|
Showing 1 - 25 of
222 matches in All Departments
1. The book foregrounds the voices of Australian Aboriginal people
who are involved in ‘Caring for Country’. 2. The text is an
essential resource for those engaged in the study of Country,
heritage, museums, indigenous peoples, landscape architecture,
environmental studies, planning and archaeology. It will also be of
great interest to heritage practitioners working around the globe.
3. The book will be one of the first titles to offer a true
counter-narrative to the Western notion of heritage.
1. The book foregrounds the voices of Australian Aboriginal people
who are involved in ‘Caring for Country’. 2. The text is an
essential resource for those engaged in the study of Country,
heritage, museums, indigenous peoples, landscape architecture,
environmental studies, planning and archaeology. It will also be of
great interest to heritage practitioners working around the globe.
3. The book will be one of the first titles to offer a true
counter-narrative to the Western notion of heritage.
This revision guide for students delivers the essentials of dosage
formulation in a concise and easy-to-use format.
What should and should not be considered an affordance is still an
open issue. This special issue expands on the 2002 North American
meeting of the International Society for Ecological Psychology
covering this topic. The first article argues that affordances are
properties of the animal-environment system and are emergent
properties that do not inhere in either the environment or the
animal. The next paper focuses on four issues regarding
affordances: the ontological status, whether or not they are
necessarily related to (one's own) actions, the relation between
affordances and effectivities, and the nesting of affordances.
Finally, several exemplars of phenomenologically driven perceptual
research are examined, as well as the advantages over extant
theories of affordances.
Desperately Young introduces the masterpieces left behind by some
of the greatest rising stars in fine art - all of whom died before
their thirtieth birthday. Precocious talent seeps from each
artist's work, along with a sense of unfulfilled potential.
Informative biographies detail their legacies, while their tragic
deaths lead us to wonder what heights they might've reached, had
their lives not been cut short. Richly illustrated, Desperately
Young presents prime examples of each artist's work, demonstrating
how our cultural heritage is just a little narrower for their loss.
From Europe to America to Japan and the Indian Subcontinent, the
mid-14-hundreds to the late 20th century, this book hails the
acknowledged greats and introduces those who died before they could
leave an indelible mark on history. A compendium of 109 artists who
fell prey to sickness, warfare, heartbreak or bad luck, Desperately
Young is the only book to provide an in-depth study of artists who
died young. Contents: With works from Tommaso Masaccio, Frederic
Bazille, Thomas Girtin, Egon Schiele, Henri Regnault, Ernst Klimt,
Jeanne Hebuterne, Kaita Murayama, Hermann Stenner, Maurycy
Gottlieb, Fyodor Vasilyev, Marie Bashkirtseff, Richard Parkes
Bonington, Luisa Anguissola, Walter Deverell, August Macke, Pauline
Boty and Jean-Michel Basquiat - among many others.
Taking both a retrospective and prospective view of the management
of cultural heritage in the region, this volume argues that the
plurality and complexity of heritage in the region cannot be
comprehensively understood and effectively managed without a
broader conceptual framework like the cultural landscape approach.
The book also demonstrates that such an approach facilitates the
development of a flexible strategy for heritage conservation.
Acknowledging the effects of rapid socio-economic development,
globalization and climate change, contributors examine the pressure
these issues place on the sustenance of cultural heritage.
Including chapters from more than 20 countries across the
Asia-Pacific region, the volume reviews the effectiveness of
theoretical and practical potentials afforded by the cultural
landscape approach and examines how they have been utilized in the
Asia-Pacific context for the last three decades. The Routledge
Handbook of Cultural Landscape Heritage in the Asia-Pacific
provides a comprehensive analysis of the processes of cultural
landscape heritage conservation and management. As a result, it
will be of interest to academics, students and professionals who
are based in the fields of cultural heritage management,
architecture, urban planning, landscape architecture, and landscape
management.
The next big area within the information and communication
technology field is Artificial Intelligence (AI). The industry is
moving to automate networks, cloud-based systems (e.g.,
Salesforce), databases (e.g., Oracle), AWS machine learning (e.g.,
Amazon Lex), and creating infrastructure that has the ability to
adapt in real-time to changes and learn what to anticipate in the
future. It is an area of technology that is coming faster and
penetrating more areas of business than any other in our history.
