term.subject="administration"

Præciser din søgning:

Emne
Forfatter
Materialetype
Sprog
Årstal
Kilde
Set sort order for search result
HjemmeHjemme
UdlåntUdlånt
Kan ikke reserveresKan ikke reserveres
Læs på biblioteketLæs på biblioteket
Vis antal:102550
  1. VMware performance and capacity management

    • Bog

    VMware performance and capacity management

    2016
    Second edition
    Summary: Master SDDC Operations with proven best practicesAbout This Book Understand the drawbacks of the traditional paradigm and management that make operations difficult in SDDC Master performance and capacity management in Software-Defined Data Center Operationalize performance and capacity monitoring with proven dashboardsWho This Book Is For This book is primarily for any system administrator or cloud infrastructure specialist who is interested in performance management and capacity management using VMware technologies. This book will also help IT professionals whose area of responsibility is not VMware, but who work with the VMware team. You can be Windows, Linux, Storage, or Network team; or application architects. Note that prior exposure to the VMware platform of data-center and cloud-based solutions is expected. What You Will Learn Simplify the task of performance and capacity management Master the counters in vCenter and vRealize Operations and understand their dependency on one another Educate your peers and management on SDDC Operations Complete your SDDC monitoring to include non-VMware components Perform SDDC performance troubleshooting Explore real-life examples of how super metric and advanced dashboards Introduce and implement a Performance SLA Accomplish your Capacity Management by taking into service tiering and performance SLAIn Detail Performance management and capacity management are the two top-most issues faced by enterprise IT when doing virtualization. Until the first edition of the book, there was no in-depth coverage on the topic to tackle the issues systematically. The second edition expands the first edition, with added information and reorganizing the book into three logical parts. The first part provides the technical foundation of SDDC Management. It explains the difference between a software-defined data center and a classic physical data center, and how it impacts both architecture and operations. From this strategic view, it zooms into the most common challenges--performance management and capacity management. It introduces a new concept called Performance SLA and also a new way of doing capacity management. The next part provides the actual solution that you can implement in your environment. It puts the theories together and provides real-life examples created together with customers. It provides the reasons behind each dashboard, so that you get the understanding on why it is required and what problem it solves. The last part acts as a reference section. It provides a complete reference to vSphere and vRealize Operations counters, explaining their dependencies and providing practical guidance on the values you should expect in a healthy environment. Style and approach This book covers the complex topic of managing performance and capacity in an easy-to-follow style. It relates real-world scenarios to topics in order to help you implement the book's teachings on the go
    Emner: 
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn969048380|980|.
    Note: 
    Erscheint auch als: Rahabok, Iwan 'e1'. VMware Performance and Capacity Management, Cover ; Copyright; Credits; Foreword; Foreword; About the Author; Acknowledgments; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Part 1; Chapter 1: VM -- It Is Not What You Think! ; Our journey into the virtual world; Not all virtualizations are equal; Hardware partitioning; OS partitioning; Virtual Machine -- it is not what you think!; Physical server versus Virtual Machine; Summary; Chapter 2: Software-Defined Data Centers ; The software-defined data center; The compute function; The network function; The storage function; All together now; SDDC versus HDDC; Data Center, ComputeStorage; Network; Application; Summary; Chapter 3: SDDC Management ; What you manage has changed; Management changes in SDDC; The restaurant analogy; The consumer layer; The provider layer; Contention versus utilization; Performance and capacity management; Performance; Capacity; Primary counters for monitoring; Who uses which dashboards; How many dashboards do I need?; Summary; Chapter 4: Performance Monitoring ; A day in the life of a VMware Admin; What exactly is performance?; Performance versus capacity; Performance SLA; CPU SLA; Memory SLA; Network SLA; Storage SLA; VDI SLA, Creating the super metricsApplying the super metrics; Creating the dashboard; The performance SLA line; Step 1 -- create a super metric to define the SLA; Step 2 -- create a group for each tier; Step 3 -- create policies for each group; Step 4 -- map super metrics to policy; Step 5 -- add the SLA to each line chart; The resultant dashboard; Alerts; Which VMs are affected?; Adapting the dashboards to different environments; Are you serving my VM well?; Is vMotion causing performance hit?; Is any VM abusing the shared IaaS?; Summary; Chapter 7: Capacity-Monitoring Dashboards ; Tier 1 compute, Tier 1 compute -- CPUTier 1 compute -- RAM; Tier 1 compute -- VM; Tier 1 compute -- summary; Tier 2 and 3 compute; Storage; Storage -- performance; Storage -- utilization; Network; Putting it all together; Enhancements to the dashboard; The percentile chart; Utilization information; Rightsizing VMs; Rightsizing large VMs; Rightsizing vCPUs; Step 1 -- create a group; Step 2 -- create super metrics; Step 3 -- create a heatmap; Step 4 -- create a list; Step 5 -- create a detailed vCPU line chart; Step 6 -- add a percentile chart; Step 7 -- configure interaction; The resultant dashboard; Rightsizing memory
    ISBN nr.: 
    9781785883934, 9781785880315, 1785883933, 1785880314
    Omfang: 
    1 online resource
    Udgiver: 
    Packt Publishing
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:ocn969048380|260|a
    Available: 
    150057-ebscobog:ocn969048380|980|a
  2. Open Data in Developing Economies : Toward Building an Evidence Base on What Works and How

