In an effort to keep up with a world of too much, life hackers sometimes risk going too far. Life hackers track and analyze the food they eat, the hours they sleep, the money they spend, and how they're feeling on any given day. They share tips on the most efficient ways to tie shoelaces and load the dishwasher; they employ a tomato-shaped kitchen timer as a time-management tool.They see everyt…
We have been looking things up in Wikipedia for twenty years. What began almost by accident—a wiki attached to a nascent online encyclopedia—has become the world's most popular reference work. Regarded at first as the scholarly equivalent of a Big Mac, Wikipedia is now known for its reliable sourcing and as a bastion of (mostly) reasoned interaction. How has Wikipedia, built on a model of r…
As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the…
Termasuk prosiding lengkap Kongres Pemasaran Dunia 1993?, Menawarkan penelitian dan wawasan berkualitas di bidang pemasaran global, Termasuk kontribusi yang berkaitan dengan strategi pemasaran, manajemen pemasaran, dan perilaku konsumen. --> Jelas bahwa kongres internasional yang Anda maksud memiliki tujuan yang signifikan untuk memajukan basis pengetahuan dalam pemasaran secara global. Dimasuk…
This book focuses on the multiple and diverse masculinities ‘at work’. Spanning both historical approaches to the rise of ‘profession’ as a marker of masculinity, and critical approaches to the current structures of management, employment and workplace hierarchy, the book questions what role masculinity plays in cultural understandings, affective experiences and mediatised representatio…
Providing many unique MATLAB codes and functions throughout, this book covers the basics of Magnetic Resonance Imaging (MRI), leading to an in-depth understanding of the concepts and tools required for analysis and interpretation of Phase Contrast MR Angiography (PC-MRA). The concept of PC-MRA is often difficult, but essential for practicing engineers and scientists working in MR related areas.…
This book reviews the growing literature that is consistent with the hypothesis that hormones can regulate auditory physiology and perception across a broad range of animal taxa, including humans. Understanding how hormones modulate auditory function has far reaching implications for advancing our knowledge in the basic biomedical sciences and in understanding the evolution of acoustic communic…
Hibernate Recipes, Second Edition contains a collection of code recipes and templates for learning and building Hibernate solutions for you and your clients, including how to work with the Spring Framework and the JPA. This book is your pragmatic day-to-day reference and guide for doing all things involving Hibernate. There are many books focused on learning Hibernate, but this book takes you f…
Used to describe both binary systems and optical doubles, the term 'double star' has been familiar to astronomers since the seventeenth century. This book, first published in 1879, outlines the history of their study, and describes the methods and equipment needed in order to observe the fascinating phenomenon. Written for non-specialists by Fellows of the Royal Society Edward Crossley (1841–…
This fully updated new edition explores the security issues, vulnerabilities and dangers encountered by the users of modern computing and communication devices, highlighting the need to develop improved algorithms, protocols, and best practices to enhance the security of public, private and enterprise systems alike. Features: introduces the fundamentals of traditional computer networks and …