When the Supreme Court declared in 1954 that segregated public schools were unconstitutional, the highest echelons of Protestant, Catholic, and Jewish religious organizations enthusiastically supported the ruling, and black civil rights workers expected and actively sought the cooperation of their white religious cohorts. Many white southern clergy, however, were outspoken in their defense of segregation, and even those who supported integration were wary of risking their positions by urging parishioners to act on their avowed religious beliefs in a common humanity. Those who did so found themselves abandoned by friends, attacked by white supremacists, and often driven from their communities. Michael Friedland here offers a collective biography of several southern and nationally known white religious leaders who did step forward to join the major social protest movements of the mid-twentieth century, lending their support first to the civil rights movement and later to protests over American involvement in Vietnam. Profiling such activists as William Sloane Coffin Jr., Daniel and Philip Berrigan, Abraham Joshua Heschel, Eugene Carson Blake, Robert McAfee Brown, and Will D. Campbell, he reveals the passions and commitment behind their involvement in these protests and places their actions in the context of a burgeoning ecumenical movement.
Is It Safe? PROTECTING YOUR COMPUTER, YOUR BUSINESS, AND YOURSELF ONLINE IDENTITY THEFT. DATA THEFT. INTERNET FRAUD. ONLINE SURVEILLANCE. EMAIL SCAMS. Hacks, attacks, and viruses. The Internet is a dangerous place. In years past, you could protect your computer from malicious activity by installing an antivirus program and activating a firewall utility. Unfortunately, that’s no longer good enough; the Internet has become a much darker place, plagued not only by rogue software but also by dangerous criminals and shadowy government agencies. Is It Safe? addresses the new generation of security threat. It presents information about each type of threat and then discusses ways to minimize and recover from those threats. Is It Safe? differs from other security books by focusing more on the social aspects of online security than purely the technical aspects. Yes, this book still covers topics such as antivirus programs and spam blockers, but it recognizes that today’s online security issues are more behavioral in nature–phishing schemes, email scams, and the like. Are you being scammed? Learn how to spot the newest and most insidious computer security threats–fraudulent retailers, eBay scammers, online con artists, and the like. Is your identity safe? Avoid being one of the nine million Americans each year who have their identities stolen. Today’s real Internet threats aren’t viruses and spam. Today’s real threat are thieves who steal your identity, rack up thousands on your credit card, open businesses under your name, commit crimes, and forever damage your reputation! Is Big Brother watching? Get the scoop on online tracking and surveillance. We examine just who might be tracking your online activities and why. Is your employer watching you? How to tell when you’re being monitored; and how to determine what is acceptable and what isn’t. Michael Miller has written more than 80 nonfiction books over the past two decades. His best-selling books include Que’s YouTube 4 You, Googlepedia: The Ultimate Google Resource, iPodpedia: The Ultimate iPod and iTunes Resource, and Absolute Beginner’s Guide to Computer Basics. He has established a reputation for clearly explaining technical topics to nontechnical readers and for offering useful real-world advice about complicated topics.
New Pedagogies for Deep Learning (NDPL) provides a comprehensive strategy for systemwide transformation. Using the 6 competencies of NDPL and a wealth of vivid examples, Fullan re-defines and re-examines what deep learning is and identifies the practical strategies for revolutionizing learning and leadership.
A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition or the CompTIA Security+ Deluxe Study Guide, 2nd Edition, the latest offerings from Sybex for CompTIA's Security+ SY0-301 exam. Targets security administrators who confront a wide assortment of challenging tasks and those seeking a career in security administration who are hampered by a lack of actual experience Walks you through a variety of common tasks, demonstrating step by step how to perform them and how to circumvent roadblocks you may encounter Features tasks that are arranged according to four phases of the security administrator's role: designing a secure network, creating and implementing standard security policies, identifying insecure systems in an existing environment, and training both onsite and remote users Ideal hands-on for those preparing for CompTIA's Security+ exam (SY0-301) This comprehensive workbook provides the next best thing to intensive on-the-job training for security professionals.