    • Ebog

    Open Data in Developing Economies : Toward Building an Evidence Base on What Works and How

    2017
    Summary: Recent years have witnessed considerable speculation about the potential of open data to bring about wide-scale transformation. The bulk of existing evidence about the impact of open data, however, focuses on high-income countries. Much less is known about open data's role and value in low- and middle-income countries, and more generally about its possible contributions to economic and social development. Open Data for Developing Economies features in-depth case studies on how open data is having an impact across the developing world-from an agriculture initiative in Colombia to data-driven healthcare projects in Uganda and South Africa to crisis response in Nepal. The analysis built on these case studies aims to create actionable intelligence regarding: (a) the conditions under which open data is most (and least) effective in development, presented in the form of a Periodic Table of Open Data; (b) strategies to maximize the positive contributions of open data to development; and (c) the means for limiting open data's harms on developing countries
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:on1019654007|980|.
    Note: 
    Additional physical form: Verhulst, Stefaan (Stefaan G.) ; Open data in developing economies, 1. Introduction -- part I. Open data for development -- 2. The relevance of open data for developing economies -- 3. The impact of open data on developing economies -- 4. The impact of open data in developing economies across sectors -- part II. Case studies -- Open data's impact on improving government. 5. Burundi's open RBF -- 6. India's ESMI -- 7. Open Development Cambodia -- 8. Uganda's iparticipate -- Open data's impact on empowering citizens. 9. Gottovote! Kenya -- 10. Tanzania's open education dashboards -- 11. South Africa's Medicine Price Registry -- Open data's impact on creating opportunity. 12. Aclímate Colombia -- 13. Ghana's Esoko -- 14. Jamaica's Interactive Community Mapping -- Open data's impact on solving public problems. 15. Nepal earthquake recovery -- 16. Paraguay's dengue prediction -- part III. Conclusion -- 17. Leveraging open data as a new asset for development
    ISBN nr.: 
    9781928331605, 9781928331599, 1928331602, 1928331599
    Udgiver: 
    African Minds
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:on1019654007|260|a
    Available: 
    150057-ebscobog:on1019654007|980|a
  3. Enterprise Cloud Security and Governance : Efficiently set data protection and privacy principles

    • Ebog

    Enterprise Cloud Security and Governance : Efficiently set data protection and privacy principles