AI will be used from the C-suite to the distribution warehouse
floor. Replete with case studies, this book provides a working
knowledge of AI's current and future capabilities and the impact it
will have on every business. It covers everything from healthcare
to warehousing, banking, finance and education. It is essential
reading for anyone involved in industry.
Love Canal. Exxon Valdez. Times Beach. Sacramento River Spill.
Amoco Cadiz. Seveso. Every area of the world has been affected by
improper waste disposal and chemical spills. Common hazardous waste
sites include abandoned warehouses, manufacturing facilities,
processing plants, and landfills. These sites poison the land and
contaminate groundwater and drinking water. A sequel to the
bestselling Ecological Risk Assessment, Ecological Risk Assessment
for Contaminated Sites focuses on how to perform ecological risk
assessments for Superfund sites and locations contaminated by
improper disposal of wastes, or chemical spills. It integrates the
authors' extensive experience in assessing ecological risks at U.S.
government sites with techniques and examples from assessments
performed by others. Conducting an ecological risk assessment on a
contaminated site provides the information needed to make decisions
concerning site remediation. The first rule of good risk assessment
is "don't do anything stupid". With the practical preparation you
get from Ecological Risk Assessment for Contaminated Sites you
won't.
Mathematical Modelling of Waves in Multi-Scale Structured Media
presents novel analytical and numerical models of waves in
structured elastic media, with emphasis on the asymptotic analysis
of phenomena such as dynamic anisotropy, localisation, filtering
and polarisation as well as on the modelling of photonic, phononic,
and platonic crystals.
Learn network and data security by analyzing the Anthem breach and
step-by-step how hackers gain entry, place hidden software,
download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of
sites as testbeds to determine successful variations of software
that elude detection, and reaching out across trusted connections
to the entire healthcare system of the nation. Examine the
components of technology being diverted, starting with application
code and how to protect it with isolation approaches. Dissect forms
of infections including viruses, worms, bots, and Trojans; and
encryption with RSA algorithm as the working example.
This book provides a technical description of cloud computing
technologies, covering cloud infrastructure and platform services.
It then addresses the basics of operating a Cloud computing data
center, the services offered from Cloud providers, the carrier role
in connecting users to data centers, and the process of
interconnecting Cloud data centers to form a flexible processing
unit. It also describes how cloud computing has made an impact in
various industries and provides emerging technologies that are
critical within each industry. Lastly, this book will address
security requirements and provide the best practices in securing
data.
This title is suitable for children of ages 6 to 9 years. This book
celebrates the Beijing 2008 Olympic Games with fun and
thought-provoking activities. Students learn about China, as well
as Olympic history, traditions, and the sports that will be played
in 2008. The activities meet standards and benchmarks for art,
geography, history, language arts, and mathematics.
Learn network and data security by analyzing the Anthem breach and
step-by-step how hackers gain entry, place hidden software,
download information, and hide the evidence of their entry.
Understand the tools, establishing persistent presence, use of
sites as testbeds to determine successful variations of software
that elude detection, and reaching out across trusted connections
to the entire healthcare system of the nation. Examine the
components of technology being diverted, starting with application
code and how to protect it with isolation approaches. Dissect forms
of infections including viruses, worms, bots, and Trojans; and
encryption with RSA algorithm as the working example.
Love Canal. Exxon Valdez. Times Beach. Sacramento River Spill. Amoco Cadiz. Seveso. Every area of the world has been affected by improper waste disposal and chemical spills. Common hazardous waste sites include abandoned warehouses, manufacturing facilities, processing plants, and landfills. These sites poison the land and contaminate groundwater and drinking water. A sequel to the bestselling Ecological Risk Assessment, Ecological Risk Assessment for Contaminated Sites focuses on how to perform ecological risk assessments for Superfund sites and locations contaminated by improper disposal of wastes, or chemical spills. It integrates the authors' extensive experience in assessing ecological risks at U.S. government sites with techniques and examples from assessments performed by others. Conducting an ecological risk assessment on a contaminated site provides the information needed to make decisions concerning site remediation. The first rule of good risk assessment is "don't do anything stupid". With the practical preparation you get from Ecological Risk Assessment for Contaminated Sites you won't.
