Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Berlin International  (85)
Type of Medium
Region
Library
Subjects(RVK)
Access
  • 1
    Online Resource
    Online Resource
    Tokyo :Springer Japan,
    UID:
    almahu_9949602152602882
    Format: 1 online resource (225 pages)
    Edition: 1st ed.
    ISBN: 9784431566236
    Series Statement: Science for Sustainable Societies Series
    Note: Intro -- Preface: From "Vision 2050" to "New Vision 2050" -- Preface (1): Turning Point of Human History -- Twenty-First Century Is a Special Era -- Various Issues -- Global Warming and Abnormal Weather -- Is Capitalism Sustainable? -- Preface (2): The Latest Report -- Human Race Is Navigating in the Right Direction (1): SDGs -- Human Race Is Navigating in the Right Direction (2): COP21 -- IEA Report -- Japan's Experiences as a Leading Country in Resolving Societal Problems -- Essence of the Era of Saturation -- Saturation of the Population -- Saturation of Man-Made Objects -- Saturation of Minerals -- World in 2050 -- Preface (3): A Society We Are Aiming At -- Creation of a New Society and Values by Resolving Issues -- "Platinum Society": A Vision in the Twenty-First Century -- Essential Factors for a Platinum Society -- A Vision That Can be Realized -- Preface (4): Image of a Platinum Society Has Begun to Appear -- Creative Demand -- Low-Carbon Society -- Energy-Creating Houses and Zero-Energy Buildings -- From Eco-Cars, Eco-Factories, and Cars to Cars, and Zero CO2 -- Diversifying Means of Transportation -- Energy Conservation Is the Best Policy -- Urban Mines -- Renewable Energy -- Japan Will Become a Resource Self-Sufficient Society -- The World Will Become a Sustainable Recycling-Oriented Society -- Harmony with Nature -- Macro-Level Viewpoint of Harmony with Nature -- Health Support and Self-Reliance Support Are Important Industries -- Participation of Active Seniors Is Indispensable -- Various Options -- Free Participation -- Education of Information Technology Nurtures the Next Generation -- Society with Employment -- Society Where Children Will Be Born -- Knowledge Structuring Will Lead to Solutions -- How to Expand and Develop More Successful Examples -- Challenging the Issue Through Knowledge Structuring and Action. , Innovations from Mega-Cities -- Viable Business Ensures Sustainability -- A Society of Lifelong Learning -- Developed Countries Can Achieve Economic Growth -- GDP and IWI -- Platinum Industry and Economic Growth -- Developing Countries Aim at a Platinum Society Together -- Social Disparity and Social Security, the State and the Market -- A System for Innovations -- Twenty-First Century Is a Turning Point -- Platinum Society Network -- References -- Contents -- Chapter 1: The Message in "Vision 2050" -- 1.1 Behind the Birth of Vision 2050 -- 1.1.1 The Need for a "Macro" Vision -- 1.1.2 An Affluent Lifestyle for All -- 1.1.3 Why a Low-Carbon Society? -- 1.1.4 The Threat of Global Warming -- 1.2 What Is Vision 2050? -- 1.2.1 The Vision for 2050 -- 1.2.2 A Happy Low-Carbon Society Is Achievable -- 1.2.3 Saturation of Man-Made Objects and the Material-­Circulating System -- 1.2.4 Tripling Energy Efficiency -- 1.2.5 Doubling the Amount of Renewable Energy -- 1.2.6 Increases in Both Comfort and Economic Performance -- 1.2.7 Premises Consequent on Being a Realistic Vision -- Chapter 2: Progress on Vision 2050 Since 1995 -- 2.1 Saturation of Man-Made Objects and the Material-­Circulating System -- 2.1.1 Saturation of Population -- 2.1.2 Saturation of Man-Made Objects -- 2.1.3 Saturated Demand for Substances and Materials: Cement -- 2.1.4 Saturated Demand for Substances and Materials: Iron -- 2.1.5 Hope for a Circulating Society -- 2.2 Energy Saving and Renewable Energy -- 2.2.1 Further Development Achieved in Energy Saving -- 2.2.2 Putting Renewable Energy at the Core of Energy Investments -- 2.3 Vision 2050 as a Happy Vision -- 2.3.1 The Industrial Structure of Japan as a "Leading Country in Resolving Societal Problems" and Energy -- 2.3.2 Certainly Japan Led the World -- 2.3.3 The World Is Making Progress toward Achieving Vision 2050 -- Bibliography. , Chapter 3: Technology to Support Low-Carbon Society (Using Energy) -- 3.1 Direction of Improvement in Energy Efficiency -- 3.1.1 "Daily Living" and "Monozukuri" -- 3.2 Low Carbon Technologies in the Transportation Sector -- 3.2.1 Shipment Does Not Consume Energy? -- 3.2.2 Energy-Efficient Cars Appear One after Another -- 3.2.3 Car Energy Efficiency Increases Eightfold -- 3.2.4 A Rich Car Life with Diverse Eco Cars -- 3.2.5 Modal Shift in Movement -- 3.3 Low Carbon Technologies in the Home and Business Sectors -- 3.3.1 Promotion of Energy Saving Is Economically Advantageous -- 3.3.2 Energy Conservation Will Be a Business Opportunity -- 3.3.3 Household Energy Consumption Is Consolidated into Electricity -- 3.3.4 Eco Houses Are Also Friendly to Their Occupants -- 3.3.5 The Latest Heat Pump Situation -- 3.3.6 Domestic Fuel Cells Packed with Japanese Technologies -- 3.3.7 Globalize Japanese Environmental Technologies -- 3.4 Low-Carbon Technologies for Monozukuri -- 3.4.1 Shift from Blast Furnaces to Electric Furnaces -- 3.4.2 Aluminum Is an Excellent Material in Terms of Recycling -- 3.4.3 Achieving Material Cycling of Rare Metals -- 3.4.4 Expectations for Dissemination of Industrial Heat Pumps -- Bibliography -- Chapter 4: Technology to Support Low-Carbon Society (Utilizing Energy) -- 4.1 Future Image of Renewable Energy -- 4.1.1 Rethinking the Value of Renewable Energy -- 4.1.2 The Future Image of Solar Cells and Storage Batteries -- 4.1.3 Importance of Balance Between Future Cost and Investment -- 4.1.4 Which Storage Battery Will Be Playing the Leading Role in 2050? -- 4.1.5 Promising Markets Where Various Uses Can Be Considered -- 4.1.6 Dissemination of Hydropower Generation by Region -- 4.1.7 The Potential of Biomass -- 4.1.8 Hydrogen as a Partner of Renewable Energy -- 4.2 Innovations Emerging from Theory and IT. , 4.2.1 Pursuing Efficiency to the Utmost Limit -- 4.2.2 Enhance Efficiency with an Energy Management System -- 4.2.3 Japan Should Compete with High-Added-Value Items -- 4.2.4 Increased Sophistication of Demand Forecasting by Utilizing Big Data -- 4.2.5 The Possibility of Carbon Pricing -- Bibliography -- Chapter 5: Low-Carbon Society in 2050 -- 5.1 Low Carbon Power Supply Systems in 2050 -- 5.1.1 Means to Achieve Low Carbonization -- 5.1.2 80% Reduction and Power Generation Costs -- 5.1.3 Consideration of the Best Power Supply Configuration -- 5.2 Reducing Carbon in Major Fields -- 5.2.1 Value-Added Industry and Low Carbon -- 5.2.2 The Ideal State of the Steel Industry -- 5.3 Reducing CO2 Emissions by 80% Across Japan -- 5.3.1 Low Carbonization by Sector in 2050 -- 5.3.2 Value-Added by Industry and CO2 Emissions in 2050 -- 5.3.3 Image of CO2 Emissions and Changes in GDP in all Industries -- Chapter 6: Platinum Industry and a New Society -- 6.1 What Is a Platinum Society? -- 6.1.1 Per Capita GDP and Average Life Expectancy -- 6.1.2 From Quantitative Sufficiency to Qualitative Sufficiency -- 6.1.3 An Island (Ama-cho) that Increased the Number of Children Attending School Despite a Declining Birthrate -- 6.1.4 Contributing to Lowering Carbon in Asia from Actual Experiences (Kitakyushu) -- 6.1.5 Leadership that Achieved a Miracle (Yanedan) -- 6.1.6 Realizing a Vision in a Megalopolis (Futakotamagawa) -- 6.2 Towards Becoming a Nation Self-Sufficient in Resources -- 6.2.1 Making a Self-Sufficiency Rate of 70% a Reality with Vision 2050 -- 6.2.2 A Scenario for Reviving Forestry -- 6.3 Coexisting in Harmony with Beautiful Nature -- 6.3.1 A World that Is Comfortable for All Living Things -- 6.3.2 Initiatives by Corporations for Living in Harmony with Nature -- 6.4 Good Health and Self-Reliance for a Fulfilling Life. , 6.4.1 The Wisdom of Seniors Is a Social Resource -- 6.4.2 Making Use of the Knowledge and Experience of Seniors for the Next Generation -- 6.5 Diverse Options and Freedom of Participation -- 6.5.1 Why Are Bonds Being Sought After Now? -- 6.5.2 Freedom of Mobility Induces Changes to Work Styles -- 6.5.3 Spread of Multi-habitation -- 6.5.4 Tokyo Work Styles and Countermeasures for Declining Birthrates -- 6.6 New Industries Created in a Platinum Society -- 6.6.1 Marunouchi Platinum University - Thinking About Regional Issues in a Big City -- 6.6.2 Developing Human Resources for Realizing the Platinum Society -- 6.6.3 Education Changing Through ICT -- 6.6.4 Adult Education as a New Industry -- 6.6.5 Developing Leaders Who can Carve Out a Path to a New Era -- 6.6.6 Questioning Anew the Importance of Education -- 6.7 The Platinum Society Becomes More Visible -- 6.7.1 How to Promote a Platinum Society -- 6.7.2 The Platinum Network Society and the Platinum Vision Award -- 6.7.3 Creating the Platinum Society Handbook -- 6.8 The Platinum Society and Vision 2050 -- Bibliography -- Interview -- Interview 1: Toyota Environmental Challenge 2050 -- Challenges Unachievable Following the Lines Laid Before -- The Impact of Climate Change -- "Let's Do What We Have to Do." -- Parts Manufacturers Have a Major Presence -- Mid-To-Long-Term Targets for Clearing Regulations -- Interview 2: Regional Revitalization and New Work Styles -- Local Activation for Stronger Competitiveness -- Japanese Factories Are Competitive -- Relocation of Some Head Office Functions, 3.2 Times More Children -- Retirees Teaching Science to Young Children -- Interview 3: Considering Ways to Solve Social Problems -- There Is Much Room for Innovation of the Social System -- The Notion that a Decline in the Population Means the Economy will Falter Is Faulty. , It Is Innovation for Being Used at the Site.
