Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Language: English
    Pages: 1 online resource (382 pages)
    Edition: 1st edition
    Keywords: Electronic books ; local
    Abstract: This fifth edition emphasizes the importance of developing management skills or admitted that learning about management concepts was not the same as learning how to apply those concepts in practice. It is built on a solid foundation of theory and empirical evidence that provides a compelling case for why specific competencies are important. The framework offers managers an enduring foundation for analysing what types of behaviors are most appropriate to achieve organisational goals in light of the existing environment. This edition overall gives a strong background in management skills and concepts needed on the job.
    Note: Online resource; Title from title page (viewed October 12, 2010)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Beijing ; : O'Reilly
    Language: English
    Pages: 1 online resource (vii, 37 p.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Cloud computing ; Computing platforms ; Web services ; Electronic books ; Electronic books ; local
    Abstract: The least understood feature of cloud computing, Platform as a Service (PaaS), is also the most powerful and cost effective. This concise overview shows you why organizations that properly wield PaaS can quickly gain a strong competitive advantage. You'll learn how PaaS enables developers to pursue low cost R&D projects, lets system administrators focus on systems rather than servers, and helps architects evaluate new technology quickly and directly. Many reliable PaaS providers are available today, including services from Amazon, Red Hat, and Google. This book offers valuable advice for technically and not-so-technically minded people who want to understand how PaaS can change the way organizations do computing. Get rudimentary examples of how to initiate projects with a typical PaaS provider Consider language selection, feature set, and general capabilities when evaluating a PaaS solution Automate tasks like continuous integration, unit tests, and builds Learn how to design applications by understanding how PaaS works under the hood Discover the critical difference between scaling up and scaling out Anticipate subtle but important differences between traditional computing and PaaS computing Change the way you think about security in the cloud
    Note: "Unleash the power of cloud computing"--Cover. - Description based on print version record
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Keywords: Detectors ; Biosensors ; Electronic books ; Electronic books ; local
    Abstract: Sensor Technologies: Healthcare, Wellness and Environmental Applications explores the key aspects of sensor technologies, covering wired, wireless, and discrete sensors for the specific application domains of healthcare, wellness and environmental sensing. It discusses the social, regulatory, and design considerations specific to these domains. The book provides an application-based approach using real-world examples to illustrate the application of sensor technologies in a practical and experiential manner. The book guides the reader from the formulation of the research question, through the design and validation process, to the deployment and management phase of sensor applications. The processes and examples used in the book are primarily based on research carried out by Intel or joint academic research programs. " Sensor Technologies: Healthcare, Wellness and Environmental Applications provides an extensive overview of sensing technologies and their applications in healthcare, wellness, and environmental monitoring. From sensor hardware to system applications and case studies, this book gives readers an in-depth understanding of the technologies and how they can be applied. I would highly recommend it to students or researchers who are interested in wireless sensing technologies and the associated applications." Dr. Benny Lo Lecturer, The Hamlyn Centre, Imperial College of London "This timely addition to the literature on sensors covers the broad complexity of sensing, sensor types, and the vast range of existing and emerging applications in a very clearly written and accessible manner. It is particularly good at capturing the exciting possibilities that will occur as sensor networks merge with cloud-based 'big data' analytics to provide a host of new applications that will impact directly on the individual in ways we cannot fully predict at present. It really brings this home through the use of carefully chosen case studies that bring the overwhelming concept of 'big data' down to the personal level of individual life and health." Dermot Diamond Director, National Centre for Sensor Research, Principal Investigator, CLARITY Centre for Sensor Web Technologies, Dublin City University "Sensor Technologies: Healthcare, Wellness and Environmental Applications takes the reader on an end-to-end journey of sensor technologies, covering the fundamentals from an engineering perspective, introducing how the data gleaned can be both processed and visu...
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed Jan. 21, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781119978022 , 1119978025
    Language: English
    Pages: 1 online resource (1 v.) , ill.
