Skip to main content

Books in Social sciences and humanities

1391-1400 of 6227 results in All results

Valuation

  • 1st Edition
  • November 5, 2015
  • Rajesh Kumar
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 2 3 0 3 - 7
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 5 4 3 - 7
Valuation: Theories and Concepts provides an understanding on how to value companies that employ non-standard accounting procedures, particularly companies in emerging markets and those that require a wider variety of options than standard texts provide. The book offers a broader, more holistic perspective that is perfectly suited to companies and worldwide markets. By emphasizing cases on valuation, including mergers and acquisition valuation, it responds to the growing expectation that students and professionals must generate comprehensive perspectives based on thorough investigations and a library of valuation theories. Readers will gain a better understanding of the development of complete analyses, including trend analysis of financial parameters, ratio analysis, and differing perspectives on valuation and strategic initiatives. Case studies include stock market performance and synergies and the intrinsic value of the firm are compared with offer price. In addition, full data sets for each chapter are available online.

Project Management for Information Professionals

  • 1st Edition
  • November 3, 2015
  • Margot Note
  • English
  • Paperback
    9 7 8 - 0 - 0 8 - 1 0 0 1 2 7 - 1
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 1 3 3 - 2
Aimed at practitioners, this handbook imparts guidance on project management techniques in the cultural heritage sector. Information professionals often direct complex endeavors with limited project management training or resources. Project Management for Information Professionals demystifies the tools and processes essential to successful project management and advises on how to manage the interpersonal dynamics and organizational culture that influence the effectiveness of these methods. With this book, readers will gain the knowledge to initiate, plan, execute, monitor, and close projects.

The Invisible Librarian

  • 1st Edition
  • November 3, 2015
  • Aoife Lawton
  • English
  • Paperback
    9 7 8 - 0 - 0 8 - 1 0 0 1 7 1 - 4
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 1 7 4 - 5
The Invisible Librarian: A Librarian's Guide to Increasing Visibility and Impact provides insights into what many librarians are feeling, including questions such as "do they feel invisible?" and "How many times have they heard somebody say ‘but everything is on the Internet’?" If you are a librarian struggling to find the best strategy for the future of the profession in a rapidly changing information environment, this book is for you. People don’t realize that librarians make information available and not just by search engine. This book will make people think differently about librarians, making a case for their value and impact that is compelling, convincing, and credible. Given their versatility and knowledge, now is the time for librarians to become champions of the information age as they improve the visibility and impact of libraries to readers, to stakeholders, and in society. By the end of the book, librarians will have a Visibility Improvement Plan to guarantee future success.

A Study of Black Hole Attack Solutions

  • 1st Edition
  • November 3, 2015
  • Iraj Sadegh Amiri + 2 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 5 3 7 9 - 9
Mobile Ad Hoc Networks (MANETs) are a popular form of network for data transfer due to the fact that they are dynamic, require no fixed infrastructure, and are scalable. However, MANETs are particularly susceptible to several different types of widely perpetrated cyberattack. One of the most common hacks aimed at MANETs is the Black Hole attack, in which a particular node within the network displays itself as having the shortest path for the node whose packets it wants to intercept. Once the packets are drawn to the Black Hole, they are then dropped instead of relayed, and the communication of the MANET is thereby disrupted, without knowledge of the other nodes in the network. Due to the sophistication of the Black Hole attack, there has been a lot of research conducted on how to detect it and prevent it. The authors of this short format title provide their research results on providing an effective solution to Black Hole attacks, including introduction of new MANET routing protocols that can be implemented in order to improve detection accuracy and network parameters such as total dropped packets, end-to-end delay, packet delivery ratio, and routing request overhead.

Traffic Anomaly Detection

  • 1st Edition
  • October 30, 2015
  • Antonio Cuadra-Sánchez + 1 more
  • English
  • Hardback
    9 7 8 - 1 - 7 8 5 4 8 - 0 1 2 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 8 0 7 - 2
Traffic Anomaly Detection presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consider the concrete traffic period in which the anomaly occurs. This book presents the algorithms proposed specifically for this analysis and an empirical comparative analysis of those methods and settle a new information theory based technique, named "typical day analysis".

