Search Results: 1 - 10 of 852
display
Foodservice Operations Management: A Menu Perspective
Author(s): James Taylor, Mary Roseman
Prepare savvy future professionals ready to manage the foodservice industry with poise.Well-run foodservice may look like magic, but there is very careful intersection of science and management at play. Foodservice Operations Management: A Menu Perspective takes readers behind the scenes of smooth, ...about product
A Criminological Guide and Theoretical Analysis of Serial Killers and Infamous Murders
Author(s): Michael Birzer, Robert Holland
Much of the general public’s knowledge of serial killers is a product of sensationalized and stereotypical presentations in the media. It’s time to break free of what we think we know and draw our information from factual analysis.Serial Killers provides an interdisciplinary approach to the study of...Event Planning and Management: Communicating Theory and Practice
Author(s): Leeanne McManus, Stephanie Verni, Mary Elizabeth Rouse
Event Planning: Communicating Theory & Practice, 3rd edition, offers a unique approach that connects concepts in communication to practical event planning ideas. Understanding the “why” behind successful events is fundamental to creating unique and successful experiences for companies, organizations...Content Area Literacy
Author(s): Jerry Johns, Paula Di Domenico, Rachel Lesinski-Roscoe
Content Area Literacy: Toolkit of Disciplinary Strategies for Middle and High School considers various professionals who may find its content useful:professors teaching a content area or disciplinary literacy coursemiddle and high school teachers working directly with students literacy and instructi...The Dark Web: Unfiltered
Author(s): Scott H. Belshaw
In The Dark Web: Unfiltered, Dr. Scott Belshaw takes you into an online world that very few have encountered. This book serves as a proverbial travel guide into the sick and twisted side of the dark web, including hidden coves for illegal activity. These areas include the dark web drug scene, hiring...Global Enterprise: The Theory & Practice of International Business
By: Eugene Paul Kim, Roger Philips, Stanley Klatka, Jonathan Opata, Virginia A Suveiu, Robert Austin
about product
Global Enterprise: The Theory & Practice of International Business
Author(s): Eugene Paul Kim, Roger Philips, Stanley Klatka, Jonathan Opata, Virginia A Suveiu, Robert Austin
Global Enterprise – Theory and Practice is a multi-authored textbook on international business providing an alternative to the standard, bland, encyclopedic international business textbooks on the market today. The emphasis here is on teaching students usable skills and knowledge in the context of ...Reading the Web: Strategies for Internet Inquiry
Author(s): Elizabeth Dobler
Reading the Web: Strategies for Internet Inquiry outlines web literacy in a user-friendly way that helps educators provide students with practical skills and strategies needed to approach the internet with discernment. One of the ways it accomplishes this is through the QUEST model: questioning, und...Severe and Hazardous Weather: An Introduction to High Impact Meteorology
Author(s): Robert Rauber, John Walsh, Donna Charlevoix
Extreme weather and climate events have impacted every region of the United States and many regions throughout the world during the five years since the publication of the previous edition of Severe and Hazardous Weather. The recent fires in California and Oregon were heartbreaking to watch. The num...about product
The Need for Weed: Marijuana Policy and Public Politics in the Criminal Justice System
Author(s): Kellie A. Wallace, Scott H. Belshaw, Jared R. Dmello
Cannabis is everywhere! Whether you call it weed, pot, or marijuana, cannabis by any other name is still cannabis. From your stereotypical street drug dealer to medical cannabis dispensaries to courtrooms across America, we cannot escape the hot buzz that is weed. While it may be hot, it is nothing ...Cyber Security Essentials: Understanding Risk and Controls
Author(s): Scott H. Belshaw, Ben Allen CISM CRISC
Since the 1990's, the internet has transformed business by enabling the collection, analysis, and almost instantaneous transmission of data. It has also transformed crime. The demand for 24-hour online access to databases and information has created unprecedented opportunities for unethical people. ...