Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Researchers at Risk: Precarity, Jeopardy and Uncertainty in Academia (Palgrave Studies in Education Research Methods)

Buy
This book explores the phenomenon of researchers at risk: that is, the experiences of scholars whose research topics require them to engage with diverse kind of dangers, uncertainties or vulnerabilities. This risk may derive from working with variously marginalised individuals or groups, or from being members of such groups themselves. At other times, the risk relates to particular economic or environmental conditions, or political forces influencing the specific research fields in which they operate. This book argues for the need to reconceptualise – and thereby to reimagine – the phenomenon of researchers’ risks, particularly when those risks are perceived to affect, and even to threaten the researchers. Drawing on a diverse and global range case studies including Aotearoa New Zealand, Australia, Bal?chist?n, Cyprus, and Germany, the chapters call for the need to identify effective strategies for engaging proactively with these risks to address precarity, jeopardy and uncertainty. 
(HTML tags aren't allowed.)

UNIX® Shells by Example Fourth Edition
UNIX® Shells by Example Fourth Edition

The world's #1 shell programming book—now fully updated for Linux and more!

UNIX Shells by Example is the world's #1 shell programming book, from the world's #1 shell programming instructor: Ellie Quigley. In ...

Guide to Assembly Language Programming in Linux
Guide to Assembly Language Programming in Linux
The primary goal of this book is to teach the IA-32 assembly language programming under
the Linux operating system. A secondary objective is to provide a gende introduction to the
Fedora Linux operating system. Linux has evolved substantially since its first appearance in
1991. Over the years, its popularity has grown as well.
...
Software Project Secrets: Why Software Projects Fail
Software Project Secrets: Why Software Projects Fail
Previously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the...

Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks
Resource Allocation and Cross Layer Control in Wireless Networks presents abstract models that capture the cross layer interaction from the physical to transport layer in wireless network architectures including cellular, ad-hoc and sensor networks as well as hybrid wireless-wireline. The emphasis in the presentation is on describing the models and...
Release It!: Design and Deploy Production-Ready Software
Release It!: Design and Deploy Production-Ready Software

You’ve worked hard on the project for more than year. Finally, it looks like all the features are actually complete, and most even have unit tests. You can breathe a sigh of relief. You’re done.

Or are you?

Does “feature complete” mean “production ready”? Is your system
...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy