You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Presents a global history of dress regulation and debates around how human life and societies should be visualised and materialised.
Here is an authoritative reference work that makes biographies of prominent Mexican national politicians from the period 1884–1934 available in English. Like the author's biographical directory for the years 1935–2009, it draws on many years of research in Mexico and the United States and seeks not only to provide accurate biographical information about each entry but also, where possible and appropriate, to connect these politicians to more recent leadership generations. Thus, Mexican Political Biographies, 1884-1934 not only is a useful historical source but also provides additional information on the family backgrounds of many contemporary figures. The work includes those figures who ...
The new 2030 Agenda for Sustainable Development includes water, sanitation, and hygiene (WASH) at its core. A dedicated Sustainable Development Goal (SDG 6) declares a commitment to "ensure availability and sustainable management of water and sanitation for all." Monitoring progress toward this goal will be challenging: direct measures of water and sanitation service quality and use are either expensive or elusive. However, reliance on household surveys poses limitations and likely overstated progress during the Millennium Development Goal period.In Innovations in WASH Impact Measures: Water and Sanitation Measurement Technologies and Practices to Inform the Sustainable Development Goals, we...
None
This book constitutes the refereed proceedings of the 4th International Conference on Computational Intelligence in Security for Information Systems, CISIS 2011, held in Torremolinos-Málaga, in June 2011 as a satellite event of IWANN 2011, the International Work-Conference on Artificial and Natural Neural Networks. The 38 revised full papers presented were carefully reviewed and selected from a total of 70 submissions. The papers are organized in topical sections on machine learning and intelligence, network security, cryptography, securing software, and applications of intelligent methods for security.