This is a book which is nothing if not ambitious.
First, it attempts to offer a comprehensive overview of the diverse and fragmented world of business travel and tourism. It endeavours to do this at a time when there is still relatively little literature on any aspect of this subject. However, the authors believe that there is a need for a text which, albeit tentatively, tries to offer a holistic view of business travel and tourism given that most of its elements are interrelated. We cannot separate the time spent at a conference from the journey that took delegates there or the leisure activities they indulge in when the working day is over. Likewise, both practitioners and students need to have an understanding of both the design and development of convention centres and their marketing. The authors also believe it is important that the text covers both the supply and the demand side of business tourism, for both are clearly interdependent.
Mathematical Methods for Knowledge Discovery and Data Mining The importance of knowledge discovery and data mining is evident by the great plethora of books and papers dedicated to this subject. Such methods are finding applications in almost any area of human endeavor. This includes applications in engineering, science, business, medicine, humanities, just to name a few. At the same time, however, there is... Ecological Modeling for Resource Management
This book was developed from a workshop on the “Effective Use of
Ecological Modeling in Management,” held in Oak Ridge, Tennessee,
on October 23–26, 2000. The workshop was sponsored by the Department
of Defense’s (DoD’s) Strategic Environmental Research and Development
Program (SERDP), the Army Research...
Mobile Mac Superguide
The team of experts at Macworld has used its encyclopedic Apple knowledge to create the essential guide to being a mobile Mac user. Whether you re using a MacBook, MacBook Pro, MacBook Air, iPhone, or iPod touch, this book makes it easy for you to stay on the ball while on the road.
First, a review of the Apple available mobile...
Computer Network Security and Cyber Ethics, 4th ed.
In its 4th edition, this book remains focused on increasing public awareness of the nature and motives of cyber vandalism and cybercriminals, the weaknesses inherent in cyberspace infrastructure, and the means available to protect ourselves and our society. This new edition aims to integrate security education and awareness with discussions...
Graphs and their Uses (New Mathematical Library) In 1963 Oystein Ore wrote this classic volume, which was published in the New Mathematical Library Series. This elegant book has provided students and teachers with an excellent introduction to the field of graph theory for close to thirty years. Robin Wilson's revision adds strength to the book by updating the terminology and notation, bringing...