Skip to main content

Books in Social sciences and humanities

  • Mergers, Acquisitions, and Other Restructuring Activities

    • 8th Edition
    • Donald DePamphilis
    • English
    Mergers, Acquisitions, and Other Restructuring Activities is unique in that it is the most current, comprehensive, and cutting-edge text on M&A and corporate restructuring available. It is current in that it includes many of the most up-to-date and notable deals (e.g., Facebook’s takeover of WhatsApp, the Dell privatization, and Verizon’s mega buyout of Vodafone’s share of Verizon Wireless), precedent setting judicial decisions (e.g., efforts to overturn defenses at Airgas and Sotheby’s), new regulations (e.g., expediting backend mergers), trends (e.g., increasing role of activist investors in takeovers), and new tactics (e.g., two-tiered poison pill) employed in M&As. Most integrative case studies are new for this edition and involve transactions that have been announced or completed since 2013. It is comprehensive in that nearly all aspects of M&As and corporate restructuring are explored. It is cutting edge in that conclusions and insights are anchored by the most recent academic research, with references to more than 200 empirical studies published in leading peer-reviewed journals just since 2012. And the substantially updated content is illustrated with numerous practical exhibits, case studies involving diverse transactions, easy-to-understand numerical examples, and hundreds of discussion questions and practice exercises. The highlights of the new edition are listed here: · New Chapters: Two new chapters: Chapter 9 and 14. Chapter 9 discusses the basics of applying financial modeling methods to firm valuation and assists the reader in understanding the power (and limitations) of models in analyzing real world situation. Chapter 14 illustrates how complex financial models often are used to support the deal structuring process during M&A negotiations. · New Cases: Ninety percent of the nearly forty case studies are new and involve transactions announced or completed during the last three years. These cases represent friendly, hostile, highly leveraged, and cross-border deals in ten different industries, involving public and private firms as well as firms experiencing financial distress. All end of chapter case studies begin with a "Key Objectives" section indicating what the student should learn from the case study and include discussion questions and solutions available in the online instructors’ manual. · Latest Research: This edition focuses on the most recent and relevant academic studies, some of which contain surprising insights changing the way we view this subject matter. Recent research has significant implications for academicians, students, M&A practitioners, and government policy makers shedding new light on current developments and trends in the ever-changing mergers and acquisitions market. The market for corporate control and corporate restructuring strategies are constantly changing, reflecting the ongoing globalization of both product and capital markets, accelerating technological change, escalating industry consolidation, changing regulatory practices, and intensifying cross-border competition. While continuing to be relevant, empirical research covering the dynamics of the M&A markets of the 1970s, 1980s, and 1990s may be less germane in explaining current undercurrents and future trends.
  • Health Disparities and Intellectual Disabilities

    • 1st Edition
    • Volume 48
    • English
    International Review of Research in Developmental Disabilities is an ongoing scholarly look at research into the causes, effects, classification systems, and syndromes of developmental disabilities. Contributors come from wide-ranging perspectives, including genetics, psychology, education, and other health and behavioral sciences.
  • Practical Financial Modelling

    The Development and Audit of Cash Flow Models
    • 3rd Edition
    • Jonathan Swan
    • English
    Practical Financial Modelling, 3e is a book on model development and model assurance. It enhances the modelling process by emphasizing controls and checks for accuracy and reliability. New content on validation and verification, model use and sensitivity analysis is presented alongside a modelling methodology that underpins the various proprietary standards used in financial modelling today. It provides more details than other books and yet is general enough for applying its methodology to many applications. This book isn’t just about the details of building cash flow models, it’s about building better cash flow models.
  • Evolution of Vulnerability

    Implications for Sex Differences in Health and Development
    • 1st Edition
    • David C. Geary
    • English
    Biologists have known for decades that many traits involved in competition for mates or other resources and that influence mate choice are exaggerated, and their expression is influenced by the individuals’ ability to tolerate a variety of environmental and social stressors. Evolution of Vulnerability applies this concept of heightened sensitivity to humans for a host of physical, social, psychological, cognitive, and brain traits. By reframing the issue entirely, renowned evolutionary psychologist David C. Geary demonstrates this principle can be used to identify children, adolescents, or populations at risk for poor long-term outcomes and identify specific traits in each sex and at different points in development that are most easily disrupted by exposure to stressors. Evolution of Vulnerability begins by reviewing the expansive literature on traits predicted to show sex-specific sensitivity to environmental and social stressors, and details the implications for better assessing and understanding the consequences of exposure to these stressors. Next, the book reviews sexual selection—mate competition and choice—and the mechanisms involved in the evolution of condition dependent traits and the stressors that can undermine their development and expression, such as poor early nutrition and health, parasites, social stress, and exposure to man-made toxins. Then it reviews condition dependent traits (physical, behavioral, cognitive, and brain) in birds, fish, insects, and mammals to demonstrate the ubiquity of these traits in nature. The focus then turns to humans and covers sex-specific vulnerabilities in children and adults for physical traits, social behavior, psychological wellbeing, and brain and cognitive traits. The sensitivity of these traits is related to exposure to parasites, poor nutrition, social maltreatment, environmental toxins, chemotherapy, and Alzheimer’s disease, among others. The book concludes with an implications chapter that outlines how to better assess vulnerabilities in children and adults and how to more fully understand how, why, and when in development some types of environmental and social stressors are particularly harmful to humans.
  • The Strategies of China’s Firms

    Resolving Dilemmas
    • 1st Edition
    • Hailan Yang + 2 more
    • English
    This book aims to analyze how China’s firms in the consumer electronics (CE) sector have developed their business strategy and corporate governance during the reform process. This book examines the CE sector in particular because it is one of the country’s most important and dynamic manufacturing sectors and one of the earliest market-oriented sectors.
  • Dissecting the Hack

    The V3rb0t3n Network
    • 1st Edition
    • Jayson E Street
    • English
    Dissecting the Hack: The V3rb0t3n Network ventures further into cutting-edge techniques and methods than its predecessor, Dissecting the Hack: The F0rb1dd3n Network. It forgoes the basics and delves straight into the action, as our heroes are chased around the world in a global race against the clock. The danger they face will forever reshape their lives and the price they pay for their actions will not only affect themselves, but could possibly shake the foundations of an entire nation. The book is divided into two parts. The first part, entitled "The V3rb0t3n Network," continues the fictional story of Bob and Leon, two hackers caught up in an adventure in which they learn the deadly consequence of digital actions. The second part, "Security Threats Are Real" (STAR), focuses on these real-world lessons and advanced techniques, as used by characters in the story. This gives the reader not only textbook knowledge, but real-world context around how cyber-attacks may manifest. "The V3rb0t3n Network" can be read as a stand-alone story or as an illustration of the issues described in STAR. Scattered throughout "The V3rb0t3n Network" are "Easter eggs"—references, hints, phrases, and more that will lead readers to insights into hacker culture. Drawing on "The V3rb0t3n Network," STAR explains the various aspects of reconnaissance; the scanning phase of an attack; the attacker’s search for network weaknesses and vulnerabilities to exploit; the various angles of attack used by the characters in the story; basic methods of erasing information and obscuring an attacker’s presence on a computer system; and the underlying hacking culture.
  • Information Professionals' Career Confidential

    Straight Talk and Savvy Tips
    • 1st Edition
    • Ulla de Stricker
    • English
    Based in part on a selection of the author's past blog postings, Information Professionals' Career Confidential is a convenient, browsable, and illuminating pocket compendium of insights on topics relevant for information and knowledge professionals at any stage of their careers. This book collects comments on matters of interest to new and experienced information professionals alike in 1-2 minute “quick takes,” inviting further thought. Topics range from the value of knowledge management and effective communication in organizations to assessing employers’ perception of information professionals and how best to increase one’s value through professional organizations and volunteering. This unique resource will be illuminating for anyone in library and information science, career development, or knowledge and information management.
  • Nonclinical Assessment of Abuse Potential for New Pharmaceuticals

    • 1st Edition
    • Carrie Markgraf + 2 more
    • English
    Nonclinical Assessment of Abuse Potential for New Pharmaceuticals offers a complete reference on the current international regulatory guidelines and details best practice methodology for the three standard animal models used to evaluate abuse potential: physical dependence, self-administration and drug discrimination. This book also includes chapters on alternative models and examples of when you should use these alternatives. Case histories are provided at the end of the book to show how the data generated from the animal models play a pivitol role in the submission package for a new drug. By incorporating all of this information into one book, Nonclinical Assessment of Abuse Potential for New Pharmaceuticals is your single resource for everything you need to know to understand and implement the assessment of abuse liability.
  • Tethered Money

    Managing Digital Currency Transactions
    • 1st Edition
    • Gideon Samid
    • English
    Tettered Money: Managing Digital Currency Transactions presents a comprehensive discussion of financial transactions using digital currencies, with the author, Gideon Samid, making the case for their expansion in tethered money. Exploring the technical, legal, and historical aspects of digital money, the author discusses how the emerging technology of money specified for a specific need or to perform a particular task will affect society. The ability to dictate, Samid argues, how money is spent could increase control over our lives and resources, enabling us to practice a certain efficiency that would, in due time, become a pillar of civilization. Informative and thought-provoking, the book describes an evolving future that, in some quarters, has already arrived.
  • China's Spatial (Dis)integration

    Political Economy of the Interethnic Unrest in Xinjiang
    • 1st Edition
    • Rongxing Guo
    • English
    This book is intended to provide the narratives and analytics of China’s spatial (dis)integration. Indeed, the Chinese nation is far too large and spatially complicated and diversified to be misinterpreted. The only feasible approach to analyzing it is, therefore, to divide it into smaller geographical elements through which one can have a better insight into the spatial mechanisms and regional characteristics.