This volume is the most up-to-date text available on diffuse malignant mesothelioma and includes all the newest imaging modalities, immunohistochemical features, and ever-expanding information on the molecular characteristics of the cancer. In-depth chapters contain fully referenced text as well as detailed tables and images. While the primary audiences for this book are pathologists and pathol…
This textbook provides an introduction to changes that occur in solids such as ceramics, mainly at high temperatures, which are diffusion controlled, as well as presenting research data. Such changes are related to the kinetics of various reactions such as precipitation, oxidation and phase transformations, but are also related to some mechanical changes, such as creep. The book is composed of …
This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of prop…
This book is a new media mini-book covering concepts central to digital audio editing using the Audacity 2.1.1 open source software package which also apply to all of the professional audio editing packages. The book builds upon the foundational concepts of MIDI, synthesis (artificially created digital audio), and sampled waveforms (analog audio turned into digital audio). The book gets more ad…
Digital Darwinism is a key challenge for all companies and brands. Not all companies and managers are aware of the challenges lying ahead. This book helps to identify the need for change and adaption based on a framework of findings and additional tools to position you and your company in the digital rat race
Drs. Pelton and Singh warn of the increasing risks of cybercrime and lay out a series of commonsense precautions to guard against individual security breaches. This guide clearly explains the technology at issue, the points of weakness, and the best ways to proactively monitor and maintain the integrity of individual networks. Covering both the most common personal attacks of identity fraud, ph…
This book presents a selection of the best papers from the HEaRT 2013 conference, held in Cosenza, Italy, which provided a valuable forum for engineers and architects, researchers and educators to exchange views and findings concerning the technological history, construction features and seismic behavior of historical timber-framed walls in the Mediterranean countries. The topics covered are wi…
This book presents a selection of the best papers from the HEaRT 2013 conference, held in Cosenza, Italy, which provided a valuable forum for engineers and architects, researchers and educators to exchange views and findings concerning the technological history, construction features and seismic behavior of historical timber-framed walls in the Mediterranean countries. The topics covered are wi…
Histories of Transnational Crime provides a broad, historical framework for understanding the developments in research of transnational crime over the centuries. This volume provides examples of transnational crime, and places them in a broad historical context, which has so far been missing from this field of study. The contributions to this comprehensive volume explore the causes and historic…
For more than three decades, researchers, policy makers and educationalists have all harboured great expectations towards the use of technology in schools. This belief has received a hard knock after an OECD 2015 report has shown that computers do not improve pupil results: Investing heavily in school computers and classroom technology does not improve pupils' performance, and frequent use of c…