22 results (0,18085 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

The Arctic Journal of Captain Henry Wemyss Feilden R. A. The Naturalist in H. M. S. Alert 1875-1876

The Arctic Journal of Captain Henry Wemyss Feilden R. A. The Naturalist in H. M. S. Alert 1875-1876

The British Arctic Expedition of 1875–6 was the first major British naval expedition to the high Arctic where science was almost as important as geographical exploration. There were hopes that the expedition might find the hypothetical open polar sea and with it the longed-for Northwest Passage and it did reach the highest northern latitude to date. The Royal Society compiled instructions for the expedition and selected two full-time naturalists (an unusual naval concession to science) of whom one Henry Wemyss Feilden proved a worthy choice. Feilden was a soldier who fought in most of the wars in his lifetime including the American Civil War on the Confederate side. On board HMS Alert he kept a daily journal a record important for its scientific content but also as a view of the expedition as seen by a soldier revealing admiration and appreciation for his naval colleagues; he performed whatever tasks were given to him including the rescue of returning sledge parties stricken by scurvy. He also did a remarkably comprehensive job in mapping the geology of Smith Sound; some of his work on the Cape Rawson Beds was the most reliable until the 1950s. He was an all-round naturalist and a particularly fine geologist and ornithologist. He was not just a collector; he pondered the significance of his findings within the context of the best modern science of his day: in zoology Charles Darwin on evolution; in botany Hooker on phytogeography and in geology Charles Lyell’s system. He illustrated his journal with his own sketches and also enclosed the printed programmes of popular entertainments held on the ship and verses for birthdays and sledging (there was a printing press onboard). The journal gives a vigorous impression of a ship’s company well occupied through the winter then increasingly active in sledging and geographical discovery in spring before the scurvy-induced decision to head home in the summer of 1876. After his return Feilden had dealings with many scientists and their institutions finding homes for and meaning in his collections. | The Arctic Journal of Captain Henry Wemyss Feilden R. A. The Naturalist in H. M. S. Alert 1875-1876

GBP 130.00
1

Understanding GMDSS

Paradise Lost

Security for Service Oriented Architectures

Security for Service Oriented Architectures

Although integrating security into the design of applications has proven to deliver resilient products there are few books available that provide guidance on how to incorporate security into the design of an application. Filling this need Security for Service Oriented Architectures examines both application and security architectures and illustrates the relationship between the two. Supplying authoritative guidance on how to design distributed and resilient applications the book provides an overview of the various standards that service oriented and distributed applications leverage including SOAP HTML 5 SAML XML Encryption XML Signature WS-Security and WS-SecureConversation. It examines emerging issues of privacy and discusses how to design applications within a secure context to facilitate the understanding of these technologies you need to make intelligent decisions regarding their design. This complete guide to security for web services and SOA considers the malicious user story of the abuses and attacks against applications as examples of how design flaws and oversights have subverted the goals of providing resilient business functionality. It reviews recent research on access control for simple and conversation-based web services advanced digital identity management techniques and access control for web-based workflows. Filled with illustrative examples and analyses of critical issues this book provides both security and software architects with a bridge between software and service-oriented architectures and security architectures with the goal of providing a means to develop software architectures that leverage security architectures. It is also a reliable source of reference on Web services standards. Coverage includes the four types of architectures implementing and securing SOA Web 2. 0 other SOA platforms auditing SOAs and defending and detecting attacks.

GBP 170.00
1

Software Methodologies A Quantitative Guide

Building a Dedicated GSM GPS Module Tracking System for Fleet Management Hardware and Software

Professional Women Painters in Nineteenth-Century Scotland Commitment Friendship Pleasure

Enhancing Legislative Drafting in the Commonwealth A Wealth of Innovation

The Physical Actor Contact Improvisation from Studio to Stage

Synopsis of Sleep Medicine

Fifty Key Irish Plays

Decadent Romanticism: 1780-1914

The Remote Work Handbook The Definitive Guide for Operationalizing Remote Work as a Competitive Business Strategy

The Remote Work Handbook The Definitive Guide for Operationalizing Remote Work as a Competitive Business Strategy

