Skip to main content

Books in Social sciences and humanities

    • Global Regulatory Issues for the Cosmetics Industry

      • 1st Edition
      • Karl Lintner
      • English
      This volume examines regulatory issues of ingredients, manufacturing, and finished products, as well as claim substantiation, packaging, and advertising. A chapter on Chinese regulations will be one of the first about this country to be published in book form.• Includes a regulatory map of India and China • Global IP protection strategies • REACH and European Regulatory standards • "Green chemistry" in relation to cosmetics and regulation
    • South Korea

      Challenging Globalisation and the Post-Crisis Reforms
      • 1st Edition
      • Young-Chan Kim + 2 more
      • English
      South Korea: Challenging globalisation and the post-crisis reforms examines the major economic issues flowing from the Korean financial crisis of 1997 and covers such issues as industrial relations, macroeconomic sectors, the role of administrations, and corporates’ globalisation process by over-expanded foreign direct investment. The chapters contained in this book are written by a wide variety of contributors, including a former government technocrat, president’s advisory board member, plus leading Korean economy specialists.
    • Introduction to Quantitative EEG and Neurofeedback

      Advanced Theory and Applications
      • 2nd Edition
      • Thomas H. Budzynski + 3 more
      • English
      The study of Quantitative EEGs and Neurofeedback offer a window into brain physiology and function via computer and statistical analyses, suggesting innovative approaches to the improvement of attention, anxiety, mood and behavior. Resources for understanding what QEEG and Neurofeedback is, how they are used, and to what disorders and patients they can be applied are scarce, and this volume serves as an ideal tool for clinical researchers and practicing clinicians, providing a broad overview of the most interesting topics relating to the techniques. The revised coverage of advancements, new applications (e.g. Aspberger's, music therapy, LORETA, etc.), and combinations of prior approaches make the second edition a necessary companion to the first. The top scholars in the field have been enlisted and contributions will offer both the breadth needed for an introductory scholar and the depth desired by a clinical professional.
    • Financial Planning Using Excel

      Forecasting, Planning and Budgeting Techniques
      • 2nd Edition
      • Sue Nugus
      • English
      This book covers all aspects of budget preparation, from designing and creating a budgetary control system, consolidating data and working with spreadsheets. Now fully updated to include the latest version of Excel, Excel 2007 and for easy budgeting. The book shows how things are done in Excel 2003 and Excel 2007 to ease transition from the previous version to the new version. Now in full colour throughout to aid quick understanding through numerous color screen shots.For those who use Excel on a daily basis in budget planning, this book is a must. It contains a wealth of practical examples, tips, new techniques all designed to help quickly exploit and master Excel to its full advantage and therefore use spreadsheets for more effective management accounting in your firm.
    • Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit

      • 1st Edition
      • Jesse Varsalone
      • English
      This book provides digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic investigators and security professionals subsequently can use data gathered from these devices to aid in the prosecution of criminal cases, litigate civil cases, audit adherence to federal regulatory compliance issues, and identify breech of corporate and government usage policies on networks. MAC Disks, Partitioning, and HFS+ File System Manage multiple partitions on a disk, and understand how the operating system stores data.FileVault and Time Machine Decrypt locked FileVault files and restore files backed up with Leopard's Time Machine.Recovering Browser History Uncover traces of Web-surfing activity in Safari with Web cache and .plist filesRecovering Email Artifacts, iChat, and Other Chat Logs Expose communications data in iChat, Address Book, Apple's Mail, MobileMe, and Web-based email.Locating and Recovering Photos Use iPhoto, Spotlight, and shadow files to find artifacts pof photos (e.g., thumbnails) when the originals no longer exist.Finding and Recovering QuickTime Movies and Other Video Understand video file formats--created with iSight, iMovie, or another application--and how to find them.PDF, Word, and Other Document Recovery Recover text documents and metadata with Microsoft Office, OpenOffice, Entourage, Adobe PDF, or other formats.Forensic Acquisition and Analysis of an iPod Documentseizure of an iPod model and analyze the iPod image file and artifacts on a Mac.Forensic Acquisition and Analysis of an iPhone Acquire a physical image of an iPhone or iPod Touch and safely analyze without jailbreaking.
    • Rating Based Modeling of Credit Risk

