Home | Amazing | Today | Tags | Publishers | Years | Search 
Persistent Creativity: Making the Case for Art, Culture and the Creative Industries (Sociology of the Arts)
Persistent Creativity: Making the Case for Art, Culture and the Creative Industries (Sociology of the Arts)

Recent years have seen the increasing valuation and promotion of ‘creativity’. Future success, we are often assured, will rest on the creativity of our endeavours, often aligned specifically with ‘cultural’ activity. This book considers the emergence and persistence of this pattern, particularly with regards...

The Family Business Group Phenomenon: Emergence and Complexities
The Family Business Group Phenomenon: Emergence and Complexities

This edited collection analyses the unexplored concept of the family business group, evaluating the opportunities and advantages that it creates for entrepreneurs. Raising a number of important questions, the authors construct a new research agenda for the complex topic of the family business group, which will ultimately assess its...

Transforming Japanese Business: Rising to the Digital Challenge (Future of Business and Finance)
Transforming Japanese Business: Rising to the Digital Challenge (Future of Business and Finance)

This book explores how the business transformation taking place in Japan is influenced by the digital revolution. Its chapters present approaches and examples from sectors commonly understood to be visible arenas of digital transformation?3D printing and mobility, for instance?as well as some from not-so-obvious sectors, such as...

Location-Based Gaming: Play in Public Space
Location-Based Gaming: Play in Public Space
Location-based games emerged in the early 2000s following the commercialisation of GPS and artistic experimentation with ‘locative media’ technologies. Location-based games are played in everyday public spaces using GPS and networked, mobile technologies to track their players’ location. This book traces the...
EU Influence Beyond Conditionality: Turkey Plus/Minus the EU
EU Influence Beyond Conditionality: Turkey Plus/Minus the EU
This book presents an in-depth analysis of the role played by the EU accession process in Turkey’s democratic evolution and in the empowerment of the Justice and Development Party (AKP) in the early 2000s. Often moving against the grain of consolidated analytical positions, the author finds that the accession process can have a critical...
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software
Securing the Perimeter: Deploying Identity and Access Management with Free Open Source Software

Leverage existing free open source software to build an identity and access management (IAM) platform that can serve your organization for the long term. With the emergence of open standards and open source software, it’s now easier than ever to build and operate your own IAM stack.

The most common culprit of...

Principles of Distributed Database Systems
Principles of Distributed Database Systems
This third edition of a classic textbook can be used to teach at the senior undergraduate and graduate levels. The material concentrates on fundamental theories as well as techniques and algorithms. The advent of the Internet and the World Wide Web, and, more recently, the emergence of cloud computing and streaming data applications, has forced...
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)
The Art of War in the Network Age: Back to the Future (Information Systems, Web and Pervasive Computing Series: Intellectual Technologies Set)

Previous studies have looked at the contribution of information technology and network theory to the art of warfare as understood in the broader sense. This book, however, focuses on an area particularly important in understanding the significance of the information revolution; its impact on strategic theory. The purpose of the book is to...

Computers Under Attack: Intruders, Worms and Viruses
Computers Under Attack: Intruders, Worms and Viruses

This book is broken down into 6 parts. The first describes the emergence of a worldwide network of computers, here called Worldnet, and the practices that people have engaged in as a result. The second part describes the problem of electronic breakins. The third part deals with the phenomenon of worms. The fourth part deals with viruses. The...

Information: A Very Short Introduction
Information: A Very Short Introduction

We live in a society that is awash with information, but few of us really understand what information is. In this Very Short Introduction, one of the world's leading authorities on the philosophy of information and on information ethics, Luciano Floridi, offers an illuminating exploration of information as it relates to both...

Guided Self-Organization: Inception (Emergence, Complexity and Computation)
Guided Self-Organization: Inception (Emergence, Complexity and Computation)

Is it possible to guide the process of self-organisation towards specific patterns and outcomes? Wouldn’t this be self-contradictory? After all, a self-organising process assumes a transition into a more organised form, or towards a more structured functionality, in the absence of centralised control. Then...

Raspberry Pi Embedded Projects Hotshot
Raspberry Pi Embedded Projects Hotshot

This book is targeted towards beginners and intermediate designers of mechatronic systems and embedded system design. Some familiarity with the Raspberry Pi and Python programming is preferred but not required.

The Raspberry Pi is a quaint example of technological innovations that come by once every two or three decades and set off...

Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy