Skip to main content

Books in Social sciences and humanities

  • Applying Knowledge Management

    Techniques for Building Corporate Memories
    • 1st Edition
    • Ian Watson
    • English
    The wholesale capture and distribution of knowledge over the last thirty years has created an unprecedented need for organizations to manage their knowledge assets. Knowledge Management (KM) addresses this need by helping an organization to leverage its information resources and knowledge assets by "remembering" and applying its experience. KM involves the acquisition, storage, retrieval, application, generation, and review of the knowledge assets of an organization in a controlled way. Today, organizations are applying KM throughout their systems, from information management to marketing to human resources. Applying Knowledge Management: Techniques for Building Corporate Memories examines why case-based reasoning (CBR) is so well suited for KM. CBR can be used to adapt solutions originally designed to solve problems in the past, to address new problems faced by the organization. This book clearly demonstrates how CBR can be successfully applied to KM problems by presenting several in-depth case-studies. Ian Watson, a well-known researcher in case-based reasoning and author of the introductory book, Applying CBR: Techniques for Enterprise Systems has written this book specifically for IT managers and knowledge management system developers.
  • Handbook of Agricultural Economics

    • 1st Edition
    • Volume 2
    • Bruce L. Gardner + 1 more
    • English
  • Handbook of Agricultural Economics

    Agriculture and its External Linkages
    • 1st Edition
    • Volume 2A
    • Bruce L. Gardner + 1 more
    • English
    The subject matter of agricultural economics has both broadened and deepened and the chapters of this handbook present innovative work in the field. This volume contains sections on "agriculture, natural resources and the environment" and "agriculture in the macroeconomy". Volume 2B completes the handbook with a section on "agriculture and food policy". Although agricultural economists have always paid attention to these topics, research devoted to them has increased substantially in scope as well as depth in recent years.
  • Handbook of Agricultural Economics

    Agricultural and Food Policy
    • 1st Edition
    • Volume 2B
    • Bruce L. Gardner + 1 more
    • English
  • Investigative Data Mining for Security and Criminal Detection

    • 1st Edition
    • Jesus Mena
    • English
    Investigative Data Mining for Security and Criminal Detection is the first book to outline how data mining technologies can be used to combat crime in the 21st century. It introduces security managers, law enforcement investigators, counter-intelligence agents, fraud specialists, and information security analysts to the latest data mining techniques and shows how they can be used as investigative tools. Readers will learn how to search public and private databases and networks to flag potential security threats and root out criminal activities even before they occur. The groundbreaking book reviews the latest data mining technologies including intelligent agents, link analysis, text mining, decision trees, self-organizing maps, machine learning, and neural networks. Using clear, understandable language, it explains the application of these technologies in such areas as computer and network security, fraud prevention, law enforcement, and national defense. International case studies throughout the book further illustrate how these technologies can be used to aid in crime prevention.Investiga... Data Mining for Security and Criminal Detection will also serve as an indispensable resource for software developers and vendors as they design new products for the law enforcement and intelligence communities.Key Features:* Covers cutting-edge data mining technologies available to use in evidence gathering and collection * Includes numerous case studies, diagrams, and screen captures to illustrate real-world applications of data mining * Easy-to-read format illustrates current and future data mining uses in preventative law enforcement, criminal profiling, counter-terrorist initiatives, and forensic science
  • Profile of the International Pump Industry - Market Prospects to 2007

    • 5th Edition
    • R. Reidy
    • English
    This fifth edition of Profile of the International Pump Industry - Market Prospects to 2007 reviews the markets, technological trends, and major manufacturers of industrial pumps. Profile of the International Pump Industry covers both the international pump industry and its associated market, illustrating the structure of the industry, highlighting developments, identifying future trends, and looking at recent mergers and acquisitions. Market estimates and forecasts to 2007, by region and pump type, are presented along with an analysis of the main end-user markets for industrial pumps, and a technology overview. Forty leading international pump manufacturers are profiled and a Top 20 league table of pump manufacturers, ranked by sales of pumps, is given. A directory of pump manufacturing companies and an index of companies by product type are also included.
  • Dr Tom Shinder's ISA Server and Beyond

    Real World Security Solutions for Microsoft Enterprise Networks
    • 1st Edition
    • Syngress
    • English
    The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks is designed to help network administrators meet the challenge of securing Microsoft enterprise networks. This is not another Windows "security book." It is written, reviewed, and field tested by Microsoft network and security engineers who bring their real-world experiences to provide an entertaining, thought provoking, and imminently practical guide to securing Microsoft networks. Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks also provides scenario based, practical examples, with detailed step-by-step explanations on how to carry out the most complex and obscure security configurations on Windows NT 4.0, Windows 2000 and Windows .Net computers.
  • Cisco Security Specialists Guide to PIX Firewall

    • 1st Edition
    • Syngress
    • English
    Cisco Security Specialist's Guide to PIX Firewall immerses the reader in the highly complicated subject of firewall implementation, deployment, configuration, and administration. This guide will instruct the reader on the necessary information to pass the CSPFA exam including protocols, hardware, software, troubleshooting and more. Cisco Security Specialist's Guide to PIX Firewall introduces the basic concepts of attack, explains the networking principals necessary to effectively implement and deploy a PIX firewall, covers the hardware and software components of the device, provides multiple configurations and administration examples, and fully describes the unique line syntax native to PIX firewall configuration and administration.
  • Evaluating and Treating Adolescent Suicide Attempters

    From Research to Practice
    • 1st Edition
    • Anthony Spirito + 1 more
    • English
    Evaluating and Treating Adolescent Suicide Attempters provides a comprehensive overview of the emotional, behavioral and cognitive characteristics of adolescents who have attempted suicide. Each chapter opens with a case study vignette from the author's extensive clinical files followed by a summary of the empirical literature. Assessment and treatment practices close each chapter. While suicide is the third largest killer of adolescents, most suicide attempts do not result in death. Therefore the treatment of the suicide attempter following the attempt becomes a significant part of the clinician's work with these adolescents. Moreover, the precursors and behavioral markers for a suicide attempt become important signals for the school counselor, youth worker, or therapist. This book also include assessment measures to use when evaluating an adolescent who has attempted suicide.
  • Real R & D Options

    • 1st Edition
    • Dean Paxson
    • English
    Real R&D options are among the earliest modelled real options, with now ten primary practical uses: general R&D planning, planning R&D in stages, evaluating test information, new product development timing, operations, abandonment, risk sharing, market funding, industry strategy and regulation. This book was partly motivated by requests to identify and develop real option models for R&D in telecommunications, petroleum technology and biotechnology. Nine new models cover information and implementation costs, analytical solutions for mean reverting, or fat tailed revenues, endogenous learning and exogenous and experiential shocks, American sequential options, and innovator advantages. Four new applications include forward start development options, exploration options, innovation with information costs, and innovator's real values with changing market share. R&D directors and researchers will find several uses for these models: general R&D planning evaluating test information new product development timing risk sharing industry strategy and regulation