    Additional Edition: Print version: Komiyama, Hiroshi New Vision 2050 Tokyo : Springer Japan,c2018 ISBN 9784431566229
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Volltext  (kostenfrei)
    URL: Volltext  (kostenfrei)
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9949301482702882
    Format: 1 online resource (263 pages)
    ISBN: 9781430265726
    Note: Intro -- Contents at a Glance -- Contents -- About the Author -- About the Technical Reviewer -- Acknowledgments -- Introduction -- Chapter 1: Cyber Security in the Mobile Age -- Three Pillars of Mobile Computing -- Power Efficiency -- Internet Connectivity -- Security -- BYOD -- Incident Case Study -- eBay Data Breach -- Target Data Breach -- OpenSSL Heartbleed -- Key Takeaways -- Strong Authentication -- Network Management -- Boot Integrity -- Hardware-Based Protection -- Open-Source Software Best Practice -- Third-Party Software Best Practice -- Security Development Lifecycle -- Assessment -- Architecture -- Design -- Implementation -- Deployment -- Interface Testing -- Penetration Testing -- CVSS -- Limitations -- References -- Chapter 2: Intel's Embedded Solutions: from Management to Security -- Management Engine vs. Intel AMT -- Intel AMT vs. Intel vPro Technology -- Management Engine Overview -- Hardware -- Overlapped I/O -- Firmware -- Software -- Platform and System Management -- Software Solutions -- Hardware Solutions -- In-Band Solutions -- Out-of-Band Solutions -- Intel AMT Overview -- BIOS Extension -- Local Management Service and Tray Icon -- Remote Management -- The Engine's Evolvement: from Management to Security -- Embedded System as Security Solution -- Security Applications at a Glance -- EPID -- PAVP -- IPT -- Boot Guard -- Virtual Security Core: ARM TrustZone -- Secure Mode and Nonsecure Mode -- Memory Isolation -- Bus Isolation -- Physical Isolation vs. Virtual Isolation -- References -- Chapter 3: Building Blocks of the Security and Management Engine -- Random Number Generation -- Message Authentication -- Hash with Multiple Calls -- Symmetric-Key Encryption -- AES -- DES/3DES -- Asymmetric-Key Encryption: RSA -- Key Pair Generation and Validation -- Encryption and Decryption -- Digital Signature -- RSA -- ECDSA. , Key Pair Generation and Validation -- Scalar Multiplication -- Window Method -- Dual Scalar Multiplication -- Hardware Acceleration -- Other Cryptography Functions -- Secure Storage -- Debugging -- Debug Messaging -- Special Production-Signed Firmware Based on Unique Part ID -- Secure Timer -- Host-Embedded Communication Interface -- Direct Memory Access to Host Memory -- References -- Chapter 4: The Engine: Safeguarding Itself before Safeguarding Others -- Access to Host Memory -- Communication with the CPU -- Triggering Power Flow -- Security Requirements -- Confidentiality -- Integrity -- Availability -- Threat Analysis and Mitigation -- Load Integrity -- Memory Integrity -- Memory Encryption -- Task Isolation -- Asset Protection -- Memory Manager -- Thread Manager -- Memory Protection Control -- Loader -- Inter-Task Call Management -- Exception Handler -- Nonprivileged Tasks -- Firmware Update and Downgrade -- Published Attacks -- "Introducing Ring -3 Rootkits " -- References -- Chapter 5: Privacy at the Next Level: Intel's Enhanced Privacy Identification (EPID) Technology -- Redefining Privacy for the Mobile Age -- Passive Anonymity -- Active Anonymity -- Processor Serial Number -- EPID -- Key Structures and Provisioning -- Revocation -- Private Key-Based Revocation -- Signature-Based Revocation -- Group-Based Revocation -- Signature Generation and Verification -- Signature Generation -- Base Name -- Signature Verification -- SIGMA -- Verifier's Certificate -- Messages Breakdown -- Implementation of EPID -- Key Recovery -- Attack Mitigation -- Applications of EPID -- Next Generation of EPID -- Two-way EPID -- Optimization -- References -- Chapter 6: Boot with Integrity, or Don't Boot -- Boot Attack -- Evil Maid -- BIOS and UEFI -- BIOS Alteration -- Software Replacement -- Jailbreaking -- Trusted Platform Module (TPM). , Platform Configuration Register -- Field Programmable Fuses -- Field Programmable Fuses vs. Flash Storage -- Field Programmable Fuse Task -- Intel Boot Guard -- Operating System Requirements for Boot Integrity -- OEM Configuration -- Measured Boot -- Verified Boot -- Manifests -- Verification Flow -- References -- Chapter 7: Trust Computing, Backed by the Intel Platform Trust Technology -- TPM Overview -- Cryptography Subsystem -- Storage -- Endorsement Key -- Attestation -- Binding and Sealing -- Intel Platform Trust Technology -- Cryptography Algorithms -- Endorsement Key Storage -- Endorsement Key Revocation -- Endorsement Certificate -- Supporting Security Firmware Applications -- Integrated vs. Discrete TPM -- References -- Chapter 8: Unleashing Premium Entertainment with Hardware-Based Content Protection Technology -- Rights Protection -- DRM Schemes -- Device Key Management -- Rights Management -- Playback -- UltraViolet -- End-to-End Content Protection -- Content Server -- License Server -- Software Stack -- External Display -- Weak Points -- Intel's Hardware-Based Content Protection -- Protected Audio and Video Path (PAVP) -- Device Key Provisioning -- Rights Management -- Intel Wireless Display -- Authentication and Key Exchange -- Content Protection on TrustZone -- References -- Chapter 9: Breaking the Boundaries with Dynamically Loaded Applications -- Closed-Door Model -- DAL Overview -- DAL Architecture -- Loading an Applet -- Secure Timer -- Host Storage Protection -- Security Considerations -- Reviewing and Signing Process -- References -- Chapter 10: Intel Identity Protection Technology: the Robust, Convenient, and Cost-Effective Way to Deter Identity Theft -- One-Time Password -- HOTP -- TOTP -- Transaction Signing -- OTP Tokens -- Embedded OTP and OCRA -- Token Installation -- TOTP and OCRA Generation -- Highlights and Lowlights. , Protected Transaction Display -- Drawing a Sprite -- Gathering the User's PIN Input -- Firmware Architecture -- Embedded PKI and NFC -- References -- Chapter 11: Looking Ahead: Tomorrow's Innovations Built on Today's Foundation -- Isolated Computing Environment -- Security-Hardening Measures -- Basic Utilities -- Anonymous Authentication and Secure Session Establishment -- Protected Input and Output -- Dynamic Application Loader -- Summary of Firmware Ingredients -- Software Guard Extensions -- More Excitement to Come -- References -- Index.
    Additional Edition: Print version: Ruan, Xiaoyu Platform Embedded Security Technology Revealed Berkeley, CA : Apress L. P.,c2014 ISBN 9781430265719
    Language: English
    Keywords: Electronic books. ; Electronic books ; Electronic books. ; Electronic books.
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Northampton, MA :Edward Elgar Pub.,
    UID:
    almahu_9948265329002882
    Format: 1 online resource (3 v. (2,608 p.)) ; , cm.
    ISBN: 9781785360589 (e-book)
    Series Statement: International library of critical writings in economics ; 327
    Content: This extensive research review discusses more than one hundred of the very best and most influential scholarly articles on the sovereign debt of central governments around the world. It examines discussions of the debt of many emerging nations as well as the largest sovereign debtors in the world thus providing a thorough understanding of sovereign debt as seen by the best economists from around the world. This research review is an essential tool to libraries, academic institutions, economic scholars and students alike.
    Note: The recommended readings are available in the print version, or may be available via the link to your library's holdings. , Recommended readings (Machine generated): Robert J. Barro (1974), 'Are Government Bonds Net Wealth?', Journal of Political Economy, 82 (6), November-December, 1095-117 -- Robert J. Barro (1979), 'On the Determination of the Public Debt', Journal of Political Economy, 87 (5, Part 1), October, 940-71 -- Martin Feldstein (1985), 'Debt and Taxes in the Theory of Public Finance', Journal of Public Economics, 28 (2), November, 233-45 -- Jonathan Eaton and Mark Gersovitz (1981), 'Debt with Potential Repudiation: Theoretical and Empirical Analysis', Review of Economic Studies, XLVII (2), April, 289-309 -- Jonathan Eaton, Mark Gersovitz and Joseph E. Stiglitz (1986), 'The Pure Theory of Country Risk', European Economic Review, 30 (3), June, 481-513 -- Herschel I. Grossman and John B. Van Huyck, (1988), 'Sovereign Debt as a Contingent Claim: Excusable Default, Repudiation, and Reputation', American Economic Review, 78 (5), December, 1088-97 -- Jeremy Bulow and Kenneth Rogoff (1989), 'Sovereign Debt: Is to Forgive to Forget?', American Economic Review, 79 (1), March, 43-50 -- Jeremy Bulow and Kenneth Rogoff (1989), 'A Constant Recontracting Model of Sovereign Debt', Journal of Political Economy, 97 (1), February, 155-78 -- Harold L. Cole and Patrick J. Kehoe (1998), 'Models of Sovereign Debt: Partial Versus General Reputations', International Economic Review, 39 (1), February, 55-70 -- Kenneth M. Kletzer and Brian D. Wright (2000), 'Sovereign Debt as Intertemporal Barter', American Economic Review, 90 (3), June, 621-39 -- John M. Veitch (1986), 'Repudiations and Confiscations by the Medieval State', Journal of Economic History, 46 (1), March, 31-6 -- J. Bradford De Long and Andrei Shleifer (1993), 'Princes and Merchants: European City Growth Before the Industrial Revolution', Journal Of Law and Economics, XXXVI (2), October, 671-702 -- James Conklin (1998), 'The Theory of Sovereign Debt and Spain under Philip II', Journal of Political Economy, 106 (3), June, 483-513 -- Mauricio Drelichman and Hans-Joachim Voth (2010), 'The Sustainable Debts of Philip II: A Reconstruction of Castile's Fiscal Position, 1566-1596', Journal of Economic History, 70 (4), December, 813-42 -- Mauricio Drelichman and Hans-Joachim Voth (2011), 'Lending to the Borrower from Hell: Debt and Default in the Age of Philip II', Economic Journal, 121 (557), December, 1205-27, technical appendix -- Mauricio Drelichman and Hans-Joachim Voth (2011), 'Serial Defaults, Serial Profits: Returns to Sovereign Lending in Habsburg Spain, 1566-1600', Explorations in Economic History, 48 (1), January, 1-19 -- Mauricio Drelichman and Hans-Joachim Voth (2015), 'Risk Sharing with the Monarch: Contingent Debt and Excusable Defaults in the Age of Philip II, 1556-1598', Cliometrica, 9 (1), January, 49-75 -- Earl J. Hamilton (1947), 'Origin and Growth of the National Debt in Western Europe', American Economic Review, 37 (2), May, 118-30 -- David R. Weir (1989), 'Tontines, Public Finance, and Revolution in France and England, 1688-1789', Journal of Economic History, 49 (1), March, 95-124. , Douglass C. North and Barry R. Weingast (1989), 'Constitutions and Commitment: The Evolution of Institutional Governing Public Choice in Seventeenth-Century England', Journal of Economic History, XLIX (4), December, 803-32 -- David Stasavage (2002), 'Credible Commitment in Early Modern Europe: North and Weingast Revisited', Journal of Law Economics and Organization, 18 (1), April, 155-86 -- Kenneth A. Schultz and Barry R. Weingast (2003), 'The Democratic Advantage: Institutional Foundations of Financial Power in International Competition', International Organization, 57 (1), Winter, 3-42 -- Sebastian M. Saiegh (2005), 'Do Countries Have a 'Democratic Advantage"?: Political Institutions, Multilateral Agencies, and Sovereign Borrowing', Comparative Political Studies, 38 (4), May, 366-87 -- David Stasavage (2007), 'Cities, Constitutions, and Sovereign Borrowing in Europe, 1274-1785', International Organization, 61 (3), July, 489-525 -- Candace C. Archer, Glen Biglaiser and Karl DeRouen Jr. (2007), 'Sovereign Bonds and the 'Democratic Advantage": Does Regime Type Affect Credit Rating Agency Ratings in the Developing World?', International Organization, 61 (2), April, 341-65 -- Glen Biglaiser and Joseph L. Staats (2012), 'Finding the 'Democratic Advantage" in Sovereign Bond Ratings: The Importance of Strong Courts, Property Rights Protection, and the Rule of Law', International Organization, 66 (3), July, 515-35 -- Emanuel Kohlscheen (2007), 'Why Are There Serial Defaulters? Evidence from Constitutions', Journal of Law and Economics, 50 (4), November, 713-30 -- Juan Carlos Hatchondo and Leonardo