Describes a new plan to improve the current election system under which every voter gains and no state loses its current Electoral College benefits, which has a chance to be introduced in the form of a constitutional amendment.
Provides explanations of why the National Popular Vote plan may violate the Equal Protection Clause from the Fourteenth A...
Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth.
The IoT presents unique challenges in implementing security and Inte...
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
This book surveys the frontier of scientific river research and provides examples to guide management towards a sustainable future of riverine ecosystems. Principal structures and functions of the biogeosphere of rivers are explained; key threats are identified, and effective solutions for restoration and mitigation are provided. Rivers are among ...
This book sheds new light on a selection of big data scenarios from an interdisciplinary perspective. It features legal, sociological and economic approaches to fundamental big data topics such as privacy, data quality and the ECJ's Safe Harbor decision on the one hand, and practical applications such as smart cars, wearables and web tracking ...
It explores the diverse phenomena which are challenging the international law of the sea today, using the unique perspective of a simultaneous analysis of the national, individual and common interests at stake. This perspective, which all the contributors bear in mind when treating their own topic, also constitutes a useful element in the effort to...
This book provides both a broad perspective and a focused examination of cow care as a subject of widespread ethical concern in India, and increasingly in other parts of the world. In the face of what has persisted as a highly charged political issue over cow protection in India, intellectual space must be made to bring the wealth of Indian traditi...
This two-volume book, published open access, brings together leading scholars of constitutional law from twenty-nine European countries to revisit the role of national constitutions at a time when decision-making has increasingly shifted to the European and transnational level. It offers important insights into three areas. First, it explores how c...
"Dr Cassidy draws pertinent general conclusions about generating policy and mediating the role of the expert in today's science-sceptic and increasingly polarised society... It is both a useful and original contribution, specifically to the history of zoonotic disease policy, and policy history more generally."—Helen Bynum, Author ...
This open access book provides the first comprehensive collection of papers that provide an integrative view on cybersecurity. It discusses theories, problems and solutions on the relevant ethical issues involved. This work is sorely needed in a world where cybersecurity has become indispensable to protect trust and confidence in the digital infras...
This book analyses intellectual property and innovation governance in the development of six key industries in India and China. These industries are reflective of the innovation and economic development of the two economies, or of vital importance to them: the IT Industry, the film industry, the pharmaceutical industry, plant varieties and food sec...
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
This open access book describes the technologies needed to construct a secure big data infrastructure that connects data owners, analytical institutions, and user institutions in a circle of trust. It begins by discussing the most relevant technical issues involved in creating safe and privacy-preserving big data distribution platforms, and especia...
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Suppose you sit down at your computer to check your email. One of the messages includes an attached document, which you are to edit. You click the attachment, and it opens up in another window. After you start editing the document, you realize you need to leave for a trip. You save the document in its partially edited state and shut down the comput...
This open book explores the role of the ILO (International Labour Organization) in building global social governance from multiple and mutually complementary perspectives. It explores the impact of this UN´s oldest agency, founded in 1919, on the transforming world of work in a global setting, providing insights into the unique history and functio...
The use of non-standard technologies such as superconductivity, cryogenics and radiofrequency pose challenges for the safe operation of accelerator facilities that cannot be addressed using only best practice from occupational safety in conventional industry. This book introduces readers to different occupational safety issues at accelerator facili...
This open volume identifies the common and specific aspects of social mechanisms that generate inequalities, through comparative analyses of different dimensions in which inequalities are expressed. It includes studies on social inequalities in 5 European and 5 Latin American countries, along 11 thematic axes: inequalities in the labour market and ...
This open book deals with Article 7 TEU measures, court proceedings, financial sanctions and the EU Rule of Law Framework to protect EU values with a particular focus on checks and balances in EU Member States. It analyses substantive standards, powers, procedures as well as the consequences and implications of the various instruments. It combines ...
This open volume of the AIDA Europe Research Series on Insurance Law and Regulation offers the first comprehensive legal and regulatory analysis of the Insurance Distribution Directive (IDD). The IDD came into force on 1 October 2018 and regulates the distribution of insurance products in the EU. The book examines the main changes accompanying the ...
Aquatic ecosystems are rich in biodiversity and home to a diverse array of species and habitats, providing a wide variety of benefits to human beings. Many of these valuable ecosystems are at risk of being irreversibly damaged by human activities and pressures, including pollution, contamination, invasive species, overfishing and climate change. Su...
This open book examines the multiple intersections between national and international courts in the field of investment protection, and suggests possible modes for regulating future jurisdictional interactions between domestic courts and international tribunals. The current system of foreign investment protection consists of more than 3,000 interna...
In this eBook, we tell you how to take an existing NGINX Open Source or F5 NGINX Plus configuration and extend it to manage API traffic as well. When you use NGINX for API management, you tap into the high performance, reliability, robust community support, and expert professional support (for NGINX Plus customers) that NGINX is famous for.
With...
As technology has developed, computer hackers have become increasingly sophisticated, mastering the ability to hack into even the most impenetrable systems. The best way to secure a system is to understand the tools hackers use and know how to circumvent them. Defense against the Black Arts: How Hackers Do What They Do and How to Protect against It...
This book is geared towards users who have no Revit background. It starts with Revit basics such as how to create walls, floors, roof, but it also covers more advanced topics such as creating a complex object, preparing construction documents, and modeling mechanical and structural systems.
This book is an open education platform for Architectur...
This book focuses on central themes related to the conservation of bats. It details their response to land-use change and management practices, intensified urbanization and roost disturbance and loss. Increasing interactions between humans and bats as a result of hunting, disease relationships, occupation of human dwellings, and conflict over fruit...
Some European lands have been progressively alleviated of human pressures, particularly traditional agriculture in remote areas. This book proposes that this land abandonment can be seen as an opportunity to restore natural ecosystems via rewilding. We define rewilding as the passive management of ecological successions having in mind the long-term...
This book overviews environmental issues 4 years after the Fukushima nuclear accident, covering a wide range of areas related to radiation and radioactivity. The topics discussed are necessary to make clear the relationship between the results of research and Fukushima's revitalized future. The chapters are divided into four parts: Part 1 pres...
This book seeks to identify the ethical spirit of European Union (EU) law, a context in which we can observe a trend towards increasing references to the terms 'ethics' and 'morality.' This aspect is all the more important because EU law is now affecting more and more areas of national law, including such sensitive ones as the p...
This book is written by world-recognized experts in the fields of applied superconductivity and superconducting accelerator magnet technologies. It provides a contemporary review and assessment of the experience in research and development of high-field accelerator dipole magnets based on Nb3Sn superconductor over the past five decades. The reader ...
This book identifies and discusses biodiversity's contribution to physical, mental and spiritual health and wellbeing. Furthermore, the book identifies the implications of this relationship for nature conservation, public health, landscape architecture and urban planning – and considers the opportunities of nature-based solutions for climate...
This volume presents new insights on marginality, i.e. the situation of people living on the edge of socio-economic and ecological systems. The marginality concept leads to different development policies. While the prevalence of poverty declined by about 50 percent in the past two decades, any further reduction of poverty will be more difficult, be...