Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Vulnerability in Scandinavian Art and Culture
In this open access book, seventeen scholars discuss how contemporary Scandinavian art and media have become important arenas to articulate and stage various forms of vulnerability in the Scandinavian welfare states. How do discourses of privilege and vulnerability coexist and interact in Scandinavia? How do the Scandinavian countries respond to vu...
Renewing Local Planning to Face Climate Change in the Tropics
This book aims to inspire decision makers and practitioners to change their approach to climate planning in the tropics through the application of modern technologies for characterizing local climate and tracking vulnerability and risk, and using decision-making tools. Drawing on 16 case studies conducted mainly in the Caribbean, Central America, W...
Deltas in the Anthropocene
The Anthropocene is the human-dominated modern era that has accelerated social, environmental and climate change across the world in the last few decades. This book examines the challenges the Anthropocene presents to the sustainable management of deltas, both the many threats as well as the opportunities. In the world's deltas the Anthropocen...
Energy Poverty
This book aims to consolidate and advance debates on European and global energy poverty by exploring the political and infrastructural drivers and implications of the condition across a variety of spatial scales. It highlights the need for a geographical conceptualization of the different ways in which household-level energy deprivation both influe...
The Hindu Kush Himalaya Assessment
This open access volume is the first comprehensive assessment of the Hindu Kush Himalaya (HKH) region. It comprises important scientific research on the social, economic, and environmental pillars of sustainable mountain development and will serve as a basis for evidence-based decision-making to safeguard the environment and advance people's w...
Surveying Human Vulnerabilities across the Life Course
This book details tools and procedures for data collections of hard-to-reach, hard-to-survey populations. Inside, readers will discover first-hand insights from experts who share their successes as well as their failures in their attempts to identify and measure human vulnerabilities across the life course. Coverage first provides an introduction o...
The Interconnected Arctic - UArctic Congress 2016
This book presents the most current research results and knowledge from five multidisciplinary themes: Vulnerability of Arctic Environments, Vulnerability of Arctic Societies, Local and Traditional Knowledge, Building Long-term Human Capacity, New Markets for the Arctic, including tourism and safety. The themes are those discussed at the first ever...
Climate Smart Agriculture
The book uses an economic lens to identify the main features of climate-smart agriculture (CSA), its likely impact, and the challenges associated with its implementation. Drawing upon theory and concepts from agricultural development, institutional, and resource economics, this book expands and formalizes the conceptual foundations of CSA. Focusing...
The Making of Islamic Heritage
Offering key insights into critical debates on the construction, management and destruction of heritage in Muslim contexts, this volume considers how Islamic heritages are constructed through texts and practices which award heritage value. It examines how the monolithic representation of Islamic heritage (as a singular construct) can be enriched by...
Public Health Ethics: Cases Spanning the Globe
This book highlights the ethical issues and dilemmas that arise in the practice of public health. It is also a tool to support instruction, debate, and dialogue regarding public health ethics. Although the practice of public health has always included consideration of ethical issues, the field of public health ethics as a discipline is a relatively...
West African Youth Challenges and Opportunity Pathways
This open access edited collection explores obstacles that impede, and potential pathways toward improving, the material and psychological well-being of youth in and from West Africa. Contributors range from researchers to practitioners, offering a transatlantic, transcontinental set of perspectives on the mounting evidence that, whether they resid...
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application security has been lacking - until now. This practical guide provides both offensive and defensive security concepts that software engineers can easily learn and apply. Andrew Hoffman, a senior security engineer at Salesforce, intro...
Managing Elevated Risk
This book discusses the risks and opportunities that arise in Emerging Asia given the context of a new environment in global liquidity and capital flows. It elaborates on the need to ensure financial and overall economic stability in the region through improved financial regulation and other policy measures to minimize the emergent risks. "Man...
Equitable Research Partnerships
This book offers insights into the development of the ground-breaking Global Code of Conduct for Research in Resource-Poor Settings (GCC) and the San Code of Research Ethics. Using a new, intuitive moral framework predicated on fairness, respect, care and honesty, both codes target ethics dumping - the export of unethical research practices from a ...
Marginality
This volume presents new insights on marginality, i.e. the situation of people living on the edge of socio-economic and ecological systems. The marginality concept leads to different development policies. While the prevalence of poverty declined by about 50 percent in the past two decades, any further reduction of poverty will be more difficult, be...
Ethics Dumping
This book provides original, up-to-date case studies of "ethics dumping" that were largely facilitated by loopholes in the ethics governance of low and middle-income countries. It is instructive even to experienced researchers since it provides a voice to vulnerable populations from the forementioned countries. Ensuring the ethical conduc...