Thor's OS Xodus

  • 1st Edition
  • October 28, 2015
  • Timothy "Thor" Mullen
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 4 1 0 4 6 3 - 1
  • eBook
    9 7 8 - 0 - 1 2 - 4 1 0 5 0 6 - 5
Thor's OS Xodus: Securely Migrating from Microsoft Windows to Mac OS X provides readers with everything they need to securely and successfully migrate from Microsoft to Mac. It includes information that can be found nowhere else, enabling users to execute a MSFT to OS X migration seamlessly and with minimal downtime. The text is the most complete roadmap for entities that want to move away from Microsoft and decouple their dependency on Microsoft products. It is a perfect choice for enterprise computing, providing the ease and simplicity of a UI that can also be incredibly customized via configuration files because of its BSD core. The text, authored by Thor Mullen, the founder of the "Hammer of God" security co-op group and Principal Security Architect for a worldwide, multi-billion dollar commerce platform, provides the perfect combination of Windows and Unix.

Handbook of Environmental and Sustainable Finance

  • 1st Edition
  • October 28, 2015
  • Vikash Ramiah + 1 more
  • English
  • Hardback
    9 7 8 - 0 - 1 2 - 8 0 3 6 1 5 - 0
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 3 6 4 6 - 4
The use of financial concepts and tools to shape development is hardly new, but their recent adoption by advocates of sustainable environmental management has created opportunities for innovation in business and regulatory groups. The Handbook of Environmental and Sustainable Finance summarizes the latest trends and attitudes in environmental finance, balancing empirical research with theory and applications. It captures the evolution of environmental finance from a niche scholarly field to a mainstream subdiscipline, and it provides glimpses of future directions for research. Covering implications from the Kyoto and Paris Protocols, it presents an intellectually cohesive examination of problems, opportunities, and metrics worldwide.

Threat Assessment and Risk Analysis

  • 1st Edition
  • October 27, 2015
  • Gregory Allen + 1 more
  • English
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 4 9 3 - 5
Threat Assessment and Risk Analysis: An Applied Approach details the entire risk analysis process in accessible language, providing the tools and insight needed to effectively analyze risk and secure facilities in a broad range of industries and organizations. The book explores physical vulnerabilities in such systems as transportation, distribution, and communications, and demonstrates how to measure the key risks and their consequences, providing cost-effective and achievable methods for evaluating the appropriate security risk mitigation countermeasures. Users will find a book that outlines the processes for identifying and assessing the most essential threats and risks an organization faces, along with information on how to address only those that justify security expenditures. Balancing the proper security measures versus the actual risks an organization faces is essential when it comes to protecting physical assets. However, determining which security controls are appropriate is often a subjective and complex matter. The book explores this process in an objective and achievable manner, and is a valuable resource for security and risk management executives, directors, and students.

Emotions, Technology, and Behaviors

  • 1st Edition
  • October 26, 2015
  • Sharon Y. Tettegah + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 1 8 7 3 - 6
  • eBook
    9 7 8 - 0 - 0 8 - 1 0 0 7 0 2 - 0
Exploring the connections between technology, emotions, and behaviors is increasingly important as we spend more and more time online and in digital environments. Technology, Emotions, and Behavior explains the role of technology in the evolution of both emotions and behaviors, and their interaction with each other. It discusses emotion modeling, distraction, and contagion as related to digital narrative and virtual spaces. It examines issues of trust and technology, behaviors used by individuals who are cut off from technology, and how individuals use technology to cope after disasters such as Hurricane Sandy. Technology, Emotions and Behaviors ends by exploring the construct of empathy and perspective-taking through online videos and socially shared activities. Practitioners and researchers will find this text useful in their work.

Workplace Safety

  • 1st Edition
  • October 23, 2015
  • Randall W. Ferris + 1 more
  • English
  • Paperback
    9 7 8 - 0 - 1 2 - 8 0 2 7 7 5 - 2
  • eBook
    9 7 8 - 0 - 1 2 - 8 0 2 7 8 9 - 9
Workplace Safety: Establishing an Effective Violence Prevention Program includes a powerful model on how to overcome organizational rationalization, objection, and denial when confronted with proposing a workplace violence protection program. The book offers real-life cases studies on how violence was successfully avoided using the book’s program, and also shows how to recognize and report precursor behaviors that precede violence. In addition, the book demonstrates proven methods for properly, and effectively, responding to violence should it occur, and tactfully managing the aftermath.