A comprehensive survey of the most current and critical information security practices, Information Security Illuminated is an excellent introduction to the fundamental concepts and applications for students and professionals alike. Key security concepts are discussed with clear, accessible language and reinforced by a large number of scenario-based exercises and practical review questions. Readers are then able to apply their knowledge through hands-on experience with computer security-related tools. Coverage begins with the basics of computer security (CIA and DAD triads, risk analysis, etc.), and moves quickly through to important, real-world topics such as access control methodologies, security principles and practices, business continuity planning and disaster recovery, firewalls, incident handling, and much more. In addition to providing the requisite material for a complete course in information security practices, the book can be used as a self-study guide for many of the basic security certifications.
Provides a comprehensive survey of the problems of the cervical spine. Experts in the field have contributed to this text on the management of the many problems generated by diseases and trauma to the cervical spine.
Does an airline pilot really need to surrender his tweezers at airport security when he's about to board an aircraft equipped with an axe on the back of the cockpit door Can a mobile phone really cause a major explosion at a gas station And is there really a good reason why you should be be prevented from swimming in a lake more than a foot deep These rules exist, and they exist in the name of our own protection. But in this engrossing dissection of global health, safety and security regulations, authors Tracey Brown and Michael Hanlon dig a little deeper to discover the real reasons behind many of the instructions we obey without questioning their creators' motives. Their conclusions range from the startling to the staggering, and in presenting them the authors seek to empower readers to question the people and organisations who come up with them in the first place.
Demanding Medical Excellence is a groundbreaking and accessible work that reveals how the information revolution is changing the way doctors make decisions. Michael Millenson, a three-time Pulitzer Prize nominee as a health-care reporter for the Chicago Tribune, illustrates serious flaws in contemporary medical practice and shows ways to improve care and save tens of thousands of lives. "If you read only one book this year, read Demanding Medical Excellence. It's that good, and the revolution it describes is that important."—Health Affairs "Millenson has done yeoman's work in amassing and understanding that avalanche of data that lies beneath most of the managed-care headlines. . . . What he finds is both important and well-explained: inconsistency, overlap, and inattention to quality measures in medical treatment cost more and are more dangerous than most cost-cutting measures. . . . [This book] elevates the healthcare debate to a new level and deserves a wide readership."—Library Journal "An involving, human narrative explaining how we got to where we are today and what lies ahead."—Mark Taylor, Philadelphia Inquirer "Read this book. It will entertain you, challenge, and strengthen you in your quest for better accountability in health care."—Alex R. Rodriguez, M.D., American Journal of Medical Quality "Finally, a health-care book that doesn't wring its hands over the decline of medicine at the hands of money-grubbing corporations. . . . This is a readable account of what Millenson calls a 'quiet revolution' in health care, and his optimism makes for a refreshing change."—Publishers Weekly "With meticulous detail, historical accuracy, and an uncommon understanding of the clinical field, Millenson documents our struggle to reach accountability."—Saty Satya-Murti, M.D., Journal of the American Medical Association
This volume provides students with accessible and easy-to-follow strategies for tackling the major types of documents, from writing reports to job applications. Interactive exercises are included to provide engaging scenarios for writing practice.
Everything casual users need to know to get the most out of their new Windows 7 PCs, software, and the Internet, including Facebook, craigslist, Twitter, and Wikipedia.
This book presents two experimental studies that deal with the comparison of multi-item auction designs for two specific applications: the sale of 2.6 GHz radio spectrum rights in Europe, and the sale of emissions permits in Australia. In order to tackle the complexity of these experiments, a cognitively based toolkit is proposed, including modularized video instructions, comprehension tests, a learning platform, a graphical one-screen user interface, and comprehension-based group matching.
The story of the notorious Jewish gangster who ascended from impoverished beginnings to the glittering Las Vegas strip "[A] brisk-reading chronicle of Siegel’s life and crimes."—Tom Nolan, Wall Street Journal "Fast-paced and absorbing. . . . With a keen eye for the amusing, and humanizing detail, [Shnayerson] enlivens the traditional rise-and-fall narrative."—Jenna Weissman Joselit, New York Times Book Review In a brief life that led to a violent end, Benjamin “Bugsy” Siegel (1906–1947) rose from desperate poverty to ill‑gotten riches, from an early‑twentieth‑century family of Ukrainian Jewish immigrants on the Lower East Side to a kingdom of his own making in Las Vegas. In this captivating portrait, author Michael Shnayerson sets out not to absolve Bugsy Siegel but rather to understand him in all his complexity. Through the 1920s, 1930s, and most of the 1940s, Bugsy Siegel and his longtime partner in crime Meyer Lansky engaged in innumerable acts of violence. As World War II came to an end, Siegel saw the potential for a huge, elegant casino resort in the sands of Las Vegas. Jewish gangsters built nearly all of the Vegas casinos that followed. Then, one by one, they disappeared. Siegel’s story laces through a larger, generational story of eastern European Jewish immigrants in the early‑ to mid‑twentieth century.
Does an airline pilot really need to surrender his tweezers at airport security when he's about to board an aircraft equipped with an axe on the back of the cockpit door? Can a mobile phone really cause a major explosion at a gas station? And is there really a good reason why you should be be prevented from swimming in a lake more than a foot deep? These rules exist, and they exist in the name of our own protection. But in this engrossing dissection of global health, safety and security regulations, authors Tracey Brown and Michael Hanlon dig a little deeper to discover the real reasons behind many of the instructions we obey without questioning their creators' motives. Their conclusions range from the startling to the staggering, and in presenting them the authors seek to empower readers to question the people and organisations who come up with them in the first place. Previously published as In the Interests of Safety.
Ecology has become a central question governing the survival and sustainability of human societies, cultures and languages. In this timely study, Michael Cronin investigates how the perspective of the Anthropocene, or the effect of humans on the global environment, has profound implications for the way translation is considered in the past, present and future. Starting with a deep history of translation and ranging from food ecology to inter-species translation and green translation technology, this thought-provoking book offers a challenging and ultimately hopeful perspective on how translation can play a vital role in the future survival of the planet.
A guide to upgrading and fixing common problem on a PC covers such topics a upgrading memory, adding hard drives, installing printers and scanners, and replacing sound cards.
Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided into three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. It’s ideal for network administrators and operational security analysts familiar with scripting. Explore network, host, and service sensors for capturing security data Store data traffic with relational databases, graph databases, Redis, and Hadoop Use SiLK, the R language, and other tools for analysis and visualization Detect unusual phenomena through Exploratory Data Analysis (EDA) Identify significant structures in networks with graph analysis Determine the traffic that’s crossing service ports in a network Examine traffic volume and behavior to spot DDoS and database raids Get a step-by-step process for network mapping and inventory
This sweeping history of the development of professional, institutionalized intelligence examines the implications of the fall of the state monopoly on espionage today and beyond. During the Cold War, only the alliances clustered around the two superpowers maintained viable intelligence endeavors, whereas a century ago, many states could aspire to be competitive at these dark arts. Today, larger states have lost their monopoly on intelligence skills and capabilities as technological and sociopolitical changes have made it possible for private organizations and even individuals to unearth secrets and influence global events. Historian Michael Warner addresses the birth of professional intelligence in Europe at the beginning of the twentieth century and the subsequent rise of US intelligence during the Cold War. He brings this history up to the present day as intelligence agencies used the struggle against terrorism and the digital revolution to improve capabilities in the 2000s. Throughout, the book examines how states and other entities use intelligence to create, exploit, and protect secret advantages against others, and emphasizes how technological advancement and ideological competition drive intelligence, improving its techniques and creating a need for intelligence and counterintelligence activities to serve and protect policymakers and commanders. The world changes intelligence and intelligence changes the world. This sweeping history of espionage and intelligence will be a welcomed by practitioners, students, and scholars of security studies, international affairs, and intelligence, as well as general audiences interested in the evolution of espionage and technology.
Moquedas, or Tonto, The Brave, as he is known to his companions, Mehitabel Lee and Ronnie Jones, with whom he shares many adventures, while hiking with them in the canyons around their town of Highland Boy, come across a deep abandoned mineshaft. When Ronnie drops a pebble into it to determine its depth, instead of a rock-against-rock echo or the sound of a splash, they hear a screeching throbbing wail as though from a tormented witch. Thus begins the adventure of a lifetime for the three companions. They are determined to learn more about the legends, which have caused the people of Highland Boy to be fearful of the thundershowers, whose brilliant flashes of lightening and building-shaking thunder, come to town about the same time each year. The elders, the town marshal and doctor, relate stories of the old days: Of a romance between ill-fated lovers, whose mishaps in days gone by, have led to the mysteries that cause the haunting, screeching laughter and wails of despair that accompany the thunder and lightening. Determined to end the grief of the lovers and end the troubles that plague the town, the adventurers set out to learn all they can and rid the town of its nightmarish history. They bravely face the missions that they have laid out for themselves in order to achieve their goals. Finally, in the coroner's dark, rat-infested warehouse, the adventurers find the key that will help them solve the mystery of the haunted mine and bring peace to their beloved town. They vow to return the key, a message of love, to its rightful place, in the haunted mine.
**Winner of the TAA 2017 Textbook Excellence Award** "Social Media Marketing deserves special kudos for its courage in tackling the new frontier of social media marketing. This textbook challenges its readers to grapple with the daunting task of understanding rapidly evolving social media and its users." TAA Judges Panel Social Media Marketing was the first textbook to cover this vital subject and has quickly become the market leader. It melds essential theory with practical application and covers core skills such as strategic planning for social media applications, incorporating these platforms into the brand’s marketing communications, and harnessing social media data to yield consumer insights. The authors outline the ‘four zones’ of social media that marketers can use to help achieve their strategic objectives: 1. Community 2. Publishing 3. Entertainment 4. Commerce The new third edition has been extensively updated to include new content on tactical planning and execution and coverage of the latest research within social media marketing. Expanded new case studies and examples including Facebook, Instagram, Twitter and Snapchat are discussed in relation to globally recognized brands such as Pokemon Go, Nike, Amazon Kindle and Lady Gaga. The book is complemented by a companion website that offers valuable additional resources for both instructors and students, including author videos discussing key social media marketing ideas and concepts, author-selected YouTube video playlists, additional case studies, further weblinks, PowerPoint slides and Testbank. Suitable for modules and courses on social media marketing.
Speed It Up! A Non-Technical Guide for Speeding Up Slow Computers Does your PC perform like grandma on a cold winter morning? Does it limp along slowly through everyday tasks, such as starting up, shutting down or just opening an email? Are you wondering if your PC’s get up and go has got up and left? If you answered yes to any of these questions, this is the book for you. Sure, there are uber-geeky guides out there that provide tweaks and customizations appealing to the pocket protector nation, but there is no other book that addresses these common problems at the everyday consumer level. We think it’s time for a book that covers all of these topics in a way that appeals to real humans, like you. Let us help you keep your PC running like it did the day you brought it home from the store. • Troubleshooting—We show you how to diagnose the cause of your PC’s dawdling behavior. We help you determine whether the culprit is your hardware, software, the network, a cluttered registry, or even a virus. • Software—We show you dozens of easy, non-techy things you can do to speed up Windows, your applications, your Internet apps, and more. • Hardware—We show you easy upgrades you can do yourself. The solutions we provide are easy to implement. • Network—We show you how to easily fix network issues that are robbing you of precious time. • Buyer’s advice—If it’s time to put your beloved PC out to pasture, we offer some tried and true advice for choosing a new PC and keeping it in tip-top condition. CATEGORY: Windows Operating Systems COVERS: Windows XP, Windows Vista USER LEVEL: Beginning-Intermediate
...the most original--and profoundly disturbing--work on the critical issue of housing affordability...." --Chester Hartman, President, Poverty and Race Research Action Council In Shelter Poverty, Michael E. Stone presents the definitive discussion of housing and social justice in the United States. Challenging the conventional definition of housing affordability, Stone offers original and powerful insights about the nature, causes, and consequences of the affordability problem and presents creative and detailed proposals for solving a problem that afflicts one-third of this nation. Setting the housing crisis into broad political, economic, and historical contexts, Stone asks: What is shelter poverty? Why does it exist and persist? and How can it be overcome? Describing shelter poverty as the denial of a universal human need, Stone offers a quantitative scale by which to measure it and reflects on the social and economic implications of housing affordability in this country. He argues for "the right to housing" and presents a program for transforming a large proportion of the housing in this country from an expensive commodity into an affordable social entitlement. Employing new concepts of housing ownership, tenure, and finance, he favors social ownership in which market concepts have a useful but subordinate role in the identification of housing preferences and allocation. Stone concludes that political action around shelter poverty will further the goal of achieving a truly just and democratic society that is also equitably and responsibly productive and prosperous.
