Prosiding Kongres Dunia Ketujuh tentang Manajemen Aset Teknik (WCEAM) yang diadakan di Kota Daejeon, Korea dari tanggal 8-9 Oktober 2012. Termasuk kompilasi makalah mutakhir di lapangan yang mencakup berbagai mata pelajaran yang komprehensif. Mencakup sumber daya untuk praktisi manajemen aset, peneliti dan akademisi, serta mahasiswa sarjana dan pascasarjana di perguruan tinggi dan di industri. …
Human and Minority Rights Protection by Multiple Diversity Governance provides a comprehensive overview and critical analysis of minority protection through national constitutional law and international law in Europe. Using a critical theoretical and methodological approach, this textbook: provides a historical analysis of state formation and nation building in Europe with context of religio…
Originally published in 1945, An Historical and Analytical Bibliography of the Literature of Cryptology provides a comprehensive listing of the most important works written up to that time on cryptography, as well as works in related fields in which cryptography appears. It includes a vast range of materials: scientific and technical works dealing with military, diplomatic, and commercial uses …
The story of the evolution of the urban freeway, the competing visions that informed it, and the emerging alternatives for more sustainable urban transportation. Urban freeways often cut through the heart of a city, destroying neighborhoods, displacing residents, and reconfiguring street maps. These massive infrastructure projects, costing billions of dollars in transportation funds, have be…
Originally published in celebration of Hermann Hesse's 80th birthday, this highly documented study, practical handbook, and reference work for Hesse scholarship is presented in three parts. Mileck gives a short biography of Hesse's life and a general characterization of his writing, followed by a critical history of Hesse scholarship through 1957 organized chronologically, categorically and the…
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, …
In an effort to keep up with a world of too much, life hackers sometimes risk going too far. Life hackers track and analyze the food they eat, the hours they sleep, the money they spend, and how they're feeling on any given day. They share tips on the most efficient ways to tie shoelaces and load the dishwasher; they employ a tomato-shaped kitchen timer as a time-management tool.They see everyt…
We have been looking things up in Wikipedia for twenty years. What began almost by accident—a wiki attached to a nascent online encyclopedia—has become the world's most popular reference work. Regarded at first as the scholarly equivalent of a Big Mac, Wikipedia is now known for its reliable sourcing and as a bastion of (mostly) reasoned interaction. How has Wikipedia, built on a model of r…