Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Greed, Lust and Gender: A History of Economic Ideas
Greed, Lust and Gender: A History of Economic Ideas

When does the pursuit of self-interest go too far, lapsing into morally unacceptable behaviour? Until the unprecedented events of the recent global financial crisis economists often seemed unconcerned with this question, even suggesting that "greed is good." A closer look, however, suggests that greed and lust are generally...

The Lucent Library of Science and Technology - Artificial Intelligence
The Lucent Library of Science and Technology - Artificial Intelligence
As far back as the ancient Greek civilization, people have imagined machines and mechanical men that could work and think like any human. One Greek myth, for example, tells of the Greek god Hephaestus, who built mechanical men to forge powerful weapons and spectacular jewelry. When the king of Crete requested that he make a giant man to guard his...
Political Trials in an Age of Revolutions: Britain and the North Atlantic, 1793?1848 (Palgrave Histories of Policing, Punishment and Justice)
Political Trials in an Age of Revolutions: Britain and the North Atlantic, 1793?1848 (Palgrave Histories of Policing, Punishment and Justice)

This collection provides new insights into the ’Age of Revolutions’, focussing on state trials for treason and sedition, and expands the sophisticated discussion that has marked the historiography of that period by examining political trials in Britain and the north Atlantic world from the 1790s and into the...

ACT! 2005 For Dummies
ACT! 2005 For Dummies
Catch this new ACT! and build better relationships

Organize customer information, schedule activities, create reports, and more

It’s time to ACT! on your intention to improve customer relationship management! ACT! 2005 offers great new tools, and with this book in hand, you have a top expert showing you how to use them....

Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
Undue Influence: How the Wall Street Elite Puts the Financial System at Risk
In late 1999, a Republican congressman held a party in Washington
to celebrate the passing of new legislation destined to
have a profound effect on Wall Street and the entire financial
industry in the United States. Despite the date on the law,
the principle upon which it was based actually had been a cornerstone
of the
...
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools
Sarbanes-Oxley IT Compliance Using COBIT and Open Source Tools

A Toolkit for IT Professionals

Whether you work for a publicly traded or pre-IPO company or as an IT consultant, you are familiar with the daunting task of complying with the Sarbanes-Oxley Act. You have no doubt seen the hour and dollar estimates for compliance go up...

Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Data Quality: Concepts, Methodologies and Techniques (Data-Centric Systems and Applications)
Poor data quality can seriously hinder or damage the efficiency and effectiveness of organizations and businesses. The growing awareness of such repercussions has led to major public initiatives like the "Data Quality Act" in the USA and the "European 2003/98" directive of the European Parliament.

Batini and...

Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery
Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery

Information technology (IT) has the potential to play a critical role in managing natural and human made disasters. Damage to communications infrastructure, along with other communications problems exacerbated the difficulties in carrying out response and recovery efforts following Hurricane Katrina. To assist government planning in this...

Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)
David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
  • Learn about the various firewall models, user interfaces,...
The Pleasure Gap: American Women and the Unfinished Sexual Revolution
The Pleasure Gap: American Women and the Unfinished Sexual Revolution
It's time to take inequality in the bedroom as seriously as we take it in the boardroom. 

Tens of millions of American women are dissatisfied with their sex lives. In her provocative and meticulously researched new book, The Pleasure Gap: American Women and the Unfinished Sexual Revolution, Katherine
...
Windows XP Annoyances for Geeks, 2nd Edition
Windows XP Annoyances for Geeks, 2nd Edition
Offering dozens of on-target tips, workarounds, and warnings, Windows XP Annoyances for Geeks allows users to improve their overall experience with the popular XP operating system. And now, with this updated edition, users can also expect detailed coverage of the newly released Service Pack 2 (SP2) technology, which provides protection against...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy