguments by Indigenou...
Every four years, Schaeffler provides an insight into its latest developments and technologies from the engine, transmission and chassis as well as hybridization and electric mobility sectors. In 2014 the Schaeffler Symposium with the motto "Solving the Powertrain Puzzle" took place from 3th to 4th of April in Baden-Baden. Mobility for to...
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value is the first book of its kind, offering industry-proven solutions that go beyond mere theory and adding lucid perspectives on the challenges and opportunities raised with the emerging "personal" information economy.
The authors, a uniquely skilled team of...
Written for the IT professional and business owner, this book provides the business and technical insight necessary to migrate your business to the cloud using Microsoft Office 365. This is a practical look at cloud migration and the use of different technologies to support that migration. Numerous examples of cloud migration with technical migrati...
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out.
Simply put, this book is designed to empower and excite the programming community to go out and do co...
This book highlights the ethical issues and dilemmas that arise in the practice of public health. It is also a tool to support instruction, debate, and dialogue regarding public health ethics. Although the practice of public health has always included consideration of ethical issues, the field of public health ethics as a discipline is a relatively...
Rethinking the Internet of Things was a 2014 Jolt Award Finalist, the highest honor for a programming book. And the amazing part is that there is no code in the book.
Over the next decade, most devices connected to the Internet will not be used by people in the familiar way that personal computers, tablets and smart phones are. Billions of inter...
This book summarizes the results of 3 years of agricultural and forestry reconstructive efforts and applied research conducted directly in the affected areas of Fukushima following the Great East Japan Earthquake. It describes fast and effective revival methods and technologies from tsunami and radiation damages, demonstrated through the collaborat...
This book discusses how Norwegian shipping companies played a crucial role in global shipping markets in the 20th century, at times transporting more than ten per cent of world seaborne trade. Chapters explore how Norway managed to remain competitive, despite being a high labour-cost country in an industry with global competition. Among the feature...
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
This book addresses the issue of diffusing sustainable energy access inlow- and middle-income contexts.
Access to energy is one of the greatest challenges for many people living in low-income and developing contexts, as around 1.4 billion people lack access to electricity.Distributed Renewable Energy systems (DRE) are considered a promising approa...
Exploring indigenous life projects in encounters with extractivism, the present open access volume discusses how current turbulences actualise questions of indigeneity, difference and ontological dynamics in the Andes and Amazonia. While studies of extractivism in South America often focus on wider national and international politics, this contribu...
How does technology impact research practices in the humanities? How does digitisation shape scholarly identity? How do we negotiate trust in the digital realm? What is scholarship, what forms can it take, and how does it acquire authority?
This diverse set of essays demonstrate the importance of asking such questions, bringing together establis...
This open access book focuses on the development of methods, interoperable and integrated ICT tools, and survey techniques for optimal management of the building process. The construction sector is facing an increasing demand for major innovations in terms of digital dematerialization and technologies such as the Internet of Things, big data, advan...
A modern web-marketing book that outlines a multi-modal system for growing a website with SEO, Google AdWords/Facebook Ads, Conversion Optimisation, Copywriting/Classic Persuasion/Behavioural Psychology, Google Analytics, Statistical Significance, Email Marketing, and Remarketing. When I launched my first web application it started off with zero tr...
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
This fourth Edition presents new examples on submodules, derived type i/o, object oriented programming, abstract interfaces and procedure pointers, C interop, sorting and searching, statistics and converting to more modern versions of Fortran.Key FeaturesHighlights the core language features of modern Fortran including data typing, array processing...
This book is exceptional in the sense that it provides an introduction to law in general rather than the law of one specific jurisdiction, and it presents a unique way of looking at legal education. It is crucial for lawyers to be aware of the different ways in which societal problems can be solved and to be able to discuss the advantages and disad...
In this book, we describe the components of a launch plan at Google and offer practical methods you might apply to reduce production launch risks for your own products. We include lessons we have learned about what works well for launching Google products, including large products, new features for existing products, and even small products. The le...
Irresponsible ownership of data is the cause of many leaked emails, data, and other damaging information. Securing a user's personal information is the job of software developers. If you, as a developer, can decrypt the information stored in the database of the system you are working on, then so can anyone else. In Cryptography in .NET Succinc...
Illicit financial flows constitute a global phenomenon of massive but uncertain scale, which erodes government revenues and drives corruption in countries rich and poor. In 2015, the countries of the world committed to a target to reduce illicit flows, as part of the UN Sustainable Development Goals. But five years later, there is still no agreemen...
This open access book provides a detailed exploration of the British media coverage of the press reform debate that arose from the News of the World phone hacking scandal and the Leveson Inquiry. Gathering data from a content analysis of 870 news articles, Ogbebor shows how journalists cover debates on media policy and illustrates the impact of the...
The Linux Commands Handbook follows the 80/20 rule: learn in 20% of the time the 80% of a topic. The author find this approach gives a well-rounded overview.
This book does not try to cover everything under the sun related to Linux and its commands. It focuses on the small core commands that you will use the 80% or 90% of the time, trying to sim...
This open book summarizes the first two decades of the NII Testbeds and Community for Information access Research (NTCIR). NTCIR is a series of evaluation forums run by a global team of researchers and hosted by the National Institute of Informatics (NII), Japan. The book is unique in that it discusses not just what was done at NTCIR, but also how ...