Martinez (2010), 'The Politics of Sovereign Defaults', Economic Quarterly, 96 (3), Third Quarter, 291-317 -- Atif Mian, Amir Sufi and Francesco Trebbi (2014), 'Resolving Debt Overhangs: Political Constraints in the Aftermath of Financial Crises', American Economic Journal: Macroeconomics, 6 (2), April, 1-28 -- Mark Dincecco (2010), 'The Political Economy of Fiscal Prudence in Historical Perspective', Economics and Politics, 22 (1), March, 1-36 -- Michael D. Bordo (1999), 'International Rescues versus Bailouts: A Historical Perspective', Cato Journal, 18 (3), Winter, 363-75 -- John Joseph Wallis (2000), 'American Government Finance in the Long Run: 1790 to 1990', Journal of Economic Perspectives, 14 (1), Winter, 61-82 -- Carmen M. Reinhart and Vincent R. Reinhart (2015), 'Financial Crises, Development, and Growth: A Long-Term Perspective', World Bank Economic Review, Annual Bank Conference on Development Economics 'The Role of Theory in Development Economics" June 2-3, 2014 Washington D.C., 29 (Supplement 1), April, S57-S76 -- Carmen M. Reinhart, Vincent R. Reinhart and Kenneth S. Rogoff (2012), 'Public Debt Overhangs: Advanced-Economy Episodes Since 1800', Journal of Economic Perspectives, 26 (3), Summer, 69-86 -- Moritz Schularick and Alan M. Taylor (2012), 'Credit Booms Gone Bust: Monetary Policy, Leverage Cycles, and Financial Crises, 1870-2008', American Economic Review, 102 (2), April, 1029-61 -- Michael D. Bordo and Eugene N. White (1991), 'A Tale of Two Currencies: British and French Finance During the Napoleonic Wars', Journal of Economic History, 51 (2), June, 303-16 -- Marc Flandreau and Juan H. Flores (2009), 'Bonds and Brands: Foundations of Sovereign Debt Markets, 1820-1830', Journal of Economic History, 69 (3), September, 646-84 -- Gerardo della Paolera and Alan M. Taylor (2013), 'Sovereign Debt in Latin America, 1820-1913', Revista de Historia Económica/Journal of Iberian and Latin American Economic History, 31 (2), September, 173-217. , Richard Sicotte, Catalina Vizcarra and Kirsten Wandschneider (2010), 'Military Conquest and Sovereign Debt: Chile, Peru and the London Bond Market, 1876-1890', Cliometrica, 4 (3), October, 293-319 -- Marc D. Weidenmier (2005), 'Gunboats, Reputation, and Sovereign Repayment: Lessons from the Southern Confederacy', Journal of International Economics, 66 (2), July, 407-22 -- Michael D. Bordo and Hugh Rockoff (1992), 'The Gold Standard as a 'Good Housekeeping Seal of Approval"', Journal of Economic History, 56 (2), June, 389-428 -- Niall Ferguson and Moritz Schularick (2006), 'The Empire Effect: The Determinants of Country Risk in the First Age of Globalization, 1880-1913', Journal of Economic History, 66 (2), June, 283-312 -- Theodore Roosevelt (1904) 'President Theodore Roosevelt's Annual Message to Congress', delivered December 6th, 1904 -- Kris Mitchener and Marc Weidenmier (2005), 'Empire, Public Goods, and the Roosevelt Corollary', Journal of Economic History, 65 (3), September, 658-92 -- Kris James Mitchener and Marc D. Weidenmier (2010), 'Supersanctions and Sovereign Debt Repayment', Journal of International Money and Finance, 29 (1), February, 19-36 -- Barry Eichengreen and Ricardo Hausmann (1999) 'Exchange Rates and Financial Fragility' in Federal Reserve Bank of Kansas City (eds.), New Challenges for Monetary Policy, 329-68 -- Michael D. Bordo and Christopher M. Meissner (2006), 'The Role of Foreign Currency Debt in Financial Crises: 1880-1913 versus 1972-1997', Journal of Banking and Finance, 30 (12), December, 3299-329 -- Lyndon Moore and Jakub Kaluzny (2005), 'Regime Change and Debt Default: The Case of Russia, Austro-Hungary, and the Ottoman Empire following World War One', Explorations in Economic History, 42 (2), April, 237-58 -- Kim Oosterlinck and John S. Landon-Lane (2006), 'Hope Springs Eternal - French Bondholders and the Soviet Repudiation (1915-1919)', Review of Finance, 10 (4), 507-35 -- Barry Eichengreen and Richard Portes (1986), 'Debt and Default in the 1930s: Causes and Consequences', European Economic Review, 30 (3), June, 599-640 -- Barry Eichengreen (1991), 'Historical Research on International Lending and Debt', Journal of Economic Perspectives, 5 (2), Spring, 149-69 -- Peter Boone and Simon Johnson (2014), 'Forty Years of Leverage: What Have We Learned About Sovereign Debt?', American Economic Review: Papers and Proceedings, 104 (5), May, 266-71 -- Paolo Manasse and Nouriel Roubini (2009), ''Rules for Thumb' for Sovereign Debt Crises', Journal of International Economics, 78 (2), July, 192-205 -- Bergljot Barkbu, Barry Eichengreen and Ashoka Mody (2012), 'Financial Crises and the Multilateral Response: What the Historical Record Shows', Journal of International Economics, 88 (2), November, 422-35 -- Allan H. Meltzer (1984), 'The International Debt Problem', Cato Journal, 4 (1), Sping/Summer, 63-9 -- Jeffrey Sachs (1986), 'Managing the LDC Debt Crisis', Brookings Paper on Economic Activity, No. 2, 397-431 -- Jeffrey Sachs and Harry Huizinga (1987), 'U.S. Commercial Banks and the Developing-Country Debt Crisis', Brookings Paper on Economic Activity, No. 2, 555-601. , Jeremy Bulow (2002), 'First World Governments and Third World Debt', Brookings Papers on Economic Activity, No. 1, 229-55 -- Allan H. Meltzer (2004), 'Argentina 2002: A Case of Government Failure', Cato Journal, 23 (1), Spring/Summer, 29-31 -- Eugenio Andrea Bruno (2006), 'The Failure of Debt-Based Development: Lessons from Argentina', Cato Journal, 26 (2), Spring/Summer, 357-65 -- Juan Carlos Hatchondo, Leonardo Martinez and Horacio Sapriza (2007), 'The Economics of Sovereign Default', Economic Quarterly, 93 (2), Spring, 163-87 -- Ugo Panizza, Federico Sturzenegger and Jeromin Zettelmeyer (2009), 'The Economics and Law of Sovereign Debt and Default', Journal of Economic Literature, 47 (3), September, 651-98 -- Michael Tomz and Mark L. J. Wright (2013), 'Empirical Research on Debt and Default', Annual Review of Economics, 5, August, 247-72 -- Fernando Broner, Alberto Martin and Jaume Ventura (2010), 'Sovereign Risk and Secondary Markets', American Economic Review, 100 (4), September, 1523-55 -- Michael Tomz and Mark L. J. Wright (2007), 'Do Countries Default in 'Bad Times'?', Journal of the European Economic Association, 5 (2-3), April-May, 352-60 -- Edward I. Altman and Herbert A. Rijken (2011), 'Toward a Bottom-Up Approach to Assessing Sovereign Default Risk', Journal of Applied Corporate Finance, 23 (1), Winter, 20-31 -- Federico Sturzenegger and Jeromin Zettelmeyer (2008), 'Haircuts: Estimating Investor Losses in Sovereign Debt Restructurings, 1998-2005', Journal of International Money and Finance, 27 (5), September, 780-805 -- Juan J. Cruces and Christoph Trebesch (2013), 'Sovereign Defaults: The Price of Haircuts', American Economic Journal: Macroeconomics, 5 (3), July, 85-117 -- Miguel Fuentes and Diego Saravia (2010), 'Sovereign Defaulters: Do International Capital Markets Punish Them?', Journal of Development Economics, 91 (2), March, 336-47 -- Eduardo Levy Yeyati and Ugo Panizza (2011), 'The Elusive Costs of Sovereign Defaults', Journal of Development Economics, 94 (1), January, 95-105 -- Alberto Alesina and David Dollar (2000), 'Who Gives Foreign Aid to Whom and Why?', Journal of Economic Growth, 5 (1), March, 33-63 -- Alberto Alesina and Beatrice Weder (2002), 'Do Corrupt Governments Receive Less Foreign Aid?', American Economic Review, 92 (4), September, 1126-37 -- Craig Burnside and David Dollar (2000), 'Aid, Policies and Growth', American Economic Review, 90 (4), September, 847-68 -- Robert J. Barro and Jong-Wha Lee (2005), 'IMF Programs: Who is Chosen and What Are the Effects?', Journal of Monetary Economics, 52 (7), October, 1245-69 -- William Easterly (2002), 'How Did Heavily Indebted Poor Countries Become Heavily Indebted? Reviewing Two Decades of Debt Relief', World Development, 30 (10), October, 1677-96 -- Serkan Arslanalp and Peter Blair Henry (2005), 'Is Debt Relief Efficient?', Journal of Finance, LX (2), April, 1017-51. , Federico Sturzenegger and Jeromin Zettelmeyer (2007), 'Creditors' Losses Versus Debt Relief: Results From a Decade of Sovereign Debt Crises', Journal of the European Economic Association, 5 (2-3), April-May, 343-51 -- Rutsel Silvestre J. Martha (1990), 'Preferred Creditor Status under International Law: The Case of the International Monetary Fund', International and Comparative Law Quarterly, 39 (4), October, 801-26 -- Raghuram G. Rajan (2005), 'Institutional Reform and Sovereign Debt Crises', Cato Journal, 25 (1), Winter, 17-24 -- Nouriel Roubini and Jeffrey Sachs (1989), 'Government Spending and Budget Deficits in the Industrial Countries', Economic Policy, 4 (8), April, 99-132 -- Marina Azzimonti, Eva de Francisco and Vincenzo Quadrini (2014), 'Financial Globalization, Inequality, and the Rising Public Debt', American Economic Review, 104 (8), August, 2267-302 -- Viral Acharya, Itamar Drechsler and Philipp Schnabl (2014), 'A Pyrrhic Victory? Bank Bailouts and Sovereign Credit Risk', Journal of Finance, LXIX (6), December, 2689-739 -- Mark Aguiar, Manuel Amador, Emmanuel Farhi and Gita Gopinath (2014), 'Sovereign Debt Booms in Monetary Unions', American Economic Review: Papers and Proceedings, 104 (5), May, 101-6 -- Laurence J. Kotlikoff (2004), 'Fiscal Policy and the Future of the Euro', Cato Journal, 24 (1-2), Spring/Summer, 51-5 -- Jerome L. Stein (2011), 'The Diversity of Debt Crises in Europe', Cato Journal, 31 (2), Spring/Summer, 199-215 -- Philip R. Lane (2012), 'The European Sovereign Debt Crisis', Journal of Economic Perspectives, 26 (3), Summer, 49-67 -- Kevin H. O'Rourke and Alan M. Taylor (2013), 'Cross of Euros', Journal of Economic Perspectives, 27 (3), March, 167-91 -- John Beirne and Marcel Fratzscher (2013), 'The Pricing of Sovereign Risk and Contagion During the European Sovereign Debt Crisis', Journal of International Money and Finance, 34, April, 60-82 -- Carmen M. Reinhart and Kenneth S. Rogoff (2010), 'Growth in a Time of Debt', American Economic Review, 100 (2), May, 573-78 -- Thomas Herndon, Michael Ash and Robert Pollin (2014), 'Does High Public Debt Consistently Stifle Economic Growth? A Critique of Reinhart and Rogoff', Cambridge Journal of Economics, 38 (2), December, 257-79 -- Ugo Panizza and Andrea F. Presbitero (2013), 'Public Debt and Economic Growth in Advanced Economies: A Survey', Swiss Journal of Economics in Statistics, 149 (2), 175-204 -- Anja Baum, Cristina Checherita-Westphal and Philipp Rother (2013), 'Debt and Growth: New Evidence from the Euro Area', Journal of International Money and Finance, 32, February, 809-21 -- Alan J. Auerbach, Jagadeesg Gokhale and Laurence J. Kotlikoff (1994), 'Generating Accounting: A Meaningful Way to Evaluate Fiscal Policy', Journal of Economic Perspectives, 8 (1), Winter, 73-94 -- Pierre Lemieux (2013), 'American and European Welfare States: Similar Causes, Similar Effects', Cato Journal, 33 (2), Spring/Summer, 227-32 -- Michael Tanner (2013), 'Is America Becoming Greece?', Cato Journal, 33 (2), Spring/Summer, 211-25. , John H. Cochrane (2011), 'Inflation and Debt', National Affairs, Fall, 56-78 -- Carmen Reinhart and M. Belen Sbrancia (2015), 'The Liquidation of Government Debt', Economic Policy, 30 (82), April, 291-333 -- James M. Buchanan (1986), 'The Ethics of Debt Default', in James M. Buchanan, Charles K. Rowley and Robert D. Tollison (eds.), Deficit, Oxford, UK: Basil Blackwell, 361-73 -- Geoffrey Brennan and Giuseppe Eusepi (2002), 'The Dubious Ethics of Debt Default', Public Finance Review, 30 (6), November, 546-61 -- Seema Jayachandran and Michael Kremer (2006), 'Odious Debt', American Economic Review, 96 (1), March, 82-92 -- Albert H. Choi and Eric A. Posner (2007), 'A Critique of the Odious Debt Doctrine', Law and Contemporary Problems, 70 (3), Summer, 33-51 -- Nouriel Roubini (2002), 'Do We Need a New Bankruptcy Regime?', Brookings Papers on Economic Activity, 1, 321-33 -- Andrei Shleifer (2003), 'Will the Sovereign Debt Market Survive?', American Economic Review, 93 (2), May, 85-90 -- Rohan Pitchford and Mark L. J. Wright (2012), 'Holdouts in Sovereign Debt Restructuring: A Theory of Negotiation in a Weak Contractual Environment', Review of Economic Studies, 79 (2), April, 812-37 -- Robert W. Kolb (2015), 'The Virtue of Vultures: Distressed Debt Investors in the Sovereign Debt Market', Journal of Social, Political, and Economic Studies, 40 (4), Winter, 368-412.