What should and should not be considered an affordance is still an
open issue. This special issue expands on the 2002 North American
meeting of the International Society for Ecological Psychology
covering this topic. The first article argues that affordances are
properties of the animal-environment system and are emergent
properties that do not inhere in either the environment or the
animal. The next paper focuses on four issues regarding
affordances: the ontological status, whether or not they are
necessarily related to (one's own) actions, the relation between
affordances and effectivities, and the nesting of affordances.
Finally, several exemplars of phenomenologically driven perceptual
research are examined, as well as the advantages over extant
theories of affordances.
This book strategically focuses upon the feasibility of positioning
Indigenous Knowledge Systems into tertiary built environment
education and research in Australia. Australian tertiary education
has little engaged with Indigenous peoples and their Indigenous
Knowledge Systems, and the respectful translation of their
Indigenous Knowledge Systems into tertiary education learning. In
contrast, while there has been a dearth of discussion and research
on this topic pertaining to the tertiary sector, the secondary
school sector has passionately pursued this topic. There is an
uneasiness by the tertiary sector to engage in this realm,
overwhelmed already by the imperatives of the Commonwealth's
'Closing the Gap' initiative to advance Aboriginal and Torres
Strait Islander tertiary education successes and appointments of
Indigenous academics. As a consequence, the teaching of Indigenous
Knowledge Systems relevant to professional disciplines,
particularly landscape architecture where it is most apt, is
overlooked and similarly little addressed in the relevant
professional institute education accreditation standards.
The Media of Testimony explores testimony relating to the Stasi in
different cultural forms: autobiographical writing, memorial
museums and documentary film. Combining theoretical models from
diverse disciplines, it presents a new approach to the study of
testimony, memory and mediation.
The Media of Testimony explores testimony relating to the Stasi in
different cultural forms: autobiographical writing, memorial
museums and documentary film. Combining theoretical models from
diverse disciplines, it presents a new approach to the study of
testimony, memory and mediation.
The mystery of how migrating animals find their way over unfamiliar
terrain has intrigued people for centuries, and has been the focus
of productive research in the biological sci ences for several
decades. Whether or not the earth's magnetic field had anything to
do with their navigational abilities has sufaced and been dismissed
several times, beginning at least in the mid to late 1800s. This
topic generally remained out of the mainstream of scientific
research for two reasons: (1) The apparent irreproducibility of
many of the be havioral experiments which were supposed to
demonstrate the existence of the magnetic sense; and (2) Perceived
theoretical difficulties which were encountered when biophysi cists
tried to understand how such a sensory system might operate.
However, during the mid to late 1960s as the science of ethology
(animal behavior) grew, it became clear from studies on bees and
birds that the geomagnetic field is used under a variety of
conditions. As more and more organisms were found to have similar
abilities, the problem shifted back to the question as to the basis
of this perception. Of the various schemes for trans ducing the
geomagnetic field to the nervous system which have been proposed,
the hy pothesis of magnetite-based magnetoreception discussed at
length in this volume has per haps the best potential for
explaining a wide range of these effects, even though this link is
as yet clear only in the case of magnetotactic bacteria."
This book provides a technical description of cloud computing
technologies, covering cloud infrastructure and platform services.
It then addresses the basics of operating a Cloud computing data
center, the services offered from Cloud providers, the carrier role
in connecting users to data centers, and the process of
interconnecting Cloud data centers to form a flexible processing
unit. It also describes how cloud computing has made an impact in
various industries and provides emerging technologies that are
critical within each industry. Lastly, this book will address
security requirements and provide the best practices in securing
data.
This book examines how young people understand and live politics,
using innovative research methods. It treats age, class, gender and
ethnicity as political 'lived experiences'. It concludes that young
people are alienated, rather than apathetic, and that their
interests and concerns are rarely addressed within mainstream
political institutions.
Most studies of political participation among young people focus on
formal political arenas and conclude that young people are
politically apathetic. In contrast, this book aims to establish how
young people understand and live politics, using innovative
research methods. As such, it treats age, class, gender and
ethnicity as political 'lived experiences'. It concludes that young
people are alienated, rather than apathetic, and that their
interests and concerns are rarely addressed within mainstream
political institutions.
This book is structured in a practical, example-driven, manner. The
use of VHDL for constructing logic synthesisers is one of the aims
of the book; the second is the application of the tools to the
design process. Worked examples, questions and answers are provided
together with do and don'ts of good practice. An appendix on logic
design the source code are available free of charge over the
Internet.
|
|