Anticipatory optimization for dynamic decision making relies on a number of different
scientific disciplines. On a general level, the foundations of the field may be
localized at the intersection of operations research, computer science and decision
theory. Closer inspection reveals the important role of branches such as simulation,...
How did today's rich states first establish modern fiscal systems? To answer this question, Political Transformations and Public Finances by Mark Dincecco examines the evolution of political regimes and public finances in Europe over the long term. The book argues that the emergence of efficient fiscal institutions was the result of two...
This book describes the vast opportunity created by unifying science and integrating technology, and recommends transforming ideas for individuals and society. We stand at the threshold of a new renaissance in knowledge based on the structure and behavior of matter from the nanoscale up to the most complex system yet discovered, the human brain....
The Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new...
A toolkit for giving our historic built environment a second life
Conservation of our existing structures has obvious economic and social value. Moreover, historic structures provide an excellent laboratory for studying aspects of structural engineering, materials science, forensic engineering, and building design. Structural...
Welcome to my tenth book covering the technology in Microsoft Exchange Server and its surrounding ecosystem. I seem to have been constantly writing about Exchange since before its introduction as version 4.0 in March 1996 in books and many articles printed in the redoubtable Windows IT Pro magazine (http://www.windowsitpro.com). All my...
Due Diligence and the Business Transaction: Getting a Deal Done is a practical guide to due diligence for anyone buying or selling a privately held business or entering into a major agreement with another company.
When you’re buying a business, it’s wise to conduct due...
Fully revised for the very latest EnCE exam and EnCase software
EnCE certification tells the world that you've not only mastered the use of EnCase Forensic Software, but also that you have acquired the in-depth forensics knowledge and techniques you need to conduct complex computer examinations. This official study guide,...
In this revised and expanded edition, leading forensic scientist John Trestrail offers a pioneering survey of all that is known about the use of poison as a weapon in murder. Topics range from the use of poisons in history and literature to convicting the poisoner in court, and include a review of the different types of poisons, techniques...
The complete mapping of the human genome, along with the development of sophisticated molecular technologies, has accelerated research on the relationship between nutrients and genes. This has led to compelling evidence garnered from epidemiological and experimental observations supporting the idea that the interaction between nutrients and...
Spinal trauma is a potentially devastating occurrence associated with significant morbidity and mortality. Fortunately, with improved ‘‘in-field’’ management protocols, ‘‘in-hospital’’ resuscitation measures, and further insight into the pathophysiology of spinal cord injury, progress is being made...
Privacy, Security and Trust within the Context of Pervasive Computing is an edited volume based on a post workshop at the second international conference on Pervasive Computing. The workshop was held April18-23, 2004, in Vienna, Austria. The goal of the workshop was not to focus on specific, even novel mechanisms, but rather on the interfaces...