    2017
    Summary: Modern day businesses and enterprises are moving to cloud simply to improve efficiency and speed, achieve flexibility and cost-effectiveness, and for on-demand cloud services. However, enterprise cloud security remains a major concern for many businesses because migrating to the public cloud requires transferring some control over ...
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:on1020033203|980|.
    Bidrag af: 
    Zeal Vora, Adrian Pruteanu
    Note: 
    Print version: Vora, Zeal ; Enterprise Cloud Security and Governance : Efficiently set data protection and privacy principles, Cover -- Copyright -- Credits -- About the Author -- About the Reviewer -- www.PacktPub.com -- Customer Feedback -- Table of Contents -- Preface -- Chapter 1: The Fundamentals of Cloud Security -- Getting started -- Service models -- Software as a service -- Platform as a service -- Infrastructure as a service -- Deployment models -- Cloud security -- Why is cloud security considered hard? -- Our security posture -- Virtualization -- cloud's best friend -- Understanding the ring architecture -- Hardware virtualization -- Full virtualization with binary translation -- Paravirtualization -- Hardware-assisted virtualization -- Distributed architecture in virtualization -- Enterprise virtualization with oVirt -- Encapsulation -- Point in time snapshots -- Isolation -- Risk assessment in cloud -- Service Level Agreement -- Business Continuity Planning -- Disaster Recovery (BCP/DR) -- Business Continuity Planning -- Disaster Recovery -- Recovery Time Objective -- Recovery Point Objective -- Relation between RTO and RPO -- Real world use case of Disaster Recovery -- Use case to understand BCP/DR -- Policies and governance in cloud -- Audit challenges in the cloud -- Implementation challenges for controls on CSP side -- Vulnerability assessment and penetration testing in the cloud -- Use case of a hacked server -- Summary -- Chapter 2: Defense in Depth Approach -- The CIA triad -- Confidentiality -- Integrity -- Availability -- A use case -- Understanding all three aspects -- The use case -- Introducing Defense in Depth -- First layer -- network layer -- Second layer -- platform layer -- Third layer -- application layer -- Fourth layer -- data layer -- Fifth layer -- response layer -- Summary -- Chapter 3: Designing Defensive Network Infrastructure -- Why do we need cryptography? -- The TCP/IP model -- Scenario -- The Network Transport Layer, The Internet Protocol Layer -- The Transport Layer -- The Application Layer -- Firewalls -- How a firewall works? -- How does a firewall inspect packets? -- 3-way handshake -- Modes of firewall -- Stateful packet inspection -- Stateless packet inspection -- Architecting firewall rules -- The deny all and allow some approach -- The allow all and deny some approach -- Firewall justification document -- A sample firewall justification document -- Inbound rules -- Outbound rules -- Tracking firewall changes with alarms -- Best practices -- Application layer security -- Intrusion Prevention Systems -- Overview architecture of IPS -- IPS in a cloud environment -- Implementing IPS in the cloud -- Deep Security -- Anti-malware -- Application control -- The IPS functionality -- A real-world example -- Implementation -- Advantages that IPS will bring to a cloud environment -- A web application firewall -- Architecture -- Implementation -- Network segmentation -- Understanding a flat network -- Segmented network -- Network segmentation in cloud environments -- Segmentation in cloud environments -- Rule of thumb -- Accessing management -- Bastion hosts -- The workings of bastion hosts -- The workings of SSH agent forwarding -- Practical implementation of bastion hosts -- Security of bastion hosts -- Benefits of bastion hosts -- Disadvantages of bastion hosts -- Virtual Private Network -- Routes -- after VPN is connected -- Installation of OpenVPN -- Security for VPN -- Recommended tools for VPN -- Approaching private hosted zones for DNS -- Public hosted zones -- Private hosted zones -- Challenge -- Solution -- Summary -- Chapter 4: Server Hardening -- The basic principle of host-based security -- Keeping systems up-to-date -- The Windows update methodology -- The Linux update methodology -- Using the security functionality of YUM, Approach for automatic security updates installation -- Developing a process to update servers regularly -- Knowledge base -- Challenges on a larger scale -- Partitioning and LUKS -- Partitioning schemes -- A separate partition for /boot -- A separate partition for /tmp -- A separate partition for /home -- Conclusion -- LUKS -- Introduction to LUKS -- Solution -- Conclusion -- Access control list -- Use case -- Introduction to Access Control List -- Set ACL -- Show ACL -- Special permissions in Linux -- SUID -- Use case for SUID -- Understanding the permission associated with ping -- Setting a SUID bit for files -- Removing the SUID bit for files -- SETGID -- Associating the SGID for files -- SELinux -- Introduction to SELinux -- Permission sets in SELinux -- SELinux modes -- Confinement of Linux users to SELinux users -- Process confinement -- Conclusion -- Hardening system services and applications -- Hardening services -- Guide for hardening SSH -- Enable multi-factor authentication -- Associated configuration -- Changing the SSH default port -- Associate configuration -- Disabling the root login -- Associated configuration -- Conclusion -- Pluggable authentication modules -- Team Screen application -- File Sharing Application -- Understanding PAM -- The architecture of PAM -- The PAM configuration -- The PAM command structure -- Implementation scenario -- Forcing strong passwords -- Log all user commands -- Conclusion -- System auditing with auditd -- Introduction to auditd -- Use case 1 -- tracking activity of important files -- Use case -- Solution -- First field -- Use case 2 -- monitoring system calls -- Introduction to system calls -- Use case -- Solution -- Conclusion -- Conclusion -- Central identity server -- Use Case 1 -- Use case 2 -- The architecture of IPA -- Client-server architecture -- User access management, Best practices to follow -- Conclusion -- Single sign-on -- Idea solution -- Advantages of an SSO solution -- Challenges in the classic method of authentication -- Security Assertion Markup Language -- The high-level overview of working -- Choosing the right identity provider -- Building an SSO from scratch -- Hosted Based Intrusion Detection System -- Exploring OSSEC -- File integrity monitoring -- Log monitoring and active response -- Conclusion -- The hardened image approach -- Implementing hardening standards in scalable environments -- Important to remember -- Conclusion -- Summary -- Chapter 5: Cryptography Network Security -- Introduction to cryptography -- Integrity -- Authenticity -- Real world scenario -- Non-repudiation -- Types of cryptography -- Symmetric key cryptography -- Stream cipher -- The encryption process -- The decryption process -- Advantages of stream ciphers -- Block cipher (AES) -- Padding -- Modes of block ciphers -- Message authentication codes -- The MAC approach -- The challenges with symmetric key storage -- Hardware security modules -- The challenges with HSM in on-premise -- A real-world scenario -- HSM on the cloud -- CloudHSM -- Key management service -- The basic working of AWS KMS -- Encrypting a function in KMS -- Decrypting a function in KMS -- Implementation -- Practical guide -- Configuring AWS CLI -- The decryption function -- Envelope encryption -- The encryption process -- The decryption process -- Implementation steps -- Practical implementation of envelope encryption -- Credential management system with KMS -- Implementation -- Best practices in key management -- Rotation life cycle for encryption keys -- Scenario 1-a single key for all data encryption -- Scenario 2-multiple keys for data encryption -- Protecting the access keys -- Audit trail is important -- Asymmetric key encryption, The basic working -- Authentication with the help of an asymmetric key -- Digital signatures -- The benefits and use cases of a digital signature -- SSL/TLS -- Scenario 1 -- A man-in-the-middle attack-storing credentials -- Scenario 2 -- A man-in-the-middle attack-integrity attacks -- Working of SSL/TLS -- Client Hello -- Server Hello -- Certificate -- Server key exchange -- Server Hello done -- Client key exchange -- Change cipher spec -- Security related to SSL/TLS -- Grading TLS configuration with SSL Labs -- Default Settings -- Perfect forward secrecy -- Implementation of perfect forward secrecy in nginx -- HTTP Strict Transport Security -- Implementing HSTS in nginx -- Verifying the integrity of a certificate -- Online certificate status protocol -- OCSP stapling -- Challenge 1 -- Challenge 2 -- An ideal solution -- Architecture -- Implementing TLS termination at the ELB level -- Selecting cipher suites -- Importing certificate -- AWS certificate manager -- Use case 1 -- Use case 2 -- Introduction to AWS Certificate Manager -- Summary -- Chapter 6: Automation in Security -- Configuration management -- Ansible -- Remote command execution -- The structure of the Ansible playbook -- Playbook for SSH hardening -- Running Ansible in dry mode -- Run and rerun and rerun -- Ansible mode of operations -- Ansible pull -- Attaining the desired state with Ansible pull -- Auditing servers with Ansible notifications -- The Ansible Vault -- Deploying the nginx Web Server -- Solution -- Ansible best practices -- Terraform -- Infrastructure migration -- Installing Terraform -- Working with Terraform -- Integrating Terraform with Ansible -- Terraform best practices -- AWS Lambda -- Cost optimization -- Achieving a use case through AWS Lambda -- Testing the Lambda function -- Start EC2 function -- Integrating the Lambda function with events -- Summary
    ISBN nr.: 
    9781788298513, 1788298519
    Udgiver: 
    Packt Publishing
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:on1020033203|260|a
    Available: 
    150057-ebscobog:on1020033203|980|a
  4. House of lost worlds : dinosaurs, dynasties, & the story of life on earth

