Wind energy technology has progressed enormously over the last decade. In coming years it will continue to develop in terms of power ratings, performance and installed capacity of large wind turbines worldwide, with exciting developments in offshore installations.
Designed to meet the training needs of wind engineers, this...
The proliferation of new information technologies throughout the world has raised some important questions for policymakers as to how developing countries can benefit from their diffusion. This important volume compares the advantages and disadvantages of the IT revolution through detailed studies of a variety of developed and developing nations...
This book presents the proceedings of the 20th Congress of the International Ergonomics Association (IEA 2018), held on August 26-30, 2018, in Florence, Italy. By highlighting the latest theories and models, as well as cutting-edge technologies and applications, and by combining findings from a range of disciplines including...
In April l999 an article appeared in Fishing News under the headline ‘Dredging and pollution hit stocks far more than fishing’. The article reported on claims made by an environmental group that these two anthropogenic impacts are causing a far greater decline of fish stocks in the North Sea than ‘supposed overfishing’ and...
The OECD Information Technology Outlook 2010 has been prepared by the OECD under the guidance of the OECD Committee for Information, Computer and Communications Policy (ICCP), and in particular the Working Party on the Information Economy. This edition is the tenth in a biennial series designed to provide members with a broad overview of...
Welcome to the MCSA/MCSE Self-Paced Training Kit: Implementing and Administering Security in a Microsoft Windows 2000 Network, Exam 70-214. This book provides in-depth and detailed information about the major security services in Microsoft Windows 2000 networks, including securing desktops and servers using Group Policy, configuring and managing...
As Information Technology becomes a vital part of our everyday activities, ranging from personal use to government and defense applications, the need to develop high-assurance systems increases. Data and applications security and privacy are crucial elements in developing such systems.
These papers on Intelligent Data Analysis and Management (IDAM) examine issues related to the research and applications of Artificial Intelligence techniques in data analysis and management across a variety of disciplines. The papers derive from the 2013 IDAM conference in Kaohsiung ,Taiwan. It is an interdisciplinary research field involving...
This book analyses the circular migration of care workers in Central Europe using the example of Slovak carers in 24-hour care provision for the elderly in Austria. Challenging analyses that focus primarily on care drain and care regimes, Bahna and Sekulová supplement quantitative methodology with qualitative fieldwork to...
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...
"If you've got nothing to hide," many people say, "you shouldn't worry about government surveillance." Others argue that we must sacrifice privacy for security. But as Daniel J. Solove argues in this important book, these arguments and many others are flawed. They are based on mistaken views about what it means to...