Evangelicals have always worried about how to be the Church in "the world." They have also struggled to determine with which institutions to attach themselves. Examining the idea of the church, or ecclesiology, within the Northern Protestant "establishment" in the late-nineteenth and early twentieth centuries, J. Michael Utzinger argues that evangelical ecclesiology was characterized by denominational ambivalence. This ambivalence meant that, while Northern Protestants valued their denominational affiliations, they also had no compunction to work outside of them. Trans-denominational affiliations, a result of this ambivalence, often acted as an agent for change that not only disturbed but revitalized their home denominations. Evangelicals believed their denominations were worth fighting for, even while they criticized their respective denomination's shortcomings. Faced with what they perceived to be the waning of their cultural influence, different parties of evangelicals in the late-nineteenth worked to change the vision of the church within their home denominations. Utzinger examines the theological sources of ecclesiological change (doctrine of the Holy Spirit, eschatology, and methods of cultural engagement) that evangelicals promoted, and how these influenced later fundamentalism and modernism. Further, he carefully charts the dynamics of conflict and compromise within the Northern Protestant establishment churches. Using the Northern Baptist Convention, the Presbyterian Church in the USA, and Disciples of Christ as case studies, Utzinger shows that, despite their infighting, evangelicals typically found ways to cooperate with one another in order to preserve their denominational institutions. In other words, the controversies' results were not only contention but compromise. And, rather than indicating the eclipse of denominationalism, fundamentalism and modernism acted to revitalize those institutions and help them persist. - Publisher.
When Deana Murphy died she told God she would do anything if he would let her come back. Deana did not realize what she was getting herself into. God granted her request, but in the form of a Deal. He had a mission for Deana that would change everything. Deana is sent on a path that will require her absolute faith and devotion. She is tasked with stopping a high school massacre that would destroy many lives. One element of God's mission is for Deana to help heal a broken family. Part of the deal is that Deana has to get the man of God's choosing to marry her. Her faith keeps her going and what starts as a mandate develops into an amazing love story. This is a story of family and faith, love and inner strength, healing and conquering obstacles, and an absolute triumph of the human spirit.
NOTE: The exam this book covered, CASP: CompTIA Advanced Security Practitioner (Exam CAS-002), was retired by CompTIA in 2019 and is no longer offered. For coverage of the current exam CASP+ CompTIA Advanced Security Practitioner: Exam CAS-003, Third Edition, please look for the latest edition of this guide: CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third Edition (9781119477648). CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certification exam. CompTIA approved, this guide covers all of the CASP exam objectives with clear, concise, thorough information on crucial security topics. With practical examples and insights drawn from real-world experience, the book is a comprehensive study resource with authoritative coverage of key concepts. Exam highlights, end-of-chapter reviews, and a searchable glossary help with information retention, and cutting-edge exam prep software offers electronic flashcards and hundreds of bonus practice questions. Additional hands-on lab exercises mimic the exam's focus on practical application, providing extra opportunities for readers to test their skills. CASP is a DoD 8570.1-recognized security certification that validates the skillset of advanced-level IT security professionals. The exam measures the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments, as well as the ability to think critically and apply good judgment across a broad spectrum of security disciplines. This study guide helps CASP candidates thoroughly prepare for the exam, providing the opportunity to: Master risk management and incident response Sharpen research and analysis skills Integrate computing with communications and business Review enterprise management and technical component integration Experts predict a 45-fold increase in digital data by 2020, with one-third of all information passing through the cloud. Data has never been so vulnerable, and the demand for certified security professionals is increasing quickly. The CASP proves an IT professional's skills, but getting that certification requires thorough preparation. This CASP study guide provides the information and practice that eliminate surprises on exam day. Also available as a set, Security Practitoner & Crypotography Set, 9781119071549 with Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition.