    • Ebog

    House of lost worlds : dinosaurs, dynasties, & the story of life on earth

    2016
    This fascinating book tells the story of how one museum changed ideas about dinosaurs, dynasties, and even the story of life on earth. The Yale Peabody Museum of Natural History, now celebrating its 150th anniversary, has remade the way we see the world. Delving into the museum's storied and colorful past, award-winning author Richard Conniff introduces a cast of bold explorers, roughneck bone hunters, and visionary scientists. Some became famous for wresting Brontosaurus, Triceratops, and other dinosaurs from the earth, others pioneered the introduction of science education in North America, and still others rediscovered the long-buried glory of Machu Picchu. In this lively tale of events, achievements, and scandals from throughout the museum's history. Readers will encounter renowned paleontologist O.C. Marsh who engaged in ferocious combat with his "Bone Wars" rival Edward Drinker Cope, as well as dozens of other intriguing characters. Nearly 100 color images portray important figures in the Peabody's history and special objects from the museum's 13-million-item collections.0For anyone with an interest in exploring, understanding, and protecting the natural world, this book will deliver abundant delights
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn945663025|980|.
    Note: 
    Print version: Conniff, Richard ; House of lost worlds. Dinosaurs, dynasties, and the story of life on earth, Introduction : hunting for truffles -- A West that was actually wild -- The patriarch -- The education of O.C. Marsh -- The wooing of George Peabody -- Rock render -- A rumor of war -- The Marsh expeditions -- Professor M on the warpath -- The year of enormous dinosaurs -- Fossils, buffalo, and the birth of American conservation -- A building of their own -- In the shadow of O.C. Marsh -- The prince of bone hunters -- Bone wars -- Trilobite magic and cycad obsessions -- Mapping ancient worlds -- A city raised like a chalice -- Teaching evolution -- The rise of modern ecology -- The beauty of the beasts -- The art of being invisible -- Into the unmapped world -- Zoology in the time of geneticists -- The man who saved dinosaurs -- Epilogue -- The Peabody's scientists
    ISBN nr.: 
    9780300220605, 030022060X
    Udgiver: 
    Yale University Press
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:ocn945663025|260|a
    Available: 
    150057-ebscobog:ocn945663025|980|a
  5. My decade at Old Sun, my lifetime of hell

    • Ebog

    My decade at Old Sun, my lifetime of hell

    2016
    Summary: "Arthur Bear Chief suffered both sexual and psychological abuse during his time at Old Sun Residential school in Gleichen on the Siksika Nation. My Decade at Old Sun, My Lifetime of Hell is a of chronological vignettes that depict the punishment, cruelty, and injustice that Arthur endured at Old Sun and then later relived in the traumatic process of retelling his story in connection with a complicated claims procedure. Late in life, after working for both the provincial and federal government, Arthur returned home to Gleichen. It was there that he began to reconnect with Blackfoot language and culture and to write his story."--Publisher's description
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn962422569|980|.
    Note: 
    Available in another form: Bear Chief, Arthur, 1942- ; My decade at Old Sun, my lifetime of hell./, Cover; Title Page; Copyright Page; Dedication; Contents; Preface; Acknowledgements; My Decade at Old Sun, My Lifetime of Hell; Afterword: The Burden of Reconciliation; Appendix A: Legal Correspondence; Appendix B: Letters of Apology; For Further Reading
    ISBN nr.: 
    9781771991780, 9781771991773, 9781771991766, 177199178X, 1771991771, 1771991763
    Udgiver: 
    AU Press
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:ocn962422569|260|a
    Available: 
    150057-ebscobog:ocn962422569|980|a
  6. A new juvenile justice system : total reform for a broken system

