This book describes the complex processes involved in styrene degradation by microbes, including highly adaptive microorganisms, the various enzymes involved in styrene biodegradation, new styrene-catabolic routes, novel regulatory mechanisms, and the genes coding for styrene metabolizing enzymes. Numerous biotechnological applications are discussed, such as the development of sustainable eco-f…
Leak Detection: Technology and Implementation assists water utilities with the development and implementation of leak detection programs. Leak detection and repair is one of the components of controlling water loss. In addition, techniques are discussed within this book and relevant case studies are presented. The book provides useful and practical information on leakage issues.
This book demonstrates the inevitability of a continuously growing role of data in our society and it stresses that this role does not need to be threatening: to the contrary, collection and analysis of data can help us prevent traffic jams, suppress epidemics, or produce tailor made medicine. The authors sketch the contours of a new information society, in which everything will be measured fro…
In this important collection of essays by practitioners and scholars that has been downloaded nearly half a million times is an overview of some of the most pressing issues in online education. By addressing transformations arising from educational technology advances and the new business conditions and modes of delivery of education, the contributors to The Theory and Practice of Online Learni…
Casting doubt on the assertion that online discourse, with its proliferation of voices, will somehow yield collective wisdom, Speaking Power to Truth raises concerns that this wealth of digitally enabled commentary is, in fact, too often bereft of the hallmarks of intellectual discourse: an epistemological framework and the provision of evidence to substantiate claims. Instead, the pursuit of t…
This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their waterm…
Water pricing to achieve conservation in scarce water resources is a major policy challenge. This book provides credible evidence from water pricing experiences in various countries around the world. The book chapters, written by experts in water pricing from various countries, documents the past 10 to 15 years of water pricing experiences in Australia, Brazil, Canada, China, Colombia, France, …
This book provides an overview of state-of-the-art technologies for energy conversion from waste, as well as a much-needed guide to new and advanced strategies to increase Waste-to-Energy (WTE) plant efficiency. Beginning with an overview of municipal solid waste production and disposal, basic concepts related to Waste-To-Energy conversion processes are described, highlighting the most relevant…
This book begins with an introduction to PBXs (Private Branch Exchanges) and the scene, statistics and involved actors. It discusses confidentiality, integrity and availability threats in PBXs. The author examines the threats and the technical background as well as security and forensics involving PBXs. The purpose of this book is to raise user awareness in regards to security and privacy threa…
The interdisciplinary research and development work carried out in the last ten years which is presented in this book aimed at replacing the conventional airport control tower by a new “remote tower operation” work environment (RTO) which should enhance work efficiency and safety and reduce costs. This revolutionary human–system interface allows for remote aerodrome traffic control withou…