The Remote Work Handbook: The Definitive Guide for Operationalizing Remote Work as a Competitive Business Strategy is for readers seeking to leverage the business benefits of a flexible remote workforce. It is a practical guide for building and implementing remote work at any size organization. C-suite executives operation leaders business owners or entrepreneurs who recognize the workplace is changing can use it to re-tool their operations for a strategic business advantage. Mari Anne Snow the author is a recognized remote work expert with over 20 years of experience leading remote teams and has re-written the rules of leadership to unlock the potential in remote and distributed teams. In this book she shares all her secrets. The book explores the untapped potential of remote teams and lays out the business case for adopting a new flexible workplace model to build organizational resilience and a competitive edge. It takes the reader through the step-by-step process of constructing a remote work operating model staging an implementation then institutionalizing and sustaining the change. It includes down-to-earth professional and personal stories that alert the reader to the top priorities and operational realities they will face as they craft their own implementation plan for operationalizing remote work at their company. | The Remote Work Handbook The Definitive Guide for Operationalizing Remote Work as a Competitive Business Strategy

GBP 28.99
1

Dickens’ Novels as Poetry Allegory and Literature of the City

Dickens’ Novels as Poetry Allegory and Literature of the City

Focusing on the language style and poetry of Dickens’ novels this study breaks new ground in reading Dickens’ novels as a unique form of poetry. Dickens’ writing disallows the statement of single unambiguous truths and shows unconscious processes burrowing within language disrupting received ideas and modes of living. Arguing that Dickens within nineteenth-century modernity sees language as always double Tambling draws on a wide range of Victorian texts and current critical theory to explore Dickens’ interest in literature and popular song and what happens in jokes in caricature in word-play and punning and in naming. Working from Dickens’ earliest writings to the latest deftly combining theory with close analysis of texts the book examines Dickens’ key novels such as Pickwick Papers Martin Chuzzlewit Dombey and Son Bleak House Little Dorrit Great Expectations and Our Mutual Friend. It considers Dickens as constructing an urban poetry alert to language coming from sources beyond the individual and relating that to the dream-life of characters who both can and cannot awake to fuller different consciousness. Drawing on Walter Benjamin Lacan and Derrida Tambling shows how Dickens writes a new and comic poetry of the city and that the language constitutes an unconscious and secret autobiography. This volume takes Dickens scholarship in exciting new directions and will be of interest to all readers of nineteenth-century literary and cultural studies and more widely to all readers of literature. | Dickens’ Novels as Poetry Allegory and Literature of the City

GBP 38.99
1

Gendered Approaches to Spatial Development in Europe Perspectives Similarities Differences

Gendered Approaches to Spatial Development in Europe Perspectives Similarities Differences

This book explores the extent to which gendered approaches are evident and effective in spatial development in selected European countries. Beginning with an introduction to theories and concepts of gender space and development the book includes a brief historical review of gender in spatial planning and development throughout Europe in general and an overview of different national frameworks in European countries comparing legal organisational and cultural similarities and differences. This is followed by a critical reflection on how simplifications and stereotypes of gender concepts are used in the practice of spatial development. The main part of the book offers a transnational discussion of planning practices on selected thematic topics. It starts with gender-sensitivity in urban master planning and at neighbourhood level referring to different types of planning manuals. Furthermore the book focuses on gender-sensitive evaluation in urban planning as well as international agendas for sustainable development as a framework for a new generation of gender equality policies. The chapter authors assert that climate change migration and austerity have threatened gender equality and therefore spatial development needs to be especially alert to gender dimensions. The editors end with an outlook and suggestions for further action and research on gender issues in spatial development. With inputs from some of Europe’s leading thinkers on gender space and development this volume is designed to inspire students scholars and practitioners to reflect upon the contribution that gendered approaches can make in the various fields of spatial development and environmental planning. | Gendered Approaches to Spatial Development in Europe Perspectives Similarities Differences

GBP 39.99
1

The Handbook of Fatigue Management in Transportation Waking Up to the Challenge

The Handbook of Fatigue Management in Transportation Waking Up to the Challenge

In the world of transportation fatigue is a silent killer that can affect us all. Understanding fatigue including how to manage it to minimize safety risk is of great importance. However while it is one thing to recognize that fatigue is a critical safety issue it is quite another to set up a successful scientifically informed fatigue risk management programme. This book is here to help. It has been carefully designed as a comprehensive reference point bringing together international expertise from leaders in fatigue science and showcasing valuable insights from transportation industry practitioners. The 40 authored chapters are divided into six sections to better understand fatigue science the consequences of fatigue in transportation contributors to fatigue managing fatigue and promoting alertness real world case studies of fatigue management in practice and future perspectives. While it is possible to read each chapter in isolation most will be gained by reading the book as a whole. Each chapter starts with an abstract overview and concludes with summary bullet points creating a handy quick check for key points. This accessible text is for those who are interested in supporting alert and safe transportation operations. It is suitable for professionals transport managers government advisors policy makers students academics and anyone who wants to learn more. All transport modes (road rail maritime and aviation) are considered. For anyone waking up to the complex challenge of fatigue management this handbook is a must. | The Handbook of Fatigue Management in Transportation Waking Up to the Challenge

GBP 190.00
1

The Platform of Agile Management And the Program to Implement It

The Platform of Agile Management And the Program to Implement It

Facing the amplitude and the acceleration of changes management must also change and it must become alert adaptable and agile. The children of the Internet the likes of Google Amazon Facebook and Tesla are born agile and they challenge the traditional organizations that have long lost their original agility. The latter may have innovated externally i. e. on the market-oriented part of their organization. Yet internally their mindset their models and their methods have remained tightly trapped in traditional tenets. Confronted with the need for deep changes an increasing number of business-leaders launch change-management programs yet conceived and carried out in traditional ways up to 70% of them result in partial or total failure. Management cannot innovate itself it needs people with the right motivation and with the right mind-set. However stuck in the old system people can only keep working in the old ways and means. Thus the leadership must start by replacing a traditional system with a new and agile one which will unbridle entrepreneurship. The Platform of Agile Management and the Program to Implement It combines 3 principles that help to innovate thinking 3 paradigms to innovate behaviours and 3 practices to innovate and to accelerate actions. The proposed platform is comprehensive connective and congenial. It is implemented with an agile program that combines top down push by the leadership with the bottom up pulled by the people. Then the proposed platform will generate continuous improvements and innovations of the performance drivers. | The Platform of Agile Management And the Program to Implement It

GBP 36.99
1

Work and Labor Relations in the Construction Industry An International Perspective

Work and Labor Relations in the Construction Industry An International Perspective

The need for a skilled motivated and effective workforce is fundamental to the creation of the built environment across the world. Known in so many places for a tendency to informal and casual working practices for the sometimes abusive use of migrant labor for gendered male employment and for a neglect of the essentials of health and safety the industry its managers and its workforce face multiple challenges. This book brings an international lens to address those challenges looking particularly at the diverse ways in which answers have been found to manage safe and productive employment practices and effective employment relations within the framework of client demands for timely and cost-effective project completions. Whilst context history and contractual frameworks may all militate against a careful attention to human resource issues this makes them even more deserving of attention. Work and Labor Relations in Construction aims to share understanding of best practice in the industries associated with construction and related activities recognizing that effective work organization and good standards of employee relations will vary from one location to another. It acknowledges the real difficulties encountered by workers in parts of the developing world and the quest for improvement and awareness of some of the worst hazards and current practices. This book is both critical and analytical in approach and seeks to alert readers to the need for change. Aimed at addressing practical issues within the construction industry from a theoretical and empirical standpoint it will be of value to those interested in the built environment employment relations and human resource management. | Work and Labor Relations in the Construction Industry An International Perspective

GBP 38.99
1

Accounting Irregularities in Financial Statements A Definitive Guide for Litigators Auditors and Fraud Investigators

Accounting Irregularities in Financial Statements A Definitive Guide for Litigators Auditors and Fraud Investigators

Accounting irregularities are at the heart of those kinds of frauds that hit financial statements and include misstatement misclassification as well as misrepresentation. In essence they involve manipulation of accounting data description or disclosure in order to distort the true financial picture of the organization in question. This book provides an in-depth practical reference designed for litigators investigators auditors accountants and other professionals who need to understand and combat accounting irregularities and to uphold the integrity of financial statements. Regulators will find this book an essential source of ideas and references when considering reforms. Educators and students will see this book as an alternative inspiring way of understanding accounting and how to stay alert for accounting irregularities. The first two chapters introduce the basics of accounting irregularities in the context of the financial reporting environments and generally accepted accounting principles in the UK and Hong Kong. Perpetrators often seek ways to creating financial illusions in four common directions - selling more costing less owning more and owing less as discussed in Chapters 3 to 6. The seventh chapter considers various ways that perpetrators manipulate the classification and disclosure of financial statements. Chapter 8 explores three scenarios of accounting irregularities - tax evasion theft and commercial dispute. The concluding chapter sets out the deterrents to accounting irregularities in two dimensions. At the micro-level deterrents are implemented within the authority of the organization in question whilst the macro-level deterrents refer to the external environment beyond the controls of any individual organization. | Accounting Irregularities in Financial Statements A Definitive Guide for Litigators Auditors and Fraud Investigators

GBP 46.99
1

Homeland Security Scams

Homeland Security Scams

A direct consequence of the War on Terror launched after the attacks of September 11 2001 is an awareness of the need for homeland security. This war is being used to justify a huge expansion of government powers and spending but funds allocated for homeland security are often for programs far removed from anything that might be termed defense or security. In Homeland Security Scams James T. Bennett shows that this government spending is doing very little to make us safer but a great deal to make us poorer less free and more dependent on the federal government. Regardless of the color of the security alert issued by the Homeland Security czar the spending light is always green as pork barrel dollars are showered on programs of dubious worth. Lobbyists lobby for homeland security grants and contracts; corporations and state and local governments are becoming ever more dependent on federal subsidies; the vested interest in prolonging and intensifying the concern about homeland security increases; and lobbyists press for ever more money. As Bennett makes clear with government money comes government control. Law enforcement and emergency response agencies at all levels of government are being effectively nationalized. Police power is being concentrated and the Department of Homeland Security (DHS) envisions a surveillance state that the East German State Police under Communism would have envied. In this hard-hitting critique Bennett argues that all the spending and surveillance will not win the War on Terror or preserve us from natural disasters. The foe cannot be beaten (we're having trouble even finding the enemy) cannot surrender and still has awesome powers to lay waste to American cities and citizens. He argues that we should view terrorism as just one of many other serious threats to individuals and to nations. More sternly he warns that the War on Terror is also a War on Privacy and a War on Liberty.

GBP 42.99
1

Challenges in Cybersecurity and Privacy - the European Research Landscape

Challenges in Cybersecurity and Privacy - the European Research Landscape

Cybersecurity and Privacy issues are becoming an important barrier for a trusted and dependable global digital society development. Cyber-criminals are continuously shifting their cyber-attacks specially against cyber-physical systems and IoT since they present additional vulnerabilities due to their constrained capabilities their unattended nature and the usage of potential untrustworthiness components. Likewise identity-theft fraud personal data leakages and other related cyber-crimes are continuously evolving causing important damages and privacy problems for European citizens in both virtual and physical scenarios. In this context new holistic approaches methodologies techniques and tools are needed to cope with those issues and mitigate cyberattacks by employing novel cyber-situational awareness frameworks risk analysis and modeling threat intelligent systems cyber-threat information sharing methods advanced big-data analysis techniques as well as exploiting the benefits from latest technologies such as SDN/NFV and Cloud systems. In addition novel privacy-preserving techniques and crypto-privacy mechanisms identity and eID management systems trust services and recommendations are needed to protect citizens’ privacy while keeping usability levels. The European Commission is addressing the challenge through different means including the Horizon 2020 Research and Innovation program thereby financing innovative projects that can cope with the increasing cyberthreat landscape. This book introduces several cybersecurity and privacy research challenges and how they are being addressed in the scope of 15 European research projects. Each chapter is dedicated to a different funded European Research project which aims to cope with digital security and privacy aspects risks threats and cybersecurity issues from a different perspective. Each chapter includes the project’s overviews and objectives the particular challenges they are covering research achievements on security and privacy as well as the techniques outcomes and evaluations accomplished in the scope of the EU project. The book is the result of a collaborative effort among relative ongoing European Research projects in the field of privacy and security as well as related cybersecurity fields and it is intended to explain how these projects meet the main cybersecurity and privacy challenges faced in Europe. Namely the EU projects analyzed in the book are: ANASTACIA SAINT YAKSHA FORTIKA CYBECO SISSDEN CIPSEC CS-AWARE. RED-Alert Truessec. eu. ARIES LIGHTest CREDENTIAL FutureTrust LEPS. Challenges in Cybersecurity and Privacy - the European Research Landscape is ideal for personnel in computer/communication industries as well as academic staff and master/research students in computer science and communications networks interested in learning about cyber-security and privacy aspects.

GBP 89.99
1