Sport and Exercise Psychology Research: From Theory to Practice provides a comprehensive summary of new research in sport and exercise psychology from worldwide researchers. Encompassing theory, research, and applications, the book is split into several themed sections. Section 1 discusses basic antecedents to performance including fitness, practice, emotion, team dynamics, and more. Section 2 identifies factors influencing individual performance. Section 3 discusses applied sport psychology for athletes and coaches, and section 4 includes approaches from exercise psychology on motivation and well-being. The book includes a mix of award winning researchers from the European Sport Psychology Association, along with top researchers from the U.S. to bring an international overview to sport psychology.
Successes and Failures of Knowledge Management highlights examples from across multiple industries, demonstrating where the practice has been implemented well—and not so well—so others can learn from these cases during their knowledge management journey. Knowledge management deals with how best to leverage knowledge both internally and externally in organizations to improve decision-making and facilitate knowledge capture and sharing. It is a critical part of an organization’s fabric, and can be used to increase innovation, improve organizational internal and external effectiveness, build the institutional memory, and enhance organizational agility. Starting by establishing KM processes, measures, and metrics, the book highlights ways to be successful in knowledge management institutionalization through learning from sample mistakes and successes. Whether an organization is already implementing KM or has been reluctant to do so, the ideas presented will stimulate the application of knowledge management as part of a human capital strategy in any organization.
Much as Che Guevara’s book Guerilla Warfare helped define and delineate a new type of warfare in the wake of the Cuban revolution in 1961, Cyber Guerilla will help define the new types of threats and fighters now appearing in the digital landscape. Cyber Guerilla provides valuable insight for infosec professionals and consultants, as well as government, military, and corporate IT strategists who must defend against myriad threats from non-state actors. The authors take readers inside the operations and tactics of cyber guerillas, who are changing the dynamics of cyber warfare and information security through their unconventional strategies and threats. This book draws lessons from the authors’ own experiences but also from illustrative hacker groups such as Anonymous, LulzSec and Rebellious Rose.
Accidental Information Discovery: Cultivating Serendipity in the Digital Age provides readers with an interesting discussion on the ways serendipity—defined as the accidental discovery of valued information—plays an important role in creative problem-solving. This insightful resource brings together discussions on serendipity and information discovery, research in computer and information science, and interesting thoughts on the creative process. Five thorough chapters explore the significance of serendipity in creativity and innovation, the characteristics of serendipity-friendly tools and minds, and how future discovery environments may encourage serendipity.
Crime Scene Photography, Third Edition, covers the general principles and concepts of photography, while also delving into the more practical elements and advanced concepts of forensic photography. Robinson assists the reader in understanding and applying essential concepts in order to create images that are able to withstand challenges in court. This text is a required reading by both the International Association for Identification’s Crime Scene Certification Board and the Forensic Photography Certification Board. Includes an instructor website with lecture slides, practical exercises, a test bank, and image collection and many videos which can be used.
Using psychological theory as a basis, Socializing Children through Language examines naturally occurring conversations between mothers and children in the context of achievement, self-regulation, food consumption, and television watching to illustrate how families of different socioeconomic means interact and discuss a variety of topics in the home. Specifically, the chapters in this book draw on enhanced audio recordings of over 40 families across a range of education and income levels to investigate how mothers’ language relates to child behaviors over time. The unique pairing of this digital observer data with empirical data on achievement tests, regulation tasks, and parenting information on the home environment collected one year later presents an altogether revolutionary way to understand and think about how family socialization works across socioeconomic levels.
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response.
DNS Security: Defending the Domain Name System provides tactics on how to protect a Domain Name System (DNS) framework by exploring common DNS vulnerabilities, studying different attack vectors, and providing necessary information for securing DNS infrastructure. The book is a timely reference as DNS is an integral part of the Internet that is involved in almost every attack against a network. The book focuses entirely on the security aspects of DNS, covering common attacks against DNS servers and the protocol itself, as well as ways to use DNS to turn the tables on the attackers and stop an incident before it even starts.
Forensic Polymer Engineering: Why Polymer Products Fail in Service, Second Edition presents and explains the latest forensic engineering techniques used in the investigation of failed polymer materials that are illustrated with a very large number of detailed case studies which show the different types of failure and the forensic engineering techniques used in their investigation. In this updated edition, new case studies have been added to include patent disputes and failed products such as spiral wound wall storage tanks, lithium battery explosions, water bottle failures, and breast implant failures (such as the PIP scandal). New images demonstrating failure have been included, and images from the previous edition are reproduced in color and enhanced with additional explanatory detail. With a dedicated focus on polymeric materials, the book includes details on the experimental techniques that are used to characterize the materials, particularly in cases of failure. Finally, the book has information on the fabrication of polymer devices, as manufacturing flaws often play a role in failure.
Participatory Health through Social Media explores how traditional models of healthcare can be delivered differently through social media and online games, and how these technologies are changing the relationship between patients and healthcare professionals, as well as their impact on health behavior change. The book also examines how the hospitals, public health authorities, and inspectorates are currently using social media to facilitate both information distribution and collection. Also looks into the opportunities and risks to record and analyze epidemiologically relevant data retrieved from the Internet, social media, sensor data, and other digital sources. The book encompasses topics such as patient empowerment, gamification and social games, and the relationships between social media, health behavior change, and health communication crisis during epidemics. Additionally, the book analyzes the possibilities of big data generated through social media. Authored by IMIA Social Media working group, this book is a valuable resource for healthcare researchers and professionals, as well as clinicians interested in using new media as part of their practice or research.