    Language: English
    Keywords: Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9949301323602882
    Format: 1 online resource (215 pages)
    ISBN: 9781484200704
    Note: Intro -- Contents at a Glance -- Contents -- About the Authors -- About the Technical Reviewers -- Acknowledgments -- Foreword -- Introduction -- Chapter 1: Introduction -- What Is Embedded Firmware? -- Where Is Firmware? -- What Do Firmware Engineers Do? -- Firmware Preparation for New Hardware -- The Mystery of Bits -- Programming Guides -- The Intel® Firmware Support Package -- The Uniqueness of Embedded Firmware -- The Choice of Firmware Stacks -- Welcome to the Era of the Internet of Things -- Technical Coverage in This Book -- The Future of Firmware -- Chapter 2: Firmware Stacks for Embedded Systems -- Is a One-Size-Fits-All Solution Possible? -- Microkernel -- Real-Time Operating S ystem (RTOS) -- Legacy BIOS -- Implementations of the UEFI Framework -- Open Source Firmware Stacks -- Proprietary Firmware Stacks -- Make o r Buy -- The Advantages of Outsourcing -- The Disadvantages of Outsourcing -- In-House Development -- Summary -- Chapter 3: Intel® Firmware Support Package (Intel® FSP) -- The Intel FSP Philosophy -- What Is in Intel FSP? -- Intel FSP Binary Format -- Sample Boot Flow -- Locating the Entries of Intel FSP -- The Hard Way to Find Intel FSP APIs: Use Data Structure -- The Easy Way to Find FSP APIs: Use Hard-Coded Constants -- Programming Interface: The APIs of Intel FSP -- TempRamInit -- FspInitEntry -- NotifyPhase -- Intel FSP Output -- API Execution Status -- Temporary Memory Data HOB -- Non-Volatile Storage HOB -- Sample Code for Parsing HOBs -- Customization of Intel FSP -- Downloading Intel FSP -- Microcode Patches -- Relocating Intel FSP -- Integration and Build -- The Future of Intel FSP -- What Is Coming in the Following Chapters -- Chapter 4: Building coreboot with Intel FSP -- The Introduction of coreboot -- The Philosophy of coreboot -- A Brief History -- v1: 1999-2000 -- v2: 2000-2005 -- v2+: 2005-2008. , v3: 2006-2008 -- 2008 LinuxBIOS Renamed "coreboot" -- v4: 2009-2012 -- v4+: 2012-2014 -- Further Reading -- Prerequisites for Working with coreboot -- Community Organization -- Git and Gerrit -- Git Commit Messages -- coreboot Sign-off Procedure -- Developer's Certificate of Origin 1.1 -- Adding Your Sign-off -- Working with the coreboot Community -- coreboot Do's -- coreboot Don'ts -- Nonsource Binaries in coreboot -- A Hands-on Example: Building coreboot for the MinnowBoard MAX Mainboard -- Environment -- Hardware: MinnowBoard MAX -- MinnowBoard MAX Platform Details -- Development Directory -- Downloading Intel FSP -- Installing Intel FSP -- Downloading the coreboot Source -- coreboot Toolchain -- coreboot Commit Hooks -- Creating a coreboot Development Branch -- Building the Mainboard -- On the Menuconfig Menu -- On the Chipset Menu -- On the Devices Menu -- Build -- Summary of Commands -- Flashing the ROM -- Preparing the Flash Programmer -- Flashing the ROM Image -- coreboot Internals -- Boot Stages -- Additional Files -- CBFS -- An Example of CBFS -- CBFS Size -- Special Binaries -- Boot Flow Using Intel FSP -- Reset Vector and Bootblock -- romstage -- ramstage -- Payload -- coreboot Source -- coreboot Device Tree -- Chips and Devices -- Device Tree Variables -- A Device Tree Example -- Chip Operations -- Device Operations -- coreboot Hardwaremain State Machine -- State Machine States -- State Machine Callbacks -- Mainboard -- The Chipset Driver -- Chipset FSP UPD Options -- The FSP Driver -- Kconfig -- xcompile -- Payloads -- SeaBIOS -- GRUB 2 -- FILO -- iPXE -- TianoCore -- Depthcharge -- U- Boot -- Memtest86+ -- libpayload -- coreboot Troubleshooting and Debugging -- Postcodes -- Serial Debug -- EHCI USB Debug -- Summary -- Chapter 5: Chrome book Firmware Internals -- About Chrome book and Chrome OS -- Chrome OS Firmware Overview. , Chrome OS Security Philosophy -- Chrome OS Security Guiding Principles -- Power wash -- Chrome OS Boot Modes -- Verified (Normal) Mode -- Recovery Mode -- Developer Mode -- Chrome OS Coreboot -- x86 -- ARM -- Depth charge Payload -- libpayload -- Verified Boot -- Verified Boot and Kernel Security -- Chrome OS Firmware Boot Log -- Boot Times Log -- Chrome OS Firmware Event Log -- Google SMI Linux Kernel Driver -- Chrome OS Extensions to the Firmware Image -- FMAP -- BOOT_STUB FMAP Section -- Chrome OS Firmware RW FMAP Sections -- An fmap.dts (RW_SECTION_A) Example -- Google Binary Block (GBB) -- GBB: HWID v3 -- GBB: Firmware Bitmaps -- GBB: Firmware Keys -- GBB: Boot Flags -- Vital Product Data ( VPD) -- Firmware TPM Usage -- Chrome OS Firmware Update -- Chrome OS Utilities -- flashrom -- gbb_utility -- GBB Flags Utility Script: set_gbb_flags.sh -- crossystem -- mosys -- Google Embedded Controller -- Power Sequencing -- Battery Charging -- Thermal Management -- Keyboard Controller -- Other Peripheral Controls -- Chrome EC Software Sync -- Software Sync Steps -- Summary -- Chapter 6: Intel FSP and UEFI Integration -- Introduction to EFI -- Introduction to FSP -- Introduction to EDK II -- Summary -- FSP Components -- FSP Wrapper Boot Flow -- Generic FSP Wrapper Boot Flow -- Normal Boot -- Boot Flow -- Memory Layout for a Normal Boot Flow -- FSP Normal Boot Data Structure -- S3 Boot -- Boot Flow -- S3 Memory Layout -- S3 NV Data Passing -- Capsule Flash Update -- Boot Flow -- Capsule Update Memory Layout -- Recovery Boot Flow -- FSP Recovery Memory Layout -- coreboot Payload Based upon EDK II -- Building Minnow and MinnowMax with FSP -- Future of the Intel FSP -- Conclusion -- Chapter 7: Building Firmware for Quark Processors -- Overview of UEFI and PI -- History of Implementations and Specifications -- Introduction to EDK II Building Blocks. , PKG: Packaging -- MdePkg -- MdeModulePkg -- IntelFrameworkPkg -- IntelFrameworkModulePkg -- Packages -- PCD: Platform Configuration Database -- Syntax -- DEC: Platform Declaration File -- Syntax -- DSC: Platform Description File -- FDF: Flash Description File -- Syntax -- Build: The EDK II Build Command -- INF: INF File -- More Information -- Introduction to the EDK II Subset -- Introduction to Quark -- ROM Flash Image Size Optimization -- Fixed Resource -- DRAM/SMRAM -- Remove Features -- Reduce Features -- Compiler Options -- Build Options -- Results of the TinyQuark Optimization -- RAM Footprint Optimization -- Optimization -- Result of Memory Usage Optimization -- Conclusion -- Chapter 8: Putting It All Together -- RTOS and Intel FSP -- Intel FSP and Open Source Philosophy -- Customization and Production of Intel FSP -- It Is a Community Effort After All -- Appendix A: Sample Boot Setting File (BSF) -- Index.
    Additional Edition: Print version: Zimmer, Vincent Embedded Firmware Solutions Berkeley, CA : Apress L. P.,c2015 ISBN 9781484200711
    Language: English
    Keywords: Electronic books. ; Electronic books.
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9949301350302882
    Format: 1 online resource (565 pages)
    ISBN: 9781484255742
    Note: Intro -- Table of Contents -- About the Authors -- Preface -- Acknowledgments -- Chapter 1: Introduction -- Read the Book, Not the Spec -- SYCL 1.2.1 vs. SYCL 2020, and DPC++ -- Getting a DPC++ Compiler -- Book GitHub -- Hello, World! and a SYCL Program Dissection -- Queues and Actions -- It Is All About Parallelism -- Throughput -- Latency -- Think Parallel -- Amdahl and Gustafson -- Scaling -- Heterogeneous Systems -- Data-Parallel Programming -- Key Attributes of DPC++ and SYCL -- Single-Source -- Host -- Devices -- Sharing Devices -- Kernel Code -- Kernel: Vector Addition (DAXPY) -- Asynchronous Task Graphs -- Race Conditions When We Make a Mistake -- C++ Lambda Functions -- Portability and Direct Programming -- Concurrency vs. Parallelism -- Summary -- Chapter 2: Where Code Executes -- Single-Source -- Host Code -- Device Code -- Choosing Devices -- Method#1: Run on a Device of Any Type -- Queues -- Binding a Queue to a Device, When Any Device Will Do -- Method#2: Using the Host Device for Development and Debugging -- Method#3: Using a GPU (or Other Accelerators) -- Device Types -- Accelerator Devices -- Device Selectors -- When Device Selection Fails -- Method#4: Using Multiple Devices -- Method#5: Custom (Very Specific) Device Selection -- device_selector Base Class -- Mechanisms to Score a Device -- Three Paths to Device Code Execution on CPU -- Creating Work on a Device -- Introducing the Task Graph -- Where Is the Device Code? -- Actions -- Fallback -- Summary -- Chapter 3: Data Management -- Introduction -- The Data Management Problem -- Device Local vs. Device Remote -- Managing Multiple Memories -- Explicit Data Movement -- Implicit Data Movement -- Selecting the Right Strategy -- USM, Buffers, and Images -- Unified Shared Memory -- Accessing Memory Through Pointers -- USM and Data Movement -- Explicit Data Movement in USM. , Implicit Data Movement in USM -- Buffers -- Creating Buffers -- Accessing Buffers -- Access Modes -- Ordering the Uses of Data -- In-order Queues -- Out-of-Order (OoO) Queues -- Explicit Dependences with Events -- Implicit Dependences with Accessors -- Choosing a Data Management Strategy -- Handler Class: Key Members -- Summary -- Chapter 4: Expressing Parallelism -- Parallelism Within Kernels -- Multidimensional Kernels -- Loops vs. Kernels -- Overview of Language Features -- Separating Kernels from Host Code -- Different Forms of Parallel Kernels -- Basic Data-Parallel Kernels -- Understanding Basic Data-Parallel Kernels -- Writing Basic Data-Parallel Kernels -- Details of Basic Data-Parallel Kernels -- The range Class -- The id Class -- The item Class -- Explicit ND-Range Kernels -- Understanding Explicit ND-Range Parallel Kernels -- Work-Items -- Work-Groups -- Sub-Groups -- Writing Explicit ND-Range Data-Parallel Kernels -- Details of Explicit ND-Range Data-Parallel Kernels -- The nd_range Class -- The nd_item Class -- The group Class -- The sub_group Class -- Hierarchical Parallel Kernels -- Understanding Hierarchical Data-Parallel Kernels -- Writing Hierarchical Data-Parallel Kernels -- Details of Hierarchical Data-Parallel Kernels -- The h_item Class -- The private_memory Class -- Mapping Computation to Work-Items -- One-to-One Mapping -- Many-to-One Mapping -- Choosing a Kernel Form -- Summary -- Chapter 5: Error Handling -- Safety First -- Types of Errors -- Let's Create Some Errors! -- Synchronous Error -- Asynchronous Error -- Application Error Handling Strategy -- Ignoring Error Handling -- Synchronous Error Handling -- Asynchronous Error Handling -- The Asynchronous Handler -- Invocation of the Handler -- Errors on a Device -- Summary -- Chapter 6: Unified Shared Memory -- Why Should We Use USM? -- Allocation Types -- Device Allocations. , Host Allocations -- Shared Allocations -- Allocating Memory -- What Do We Need to Know? -- Multiple Styles -- Allocations à la C -- Allocations à la C++ -- C++ Allocators -- Deallocating Memory -- Allocation Example -- Data Management -- Initialization -- Data Movement -- Explicit -- Implicit -- Migration -- Fine-Grained Control -- Queries -- Summary -- Chapter 7: Buffers -- Buffers -- Creation -- Buffer Properties -- use_host_ptr -- use_mutex -- context_bound -- What Can We Do with a Buffer? -- Accessors -- Accessor Creation -- What Can We Do with an Accessor? -- Summary -- Chapter 8: Scheduling Kernels and Data Movement -- What Is Graph Scheduling? -- How Graphs Work in DPC++ -- Command Group Actions -- How Command Groups Declare Dependences -- Examples -- When Are the Parts of a CG Executed? -- Data Movement -- Explicit -- Implicit -- Synchronizing with the Host -- Summary -- Chapter 9: Communication and Synchronization -- Work-Groups and Work-Items -- Building Blocks for Efficient Communication -- Synchronization via Barriers -- Work-Group Local Memory -- Using Work-Group Barriers and Local Memory -- Work-Group Barriers and Local Memory in ND-Range Kernels -- Local Accessors -- Synchronization Functions -- A Full ND-Range Kernel Example -- Work-Group Barriers and Local Memory in Hierarchical Kernels -- Scopes for Local Memory and Barriers -- A Full Hierarchical Kernel Example -- Sub-Groups -- Synchronization via Sub-Group Barriers -- Exchanging Data Within a Sub-Group -- A Full Sub-Group ND-Range Kernel Example -- Collective Functions -- Broadcast -- Votes -- Shuffles -- Loads and Stores -- Summary -- Chapter 10: Defining Kernels -- Why Three Ways to Represent a Kernel? -- Kernels As Lambda Expressions -- Elements of a Kernel Lambda Expression -- Naming Kernel Lambda Expressions -- Kernels As Named Function Objects. , Elements of a Kernel Named Function Object -- Interoperability with Other APIs -- Interoperability with API-Defined Source Languages -- Interoperability with API-Defined Kernel Objects -- Kernels in Program Objects -- Summary -- Chapter 11: Vectors -- How to Think About Vectors -- Vector Types -- Vector Interface -- Load and Store Member Functions -- Swizzle Operations -- Vector Execution Within a Parallel Kernel -- Vector Parallelism -- Summary -- Chapter 12: Device Information -- Refining Kernel Code to Be More Prescriptive -- How to Enumerate Devices and Capabilities -- Custom Device Selector -- Being Curious: get_info< -- > -- -- Being More Curious: Detailed Enumeration Code -- Inquisitive: get_info< -- > -- -- Device Information Descriptors -- Device-Specific Kernel Information Descriptors -- The Specifics: Those of "Correctness" -- Device Queries -- Kernel Queries -- The Specifics: Those of "Tuning/Optimization" -- Device Queries -- Kernel Queries -- Runtime vs. Compile-Time Properties -- Summary -- Chapter 13: Practical Tips -- Getting a DPC++ Compiler and Code Samples -- Online Forum and Documentation -- Platform Model -- Multiarchitecture Binaries -- Compilation Model -- Adding SYCL to Existing C++ Programs -- Debugging -- Debugging Kernel Code -- Debugging Runtime Failures -- Initializing Data and Accessing Kernel Outputs -- Multiple Translation Units -- Performance Implications of Multiple Translation Units -- When Anonymous Lambdas Need Names -- Migrating from CUDA to SYCL -- Summary -- Chapter 14: Common Parallel Patterns -- Understanding the Patterns -- Map -- Stencil -- Reduction -- Scan -- Pack and Unpack -- Pack -- Unpack -- Using Built-In Functions and Libraries -- The DPC++ Reduction Library -- The reduction Class -- The reducer Class -- User-Defined Reductions -- oneAPI DPC++ Library -- Group Functions. , Direct Programming -- Map -- Stencil -- Reduction -- Scan -- Pack and Unpack -- Pack -- Unpack -- Summary -- For More Information -- Chapter 15: Programming for GPUs -- Performance Caveats -- How GPUs Work -- GPU Building Blocks -- Simpler Processors (but More of Them) -- Expressing Parallelism -- Expressing More Parallelism -- Simplified Control Logic (SIMD Instructions) -- Predication and Masking -- SIMD Efficiency -- SIMD Efficiency and Groups of Items -- Switching Work to Hide Latency -- Offloading Kernels to GPUs -- SYCL Runtime Library -- GPU Software Drivers -- GPU Hardware -- Beware the Cost of Offloading! -- Transfers to and from Device Memory -- GPU Kernel Best Practices -- Accessing Global Memory -- Accessing Work-Group Local Memory -- Avoiding Local Memory Entirely with Sub-Groups -- Optimizing Computation Using Small Data Types -- Optimizing Math Functions -- Specialized Functions and Extensions -- Summary -- For More Information -- Chapter 16: Programming for CPUs -- Performance Caveats -- The Basics of a General-Purpose CPU -- The Basics of SIMD Hardware -- Exploiting Thread-Level Parallelism -- Thread Affinity Insight -- Be Mindful of First Touch to Memory -- SIMD Vectorization on CPU -- Ensure SIMD Execution Legality -- SIMD Masking and Cost -- Avoid Array-of-Struct for SIMD Efficiency -- Data Type Impact on SIMD Efficiency -- SIMD Execution Using single_task -- Summary -- Chapter 17: Programming for FPGAs -- Performance Caveats -- How to Think About FPGAs -- Pipeline Parallelism -- Kernels Consume Chip "Area" -- When to Use an FPGA -- Lots and Lots of Work -- Custom Operations or Operation Widths -- Scalar Data Flow -- Low Latency and Rich Connectivity -- Customized Memory Systems -- Running on an FPGA -- Compile Times -- The FPGA Emulator -- FPGA Hardware Compilation Occurs "Ahead-of-Time" -- Writing Kernels for FPGAs. , Exposing Parallelism.
