Although the 21st century library is competing with numerous web-based resources, its clients can benefit from using its research assistance, physical and online holdings, and physical space, so they need to understand what the library offers. Marketing the 21st Century Library systematically and concisely teaches students and practitioners how to and why they should market and promote academic libraries. Librarians need to use marketing not only to advertise and promote resources, but also to boost the profession and the role we play. The book introduces key marketing concepts, followed by the history of library marketing. Subsequent chapters guide readers through a series of tools and resources so they can create their own marketing plans, concluding with an exploration of resources, services and further readings.
Volume 9: Historical Perspectives, Part B: Notable People in Mass Spectrometry of The Encyclopedia of Mass Spectrometry briefly reviews the lives and works of many of the major people who carried out this development, providing insights into the history of mass spectrometry applications through the personal stories of pioneers and innovators in the field. The book presents biographies of notable contributors, including Nobel Prize winners J. J. Thomson, Francis W. Aston, Wolfgang Paul, John B. Fenn, and Koichi Tanaka, along with other luminaries in the field, including Franz Hillenkamp, Catherine Clarke Fenselau, Alfred O. C. Nier, and many more, discussing not only the instruments and their uses, but also providing interesting information on the careers, characters, and life stories of the people who did the work.
Paths to Peace: The UN Security Council and its Presidency documents the works, experiences, and roles of the former presidents of the UN Security Council, which is one of the principal organs of the UN. This book first characterizes the council, including the evolution of its practice and the scope of consensus. This text then describes the scope of power of a president of the council, which is followed by papers presenting a reflection of a former president on his presidency. An intimate and internal view of the presidency by a former Director of the Security Council, Division of the UN Secretariat is then presented. Other papers tackle various experiences of former presidents, particularly in dealing with several nations. This text will be invaluable to those working in the United Nations and aim to learn from the experts, as well as to those academicians and professionals interested in public administration.
This volume covers such issues as sound and vibration, the thermal environment, and the visual environment. It contains conmmentaries from the leading authorities in the field.
Incorporating currencies, payment methods, and protocols that computers use to talk to each other, digital currencies are poised to grow in use and importance. The Handbook of Digital Currency gives readers a way to learn about subjects outside their specialties and provides authoritative background and tools for those whose primary source of information is journal articles. Taking a cross-country perspective, its comprehensive view of the field includes history, technicality, IT, finance, economics, legal, tax and regulatory environment. For those who come from different backgrounds with different questions in mind, The Handbook of Digital Currency is an essential starting point.
SQL server is the most widely-used database platform in the world, and a large percentage of these databases are not properly secured, exposing sensitive customer and business data to attack. In Securing SQL Server, Third Edition, you will learn about the potential attack vectors that can be used to break into SQL server databases as well as how to protect databases from these attacks. In this book, Denny Cherry -Â a Microsoft SQL MVP and one of the biggest names in SQL server - will teach you how to properly secure an SQL server database from internal and external threats using best practices as well as specific tricks that the author employs in his role as a consultant for some of the largest SQL server deployments in the world. Fully updated to cover the latest technology in SQL Server 2014, this new edition walks you through how to secure new features of the 2014 release. New topics in the book include vLANs, setting up RRAS, anti-virus installs, key management, moving from plaintext to encrypted values in an existing application, securing Analysis Services Objects, Managed Service Accounts, OS rights needed by the DBA, SQL Agent Security, Table Permissions, Views, Stored Procedures, Functions, Service Broker Objects, and much more.
The Economics of Screening and Risk Sharing in Higher Education explores advances in information technologies and in statistical and social sciences that have significantly improved the reliability of techniques for screening large populations. These advances are important for higher education worldwide because they affect many of the mechanisms commonly used for rationing the available supply of educational services. Using a single framework to study several independent questions, the authors provide a comprehensive theory in an empirically-driven field. Their answers to questions about funding structures for investments in higher education, students’ attitudes towards risk, and the availability of arrangements for sharing individual talent risks are important for understanding the theoretical underpinnings of information and uncertainty on human capital formation.
Entity Information Life Cycle for Big Data walks you through the ins and outs of managing entity information so you can successfully achieve master data management (MDM) in the era of big data. This book explains big data’s impact on MDM and the critical role of entity information management system (EIMS) in successful MDM. Expert authors Dr. John R. Talburt and Dr. Yinle Zhou provide a thorough background in the principles of managing the entity information life cycle and provide practical tips and techniques for implementing an EIMS, strategies for exploiting distributed processing to handle big data for EIMS, and examples from real applications. Additional material on the theory of EIIM and methods for assessing and evaluating EIMS performance also make this book appropriate for use as a textbook in courses on entity and identity management, data management, customer relationship management (CRM), and related topics.
Professional Issues in Forensic Science will introduce students to various topics they will encounter within the field of Forensic Science. Legal implications within the field will focus on expert witness testimony and procedural rules defined by both legislative statute and court decisions. These decisions affect the collection, analysis, and court admissibility of scientific evidence, such as the Frye and Daubert standards and the Federal Rules of Evidence. Existing and pending Forensic Science legislation will be covered, including laws governing state and national DNA databases. Ethical concerns stemming from the day-to-day balancing of competing priorities encountered by the forensic student will be discussed. Such competing priorities may cause conflicts between good scientific practice and the need to expedite work, meet legal requirements, and satisfy client’s wishes. The role of individual morality in Forensic Science and competing ethical standards between state and defense experts will be addressed. Examinations of ethical guidelines issued by various professional forensic organizations will be conducted. Students will be presented with examples of ethical dilemmas for comment and resolution. The management of crime laboratories will provide discussion on quality assurance/quality control practices and the standards required by the accreditation of laboratories and those proposed by Scientific Working Groups in Forensic Science. The national Academy of Sciences report on Strengthening Forensic Science will be examined to determine the impact of the field. Professional Issues in Forensic Science is a core topic taught in forensic science programs. This volume will be an essential advanced text for academics and an excellent reference for the newly practicing forensic scientist. It will also fit strategically and cluster well with our other forensic science titles addressing professional issues.
Keeping Religious Institutions Secure explores the unique vulnerabilities that churches, synagogues, and mosques face in regards to security, making them attractive to criminals who see them as easy targets. The text illustrates why all places of worship should think about security and the types of breaches that can drive people away. The book focuses on the most frequent security concerns experienced by houses of worship, including embezzlement, vandalism, assault, hate crime, and in rare cases, an active shooter—and how to help prevent them from occurring. Beginning with an overview of the basic security concepts and principles that can enhance the security of any religious facility, it then delves deeply into the particular security concerns of houses of worship, including the use of volunteers, protecting religious leaders, ensuring safety for children and teens, interacting with local law enforcement, handling the media, and much more.