    • Ebog

    A new juvenile justice system : total reform for a broken system

    2015
    'A New Juvenile Justice System' aims at nothing less than a complete reform of the existing system: not minor change or even significant overhaul, but the replacement of the existing system with a different vision. The authors in this volume - academics, activists, researchers and those who serve in the existing system - all respond in this collection to the question of what the system should be. Uniformly, they agree that an ideal system should be centered around the principle of child wellbeing and the goal of helping kids to achieve productive lives as citizens and members of their communities
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn948397676|980|.
    Bidrag af: 
    Nancy E. Dowd (1949-)
    Note: 
    Print version, Introduction: Re-visioning youth justice / Nancy E. Dowd -- Child well-being: toward a fair and equitable public safety strategy for the new century ; James Bell. A silent sea change: the deinstitutionalization trend in juvenile justice / Bart Lubow. Starting from a Different Place: The Missouri Model / Tim Decker. Doing Things Differently: Education as a Vehicle for Youth Transformation and Finland as a Model for Juvenile Justice Reform / Peter E. Leone. Delinquency, Due Process, and Mental Health: Presuming Youth Incompetency / David R. Katner. Why Should We Treat Juvenile Offenders Differently than Adults? It's Not Because the Pie Isn't Fully Baked! / Mark R. Fondacaro. Lost in Translation No More: Marketing Evidence-Based Policies for Reducing Juvenile Crime / Richard E. Redding. Building on Advocacy for Girls and LGBT Youth: a Foundation for Liberatory Laws, Policies, and Services for all youth in the juvenile justice system / Barbara Fedders. Invest Upstream to Promote the Well-Being of LGBT Youth: Addressing Root Causes of Juvenile System Involvement / Shannan Wilber. Correcting racial disparities in the juvenile justice system: refining prosecutorial discretion / Kristin Henning -- Helping Adolescents Succeed: Assuring a Meaningful Right to Counsel ; Carlos J. Martinez. Fit to Be T(r)ied: Ending Juvenile Transfers and Reforming the Juvenile Justice System / Richard Mora and Mary Christianakis. Applying J.D.B. v. North Carolina: Toward Ending Legal Fictions and Adopting Effective Police Questioning of Youth / Lisa H. Thurau and Sia Henry. What If Your Child Were the Next One in the Door? Reimagining the Social Safety Net for Children, Families, and Communities / Wendy A. Bach. Immigrant Children: Treating Children as Children, Regardless of Their Legal Status / Elizabeth M. Frankel. Crossover Youth: Youth Should Benefit When the State Is the Parent / Robin Rosenberg and Christina L. Spudeas. Breaking the School-to-Prison Pipeline: New Models for School Discipline and Community Accountable Schools / Kaitlin Banner. No More Closed Doors: Ending the Educational Exclusion of Formerly Incarcerated Youth / David Domenici and Renagh O'Leary. Collateral Consequences of Juvenile Court: Boulders on the Road to Good Outcomes / Sue Burrell
    ISBN nr.: 
    9781479843893, 9781479800308, 147984389X, 1479800309
    Udgiver: 
    New York University Press
    Målgruppe: 
    børnematerialer
    By: 
    150057-ebscobog:ocn948397676|260|a
    Available: 
    150057-ebscobog:ocn948397676|980|a
  7. A decade of world e-Government rankings