Antitrust law regulates economic activity but differs in its operation from what is traditionally considered "regulation." Where regulation is often industry-specific and involves the direct setting of prices, product characteristics, or entry, antitrust law focuses more broadly on maintaining certain basic rules of competition. In these lectures Michael Whinston offers an accessible and lucid account of the economics behind antitrust law, looking at some of the most recent developments in antitrust economics and highlighting areas that require further research. He focuses on three areas: price fixing, in which competitors agree to restrict output or raise price; horizontal mergers, in which competitors agree to merge their operations; and exclusionary vertical contracts, in which a competitor seeks to exclude a rival. Antitrust commentators widely regard the prohibition on price fixing as the most settled and economically sound area of antitrust. Whinston's discussion seeks to unsettle this view, suggesting that some fundamental issues in this area are, in fact, not well understood. In his discussion of horizontal mergers, Whinston describes the substantial advances in recent theoretical and empirical work and suggests fruitful directions for further research. The complex area of exclusionary vertical contracts is perhaps the most controversial in antitrust. The influential "Chicago School" cast doubt on arguments that vertical contracts could be profitably used to exclude rivals. Recent theoretical work, to which Whinston has made important contributions, instead shows that such contracts can be profitable tools for exclusion. Whinston's discussion sheds light on the controversy in this area and the nature of those recent theoretical contributions. Sponsored by the Universidad Torcuato Di Tella
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention. - Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7 - Dives deep into the less known approaches to data hiding, covert communications, and advanced malware - Includes never before published information about next generation methods of data hiding - Outlines a well-defined methodology for countering threats - Looks ahead at future predictions for data hiding
The Real Estate Technology Guide is a handbook for putting technology to work in your real estate practice. The book demonstrates how to get more from the technology you already use, and helps you plan the next step in making your office a leader. Besides showing you "how to" in simple, step-by-step demonstrations, you'll learn Web marketing ......
More than just a quick-fix manual for the do-it-yourselfer, this book covers all aspects of small business computing. The Handbook of Computer Troubleshooting is a complete guide for solving the most typical problems most users will encounter. Both the neophyte and experienced user will find helpful tips to solve the more irksome, yet common, problems. Topics covered include: Hardware * Graphics Software * The Internet * Ergonomics * Keyboards * Networks * Company Addresses * Utilities Software * Educational Software * Printers * Monitors * Security Threats * Web Sites * and much more.
The hacker's point of view sheds new light on the PC, the Windows operating system, and the Internet. Tips on the efficient use of these elements, which are an integral part of the contemporary world and day-to-day life are provided along with descriptions of the internals of the Windows operating system and techniques for tweaking both the operating system and PC hardware. How to play tricks on friends using the PC and secrets of using the Internet for efficient web surfing are covered. Hacking methods are also shown for stealing data or monitoring a computer through peripheral devices.
Looks at the lives and politics of four of the key players in the independence and labour movements of the 19th century: Daniel O'Connell (1775-1847); Charles Stewart Parnell (1846-91); Michael Davitt (1846-1906); and James Bronterre O'Brien (1805-64).
Computer Security in the Workplace - A Quick and Simple Guide lives up to its name by providing fast and easy tips and suggestions to help make computer users of any level the strongest link in their company's security. With this book you can learn more about computer security in an hour, than most people do in a lifetime.
This guide to the emerging language of creative industries field is a valuable resource for researchers and students alike. Concise, extensively referenced, and accessible, this this is an exceptionally useful reference work. - Gauti Sigthorsson, Greenwich University "There could be no better guides to the conceptual map of the creative industries than John Hartley and his colleagues, pioneers in the field. This book is a clear, comprehensive and accessible tool-kit of ideas, concepts, questions and discussions which will be invaluable to students and practitioners alike. Key Concepts in Creative Industries is set to become the corner stone of an expanding and exciting field of study" - Chris Barker, University of Wollongong Creativity is an attribute of individual people, but also a feature of organizations like firms, cultural institutions and social networks. In the knowledge economy of today, creativity is of increasing value, for developing, emergent and advanced countries, and for competing cities. This book is the first to present an organized study of the key concepts that underlie and motivate the field of creative industries. Written by a world-leading team of experts, it presents readers with compact accounts of the history of terms, the debates and tensions associated with their usage, and examples of how they apply to the creative industries around the world. Crisp and relevant, this is an invaluable text for students of the creative industries across a range of disciplines, especially media, communication, economics, sociology, creative and performing arts and regional studies.
Hypercrime offers a radical critique of the narrow conceptions of cybercrime offered by current justice systems and challenges the governing presumptions about the nature of the threat posed by it.
