The vehicle for hire (VFH) market - broadly comprising taxis, limousines, and app-based transport - has faced multiple and significant changes over the years, with the period since 2010 a time of major upheaval.
Linked Data for Digital Humanities provides insights into how digital technologies can enrich and diversify humanities scholarship and make it pioneering in the digital age.
This book is an essential guide or foundational toolkit for anyone who is involved in the process of developing, offering or selling any type of product or service.
Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation.
Today's product development teams have to comprise an integrated group of professionals working from the very beginning of new product planning through design creation and design review and then on to manufacturing planning and cost accounting.
The Business-Focused, Best-Practice Guide to Succeeding with ITIL Change and Release Management ITIL(R) (Information Technology Infrastructure Library(R)) can help organizations streamline and integrate their operations, dramatically improving efficiency and delivering greater business value.
Introduction to Emergency Management, Third Edition provides a comprehensive update of this foundational text on the background components and systems involved in the management of disasters and other emergencies.
Updated for a post-Covid world, the second edition of this groundbreaking book explains why becoming a Humachine enterprise is the only way forward for a company to maintain a competitive advantage in the age of artificial intelligence (AI).
Updated for a post-Covid world, the second edition of this groundbreaking book explains why becoming a Humachine enterprise is the only way forward for a company to maintain a competitive advantage in the age of artificial intelligence (AI).
The wholesale capture and distribution of knowledge over the last thirty years has created an unprecedented need for organizations to manage their knowledge assets.
This revised edition retains the exceptional organization and coverage of the previous editions and is designed for the training and certification needs of first-line security officers and supervisors throughout the private and public security industry.
This latest edition of Effective Security Management retains the qualities that made the previous editions a standard of the profession: a readable, comprehensive guide to the planning, staffing, and operation of the security function within an organization.
School Security: How to Build and Strengthen a School Safety Program, Second Edition emphasizes a proactive rather than reactive approach to school security.
In the digital-driven economy era, an AI-oriented competency framework (AIoCF) is a collection to identify AI-oriented knowledge, attributes, efforts, skills, and experiences (AKASE) that directly and positively affect the success of employees and the organization.
Although some people had doubts about the usefulness of such solutions in the past, artificial intelligence (AI) plays a growing role in modern business.
This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools.
Over the past year there has been a shift within the computer security world away from passive, reactive defense towards more aggressive, proactive countermeasures.
Vulnerability Assessment of Physical Protection Systems guides the reader through the topic of physical security with a unique, detailed and scientific approach.
The National Security Agency's INFOSEC Assessment Methodology (IAM) provides guidelines for performing an analysis of how information is handled within an organization: looking at the systems that store, transfer, and process information.
A practical reference written to assist the security professional in clearly identifying what systems are required to meet security needs as defined by a threat analysis and vulnerability assessment.
This volume brings together for the first time the diverse threads within the growing field of serendipity research, to reflect both on the origins of this emerging field within different disciplines as well as its increasing influence as its own field with foundational texts and emerging practices.
In reaction to the continually changing business climate companies develop many business strategies to increase their competitiveness and improve profitability.
Integrated Security Systems Design is a one-stop resource for security directors, consultants, engineers and installation managers who are interested in providing the best possible security while saving millions in improved operations efficiency.
Multistate System Reliability with Dependencies explains how to select a model of load sharing that best describes the impact of changes in reliability states of components.
Volume 9: Historical Perspectives, Part B: Notable People in Mass Spectrometry of The Encyclopedia of Mass Spectrometry briefly reviews the lives and works of many of the major people who carried out this development, providing insights into the history of mass spectrometry applications through the personal stories of pioneers and innovators in the field.
Seven Deadliest Web Application Attacks highlights the vagaries of web security by discussing the seven deadliest vulnerabilities exploited by attackers.
In today's competitive global economy, a firm's market position and bottom-line financial performance is closely linked to its supply chain performance.
Become a master consultant using the training program created and used by OracleThe Oracle Consulting Way provides the essential tools and people skills a consultant must have to build trusted client relationships that lead to long-term business.