    Additional Edition: Print version: Reinders, James Data Parallel C++ Berkeley, CA : Apress L. P.,c2020 ISBN 9781484255735
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: Full-text  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    San Diego :Plural Publishing, Incorporated,
    UID:
    almahu_9949465355402882
    Format: 1 online resource (649 pages)
    Edition: 2nd ed.
    ISBN: 9781635501629
    Content: Covering an array of evidence-based content, including aphasia, traumatic brain injury, dementia, and language in aging, Aphasia and Other Acquired Neurogenic Language Disorders: A Guide for Clinical Excellence, Second Edition is a must-have textbook for clinicians and students studying to be speech-language pathologists. This clinical guide strategically addresses scientific foundations, service delivery, international and multicultural perspectives, assessment, and treatment.
    Note: Intro -- What Is Special About This Book? -- Acknowledgments -- About the Author -- Dedication -- Section I. Welcome and Introduction -- Chapter 1. Welcome to the Fantastic World of Research and Clinical Practice in Acquired Neurogenic Communication Disorders -- What Are Acquired Cognitive-Linguistic Disorders? -- Which Neurogenic Communication Disorders Are Not Acquired Language Disorders? -- What Is Clinical Aphasiology? -- What Is So Fantastic About the World of Neurogenic Communication Disorders? -- We Work With Wonderful People and Become Part of Their Rich Life Stories -- We Are Catalysts for Positive Change -- We Enjoy Empowerment of Others Through Advocacy and Leadership -- We Enjoy a Great Deal of Humor and Fascination -- We Enjoy Fantastic Local and Worldwide Professional Networks -- Our Work Is Multicultural and Multilingual -- We Are Lifelong Learners -- We Tap Into Our Most Scientific and Our Most Creative Selves at the Same Time -- We Have Rich Career Opportunities -- What Disciplines Are Relevant to Aphasia and Related Disorders? -- What Is Known About the Incidence and Prevalence of Acquired Neurogenic Language Disorders? -- Where Do Aphasiologists Work? -- What Is the Career Outlook for Clinical Aphasiologists? -- Learning and Reflection Activities -- Chapter 2. Becoming the Ultimate Excellent Clinician -- What Makes a Clinician Truly Excellent? -- What Can One Do to Become an Excellent Clinical Aphasiologist? -- How Do the People We Serve Characterize What They Most Want? -- What Are Some Traits of People Who Are Perceived as Unhelpful Clinicians? -- What Content Is Important to Master? -- What Credentials Are Required for a Career as an Aphasiologist? -- What Credentials May Aphasiologists Earn Beyond Their Basic Academic and Clinical Credentials? -- Is It Best to Specialize or Generalize?. , What Strategies Help Boost Career Development in Acquired Cognitive-Linguistic Disorders? -- What Organizations Support Professional Information Sharing and Networking Among Clinical Aphasiologists? -- Learning and Reflection Activities -- Chapter 3. Writing and Talking About the People With Whom We Work -- What Is Important to Consider in Writing and Talking About People With Neurogenic Cognitive-Linguistic Disorders? -- Person-First Language -- Alternatives to the Word Patient -- People With Disabilities -- Research Participants -- Older People -- Healthy Adults -- What Are Important Nuances in Terms We Use to Refer to People Who Care for People With Neurogenic Cognitive-Linguistic Disorders? -- What Is the Difference Between the Terms Therapy and Treatment ? -- Neurotypical People -- What Are Pros and Cons of Terms Used to Refer to SLPs? -- What Are the Preferred Terms When Referring to the Experts Who Work With People Who Have Neurogenic Communication Challenges? -- What Is Important to Keep in Mind Regarding Inclusive and Welcoming Language? -- What Other Terms Might Unintentionally Convey Negative Connotations? -- Why Are There Inconsistencies in the Prefixes Used in Terms for Characterizing Neurogenic Symptoms, and What Is the Rationale for Varied Prefix Choices? -- Learning and Reflection Activities -- Section II. Foundations for Considering Acquired Neurogenic Language Disorders -- Chapter 4. Defining and Conceptualizing Aphasia -- What Is a Good Way to Define Aphasia? -- Aphasia Is Acquired -- Aphasia Has a Neurological Cause -- Aphasia Affects Reception and Production of Language Across Modalities -- Aphasia Is Not a Speech, Intellectual, Sensory, or Psychiatric Disorder -- How Have Established Aphasiologists Defined Aphasia? -- What Are the Primary Frameworks for Conceptualizing Aphasia? -- Unidimensional Frameworks. , Multidimensional Frameworks -- Medical Frameworks -- Cognitive Neuropsychological, Psycholinguistic, and Neurolinguistic Frameworks -- Biopsychosocial Frameworks -- Social Frameworks -- Social Determinants of Health Frameworks -- Other Historically Relevant Frameworks -- How Does One Choose a Preferred Framework for Conceptualizing Aphasia? -- How Are the Frameworks for Conceptualizing Aphasia Relevant to Other Neurogenic Language Disorders? -- Learning and Reflection Activities -- Chapter 5. The WHO ICF, Human Rights Perspectives, and Life Participation Approaches -- What Is the WHO ICF? -- How Is the WHO ICF Relevant to Ethics and Human Rights? -- How Is the WHO ICF Specifically Relevant to Intervention and Research in Rehabilitation? -- How Is the WHO ICF Specifically Relevant to People With Neurogenic Language Disorders? -- Learning and Reflection Activities -- Chapter 6. Etiologies of Acquired Neurogenic Language Disorders -- What Is a Stroke? -- What Are Stroke Risk Factors, and What Causes Stroke? -- What Are the Physiological Effects of Stroke? -- How Crucial Is Timing for Medical Treatment After a Stroke? -- How Is the Sudden Onset of Stroke Relevant to Supporting Patients and Families? -- What Is a Transient Ischemic Attack? -- What Is Hypoperfusion? -- What Can Be Done to Prevent Stroke? -- Attending to Stroke Triggers -- What Is TBI? -- What Are Blast Injuries? -- What Are Concussion and Mild TBI? -- What Can Be Done to Prevent TBI? -- What Are Bacteria and Viruses? -- What Other Types of Infections Affect Cortical Function? -- What Is Neoplasm? -- What Is Toxemia? -- What Are Diabetes Mellitus and Diabetic Encephalopathy? -- What Is Metabolic Syndrome? -- What Other Metabolic Disorders Cause Encephalopathy? -- What Is Neurodegenerative Disease? -- What Is Dementia? -- What Is Mild Cognitive Impairment?. , What Is Primary Progressive Aphasia? -- What Are Some Special Challenges in Identifying Etiologies of Cognitive-Linguistic Disorders? -- Learning and Reflection Activities -- Chapter 7. Neurophysiology and Neuropathology of Acquired Neurogenic Language Disorders -- What Should SLPs Know About Neuroanatomy and Neurophysiology Associated With Neurogenic Cognitive-Linguistic Disorders? -- What Are Key Neurophysiological Principles Pertinent to Acquired Cognitive-Linguistic Disorders? -- Specialization of Structure and Function -- Interconnectivity Throughout the Brain -- The Brain's Plasticity -- What Is the Most Clinically Pertinent Knowledge an Aphasiologist Should Have About the Blood Supply to the Brain? -- What Factors Affect a Person's Prognosis for Recovery From a Stroke or Brain Injury? -- Why Is It Important for Clinical Aphasiologists to Know About the Visual System? -- What Aspects of the Visual System Are Most Relevant to People With Neurogenic Language Disorders? -- Anatomy and Physiology Associated With Visual Deficits -- How Are Visual Field Deficits Characterized? -- What Are Ocular Motor Deficits? -- What Are Visual Attention Deficits? -- What Are Higher-Level Visual Deficits? -- What Aspects of the Neurophysiology of Hearing Are Most Relevant to People With Neurogenic Language Disorders? -- Learning and Reflection Activities -- Supplemental Review of Neuroanatomy Related to Aphasiology -- Supplemental Review of Blood Supply to the Brain -- Supplemental Review of the Visual System -- Supplemental Review of the Auditory System -- Chapter 8. Neuroimaging and Other Neurodiagnostic Instrumentation -- What Are the Most Relevant Neuroimaging Techniques for Aphasiologists to Know About? -- Computed Axial Tomography (CAT or CT) -- Magnetic Resonance Imaging (MRI) -- Single Photon Emission Computed Tomography (SPECT) -- Cerebral Angiography. , What Other Neurodiagnostic Methods Are Important for Aphasiologists to Know About? -- Electroencephalography (EEG) -- Electrocorticography -- Additional Methods -- Learning and Reflection Activities -- Chapter 9. Aging, Which Is Not a Disorder, and Its Relevance to Aphasiology -- What Is Aging? -- What Are Key Theories About Aging That Are Especially Relevant to Cognition and Communication? -- What Is Aging Well? -- How Are Demographic Shifts in Aging Populations Relevant to Clinical Aphasiologists? -- What Are Normal Changes in the Brain as People Age? -- What Are Positive Aspects of the Aging Brain? -- Memory -- Word Finding -- Syntactic Processing -- Reading and Writing -- Discourse -- Pragmatics -- What Are General Guidelines for Differentiating Normal From Impaired Language in Older Adults? -- What Theories Have Been Proposed to Account for Cognitive-Linguistic Changes With Aging? -- Resource Capacity Theories -- Working Memory Theories -- Context-Processing Deficiency Theories -- Signal Degradation Theories -- Transmission Deficit Theories -- Speed-of-Processing Theories -- Inhibition Theories -- What Can Be Done to Ensure the Best Preservation of Language Abilities as People Age? -- What Is Elderspeak, and How May We Raise Awareness About It? -- What Sensitivities Related to Ageism Are Important for Aphasiologists to Demonstrate? -- Learning and Reflection Activities -- Section III. Features, Symptoms, and Syndromes in the Major Categories of Cognitive-Linguistic Disorders -- Chapter 10. Syndromes and Hallmark Characteristics of Aphasia -- How Are the Types of Aphasia Classified? -- What Are the Classic Syndromes of Aphasia, and What Are the Hallmark Characteristics of Each? -- Expressive/Receptive, Nonfluent/Fluent, and Anterior/Posterior Dichotomies -- Classic Aphasia Classification -- Wernicke's Aphasia -- Broca's Aphasia -- Global Aphasia. , Conduction Aphasia.
    Additional Edition: Print version: Hallowell, Brooke Aphasia and Other Acquired Neurogenic Language Disorders San Diego : Plural Publishing, Incorporated,c2019 ISBN 9781635501599
    Language: English
    Keywords: Electronic books. ; Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    New York : Oxford University Press
    UID:
    b3kat_BV043960972
    Format: xxii, 147 pages
    ISBN: 9780199742134 , 0199742138 , 9780195396348 , 0195396340 , 9780195396331 , 0195396332
    Series Statement: What everyone needs to know
    Note: Includes bibliographical references and index , Defining social entrepreneurship -- What is social entrepreneurship? -- When did it emerge as a global movement? -- Who are the pioneers? -- What does a social entrepreneur do? -- What are social entrepreneurs like? -- What is the difference between social and business entrepreneurship? -- What are the differences between social entrepreneurship and government? -- How is social entrepreneurship different from activism? -- What is the relationship between social entrepreneurship and democracy? -- Challenges of causing change -- What are the main financial constraints? -- How do social entrepreneurs build organizations and enterprises? -- Can the field attract and cultivate talented workers? -- How do social entrepreneurs evaluate their impact? -- What is the difference between scale and impact? -- What's stopping social change? -- Envisioning an innovating society -- How is social entrepreneurship changing minds? -- How could schools nurture social innovators? -- What is being done at the university level? -- What can governments do to engage more successfully with social entrepreneurs? -- How is social entrepreneurship influencing business? -- Can philanthropy be more effective? -- How will the field of social entrepreneurship influence journalism? -- How can individuals prepare themselves to participate in the field of social entrepreneurship? , "In development circles, there is now widespread consensus that social entrepreneurs represent a far better mechanism to respond to needs than we have ever had before, a decentralized and emergent force that remains our best hope for solutions that can keep pace with our problems and create a more peaceful world. The author's book on social entrepreneurship, How to Change the World, was hailed by Nicholas Kristof in The New York Times as 'a bible in the field' and published in more than twenty countries. Now, he shifts the focus from the profiles of successful social innovators in that book, and teams with Susan Davis, a founding board member of the Grameen Foundation, to offer the first general overview of social entrepreneurship. In a Q & A format allowing readers to go directly to the information they need, the authors map out social entrepreneurship in its broadest terms as well as in its particulars. They explain what social entrepreneurs are, how their organizations function, and what challenges they face. The book will give readers an understanding of what differentiates social entrepreneurship from standard business ventures and how it differs from traditional grant based non-profit work. Unlike the typical top down, model-based approach to solving problems employed by the World Bank and other large institutions, social entrepreneurs work through a process of iterative learning, learning by doing, working with communities to find unique, local solutions to unique, local problems. Most importantly, the book shows readers exactly how they can get involved. It is for anyone inspired by Barack Obama's call to service and who wants to learn more about the essential features and enormous promise of this new method of social change"--Provided by publisher
    Language: English
    Keywords: Entrepreneurship ; Nonprofit-Bereich ; Soziale Probleme ; Problemlösen ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Cheltenham :Edward Elgar Pub. Ltd.,
    UID:
    almahu_9947914845402882
    Format: 1 online resource (1 v.) ; , cm.