    • Ebog

    A decade of world e-Government rankings

    2015
    Summary: The field of e-Government has emerged alongside the developments in information technology in recent decades, and has become an increasingly important factor in all our lives. It has faced a wide range of challenges from the changing technologies of the internet/digital economy, such as IOT, big data, cloud and 4G mobile, as well as the rapid growth of ICT innovations and applications. The Institute of e-Government at Waseda University, Japan, was established in 2001, and this book is the latest in the series of e-Government ranking surveys published by the Institute since 2005. The book is divided into three parts, the first of which is an overview of the e-Government ranking survey including a section on historical trends, the 2015 ranking and e-Government ranking by indicators. The second part covers findings and trends, and includes analysis in the fields of digital/internet economy, IOT, cloud, open/big data, cyber security, smart cities, social media and e-aging. The last section presents 63 country reports. The lessons learnt from the best practices explode in this book will contribute greatly to the work of all those involved in setting up, developing and improving e-Government worldwide
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn919122891|980|.
    Note: 
    Erscheint auch als: Obi, T.A Decade of World e-Government Rankings, Title Page -- Preface -- Executive Summary -- Contents -- Chapter 1: Overview -- 1. Historical Trends for Eleven Years Surveys of the Rankings -- 2. Total Ranking in 2015 -- 3. e-Government Ranking by Indicators -- Chapter 2: A Decade of Waseda?IAC e-Government Findings -- 1. There is lack of capacity building, especially e-leaders such as CIO -- 2. Enough finance/funding for e-Government projects is the key for success -- 3. Citizen-engagement as digital inclusion in e-Govt. should be encouraged -- 4. Various applications for online service are progressing -- 5. More attention must be paid to local e-Government issues as well as linkage between central and local governments -- 6. The best practices for M-government in developing countries may increase active participation in developing countries with high usage of mobile devices -- 7. Open Government/Data should be implemented and shared with big data -- 8. Digital gap has become wider among developing countries in terms of accessibility, usability and affordability -- Chapter 3: New trends on e-Government development -- 1. Digital Government/Internet Economy -- 2. Internet of Things -- 3. Cloud Computing -- 4. One Stop Service -- 5. Open Government/Data -- 6. Big Data -- 7. Cyber Security -- 8. Social Media -- 9. Smart City -- 10. Inter-governmental Collaboration and Linkage -- 11. Digital Inclusion and Aging society -- Chapter 4: e-Government Country Reports -- Argentina -- Australia -- Austria -- Bahrain -- Belgium -- Brazil -- Brunei Darussalam -- Canada -- Chile -- China -- Colombia -- Costa Rica -- Czech Republic -- Denmark -- Egypt -- Estonia -- Fiji -- Finland -- France -- Georgia -- Germany -- Hong Kong -- Iceland -- India -- Indonesia -- Israel -- Italy -- Japan -- Kazakhstan -- Kenya -- Korea -- Macau -- Malaysia -- Mexico -- Morocco -- Netherlands -- New Zealand -- Nigeria -- Norway, Oman -- Pakistan -- Peru -- Philippines -- Poland -- Portugal -- Romania -- Russia -- Saudi Arabia -- Singapore -- South Africa -- Spain -- Sweden -- Switzerland -- Taiwan -- Thailand -- Tunisia -- Turkey -- United Arab Emirates -- United Kingdom (UK) -- Uruguay -- USA -- Venezuela -- Vietnam -- Appendix 1 -- Top 10 ICT and e-Government Ranking by other Organizations -- Appendix 2 -- e-Government National Portal and Open Government Data Portal
    ISBN nr.: 
    9781614995685, 9781614995678, 1614995680, 1614995672
    Udgiver: 
    IOS Press
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:ocn919122891|260|a
    Available: 
    150057-ebscobog:ocn919122891|980|a
  8. Juvenile justice in global perspective

    • Ebog

    Juvenile justice in global perspective

    2015
    Summary: Among developed nations, the United States has one of the most extreme and harsh criminal justice systems in the world-there is overwhelmingly more violence, more punishment, and more incarceration for both adults and juveniles here. But while American scholars may have extensive knowledge about other justice systems around the world and how adults are treated, juvenile justice systems and the plight of youth who break the law throughout the world is less often studied. This important volume fills a large gap in the study of juvenile justice by providing an unprecedented comparison of cri
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn913785090|980|.
    Bidrag af: 
    Franklin E. Zimring, Máximo Langer, David Spinoza Tanenhaus
    Note: 
    Print version: Juvenile justice in global perspective, Juvenile justice and crime policy in Europe / Frieder Dünkel. Juvenile justice without a juvenile court : a note on Scandinavian exceptionalism / Tapio Lappi-Seppälä. The development and prospect of juvenile justice in the People's Republic of China / Weijian Gao. Juvenile justice in India / Ved Kumari. Myths and realities of juvenile justice in Latin America / Mary Beloff and Máximo Langer. Juvenile justice in Muslim-majority states / Lena Salaymeh. Juvenile justice in Poland / Barbara Stańdo-Kawecka. Freedom in the making : juvenile justice in South Africa / Ann Skelton. Legislative impact, political change, and juvenile detention : comparing South Korea and Japan / Jae-Joon Chung. One theme or many? : the search for a deep structure in global juvenile justice / Franklin E. Zimring and Máximo Langer
    ISBN nr.: 
    9781479838004, 1479838004
    Udgiver: 
    New York University Press
    Målgruppe: 
    børnematerialer
    By: 
    150057-ebscobog:ocn913785090|260|a
    Available: 
    150057-ebscobog:ocn913785090|980|a
  9. Capital punishment in the U.S. states : executing social inequality

    • Ebog

    Capital punishment in the U.S. states : executing social inequality

    2015
    Summary: "Archibald attempts to find variables that can explain the variation not only in the adoption of the death penalty, but also in the implementation of capital punishment. She combines Kingdon's Garbage Can model and Social Control Theory to explain the differences in the adoption and implementation of the death penalty. Given that there was only one model that showed a correlation between the adoption and implementation of the death penalty and homicide rates, while other variables, such as race and hate crimes, were correlated across multiple models, one could argue that the death penalty is used as a means of social control. Her results also bolster the argument that state policies are not merely reactions to murder rates, but are influenced by other sociological, political, and economic factors"--Publisher's description
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn900725270|980|.
    Note: 
    Print version: Archibald, Sarah N., 1977- ; Capital punishment in the U.S. states, A brief social and legal history of capital punishment in the US -- Literature review -- Theoretical framework -- Research question and hypothesis -- Methodology -- Results -- Conclusion -- Capital offenses by state -- Date of capital punishment legislation enactment -- Correlations of the independent variables -- Model -- Zero inflated binomial regression estimates of the number of executions in states -- Table -- Predicted probabilities
    ISBN nr.: 
    9781593327958, 1593327951
    Udgiver: 
    LFB Scholarly Publishing
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:ocn900725270|260|a
    Available: 
    150057-ebscobog:ocn900725270|980|a
  10. Healthy, resilient, and sustainable communities after disasters : strategies, opportunities, and planning for recovery

    • Ebog

    Healthy, resilient, and sustainable communities after disasters : strategies, opportunities, and planning for recovery

    2015
    Summary: "In the devastation that follows a major disaster, there is a need for multiple sectors to unite and devote new resources to support the rebuilding of infrastructure, the provision of health and social services, the restoration of care delivery systems, and other critical recovery needs. In some cases, billions of dollars from public, private and charitable sources are invested to help communities recover. National rhetoric often characterizes these efforts as a "return to normal." But for many American communities, pre-disaster conditions are far from optimal. Large segments of the U.S. population suffer from preventable health problems, experience inequitable access to services, and rely on overburdened health systems. A return to pre-event conditions in such cases may be short-sighted given the high costs - both economic and social - of poor health. Instead, it is important to understand that the disaster recovery process offers a series of unique and valuable opportunities to improve on the status quo. Capitalizing on these opportunities can advance the long-term health, resilience, and sustainability of communities, thereby better preparing them for future challenges. Healthy, Resilient, and Sustainable Communities After Disasters identifies and recommends recovery practices and novel programs most likely to impact overall community public health and contribute to resiliency for future incidents. This book makes the case that disaster recovery should be guided by a healthy community vision, where health considerations are integrated into all aspects of recovery planning before and after a disaster, and funding streams are leveraged in a coordinated manner and applied to health improvement priorities in order to meet human recovery needs and create healthy built and natural environments. The conceptual framework presented in Healthy, Resilient, and Sustainable Communities After Disasters lays the groundwork to achieve this goal and provides operational guidance for multiple sectors involved in community planning and disaster recovery. Healthy, Resilient, and Sustainable Communities After Disasters calls for actions at multiple levels to facilitate recovery strategies that optimize community health. With a shared healthy community vision, strategic planning that prioritizes health, and coordinated implementation, disaster recovery can result in a communities that are healthier, more livable places for current and future generations to grow and thrive - communities that are better prepared for future adversities
    Find den her
    Detaljer
    Haves: 
    150057-ebscobog:ocn915729121|980|.
    Bidrag af: 
    Institute of Medicine U.S. Committee on Post-Disaster Recovery of a Community's Public Health, Medical, and Social Services
    Note: 
    Print version: Institute of Medicine (U.S.). Committee on Post-Disaster Recovery of a Community's Public Health, Medical, and Social Services ; Healthy, resilient, and sustainable communities after disasters, Post-disaster opportunities to advance healthy, resilient, and sustainable communities -- A framework for integrating health into recovery planning -- Leveraging recovery resources in a coordinated manner to achieve healthier post-disaster communities -- Public health -- Health care -- Behavioral health -- Social services -- Place-based recovery strategies for healthy communities -- Healthy housing
    ISBN nr.: 
    9780309316200, 0309316200
    Udgiver: 
    The National Academies Press
    Målgruppe: 
    voksenmaterialer
    By: 
    150057-ebscobog:ocn915729121|260|a
    Available: 
    150057-ebscobog:ocn915729121|980|a