Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Questioning the Veil: Open Letters to Muslim Women

Buy

Across much of the world today, Muslim women of all ages are increasingly turning to wearing the veil. Is this trend a sign of rising piety or a way of asserting Muslim pride? And does the veil really provide women freedom from sexual harassment? Written in the form of letters addressing all those interested in this issue, Questioning the Veil examines the inconsistent and inadequate reasons given for the veil, and points to the dangers and limitations of this highly questionable cultural practice. Marnia Lazreg, a preeminent authority in Middle East women's studies, combines her own experiences growing up in a Muslim family in Algeria with interviews and the real-life stories of other Muslim women to produce this nuanced argument for doing away with the veil.

Lazreg stresses that the veil is not included in the five pillars of Islam, asks whether piety sufficiently justifies veiling, explores the adverse psychological effects of the practice on the wearer and those around her, and pays special attention to the negative impact of veiling for young girls. Lazreg's provocative findings indicate that far from being spontaneous, the trend toward wearing the veil has been driven by an organized and growing campaign that includes literature, DVDs, YouTube videos, and courses designed by some Muslim men to teach women about their presumed rights under the veil.

An incisive mix of the personal and political, supported by meticulous research, Questioning the Veil will compel all readers to reconsider their views of this controversial and sensitive topic.

(HTML tags aren't allowed.)

SSH, The Secure Shell: The Definitive Guide
SSH, The Secure Shell: The Definitive Guide
Secure your computer network with SSH! With transparent, strong encryption, reliable public-key authentication, and a highly configurable client/server architecture, SSH (Secure Shell) is a popular, robust, TCP/IP-based solution to many network security and privacy concerns. It supports secure remote logins, secure file transfer between computers,...
Jupyter Cookbook: Over 75 recipes to perform interactive computing across Python, R, Scala, Spark, JavaScript, and more
Jupyter Cookbook: Over 75 recipes to perform interactive computing across Python, R, Scala, Spark, JavaScript, and more

Leverage the power of the popular Jupyter notebooks to simplify your data science tasks without any hassle

Key Features

  • Create and share interactive documents with live code, text and visualizations
  • Integrate popular programming languages such as Python, R, Julia, Scala...
Next-Generation Internet: Architectures and Protocols
Next-Generation Internet: Architectures and Protocols

The field of computer networking has evolved significantly over the past four decades since the development of ARPANET, the first large-scale computer network. The Internet has become a part and parcel of everyday life virtually worldwide, and its influence on various fields is well recognized. The TCP/IP protocol suite and packet...


Oracle Performance Survival Guide: A Systematic Approach to Database Optimization
Oracle Performance Survival Guide: A Systematic Approach to Database Optimization

Oracle Performance Survival Guide offers a structured, systematic, start-to-finish methodology for optimizing Oracle performance as efficiently as possible. Leading Oracle expert Guy Harrison shows how to maximize your tuning investment by focusing on causes rather than symptoms, and by quickly identifying the areas...

Data Protection: Governance, Risk Management, and Compliance
Data Protection: Governance, Risk Management, and Compliance

Failure to appreciate the full dimensions of data protection can lead to poor data protection management, costly resource allocation issues, and exposure to unnecessary risks. Data Protection: Governance, Risk Management, and Compliance explains how to gain a handle on the vital aspects of data protection.

The author...

Security and Usability: Designing Secure Systems That People Can Use
Security and Usability: Designing Secure Systems That People Can Use

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy