Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sex For Sale: Prostitution, Pornography, and the Sex Industry
Sex For Sale: Prostitution, Pornography, and the Sex Industry

A groundbreaking collection of essays on the sex industry. Sex for Sale contains original studies on sex work, its risks and benefits, and its political implications. The book covers areas not commonly researched, including gay and lesbian pornography, telephone sex workers, customers of prostitutes, male and female escorts who work...

VoIP Deployment For Dummies (Computer/Tech)
VoIP Deployment For Dummies (Computer/Tech)
It was February 2003 when my boss told me that I was going to be turning up a new VoIP softswitch. This was the first time I had ever heard of a softswitch, and about the second time I had heard of the term VoIP. There was a loose association of companies, hardware vendors, software guys, programmers, salesmen, and support staff that had to be...
Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond
Inside Windows Storage: Server Storage Technologies for Windows Server 2003, Windows 2000 and Beyond

"Dilip Naik's Inside Windows Storage is an invaluable reference for developers and customers alike and is a must-read for anyone wishing to implement Windows-based storage networking."
—Tom Clark, Director, Technical Marketing, Nishan Systems

The Windows and enterprise storage markets are...

Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing
Advances in Swarm Intelligence: First International Conference, ICSI 2010, Beijing

This book and its companion volume, LNCS vols. 6145 and 6146, constitute the proceedings of the International Conference on Swarm Intelligence (ICSI 2010) held in Beijing, the capital of China, during June 12-15, 2010. ICSI 2010 was the first gathering in the world for researchers working on all aspects of swarm intelligence, and...

Test-Driven Development: An Empirical Evaluation of Agile Practice
Test-Driven Development: An Empirical Evaluation of Agile Practice

Agile methods are gaining more and more interest both in industry and in research. Many industries are transforming their way of working from traditional waterfall projects with long duration to more incremental, iterative and agile practices. At the same time, the need to evaluate and to obtain evidence for different processes, methods and...

Scientific Engineering of Distributed Java Applications.: Third International Workshop, FIDJI 2003, Luxembourg-Kirchberg, Luxembourg, November 27-28, ... Papers (Lecture Notes in Computer Science)
Scientific Engineering of Distributed Java Applications.: Third International Workshop, FIDJI 2003, Luxembourg-Kirchberg, Luxembourg, November 27-28, ... Papers (Lecture Notes in Computer Science)

FIDJI 2003 was an international forum for researchers and practitioners in- rested in the advances in, and applications of, software engineering for distri- ted applicationdevelopment. Concerningthe technologies,the workshopfocused on “Java-related” technologies. It was an opportunity to present and observe the latest research,...

Theoretical Computer Science: 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, ... in Information and Communication Technology)
Theoretical Computer Science: 6th IFIP WG 2.2 International Conference, TCS 2010, Held as a Part of WCC 2010, Brisbane, Australia, September 20-23, ... in Information and Communication Technology)
Thisvolumecontainstheinvitedandregularpaperspresentedat TCS 2010,the 6thIFIP International Conference on Theoretical Computer Science, organised by IFIP Tech- cal Committee 1 (Foundations of Computer Science) and IFIP WG 2.2 (Formal - scriptions of Programming Concepts) in association with SIGACT and EATCS. TCS 2010 was part of the World...
Acceptance and Commitment Therapy (100 Key Points)
Acceptance and Commitment Therapy (100 Key Points)

Acceptance and Commitment Therapy: 100 Key Points and Techniques offers a comprehensive, yet concise, overview of the central features of the philosophy, theory, and practical application of ACT. It explains and demonstrates the range of acceptance, mindfulness, and behaviour change strategies that can be used in the service...

The Investigator's Guide to Computer Crime
The Investigator's Guide to Computer Crime

In the past half-century we have gone from a world where computers were science fiction to a world where computers are everyday fact. Just thirty years ago the computer that flew with the first astronauts to the moon had less computing power than the computer on the average student’s desk today. Computers have grown in popularity,...

Shortest Way Home: One Mayor's Challenge and a Model for America's Future
Shortest Way Home: One Mayor's Challenge and a Model for America's Future

NEW YORK TIMES BESTSELLER
"The best American political autobiography since Barack Obama’s Dreams from My Father." ?Charles Kaiser, The Guardian

A mayor’s inspirational story of a Midwest city that has become nothing less than a blueprint for the
...

Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAPcm CBK
Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAPcm CBK
Certification and accreditation has become a major topic of discussion in
the information security arena over the past two to three years, at least
in U.S. government circles. Many government organizations are currently
engaged in employing certification and accreditation processes in response
to the requirements of the Federal
...
Integration of Software Specification Techniques for Applications in Engineering
Integration of Software Specification Techniques for Applications in Engineering

This volume is a documenlation of I he main results in Ihe research area "Inte gration of Software Specification Techniques for Applications in Engineering". On one hand it is based on the Priority Program "Integration von Techniken der Soflwarespezifikation fur ingenieurwissensehaftliehe Anwendungen", short Soft...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy