You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
"Spatial analysis is an increasingly important tool for detecting numerous risk phenomena, from natural disasters to infrastructure failure, and beyond. This book concentrates on examples based on risk prevention, but also gives approaches and advice for crisis control in the event of an actual occurrence." "The content of the book is segmented to address different landscapes; there are chapters addressing urban applications - in which vulnerabilities are closely concentrated by area - while others address more rural areas, where risk phenomena are more scattered." "Throughout the discussion, a range of case studies are given, providing the reader with accessible demonstrations of the practical application of this field of study."--BOOK JACKET.
Lists of specialists: Soil and water. Constructions. Machinery, mechanisation. Energy. Labour, management and economy. Industrial processing. Development,project approach. Supporting occupations. Curricula vitae.
None
The Art of Communication combines over two decades of research and teaching into a comprehensive guide on strategic communication. Grounded in the theoretical and methodological frameworks of 'situated communication' and 'communication project', this book highlights an understanding of both traditional and emerging communication practices. It particularly focuses on new genres, such as branding, design and digital communication strategies, and introduces the innovative concept of 'textscapes' – specially crafted environments to fulfill communicative objectives. This book is enriched with practical examples and is particularly relevant in multicultural and international settings, providing essential insights for adapting communication strategies to diverse cultural contexts.
IT infrastructures are now essential in all areas and sectors of human activity; they are the cornerstone of any information system. Thus, it is clear that the greatest of care must be given to their design, implementation, security and supervision in order to ensure optimum functionality and better performance. Within this context, Systems and Network Infrastructure Integration presents the methodological and theoretical principles necessary to successfully carry out an integration project for network and systems infrastructures. This book is aimed at anyone interested in the field of networks in general. In particular, it is intended for students of fields relating to networks and computer systems who are called upon to integrate their knowledge and skills, gained throughout their academic study, into a comprehensive project to set up a complete infrastructure, while respecting the necessary specifications.
Catastrophes, it seems, are becoming more frequent in the twenty-first century. According to UN statistics, every year approximately two hundred million people are directly affected by natural disasters_seven times the number of people who are affected by war. Discussions about global warming and fatal disasters such as Katrina and the Tsunami of 2004 have heightened our awareness of natural disasters and of their impact on both local and global communities. Hollywood has also produced numerous disaster movies in recent years, some of which have become blockbusters. This volume demonstrates that natural catastrophes_earthquakes, hurricanes, floods, etc._have exercised a vast impact on humans...
Cyber security is a key issue affecting the confidence of Internet users and the sustainability of businesses. It is also a national issue with regards to economic development and resilience. As a concern, cyber risks are not only in the hands of IT security managers, but of everyone, and non-executive directors and managing directors may be held to account in relation to shareholders, customers, suppliers, employees, banks and public authorities. The implementation of a cybersecurity system, including processes, devices and training, is essential to protect a company against theft of strategic and personal data, sabotage and fraud. Cybersecurity and Decision Makers presents a comprehensive overview of cybercrime and best practice to confidently adapt to the digital world; covering areas such as risk mapping, compliance with the General Data Protection Regulation, cyber culture, ethics and crisis management. It is intended for anyone concerned about the protection of their data, as well as decision makers in any organization.
The humanities and social sciences are interested in the cybersecurity object since its emergence in the security debates, at the beginning of the 2000s. This scientific production is thus still relatively young, but diversified, mobilizing at the same time political science, international relations, sociology , law, information science, security studies, surveillance studies, strategic studies, polemology. There is, however, no actual cybersecurity studies. After two decades of scientific production on this subject, we thought it essential to take stock of the research methods that could be mobilized, imagined and invented by the researchers. The research methodology on the subject "cyberse...