Winning at Active Management conducts an in-depth examination of crucial issues facing the investment management industry, and will be a valuable resource for asset managers, institutional consultants, managers of pension and endowment funds, and advisers to individual investors. Bill Priest, Steve Bleiberg and Mike Welhoelter all experienced investment professionals, consider the challenges of managing portfolios through complex markets, as well as managing the cultural and technological complexities of the investment business. The book’s initial section highlights the importance of culture within an investment firm – the characteristics of strong cultures, the imperatives of communication and support, and suggestions for leading firms through times of both adversity and prosperity. It continues with a thorough discussion of active portfolio management for equities. The ongoing debate over active versus passive management is reviewed in detail, drawing on both financial theory and real-world investing results. The book also contrasts traditional methods of portfolio management, based on accounting metrics and price-earnings ratios, with Epoch Investment Partners’ philosophy of investing on free cash flow and appropriate capital allocation. Winning at Active Management closes with an inquiry into the crucial and growing role of technology in investing. The authors assert that the most effective portfolio strategies result from neither pure fundamental nor quantitative methods, but instead from thoughtful combinations of analyst and portfolio manager experience and skill with the speed and breadth of quantitative analysis. The authors illustrate the point with an example of an innovative Epoch equity strategy based on economic logic and judgment, but enabled by information technology. Winning at Active Management also offers important insights into selecting active managers – the market cycle factors that have held back many managers’ performance in recent years, and the difficulty of identifying those firms that truly possess investment skill. Drawing on behavioral economic theory and empirical research, the book makes a convincing case that many active investment managers can and do generate returns superior to those of the broad market.
The new edition of the best-selling guide for powerful, morally-grounded change leadership in any organization. Change is an inevitable, essential part of the modern world. Change prevents stagnation, fosters creative solutions, and propels innovation. With change comes challenges: to survive and prosper, organizations need to adapt to shifting market dynamics, volatility in the public arena, disruptions brought on by new technologies, and many more. Leaders need to understand the dynamics of change to cope with the complexities of the change process. Leading in a Culture of Change describes the key dimensions of leadership that are crucial in times of change. This innovative guide helps readers master the five components of change leadership—moral purpose, understanding change, building relationships, creating and sharing knowledge, and creating coherence—and mobilize others to accomplish shared goals in often difficult conditions. Extensively revised and updated throughout, this market-leading book continues to help leaders from across sectors understand the dynamics of change and navigate the end-to-end change process. The second edition is now thoroughly grounded in the various forms and interpretations of successful change and includes more precise definitions of the core competencies of change, contemporary case studies of their development and practical application, and increased guidance on their effective use through new concrete examples. Combining knowledge from the worlds of education and business, this unique book will help you: Integrate proven, time-tested methods of education reform and the most current insights in leadership and organizational change Develop and implement positive, sustained systematic change strategies in any organization Increase performance, optimize learning, and improve leadership Understand the key principles of leading change through specific, real-world examples Embrace a morally-grounded process of effective organizational change Leading in a Culture of Change is an indispensable source of information for leaders in business, non-profit, and public sectors seeking to understand, influence, and lead the change process.
This is the first book that uses cyber-vulnerability data to explore the vulnerability of over four million machines per year, covering a two-year period as reported by Symantec. Analyzing more than 20 billion telemetry reports comprising malware and binary reputation reports, this book quantifies the cyber-vulnerability of 44 countries for which at least 500 hosts were monitored. Chapters explain the context for this data and its impact, along with explaining how the cyber-vulnerability is calculated. This book also contains a detailed summary of the cyber-vulnerability of dozens of nations according to the percentage of infected hosts and number of infections. It identifies relationships between piracy rates, GDP and other country indicators. The book contains detailed information about potential cyber-security policies that 44 countries have announced, as well as an analysis of gaps in cyber-security policies in general. The Global Cyber-Vulnerability Report targets researchers and professionals including government and military workers, policy-makers and law-makers working in cybersecurity or the web intelligence fields. Advanced-level students in computer science will also find this report valuable as a reference.
Biomedical research is changing the both the format and the functions of human beings. Very soon the human race will be faced with a choice: do we join in with the enhancement or not? Make Way for the Superhumans looks at how far this technology has come and what aims and ambitions it has. From robotic implants that restore sight to the blind, to performance enhancing drugs that build muscles, improve concentration, and maintain erections, bio-enhancement has already made massive advances. Humans have already developed the technology to transmit thoughts and actions brain-to-brain using only a computer interface. By the time our grandchildren are born, they will be presented with the option to significantly alter and redesign their bodies. Make Way for the Superhumans is the only book that poses the questions that need answering now: suggesting real, practical ways of dealing with this technology before it reaches a point where it can no longer be controlled.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.