You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
Moritz Föllmer traces the history of individuality in Berlin from the late 1920s to the construction of the Berlin Wall in August 1961. The demand to be recognised as an individual was central to metropolitan society, as were the spectres of risk, isolation and loss of agency. This was true under all five regimes of the period, through economic depression, war, occupation and reconstruction. The quest for individuality could put democracy under pressure, as in the Weimar years, and could be satisfied by a dictatorship, as was the case in the Third Reich. It was only in the course of the 1950s, when liberal democracy was able to offer superior opportunities for consumerism, that individuality finally claimed the mantle. Individuality and Modernity in Berlin proposes a fresh perspective on twentieth-century Berlin that will engage readers with an interest in the German metropolis as well as European urban history more broadly.
This book provides a comprehensive overview of the field of software processes, covering in particular the following essential topics: software process modelling, software process and lifecycle models, software process management, deployment and governance, and software process improvement (including assessment and measurement). It does not propose any new processes or methods; rather, it introduces students and software engineers to software processes and life cycle models, covering the different types ranging from “classical”, plan-driven via hybrid to agile approaches. The book is structured as follows: In chapter 1, the fundamentals of the topic are introduced: the basic concepts, a ...
This book describes the key cybercrime threats facing individuals, businesses, and organizations in our online world. The author first explains malware and its origins; he describes the extensive underground economy and the various attacks that cybercriminals have developed, including malware, spam, and hacking; he offers constructive advice on countermeasures for individuals and organizations; and he discusses the related topics of cyberespionage, cyberwarfare, hacktivism, and anti-malware organizations, and appropriate roles for the state and the media. The author has worked in the security industry for decades, and he brings a wealth of experience and expertise. In particular he offers in...