      Theory and Application of Migration Matrices
      • 1st Edition
      • Stefan Trueck + 1 more
      • English
      In the last decade rating-based models have become very popular in credit risk management. These systems use the rating of a company as the decisive variable to evaluate the default risk of a bond or loan. The popularity is due to the straightforwardness of the approach, and to the upcoming new capital accord (Basel II), which allows banks to base their capital requirements on internal as well as external rating systems. Because of this, sophisticated credit risk models are being developed or demanded by banks to assess the risk of their credit portfolio better by recognizing the different underlying sources of risk. As a consequence, not only default probabilities for certain rating categories but also the probabilities of moving from one rating state to another are important issues in such models for risk management and pricing. It is widely accepted that rating migrations and default probabilities show significant variations through time due to macroeconomics conditions or the business cycle. These changes in migration behavior may have a substantial impact on the value-at-risk (VAR) of a credit portfolio or the prices of credit derivatives such as collateralized debt obligations (D+CDOs). In Rating Based Modeling of Credit Risk the authors develop a much more sophisticated analysis of migration behavior. Their contribution of more sophisticated techniques to measure and forecast changes in migration behavior as well as determining adequate estimators for transition matrices is a major contribution to rating based credit modeling.
    • Handbook of Management Accounting Research

      • 1st Edition
      • Volume 3
      • Anthony G. Hopwood + 2 more
      • English
      Volume one of Handbook of Management Accounting Research sets the context for all three volumes in the series. Volume two provides insights into research on different management accounting practices. This third and final volume features contributions from some of the most influential researchers in various areas of management accounting research, consolidates the content of volumes one and two, and concludes with examples of management accounting research from around the world.
    • Business Modeling

      A Practical Guide to Realizing Business Value
      • 1st Edition
      • David M. Bridgeland + 1 more
      • English
      As business modeling becomes mainstream, every year more and more companies and government agencies are creating models of their businesses. But creating good business models is not a simple endeavor. Business modeling requires new skills. Written by two business modeling experts, this book shows you how to make your business modeling efforts successful. It provides in-depth coverage of each of the four distinct business modeling disciplines, helping you master them all and understand how to effectively combine them. It also details best practices for working with subject matter experts. And it shows how to develop models, and then analyze, simulate, and deploy them. This is essential, authoritative information that will put you miles ahead of everyone who continues to approach business modeling haphazardly.
    • Disappearing Cryptography

      Information Hiding: Steganography and Watermarking
      • 3rd Edition
      • Peter Wayner
      • English
      Cryptology is the practice of hiding digital information by means of various obfuscatory and steganographic techniques. The application of said techniques facilitates message confidentiality and sender/receiver identity authentication, and helps to ensure the integrity and security of computer passwords, ATM card information, digital signatures, DVD and HDDVD content, and electronic commerce. Cryptography is also central to digital rights management (DRM), a group of techniques for technologically controlling the use of copyrighted material that is being widely implemented and deployed at the behest of corporations that own and create revenue from the hundreds of thousands of mini-transactions that take place daily on programs like iTunes. This new edition of our best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files. These methods include encryption, compression, data embedding and watermarking, data mimicry, and scrambling. During the last 5 years, the continued advancement and exponential increase of computer processing power have enhanced the efficacy and scope of electronic espionage and content appropriation. Therefore, this edition has amended and expanded outdated sections in accordance with new dangers, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques (such as fingerprinting, synchronization, and quantization) capable of withstanding the evolved forms of attack. Each chapter is divided into sections, first providing an introduction and high-level summary for those who wish to understand the concepts without wading through technical explanations, and then presenting concrete examples and greater detail for those who want to write their own programs. This combination of practicality and theory allows programmers and system designers to not only implement tried and true encryption procedures, but also consider probable future developments in their designs, thus fulfilling the need for preemptive caution that is becoming ever more explicit as the transference of digital media escalates.
    • Securing Intellectual Property

      Protecting Trade Secrets and Other Information Assets
      • 1st Edition
      • Information Information Security
      • English
      Most employeers are astounded at how easily and quickly their proprietary information can get out of their control. In a large number of cases, theft of trade secrets often involves employees leaving a company to start their own business or work for a direct competitor.Nearly all books that address the topic of trade secrets have the “spy vs. spy” perspective. The author approaches the topic from a practical business perspective and not simply creating “paranoia” for paranoia’s sake. The material for this book comes from the author’s extensive work experience as a computer forensics consultant and manager on numerous theft of trade secrets cases.