    Parallel Title: Erscheint auch als
    Keywords: Consolidation and merger of corporations ; Management ; Electronic books ; Electronic books ; local
    Abstract: Few business activities can match Mergers & Acquisitions (M&A) in terms of the potential for reward and for danger. A successful merger or acquisition can allow a mid-tier company to leap into the top tier, bringing rich rewards to that company, and its employees and shareholders. The failure of a merger can, on the other hand, have a devastating impact, resulting a loss of credibility, destruction of value and in some cases bringing the parties to ruin. Depending on how you measure it, between 50% and 80% of M&A deals fail to attain their objectives, before or even after the deal is done. Practical M&A Execution and Integration is all about maximising your chances of success. Merging, de-merging, acquiring or acquired, if your organisation is involved, or likely to be involved, you will need to manage the process, and following this Handbook will give you a clear, simple framework to get the job done and help your organisation move on and attain the benefits and promise of the deal. The book covers the following core topics: Fundamentals of M&A; the reasons for M&A, types of M&A deals and the challenges they present M&A Regulation Successful M&A, covering M&A power and providing a detailed look at the processes and people involved Delivering M&A The unique issues of Banking M&A, which differs significantly from other types of M&A deals. The final section consists of document templates and suggested tables of contents which are designed to be used alongside the advice in the book, thus making Practical M&A Execution and Integration the complete guide to constructing a successful M&A deal.
    Note: Includes bibliographical references and index. - Description based on print version record
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 1417552654 , 9781417552658 , 008047876X , 9780080478760
    Language: English
    Edition: Boulder, Colo NetLibrary Online-Ressource E-Books von NetLibrary
    Series Statement: EBSCOhost eBook Collection
    Parallel Title: Print version Investigating child exploitation and pornography
    Keywords: Child abuse. ; Children in pornography. ; Child abuse ; Child pornography ; Child pornography ; Child abuse ; Child abuse. ; Children in pornography. ; FAMILY & RELATIONSHIPS ; Abuse ; Child Abuse ; Child abuse ; Child pornography ; SELF-HELP ; Abuse ; Gerichtliche Wissenschaften ; Internet ; Kinderpornographie ; Verbreitung ; USA ; Electronic books. ; Electronic books ; Electronic books. ; Electronic books ; USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik ; USA ; Kinderpornografie ; Verbreitung ; Internet ; Forensik
    Abstract: Cover -- COVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR
    Description / Table of Contents: CoverCOVER -- CONTENTS -- ABOUT THE AUTHORS -- PREFACE -- ACKNOWLEDGMENTS -- SECTION I THE INFLUENCE OF TECHNOLOGY -- 1. OVERVIEW -- 1.1 BACKGROUND -- 1.2 HISTORY OF CHILD SEXUAL EXPLOITATION -- 1.3 CHILD PORNOGRAPHY -- 1.4 TECHNOLOGY AND CHILD EXPLOITATION -- 1.5 TECHNOLOGY AND PREFERENTIAL SEX OFFENDERS -- 1.6 DEVELOPMENT OF CHILD PORNOGRAPHY LAW -- 1.7 INTERNATIONAL: THE UNITED NATIONS CONVENTION ON THE RIGHTS OF THE CHILD -- 1.8 CONCLUSION -- REFERENCES -- 2. INTERNET APPLICATIONS -- 2.1 IP ADDRESSES AND DOMAIN NAME SYSTEM -- 2.2 E-MAIL -- 2.3 E-GROUPS AND MAILING LISTS -- 2.4 NEWSGROUPS, DISCUSSION BOARDS, AND BULLETIN BOARDS -- 2.5 WEB SITES -- 2.6 CHAT ROOMS AND INSTANT MESSAGING -- 2.7 WEB CAMERAS AND VIDEOPHONES -- 2.8 FILE TRANSFER PROTOCOL (FTP) -- 2.9 PEER-TO-PEER (P2P) -- 2.10 CONCLUSION -- RESOURCES -- 3. CYBER VICTIMS -- 3.1 VICTIMOLOGY -- 3.2 HOW TO PROTECT CHILDREN ONLINE -- 3.3 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 4. CYBER OFFENDERS -- 4.1 THE ONLINE SEXUAL PREDATOR -- 4.2 THE CHILD MOLESTER -- 4.3 MODUS OPERANDI: HOW ONLINE CHILD MOLESTERS OPERATE -- 4.4 SIGNATURE AND THE ONLINE CHILD MOLESTER -- 4.5 PROFILING THE CHILD MOLESTER -- 4.6 THE SUBCULTURE OF CHILD PORNOGRAPHY -- 4.7 CONCLUSION -- REFERENCES -- 5. SOURCES OF DIGITAL EVIDENCE -- 5.1 OPEN COMPUTER SYSTEMS -- 5.2 EMBEDDED COMPUTER SYSTEMS -- 5.3 COMMUNICATION SYSTEMS -- 5.4 PERIPHERAL DEVICES -- REFERENCES -- SECTION II INVESTIGATING INTERNET CHILD EXPLOITATION -- 6. UNDERCOVER OPERATIONS -- 6.1 SELF-PROTECTION -- 6.2 USING PERSONAL EQUIPMENT -- 6.3 SETTING UP INTERNET AND TELEPHONE CONNECTIONS -- 6.4 USING ONLINE UNDERCOVER IDENTITIES -- 6.5 CONDUCTING AN ONLINE INVESTIGATION -- 6.6 DOCUMENTING PREDISPOSITION OF THE SUSPECT TO COMMIT A CRIME -- 6.7 PREPARING FOR A MEETING OR SEARCH -- 6.8 AGENCIES AND RESOURCES -- 6.9 CONCLUSION -- REFERENCES -- INTERNET RESOURCES -- 7. COLLECTING AND PRESERVING EVIDENCE ON THE INTERNET -- 7.1 PRESERVING EVIDENCE ON THE INTERNET -- 7.2 FINDING EVIDENCE ON THE INTERNET -- 7.3 COLLECTING REMOTE EVIDENCE -- REFERENCES -- 8. TRACKING ON THE INTERNET -- 8.1 ATTRIBUTION AND CONTINUITY OF OFFENSE -- 8.2 TRACKING INTERNET ACTIVITIES -- 8.3 OVERCOMING CHALLENGES TO ATTRIBUTION -- REFERENCES -- 9. SEARCH AND SEIZURE IN CYBERSPACE I: DRAFTING WARRANTS AND WARRANTLESS SEARCHES -- 9.1 SEARCH WARRANT DRAFTING -- 9.2 SEARCH WARRANTS IN GENERAL -- 9.3 CHILD PORNOGRAPHY SENT VIA THE INTERNET- SEARCH WARRANT FOR INTERNET ACCOUNT -- 9.4 ENTICEMENT OF A MINOR -- 9.5 GROOMING EVIDENCE -- 9.6 THE AFFIDAVIT-PROBABLE CAUSE -- 9.7 ARREST WARRANTS -- 9.8 WARRANTLESS SEARCHES -- 9.9 CONCLUSION -- REFERENCES -- 10. SEARCH AND SEIZURE IN CYBERSPACE II: EXECUTING THE SEARCH -- 10.1 SEARCH WARRANTS -- 10.2 EVIDENCE HANDLING -- 10.3 OBTAINING A SECOND WARRANT -- 10.4 EXECUTING INTERNET SERVICE PROVIDER SEAR.
    Note: Title from ebook title screen (viewed Nov. 9, 2004) , Includes bibliographical references and index , Made available through NetLibrary; access may be limited to NetLibrary affiliated libraries , Mode of access: World Wide Web.
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Volltext  (Deutschlandweit zugänglich)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Purdue University Press
    ISBN: 9781557539014 , 9781557538994
    Language: Undetermined
    Pages: 1 Online-Ressource
    Series Statement: Purdue Studies in Romance Literatures
    Keywords: Literature: history & criticism ; Literary studies: general
    Abstract: Four hundred years since its publication, Miguel de Cervantes's Don Quixote continues to inspire and to challenge its readers. The universal and timeless appeal of the novel, however, has distanced its hero from its author and its author from his own life and the time in which he lived. The discussion of the novel's Catholic identity, therefore, is based on a reading that returns Cervantes's hero to Cervantes's text and Cervantes to the events that most shaped his life. The authors and texts McGrath cites, as well as his arguments and interpretations, are mediated by his religious sensibility. Consequently, he proposes that his study represents one way of interpreting Don Quixote and acts as a complement to other approaches. It is McGrath's assertion that the religiosity and spirituality of Cervantes's masterpiece illustrate that Don Quixote is inseparable from the teachings of Catholic orthodoxy. Furthermore, he argues that Cervantes's spirituality is as diverse as early modern Catholicism. McGrath does not believe that the novel is primarily a religious or even a serious text, and he considers his arguments through the lens of Cervantine irony, satire, and multiperspectivism. As a Roman Catholic who is a Hispanist, McGrath proposes to reclaim Cervantes's Catholicity from the interpretive tradition that ascribes a predominantly Erasmian reading of the novel. When the totality of biographical and sociohistorical events and influences that shaped Cervantes's religiosity are considered, the result is a new appreciation of the novel's moral didactic and spiritual orientation
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    [Erscheinungsort nicht ermittelbar] : Springer Nature
    ISBN: 9781430260141
    Language: English
    Pages: 1 Online-Ressource (336 p.)
    Keywords: Computer science
    Abstract: Computer science
    Note: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...