    ISBN: 9781784713713 (e-book)
    Series Statement: Elgar research reviews in business
    Content: This important title brings together some of the most influential papers that have contributed to our understanding of management consultancy work. This research review encompasses the breadth of conceptual and empirical perspectives and explores those key ideas that have helped to advance our knowledge of this intriguing area.
    Note: The recommended readings are available in the print version, or may be available via the link to your library's holdings. , Recommended readings (Machine generated): Argyris, C. and D.A. Schön (1978), Organizational Learning: A Theory of Action Perspective, Reading, MA: Addison-Wesley. -- Armbrüster, T. (2006), The Economics and Sociology of Management Consulting, Cambridge: Cambridge University Press. -- Ashford, M. (1998), Con Tricks: The Shadowy World of Management Consultancy and How to Make it Work for You, London: Simon & Schuster. -- Avakian, S. (2004), 'Assessing the Role of Management Consultants in Creating a Valuable Service to Clients Through Knowledge', in P. Petratos (ed.), Global Information Technology, Innovation and Entrepreneurship, Athens: Atiner Publications, pp. 23-40. -- Avakian, S., T. Clark and J. Roberts (2010), 'Cultural Spheres of Trust between Consultants and Clients: Exploring Knowledge Legitimization', in M. Saunders, D. Skinner, N. Gillespie and G. Dietz (eds), Trust Across Cultures: Theory and Practice, Cambridge: Cambridge University Press, pp. 129-55. -- Barcus, S.W. and J.W. Wilkinson (1986), Handbook of Management Consulting Services, New York: McGraw-Hill. -- Barnier, M. (2011), 'Audit: F.E.E.', speech to the Federation of European Accountants, 30 June, http://ec.europa.eu/commission_2010-2014/barnier/docs/speeches/20110630_fee_en.pdf. -- Beckhard, R. (1969), Organization Development, Reading, MA: Addison-Wesley. -- Bell, D. (1973), The Coming of Post-Industrial Society, New York: Basic Books. -- Benders, J., R.-J. Van Den Berg and M. Van Bijsterveld (1998), 'Hitchhiking on a Hype: Dutch Consultants Engineering Re-Engineering', Journal of Organizational Change Management, 11 (2), 201-15. -- Block, P. (1999), Flawless Consulting: A Guide to Getting Your Expertise Used (2nd edn), Johannesburg: Pfeffer and Company. -- Boussebaa, M. (2009), 'Struggling to Organize Across National Borders: The Case of Global Resource Management in Professional Service Firms', Human Relations, 62 (6), 829-50. -- Byrne, A.J. (2002), 'Inside McKinsey', Business Week, 8 July, 66-76. -- Byrnes, N. (2007), 'The Comeback of Consulting', 3 September, www.businessweek.com. -- Clark, T. (1995), Managing Consultants: Consultancy as the Management of Impressions, Buckingham: Open University Press. -- Clark, T. and R. Fincham (2002), Critical Consulting: New Perspectives on the Management Advice Industry, Oxford: Blackwell. -- Clark, T. and G. Salaman (1996), 'Management Gurus as Organizational Witchdoctors', Organization, 3 (1), 85-107. -- Clark, T., P. Bhatanacharoen and D. Greatbatch (2012), 'Management Gurus as Celebrity Consultants', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 347-63. -- Craig, D. (2005), Rip Off! The Scandalous Inside Story of the Management Consulting Money Machine, London: The Original Book Company. , Cyert, R.M. and J.G. March (1963), A Behavioural Theory of the Firm, Englewood Cliffs, NJ: Prentice-Hall. -- Czerniawska, F. and P. May (2004), Management Consulting in Practice, London: Kogan Page. -- Daft, R. and K.E., Weick (1984), 'Toward a Model of Organization as Interpretation Systems', Academy of Management Review, 9 (2), 284-95. -- Datamonitor (2010), Global Management and Marketing Consultancy, New York: Datamonitor. -- Djelic, M-L. (1998), Exporting the American Model: The Postwar Transformation of European Business, Oxford: Oxford University Press. -- Films of Record (1999), Masters of the Universe, broadcast in August on Channel 4 in UK. -- Fincham, R. (2012), 'The Client in the Client-Consultant Relationship', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 411-26. -- Fincham, R. and T. Clark (2002), 'Introduction: The Emergence of Critical Perspectives on Consulting', in T. Clark and R. Fincham (eds), Critical Consulting: New Perspectives on the Management Advice Industry, Oxford: Blackwell, pp. 1-18. -- French, W.L. and C.H. Bell (1995), Organization Development: Behavioural Science Interventions for Organization Improvement, Englewood Cliffs, NJ: Prentice-Hall. -- Frenkel, M. and Y. Shenhav (2012), 'Management Consulting in Developing and Emerging Economies: Toward a Postcolonial Perspective', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 509-27. -- Friedman, J.V. (2003), 'The Individual as Agent of Organizational Learning', in M. Dierkes, A. Berthoin Antal, J. Child and I. Nonaka (eds), Handbook of Organizational Learning and Knowledge, Oxford: Oxford University Press, pp. 398-414. -- Galal, K., A. Richter and V. Wendlandt (2012), 'IT Consulting and Outsourcing Firms: Evolution, Business Models, and Future Prospects', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 117-36. -- Gibson, J.W. and D.V. Tesone (2001), 'Management Fads: Emergence, Evolution, and Implications for Managers', Academy of Management Review, 15 (4), 122-33. -- Greiner, L. and R. Metzger (1983), Consulting to Management, Englewood Cliffs, NJ: Prentice-Hall. -- Guillén, M. (1994), Models of Management: Work, Authority, and Organization in a Comparative Perspective, Chicago, IL: University of Chicago. -- Heusinkveld, S. and J. Benders (2005), 'Contested Commodification: Consultancies and their Struggle with New Concept Development', Human Relations, 58 (2), 283-310. -- Higdon, H. (1969), The Business Healers, New York: Random House. -- House of Commons Committee of Public Accounts (2007), Central Government's Use of Consultants, thirty-first report of Session 2006-07, HC 309, London: The Stationery Office. -- Independent, The (2009), 'Masters of Illusion: The Great Management Consultancy Swindle', 17 September 2009, http://www.independent.co.uk/news/business/analysis-and-features/masters-of-illusion-the-great-management-consultancy-swindle-1788556.html; accessed 10 March 2010. , Jung, N. and A. Kieser (2012), 'Consultants in the Management Fashion Arena', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 327-46. -- Keeble, D. and J. Schwalbach (1995), 'Management Consultancy in Europe', working paper 1, ESRC Centre for Business Research, University of Cambridge. -- Kipping, M. and T. Clark (2012), 'Researching Management Consulting: An Introduction to the Handbook', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 1-26. -- Kipping, M. and L. Engwall (eds) (2002), Management Consulting: Emergence and Dynamics of a Knowledge Industry, Oxford: Oxford University Press. -- Kreis, S. (1990), 'The Diffusion of an Idea: A History of Scientific Management in Britain, 1890-1945', unpublished PhD dissertation, University of Missouri-Columbia. -- Kubr, M. (2002/1976), Management Consulting: A Guide to the Profession, Geneva: International Labour Office. -- Kumar, K. (1995), From Post-Industrial to Post-Modern Society: New Theories of the Contemporary World, Oxford: Blackwell. -- Lewitt, B. and J.G. March (1988), 'Organizational Learning', Annual Review of Sociology, 14, 319-40. -- Lippitt, G. and R. Lippitt (1986), The Consulting Process in Action, San Diego: University Associates Inc. -- Lowendahl, B.R., O. Revang and S.M. Fosstenlokken (2001), 'Knowledge and Value Creation in Professional Service Firms: A Framework for Analysis', Human Relations, 54 (7), 911-31. -- MCA (2010), 'The Ingredients of Growth: MCA Review 2010-11', www.mca.org.uk. -- McDougald, M.S. and R. Greenwood (2012), 'Cuckoo in the Nest? The Rise of Management Consulting in Large Accounting Firms', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 93-116. -- McKenna, C. (2006), The World's Newest Profession: Management Consulting in the Twentieth Century, New York: Cambridge University Press. -- Micklethwait, J. and J. Wooldridge (1996), The Witch Doctors: Making Sense of the Management Gurus, New York: Random House. -- Morgenson, G. (2002), 'Watchdog? Lap Dog? Why Have to Guess?', New York Times, 17 February. -- Nachum, L. (1999), 'Measurement of Productivity of Professional Services: An Illustration on Swedish Management Consulting Firms', International Journal of Operations & Production Management, 19 (9), 922-49. -- National Audit Office (2006), Central Government's Use of Consultants, Session 2006-07, HC 128, London: National Audit Office. -- National Audit Office (2010), Central Government's Use of Consultants and Interims, Session 2010-2011, HC 488, London: National Audit Office. -- Niewiem, S. and A. Richter (2004), 'The Changing Balance of Power in the Consulting Market', Business Strategy Review, 15 (1), 8-13. , Nikolova, N. and T. Devinney (2012), 'The Nature of Client-Consultant Interaction: A Critical Review', in M. Kipping and T. Clark (eds), The Oxford Handbook of Management Consulting, Oxford: Oxford University Press, pp. 389-409. -- O'Harrow, R. Jr. (2007), 'Costs Skyrocket as DHS Runs Up No-Bid Contracts', Washington Post, 28 June, A01. -- O'Shea, J. and C. Madigan (1997), Dangerous Company: The Consulting Powerhouses and the Businesses they Save and Ruin, London: Nicholas Brealey. -- Oxford University Press (1996), The Oxford Compact Dictionary, Oxford: Oxford University Press. -- Pinault, L. (2000), Consulting Demons: Inside the Unscrupulous World of Global Corporate Consulting, Chichester: John Wiley. -- Roberts, J. (2003), 'Competition in the Business Service Sector: Implications for the Competitiveness of the European Economy', Competition & Change, 7 (2), 127-46. -- Sahlin-Anderson, K. and L. Engwall (eds) (2002), The Expansion of Management Knowledge: Carrier, Flows and Sources, Stanford, CA: Stanford University Press. -- Saint-Martin, D. (2000), The Management Consulting Industry: History and Structure, Oxford: Oxford University Press -- Schein, E. (1969), Process Consultation: Its Role in Organization Development, Reading, MA: Addison-Wesley. -- Schein, E. (1997), 'The Concept of "Client" from a Process Consultation Perspective: A Guide for Change Agents', Journal of Organizational Change Management, 10 (3), 202-16. -- Spender, J.C. (1994), 'Organizational Knowledge, Collective Practice and Penrose Rents', International Business Review, 3 (4), 353-67. -- Spender, J.C. and R.M. Grant (1996), 'Knowledge and the Firm: Overview', Strategic Management Journal, 17 (winter special issue), 5-10. -- Starbuck W. (1992), 'Learning by Knowledge Intensive Firms', Journal of Management Studies, 29 (6), 713-40. -- Stehr, N. (1994), Knowledge Societies, London: Sage. -- Sturdy, A. (2011), 'Consultancy's Consequences? A Critical Assessment of Management Consultancy's Impact on Management', British Journal of Management, 22 (3), 517-30. -- Sturdy, A., T. Clark, R. Fincham and K. Handley (2008), 'Management Consultancy and Humour in Action and Context', in S. Fineman (ed.), The Emotional Organization: Critical Voices, Oxford: Blackwell, pp. 134-50. -- Sturdy, A., T. Clark, R. Fincham and K. Handley (2009), Management Consultancy in Action: Relationships, Knowledge and Power, Oxford: Oxford University Press. -- Sturdy, A.J. and C. Wright (2011), 'The Active Client: The Boundary-Spanning Roles of Internal Consultants as Gatekeepers, Brokers and Partners of their External Counterparts', Management Learning, 42 (5), 485-503. -- Taylor, W.F. (1911), The Principles of Scientific Management, New York: Harper and Brothers. , von Gennep, A. (1909/1960), The Rites of Passage, reprinted London: Routledge & Kegan Paul. -- Werr, A. and H. Linnarsson (2002), 'Management Consulting for Clients' Learning? Clients' Perceptions of Learning in Management Consulting', in F.A. Buono (ed.), Developing Knowledge and Value in Management Consulting (Vol. 2), Connecticut: Information Age Publishing. -- Wooldridge, A. (1996), 'A Survey of Management Consultancy', The Economist, 22 March, 3-22. -- Matthias Kipping (2002), 'Trapped in Their Wave: The Evolution of Management Consultancies', in Timothy Clark and Robin Fincham (eds), Critical Consulting: New Perspectives on the Management Advice Industry, Chapter 3, Oxford, UK: Blackwell Publishing Ltd, 28-49 -- Denis Saint-Martin (2000), 'The Management Consulting Industry: History and Structure', in Building the New Managerial State: Consultants and the Politics of Public Sector Reform in Comparative Perspective, Chapter 2, Oxford, UK: Oxford University Press, 36-71 -- Christopher Wright (2000), 'From Shop Floor to Boardroom: The Historical Evolution of Australian Management Consulting, 1940s to 1980s', Business History, 42 (1), January, 85-106 -- Matthias Kipping (1999), 'American Management Consulting Companies in Western Europe, 1920 to 1990: Products, Reputation, and Relationships', Business History Review, 73 (2), Summer, 190-220 -- Christopher D. McKenna (1995), 'The Origins of Modern Management Consulting', Business and Economic History, 24 (1), Fall, 51-8 -- Edgar H. Schein (1988), 'Introduction', in Process Consultation, Volume I: Its Role in Organization Development, 2nd edition, Chapter 1, Boston, MA: Addison-Wesley, 3-9, references -- Edgar H. Schein (1990), 'A General Philosophy of Helping: Process Consultation', Sloan Management Review, 31 (3), Spring, 57-64 -- David A. Kolb and Alan L. Frohman (1970), 'An Organization Development Approach to Consulting', Sloan Management Review, 12 (1), Fall, 51-65 -- Danielle B. Nees and Larry E. Greiner (1985), 'Seeing Behind the Look-Alike Management Consultants', Organizational Dynamics, 13 (3), Winter, 68-79 -- John Bessant and Howard Rush (1995), 'Building Bridges for Innovation: The Role of Consultants in Technology Transfer', Research Policy, 24, 97-114 -- Seymour Tilles (1961), 'Understanding the Consultant's Role', Harvard Business Review, 39, November-December, 87-99 -- Warner Woodworth and Reed Nelson (1979), 'Witch Doctors, Messianics, Sorcerers, and OD Consultants: Parallels and Paradigms', Organizational Dynamics, 8 (2), Autumn, 17-33 -- Berit Ernst and Alfred Kieser (2002), 'In Search of Explanations for the Consulting Explosion', in Kerstin Sahlin-Andersson and Lars Engwall (eds), The Expansion of Management Knowledge: Carriers, Flows, and Sources, Chapter 3, Stanford, CA: Stanford University Press, 47-73, notes, references -- Johan Berglund and Andreas Werr (2000), 'The Invincible Character of Management Consulting Rhetoric: How One Blends Incommensurates while Keeping them Apart', Organization, 7 (4), 633-55 -- Brian P. Bloomfield and Ardha Danieli (1995), 'The Role of Management Consultants in the Development of Information Technology: The Indissoluble Nature of Socio-Political and Technical Skills', Journal of Management Studies, 32 (1), January, 23-46 -- Keith Grint and Peter Case (1998), 'The Violent Rhetoric of Re-Engineering: Management Consultancy on the Offensive', Journal of Management Studies, 35 (5), September, 557-77 , Mats Alvesson (1993), 'Organizations as Rhetoric: Knowledge-Intensive Firms and the Struggle with Ambiguity', Journal of Management Studies, 30 (6), November, 997-1015 -- Timothy Clark and Graeme Salaman (1998), 'Telling Tales: Management Gurus' Narratives and the Construction of Managerial Identity', Journal of Management Studies, 35 (2), March, 137-61 -- Timothy Clark (1993), 'The Market Provision of Management Services, Information Asymmetries and Service Quality - Some Market Solutions: An Empirical Example', British Journal of Management, 4 (4), 235-51 -- Johannes Glückler and Thomas Armbrüster (2003), 'Bridging Uncertainty in Management Consulting: The Mechanisms of Trust and Networked Reputation', Organization Studies, 24 (2), 269-97 -- Royston Greenwood, Stan X. Li, Rajshree Prakash and David L. Deephouse (2005), 'Reputation, Diversification, and Organizational Explanations of Performance in Professional Service Firms', Organization Science, 16 (6), November-December, 661-73 -- Roy Suddaby and Royston Greenwood (2001), 'Colonizing Knowledge: Commodification as a Dynamic of Jurisdictional Expansion in Professional Service Firms', Human Relations, 54 (7), 933-53 -- Alfred Kieser (2002), 'On Communication Barriers Between Management Science, Consultancies and Business Organizations', in Timothy Clark and Robin Fincham (eds), Critical Consulting: New Perspectives on the Management Advice Industry, Chapter 12, Oxford, UK: Blackwell Publishing Ltd, 206-27 -- Morten T. Hansen, Nitin Nohria and Thomas Tierney (1999), 'What's Your Strategy for Managing Knowledge?', Harvard Business Review, 77 (2), March-April, 106-16 -- Morten T. Hansen and Martine R. Haas (2001), 'Competing for Attention in Knowledge Markets: Electronic Document Dissemination in a Management Consulting Company', Administrative Science Quarterly, 46 (1), March, 1-28 -- Laura Empson (2001), 'Fear of Exploitation and Fear of Contamination: Impediments to Knowledge Transfer in Mergers Between Professional Service Firms', Human Relations, 54 (7), 839-62 -- Timothy Morris (2001), 'Asserting Property Rights: Knowledge Codification in the Professional Service Firm', Human Relations, 54 (7), 819-38 -- Chris Argyris (1976), 'Single-Loop and Double-Loop Models in Research on Decision Making', Administrative Science Quarterly, 21 (3), September, 363-75 -- N. Anand, Heidi K. Gardner and Tim Morris (2007), 'Knowledge-Based Innovation: Emergence and Embedding of New Practice Areas in Management Consulting Firms', Academy of Management Journal, 50 (2), April, 406-28 -- Andreas Werr and Torbjörn Stjernberg (2003), 'Exploring Management Consulting Firms as Knowledge Systems', Organization Studies, 24 (6), 881-908 -- Ariane Berthoin Antal and Camilla Krebsbach-Gnath (2001), 'Consultants as Agents of Organizational Learning: The Importance of Marginality', in Meinolf Dierkes, Ariane Berthoin Antal, John Child and Ikujiro Nonaka (eds), Handbook of Organizational Learning and Knowledge, Chapter 21, Oxford, UK: Oxford University Press, 462-83 -- Irma Bogenrieder and Bart Nooteboom (2004), 'Learning Groups: What Types are There? A Theoretical Analysis and an Empirical Study in a Consultancy Firm', Organization Studies, 25 (2), 287-313 -- James J. Chrisman and W. Ed McMullan (2004), 'Outsider Assistance as a Knowledge Resource for New Venture Survival', Journal of Small Business Management, 42 (3), 229-44 -- Stephen R. Barley and Gideon Kunda (1992), 'Design and Devotion: Surges of Rational and Normative Ideologies of Control in Managerial Discourse', Administrative Science Quarterly, 37 (3), September, 363-99 -- Eric Abrahamson (1996), 'Management Fashion', Academy of Management Review, 21 (1), January, 254-85 , Alfred Kieser (1997), 'Rhetoric and Myth in Management Fashion', Organization, 4 (1), 49-74 -- John Gill and Sue Whittle (1992), 'Management by Panacea: Accounting for Transience', Journal of Management Studies, 30 (2), March, 281-95 -- Chester S. Spell (2001), 'Management Fashions: Where Do They Come From, and Are They Old Wine in New Bottles?', Journal of Management Inquiry, 10 (4), December, 358-73 -- Paula Phillips Carson, Patricia A. Lanier, Kerry David Carson and Brandi N. Guidry (2000), 'Clearing a Path Through the Management Fashion Jungle: Some Preliminary Trailblazing', Academy of Management Journal, 43 (6), December, 1143-58 -- Eric Abrahamson and Gregory Fairchild (1999), 'Management Fashion: Lifecycles, Triggers, and Collective Learning Processes', Administrative Science Quarterly, 44 (4), December, 708-40 -- Robert J. David and David Strang (2006), 'When Fashion is Fleeting: Transitory Collective Beliefs and the Dynamics of TQM Consulting', Academy of Management Journal, 49 (2), April, 215-33 -- Jos Benders and Kees van Veen (2001), 'What's in a Fashion? Interpretative Viability and Management Fashions', Organization, 8 (1), 33-53 -- Barbara Czarniawska and Carmelo Mazza (2003), 'Consulting as a Liminal Space', Human Relations, 56 (3), 267-90 -- Siw M. Fosstenløkken, Bente R. Løwendahl and Øivind Revang (2003), 'Knowledge Development through Client Interaction: A Comparative Study', Organization Studies, 24 (6), 859-79 -- Donald Hislop (2002), 'The Client Role in Consultancy Relations During the Appropriation of Technological Innovations', Research Policy, 31, 657-71 -- Chris McGivern (1983), 'Some Facets of the Relationship Between Consultants and Clients in Organizations', Journal of Management Studies, 20 (3), 367-86 -- Jim Kitay and Christopher Wright (2003), 'Expertise and Organizational Boundaries: The Varying Roles of Australian Management Consultants', Asia Pacific Business Review, 9 (3), Spring, 21-40 -- Stuart Macdonald (2006), 'From Babes and Sucklings: Management Consultants and Novice Clients', European Management Journal, 24 (6), December, 411-21 -- Guy G. Gable (1996), 'A Multidimensional Model of Client Success When Engaging External Consultants', Management Science, 42 (8), August, 1175-98 -- Fiona Czerniawska (1999), 'Changes in the Client-Consultant Relationship', in Management Consultancy in the 21st Century, Chapter 2, London, UK: Ichor Business Books, 13-21 -- Don A. Moore, Philip E. Tetlock, Lloyd Tanlu and Max H. Bazerman (2006), 'Conflicts of Interest and the Case of Auditor Independence: Moral Seduction and Strategic Issue Cycling', Academy of Management Review, 31 (1), January, 10-29 -- Ulrich Hagenmeyer (2007), 'Integrity in Management Consulting: A Contradiction in Terms?', Business Ethics: A European Review, 16 (2), April, 107-13 -- Monder Ram (1999), 'Managing Consultants in a Small Firm: A Case Study', Journal of Management Studies, 36 (6), November, 875-97 -- Robin Fincham (1999), 'The Consultant-Client Relationship: Critical Perspectives on the Management of Organizational Change', Journal of Management Studies, 36 (3), May, 335-51 , Andreas Werr and Alexander Styhre (2003), 'Management Consultants - Friend or Foe? Understanding the Ambiguous Client- Consultant Relationship', International Studies of Management and Organization, 32 (4), Winter, 43-66 -- Andrew Sturdy (1997), 'The Consultancy Process - An Insecure Business?', Journal of Management Studies, 34 (3), May, 389-413 -- Susan Meriläinen, Janne Tienari, Robyn Thomas and Annette Davies (2004), 'Management Consultant Talk: A Cross-Cultural Comparison of Normalizing Discourse and Resistance', Organization, 11 (4), 539-64 -- Brian P. Bloomfield and Ardha Best (1992), 'Management Consultants: Systems Development, Power and the Translation of Problems', Sociological Review, 40 (3), August, 533-60
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: FULL  ((Currently Only Available on Campus))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Cheltenham :Edward Elgar Pub. Ltd.,
    UID:
    almahu_9947914986002882
    Format: 1 online resource (1 v.) ; , cm.
    ISBN: 9781784713881 (e-book)
    Series Statement: Elgar research reviews in business
    Content: This authoritative title brings together a critical selection of important academic articles and practitioner-oriented papers that reflect current thinking and practices in the growing field of leadership development. It offers a solid foundation for theoretical approaches to leadership development and covers the key methodologies applicable to leadership development research and practice.
