Investors and analysts often need to look into a firm's operations more deeply than traditional financial statements and models allow. This book describes newly developed tools for using operations metrics to discern and influence the valuation of a firm. It is the first to present these techniques from a unified perspective: that of...
The importance of food packaging hardly needs emphasizing since only a handful of foods are sold in an unpackaged state. With an increasing focus on sustainability and cost-effectiveness, responsible companies no longer want to over-package their food products, yet many remain unsure just where reductions can effectively be made. Food...
Build an enterprise search engine using Apache Solr: index and search documents; ingest data from varied sources; apply various text processing techniques; utilize different search capabilities; and customize Solr to retrieve the desired results. Apache Solr: A Practical Approach to Enterprise Search explains each essential...
Large investments have been made by various governments for the deployment of broadband within their respective nations; however, the citizens of such countries have demonstrated a slow adoption of this technology.
The Handbook of Research on Global Diffusion of Broadband Data Transmission explores broadband adoption and the...
Inverse limits provide a powerful tool for constructing complicated spaces from simple ones. They also turn the study of a dynamical system consisting of a space and a self-map into a study of a (likely more complicated) space and a self-homeomorphism. In four chapters along with an appendix containing background material the authors...
Since the pioneering work of Joseph Schumpeter (1942), it has been assumed that innovations typically play a key role in firms’ competitiveness. This assumption has been applied to firms in both developed and developing countries. However, the innovative capacities and business environments of firms in developing countries are...
Credible Checklists and Quality Questionnaires starts off with an examination of the critical but commonly overlooked checklist method.
In the second chapter, questionnaires and surveys are discussed. Asking questions sounds simple, but the hard truth is that asking questions (and designing questionnaires) is a...
This book examines the origins of modern corporate finance systems during the rapid industrialization period leading up to World War I. The study leads to three sets of conclusions. First, modern financial systems are rooted in the past, are idiosyncratic to specific countries, and are highly path-dependent. Therefore, to understand current...
American social critics in the 1970s, convinced that their nation was in decline, turned to psychoanalysis for answers and seized on narcissism as the sickness of the age. Books indicting Americans as greedy, shallow, and self-indulgent appeared, none more influential than Christopher Lasch's famous 1978 jeremiad The Culture of...
Technology’s influence on privacy not only concerns consumers, political leaders, and advocacy groups, but also the software architects who design new products. In this practical guide, experts in data analytics, software engineering, security, and privacy policy describe how software teams can make privacy-protective features...
Fashion Branding and Consumer Behaviors presents eye-opening theory, literature review and original research on the mutual influence of branding strategies and consumer response. Contributors use multiple methods to analyze consumers' psychosocial needs and the extent that their fulfillment goes beyond the usefulness or value of...
The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the...