Building a Resilient and Sustainable Agriculture in Sub-Saharan Africa
What are the challenges and action points for agricultural sustainability in Sub-Saharan Africa? This collection of papers offers technical analyses, policy recommendations and an overview of success stories to date. Each carefully selected paper provides valuable insights for improved policy making and defines relevant strategic priorities on Afri...
The Huawei and Snowden Questions
PreliminaryThis book answers two central questions: firstly, is it at all possible to verify electronic equipment procured from untrusted vendors? Secondly, can I build trust into my products in such a way that I support verification by untrusting customers? In separate chapters the book takes readers through the state of the art in fields of comp...
Lone Parenthood in the Life Course
Lone parenthood is an increasing reality in the 21st century, reinforced by the diffusion of divorce and separation. This volume provides a comprehensive portrait of lone parenthood at the beginning of the XXI century from a life course perspective. The contributions included in this volume examine the dynamics of lone parenthood in the life course...
Disasters: Core Concepts and Ethical Theories
This book is the first to examine disasters from a multidisciplinary perspective. Justification of actions in the face of disasters requires recourse both to conceptual analysis and ethical traditions. Part 1 of the book contains chapters on how disasters are conceptualized in different academic disciplines relevant to disasters. Part 2 has chapter...
A Life Course Perspective on Health Trajectories and Transitions
This book examines health trajectories and health transitions at different stages of the life course, including childhood, adulthood and later life. It provides findings that assess the role of biological and social transitions on health status over time.The essays examine a wide range of health issues, including the consequences of military servic...
Solidarity in Europe
This open access volume provides evidence-based knowledge on European solidarity and citizen responses in times of crisis. Does the crisis of European integration translate into a crisis of European solidarity, and if yes, what are the manifestations at the level of individual citizens? How strongly is solidarity rooted at the individual level, bot...
Remembering and Disremembering the Dead
This book is a multidisciplinary work that investigates the notion of posthumous harm over time. The question what is and when is death, affects how we understand the possibility of posthumous harm and redemption. Whilst it is impossible to hurt the dead, it is possible to harm the wishes, beliefs and memories of persons that once lived. In this wa...
The Poetics and Politics of Alzheimer's Disease Life-Writing
This is the first book-length exploration of the thoughts and experiences expressed by dementia patients in published narratives over the last thirty years. It contrasts third-person caregiver and first-person patient accounts from different languages and a range of media, focusing on the poetical and political questions these narratives raise: wha...
Louisiana's Response to Extreme Weather
This book takes an in-depth look at Louisiana as a state which is ahead of the curve in terms of extreme weather events, both in frequency and magnitude, and in its responses to these challenges including recovery and enhancement of resiliency.Louisiana faced a major tropical catastrophe in the 21st century, and experiences the fastest rising sea l...
Loss and Damage from Climate Change
This book provides an authoritative insight on the Loss and Damage discourse by highlighting state-of-the-art research and policy linked to this discourse and articulating its multiple concepts, principles and methods. Written by leading researchers and practitioners, it identifies practical and evidence-based policy options to inform the discourse...
Poverty Reduction Policies and Practices in Developing Asia
This book looks at the major policy challenges facing developing Asia and how the region sustains rapid economic growth to reduce multidimensional poverty through socially inclusive and environmentally sustainable measures. Asia is facing many challenges arising from population growth, rapid urbanization, provision of services, climate change and t...
Energy Justice Across Borders
We must find new and innovative ways of conceptualizing transboundary energy issues, of embedding concerns of ethics or justice into energy policy, and of operationalizing response to them. This book stems from the emergent gap; the need for comparative approaches to energy justice, and for those that consider ethical traditions that go beyond the ...
Gene Drives at Tipping Points
This open access book reports on a pilot project aiming at collecting information on the socio-ecological risks that could arise in the event of an uncontrolled spread of genetically engineered organisms into the environment. The researchers will, for instance, be taking a closer look at genetically engineered oilseed rape, genetically engineered o...
Building Secure and Reliable Systems
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in product quality, performance, and availability. In this book, experts from Google share best prac...
A Graduate Course in Applied Cryptography
Cryptography is an indispensable tool used to protect information in computing systems. It is used everywhere and by billions of people worldwide on a daily basis. It is used to protect data at rest and data in motion. Cryptographic systems are an integral part of standard protocols, most notably the Transport Layer Security (TLS) protocol, making ...
Hacking Exposed Web Applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as critical as it is challenging. With the enhanced availability of information and services online and Web-based attacks and break-ins on the rise, security risks are at an all time high. Hacking Exposed Web Applications shows you, step...

1 2