    Note: The recommended readings are available in the print version, or may be available via the link to your library's holdings. , Recommended readings (Machine generated): Allen, M. (2002), The Corporate University Handbook: Designing, Managing, and Growing a Successful Program, Washington DC: AMACOM. -- Bass, B.M. (1985), Leadership and Performance Beyond Expectations, New York: Free Press. -- Bass, B.M. (1990), Bass & Stogdill's Handbook of Leadership: Theory, Research, and Applications, New York: Free Press. -- Bass, B.M. and R.M. Stogdill (1989), Stogdill's Handbook of Leadership: A Survey of Theory and Research, New York: Free Press. -- Bennis, W. and B. Nanus (1985), Leaders: The Strategies for Taking Charge, New York: Harper & Row. -- Berger, L.A. and D. Berger (2003), The Talent Management Handbook: Creating Organizational Excellence by Identifying, Developing, and Promoting Your Best People, New York: McGraw-Hill. -- Blake, R. and J. Mouton (1964), The Managerial Grid: The Key to Leadership Excellence, Houston: Gulf Publishing Co. -- Block, P. (1993), Stewardship: Choosing Service Over Self-Interest, San Francisco: Berrett-Koehler. -- Burns, J.M. (1978), Leadership, New York: Harper and Row. -- Charan, R., S. Drotter et al. (2000), The Leadership Pipeline: How to Build the Leadership Powered Company, San Francisco: Jossey-Bass. -- Conger, J. (1999), Building Leaders: How Successful Companies Develop the Next Generation, San Francisco: Jossey-Bass. -- Covey, S. (1991), Principle-Centered Leadership, New York: Summit Books. -- Day, V.D. (2000), 'Leadership Development: A Review in Context', Leadership Quarterly, 11 (4), Winter, 581-613. -- Dotlich, D.L. and J.L. Noel (1998), Action Learning: How the World's Top Companies are Re-Creating Their Leaders and Themselves, San Francisco: Jossey-Bass. -- Fiedler, F.E. (1967), A Theory of Leadership Effectiveness, New York: McGraw-Hill. -- Greenleaf, R.K. and L.C. Spears (1998), Power of Servant Leadership, San Francisco: Berrett-Koehler. -- Heifetz, R.A. (1994), Leadership Without Easy Answers, Cambridge, MA: The Belknap Press. -- Hesselbein, F., M. Goldsmith et al. (1996), The Leader of the Future, San Francisco: Jossey-Bass. -- House, R.J. (1977), 'A 1976 Theory of Charismatic Leadership', in J.G. Hunt and L.L. Larson (eds), Leadership: The Cutting Edge, Carbondale, IL: Southern Illionis University Press, pp. 189-207. , Jaques, E. (1989), Requisite Organization, London: Gower Publishing. -- Kets de Vries, M.F.R. (2001), The Leadership Mystique, London: Financial Times/Prentice Hall. -- Kets de Vries, M.F.R. (2004), The Global Executive Leadership Inventory: Facilitator's Guide, San Francisco: Pfeiffer. -- Kets de Vries, M.F.R. (2006), The Leader on the Couch, London: Wiley. -- Kets de Vries, M.F.R. (2007), 'Decoding the Team Conundrum: The Eight Roles Executives Play', Organizational Dynamics, 36 (1), 28-44. -- Kets de Vries, M.F.R. (2009), Sex, Money, Happiness, and Death: The Quest for Authenticity, Houndmills and New York: Palgrave/Macmillan. -- Kets de Vries, M.F.R., L. Guillen-Ramo, K. Korotov, and E. Florent-Treacy (2010), The Coaching Kaleidoscope: Insights from the Inside, Houndmills and New York: Palgrave/Macmillan. -- Kets de Vries, M.F.R., K. Korotov, and E. Florent-Treacy (eds) (2007), Coach and Couch: The Psychology of Making Better Leaders, Houndmills and New York: Palgrave/Macmillan. -- Kilburg, R.R. (2000), Executive Coaching, Washington DC: American Psychological Association. -- Kouzes, J.M. and B.Z. Posner (1995), The Leadership Challenge, San Francisco: Jossey-Bass. -- Lawler III, E.L. (2008), Talent: Making People Your Competitive Advantage, San Francisco: Jossey-Bass. -- Marquardt, M.J. (1999), Action Learning in Action: Transforming Problems and People for World-Class Organizational Learning, New York: Davies-Black Publishing. -- McCall, M.W. (1998), High Flyers: Developing the Next Generation of Leaders, Boston: Harvard Business School Press. -- McGregor, D. (1960), The Human Side of Enterprise, New York: McGraw Hill. -- Meister, J.C. (1998), Corporate Universities: Lessons in Building a World-Class Work Force, New York: McGraw-Hill. -- Schein, E.H. (1992), Organizational Culture and Leadership, San Francisco: Jossey-Bass. -- Tichy, N.M. (1997), The Leadership Engine, New York: HarperCollins. -- Tichy, N.M. and N. Nancy Cardwell (2002), The Cycle of Leadership: How Great Leaders Teach Their Companies to Win, New York: Collins Business. -- Ulrich, D. (2007), Leadership Brand: Developing Customer-Focused Leaders to Drive Performance and Build Lasting Value, Boston: Harvard Business School Press. , Ulrich, D., J. Zenger et al. (1999), Results-Based Leadership, Boston, Harvard Business School Press. -- Zaleznik, A. (1977), 'Managers and Leaders: Are they Different?', Harvard Business Review, May-June, 47-60. -- Gary P. Latham (1988), 'Human Resource Training and Development', Annual Review of Psychology, 39, 545-82 -- Fred E. Fiedler (1996), 'Research on Leadership Selection and Training: One View of the Future', Administrative Science Quarterly, 41 (2), June, 241-50 -- Robert M. Fulmer (1997), 'The Evolving Paradigm of Leadership Development', Organizational Dynamics, 25 (4), Spring, 59-72 -- Jay A. Conger (2004), 'Developing Leadership Capability: What's Inside the Black Box?', Academy of Management Executive, 18 (3), August, 136-9 -- David V. Day (2000), 'Leadership Development: A Review In Context', Leadership Quarterly, 11 (4), Winter, 581-613 -- Richard A. Barker (1997), 'How Can We Train Leaders if We Do Not Know What Leadership Is?', Human Relations, 50 (4), 343-62 -- Bruce J. Avolio, Maria Rotundo and Fred O. Walumbwa (2009), 'Early Life Experiences as Determinants of Leadership Role Occupancy: The Importance of Parental Influence and Rule Breaking Behavior', Leadership Quarterly, 20 (3), June, 329-42 -- Zhen Zhang, Remus Ilies and Richard D. Arvey (2009), 'Beyond Genetic Explanations for Leadership: The Moderating Role of the Social Environment', Organizational Behavior and Human Decision Processes, 110 (2), November, 118-28 -- Morgan W. McCall, Jr. (2004), 'Leadership Development Through Experience', Academy of Management Executive, 18 (3), August, 127-30 -- Abraham Zaleznik (2004), 'Managers and Leaders: Are They Different?', Harvard Business Review, 82 (1), 74-81 -- Scott J. Allen and Nathan S. Hartman (2008), 'Leadership Development: An Exploration of Sources of Learning', SAM Advanced Management Journal, 73 (1), Winter, 10-19, 62 -- Herminia Ibarra (1999), 'Provisional Selves: Experimenting with Image and Identity in Professional Adaptation', Administrative Science Quarterly, 44 (4), December, 764-91 -- Lisa Dragoni, Paul E. Tesluk, Joyce E.A. Russell and In-Sue Oh (2009), 'Understanding Managerial Development: Integrating Developmental Assignments, Learning Orientation, and Access to Developmental Opportunities in Predicting Managerial Competencies', Academy of Management Journal, 52 (4), 731-43 -- Boas Shamir and Galit Eilam (2005), ' "What's Your Story? " A Life-Stories Approach to Authentic Leadership Development', Leadership Quarterly, 16 (3), June, 395-417 -- Manfred F.R. Kets de Vries and Konstantin Korotov (2007), 'Creating Transformational Executive Education Programs', Academy of Management Learning and Education, 6 (3), 375-87 -- Philip Mirvis (2008), 'Executive Development Through Consciousness-Raising Experiences', Academy of Management Learning and Education, 7 (2), 173-88 , Leanne E. Atwater and Joan F. Brett (2006), '360-Degree Feedback to Leaders: Does It Relate to Change in Employee Attitudes?', Group and Organization Management, 31 (5), October, 578-600 -- Sarah A. Hezlett (2008), 'Using Multisource Feedback to Develop Leaders: Applying Theory and Research to Improve Practice', Advances in Developing Human Resources, 10 (5), October, 703-20 -- Manfred F.R. Kets de Vries, Pierre Vrignaud, Konstantin Korotov, Elisabet Engellau and Elizabeth Florent-Treacy (2006), 'The Development of the Personality Audit: A Psychodynamic Multiple Feedback Assessment Instrument', International Journal of Human Resource Management, 17 (5), May, 898-917 -- Konstantin Korotov (2008), 'Peer Coaching in Executive-Education Programmes', Training and Management Development Methods, 22 (2), 3.15-3.24 -- Wilfred R. Bion (1952), 'Group Dynamics: A Re-View', International Journal of Psycho-analysis, XXXIII, 235-47 -- Manfred F.R. Kets de Vries (1999), 'High-Performance Teams: Lessons from the Pygmies', Organizational Dynamics, 27 (3), Winter, 66-77 -- Manfred F.R. Kets de Vries (2005), 'Leadership Group Coaching in Action: The Zen of Creating High Performance Teams', Academy of Management Executive, 19 (1), 61-76 -- Manfred F.R. Kets de Vries, Pierre Vrignaud and Elizabeth Florent-Treacy (2004), 'The Global Leadership Life Inventory: Development and Psychometric Properties of a 360-Degree Feedback Instrument', International Journal of Human Resource Management, 15 (3), May, 475-92 -- Richard E. Boyatzis, Melvin L. Smith and Nancy Blaize (2006) 'Developing Sustainable Leaders Through Coaching and Compassion', Academy of Management Learning and Education, 5 (1), 8-24 -- Carol Kauffman and P. Alex Linley (2007), 'The Meeting of the Minds: Positive Psychology and Coaching Psychology', International Coaching Psychology Review, 2 (1), March, 90-96 -- Alice M. Black and Garee W. Earnest (2009), 'Measuring the Outcomes of Leadership Development Programs', Journal of Leadership and Organizational Studies, 16 (2), November, 184-96 -- Manfred Kets de Vries, Elizabeth Florent-Treacy, Laura Guillen Ramo and Konstantin Korotov (2008), 'The Proof is in the Pudding: An Integrative, Psychodynamic Approach to Evaluating a Leadership Development Program', INSEAD Working Paper 2008/38/EFE, 1-26 -- Daan van Knippenberg, Barbara van Knippenberg, David De Cremer and Michael A. Hogg (2004), 'Leadership, Self, and Identity: A Review and Research Agenda', Leadership Quarterly, 15 (6), December, 825-56 -- Robert G. Lord and Rosalie J. Hall (2005), 'Identity, Deep Structure and the Development of Leadership Skill', Leadership Quarterly, 16 (4), August, 591-615 -- David V. Day and Michelle M. Harrison (2007), 'A Multilevel, Identity-based Approach to Leadership Development', Human Resource Management Review, 17 (4), December, 360-73 -- William L. Gardner, Bruce J. Avolio, Fred Luthans, Douglas R. May and Fred Walumbwa (2005), ' "Can You See The Real Me? " A Self-based Model of Authentic Leader and Follower Development', Leadership Quarterly, 16 (3), June, 343-72 -- Kiran Trehan (2007), 'Psychodynamic and Critical Perspectives on Leadership Development', Advances in Developing Human Resources, 9 (1), February, 72-82 -- Ellen Van Velsor and Evelina Ascalon (2008), 'The Role and Impact of Leadership Development in Supporting Ethical Action in Organisations', Journal of Management Development, 27 (2), 187-95 -- Konstantin Korotov (2008), 'Citius, Altius, Fortius: Challenges of Accelerated Development of Leadership Talent in the Russian Context', Organizational Dynamics, 37 (3), July-September, 277-87
    Language: English
    Keywords: Electronic books. ; Electronic books
    URL: FULL
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    London : Laurence King Publishing
    UID:
    kobvindex_INT59490
    Format: 1 online resource (335 pages)
    Edition: 2nd ed.
    ISBN: 9781780671277
    Series Statement: Portfolio
    Content: A complete introduction to photography, this book is an essential resource for students across the visual arts. This accessible, inspirational guide explores the subjects and themes that have always obsessed photographers and explains technique in a clear and simple way. It introduces the work of the masters of the art as well as showing fresh, dynamic images created by young photographers from all over the world. The book also provides a valuable overview of careers in photography and a comprehensive reference section, including a glossary of technical vocabulary. This second edition has been extensively updated, with a greater range of visual examples from master photographers and up-to-date information on digital photography
    Note: Intro -- Title Page -- Contents -- Copyright -- 1. Loading... -- What's so great about photography? -- Why do we like photographs? -- Catching the shutter bug -- How does photography work? -- The eye and the camera -- Colour and black and white -- Where has photography come from? -- 2. The Big Picture -- The portrait -- The self-portrait -- The city -- The landscape -- The still life -- The body -- Fashion -- Telling a story with photos -- The news photo -- Photojournalism and reportage -- Documentary photography -- Telling the story of war -- Telling a story in a book of pictures -- Sequence -- Persuasion -- Manipulation -- 3. The Bridge -- Finding inspiration -- Seeing things -- Creating your own projects -- The camera in the hands of artists -- In the digital age -- What makes a great photographer? -- What makes a great photograph? -- The world's best-known pictures -- Trusting photographs -- A photographer's responsibilities -- The snapshot -- The Lomo snapshot -- The camera - the time machine -- Beyond the print -- Where next for photography? -- 4. This Is A Camera, Now Go Out And Take Some Pictures -- The tools of photography -- The camera -- Selecting a camera -- Try these cameras -- The controls of the camera -- Lenses -- Focus - to infinity and beyond -- Aperture - the iris of the camera's eye -- Shutter speed - all in the timing -- Exposure - bringing together aperture, shutter speed and focus -- Composition - order or disorder -- Black-and-white photography -- Colour photography -- Photography and light -- Photoshop -- The photographic studio - Narnia -- Pictures without a camera -- 5. So You Want To Be A Photographer? -- Photo opportunities -- Photographer's portfolio - marketing -- Fashion magazines -- Design groups and advertising agencies -- Further photo opportunities -- Being an assistant - the sorcerer's apprentice , What do you need to be a photographer? -- Art college and university -- Competitions -- Stock libraries -- Your archive -- Exhibiting -- Prints and limited editions -- 6. The Bible -- Photography and the law -- The language of photography -- Photographers' and artists' websites -- Must-see photo books -- Index -- Photo sources and credits -- Acknowledgements
    Additional Edition: Print version Ingledew, John Photography London : Laurence King Publishing,c2013 ISBN 9781780670966
    Language: English
    Keywords: Electronic books ; Electronic books
    URL: FULL  ((OIS Credentials Required))
    URL: FULL  ((OIS Credentials Required))
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages