-
Environmental Protection and the Social Responsibility of Firms
Author Richard Professor Vietor , Robert Professor Stavins , Bruce Professor Hay
Everyone agrees that firms should obey the law. But beyond what the law requires-beyond bare compliance with regulations-do firms have additional social responsibilities to commit resources voluntarily to environmental protection? How should we think about firms sac....
Release Date 2010/09 -
Take Control of Syncing in Tiger
Author Michael E. Cohen
Learn how to synchronize all your data between Macs, or with mobile phones, PDAs, and iPods!Frustrated in your attempts to synchronize data between your Macs, or with other devices? Michael E. Cohen is here to help. With clear directions and a humorous touch, his 13....
Release Date 2007/05 -
Take Control of Thanksgiving Dinner
Author Joe Kissell
If you'd like your Thanksgiving preparations to go smoothly (and who wouldn't?), turn to experienced tech writer and foodie Joe Kissell for help. At least half the battle is a good plan, and Joe provides you with a customizable plan that gets you organized, helps ....
Release Date 2012/11 -
Take Control of What’s New in Entourage 2004
Author Tom Negrino
You can take control of Entourage 2004, Microsoft's powerful email client and project manager! If you use Entourage 2004 (or are considering upgrading), you need this ebook to make the most of Entourage's new and enhanced features. Learn how to ban spam from your ....
Release Date 2007/05 -
Scanning Negatives and Slides, 2nd Edition
Author Sascha Steinhoff
Many photographers have either moved into digital photography exclusively or use both analog and digital media in their work. In either case, there is sure to be an archive of slides and negatives that cannot be directly integrated into the new digital workflow, nor....
Release Date 2009/02 -
Author James Forsythe , Burton Goldberg
Cancer rates continue to skyrocket, and the overall survival rate for Stage IV cancer patients in the United States is a grim 2.1 percent. Clearly, the extensive use of expensive, sometimes ineffective toxins in conventional oncology protocols is a failing strategy.....
Release Date 2012/05 -
Author Chris C. Ducker
Entrepreneurs often suffer from superhero syndromethe misconception that to be successful, they must do everything themselves. Not only are they the boss, but also the salesperson, HR manager, copywriter, operations manager, online marketing guru, and so much more. ....
Release Date 2014/04 -
Doing Business in the United States
Author Andrew Rohm , Matthew Stefl , Anatoly Zhuplev
This book serves as a concise guide for businesses seeking to enter the U.S. market from an international perspective. The book examines how the United States is positioned in the global marketplace, the potential for businesses entering the U.S. market, and market....
Release Date 2018/05 -
Fully Compliant: Compliance Training to Change Behavior
Author Travis Waugh
A Better Kind of Compliance TrainingCompliance training succeeds when you balance the needs of not just the organization but also the employees who you hope will learn and change their behavior. In Fully Compliant, Travis Waugh challenges traditional compliance tr....
Release Date 2019/06 -
Author Giulio D'Agostino
Conversations in Cyberspace is a collection of insights on the current state of security and privacy in the Internet world.The book contains a brief introduction to some of the most used open-source intelligence (OSINT) tools and a selection of interviews with some....
Release Date 2019/02 -
Author Dr. Michael J. Urick
Many assumed characteristics of generational groupings are actually “myths,” meaning that generational stereotypes are not accurate across all members of a generation.This book explores the Generation Myth by highlighting the complexity of the “generation” concept ....
Release Date 2019/02 -
Author Keanon J. Alderson
This book presents research-based information to provide the reader a deeper understanding of the complex nature of family owned businesses, their problems and challenges, and the unique governance structures and mechanisms that have been developed to properly guid....
Release Date 2019/04 -
Successful Cybersecurity Professionals
Author Dr. Steven Brown
This book provides a unique perspective into the mindset of psychology and cybersecurity.It presents a view of incorporating the latest research in cybersecurity and behavior. The newest cybersecurity challenge is not just understanding cybercriminals’ behavior, but our b....
Release Date 2020/09 -
Computers and Information Processing for Business
Author Sergio S. Ribeiro
This book is an introduction to computers covering relevant topics that include: computers and society, the Internet, social media, Microsoft Office 2019, and high-level programming.The main goals are to help students to define computers and information processing and des....
Release Date 2020/10 -
Author Russell von Frank
Trust, it binds us together in our deepest most fulfilling relationships, attracts and retains the best employees, and turns clients into raving fans. Let me show you how to heal old wounds, become a sought out business leader to work for, and create a loyal following of ....
Release Date 2020/11 -
Consumer Protection in E-Retailing in ASEAN
This book examines how consumers are protected on the online marketplace in the context of ASEAN countries.While many sectors have been badly affected by the COVID-19 pandemic, e-retailing is one of the booming sectors during this period. Actually, the e-retailing sector was already booming even bef.... -
Social Capital, Social Identities
Author Hans Bernhard Schmid , Christoph Henning , Dieter Thomä
Current research on social capital tends to focus on an economic reading of social relations. Whereas economists pride themselves on reaching out to social theory at-large, sociologists criticize the economization of the social fabric. The concept of social capital....
Release Date 2014/08 -
A Course in Mathematical Cryptography
Author Gerhard Rosenberger , Martin Kreuzer , Benjamin Fine , Gilbert Baumslag
Cryptography has become essential as bank transactions, credit card infor-mation, contracts, and sensitive medical information are sent through inse-cure channels. This book is concerned with the mathematical, especially algebraic, aspects of cryptography. It grew ....
Release Date 2015/06 -
Author Ulrich Hertrampf , Gerhard Rosenberger , Manfred Kufleitner , Volker Diekert
The idea behind this book is to provide the mathematical foundations for assessing modern developments in the Information Age. It deepens and complements the basic concepts, but it also considers instructive and more advanced topics. The treatise starts with a gene....
Release Date 2016/05 -
Systems, Automation and Control
Author Nabil Derbel
Extended versions of awarded contributions of the International Conference on Systems, Analysis and Automatic Control, Barcelona 2014. Among the topics are: Adaptive Control, Predictive Control, Fuzzy Logic Control, System Identification, Expert and Knowledge Based....
Release Date 2016/10 -
Systems, Automation and Control
Author Olfa Kanoun , Faouzi Derbel , Nabil Derbel
The fifth volume of the Series Advances in Systems, Signals and Devices, is dedicated to fields related to Systems, Automation and Control. The scope of this issue encompasses all aspects of the research, development and applications of the science and technology i....
Release Date 2017/12 -
Social dilemmas, institutions, and the evolution of cooperation
Author Wojtek Przepiorka , Ben Jann
The question of how cooperation and social order can evolve from a Hobbesian state of nature of a “war of all against all” has always been at the core of social scientific inquiry. Social dilemmas are the main analytical paradigm used by social scientists to explai....
Release Date 2017/09 -
Author Tsinghua University Tsinghua University Press , Dengguo Feng
The book summarizes key concepts and theories in trusted computing, e.g., TPM, TCM, mobile modules, chain of trust, trusted software stack etc, and discusses the configuration of trusted platforms and network connections. It also emphasizes the application of such ....
Release Date 2017/12 -
Author Mark Redmond
Social decentering theory was developed in response to the confusion created by the use of the term empathy and to a lesser extent, perspective-taking, to reflect a wide and varied set of human cognitive processes and behaviors. Theory of Social Decentering: A Theo....
Release Date 2018/05 -
Social Ontology of Whoness, 3rd Edition
Author Michael Eldred
How are core social phenomena to be understood as modes of being? This book offers an alternative approach to social ontology. Recent interest in social ontology on the part of mainstream philosophy and the social sciences presupposes from the outset that the human....
Release Date 2018/10 -
Author Imke Köhler
There is great power in the use of words: words create most of what we consider to be real and true. Framing our words and narratives is thus a tool of power – but a power that also comes with limitations. This intriguing issue is the topic of Framing the Threat,....
Release Date 2019/03