Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Business Law: The Ethical, Global, and E-Commerce Environment
Business Law: The Ethical, Global, and E-Commerce Environment
This is the 17th UCC Edition (and the twenty-second overall edition) of a business law text that first appeared in 1935. Throughout its 80 years of existence, this book has been a leader and an innovator in the fields of business law and the legal environment of business. One reason for the book’s success is its clear and comprehensive...
Expanding Horizons in Bioethics
Expanding Horizons in Bioethics

Like its predecessor, New Dimensions in Bioethics, this volume developed out of a series of lectures at Yale University’s Institution for Social and Policy Studies. Each speaker in the Bioethics & Public Policy Seminar Series was invited because of her or his expertise in a given area of bioethics. Each of the more successful...

Narrating Narcos: Culiacán and Medellín (Pitt Illuminations)
Narrating Narcos: Culiacán and Medellín (Pitt Illuminations)
Narrating Narcos presents a probing examination of the prominent role of narcotics trafficking in contemporary Latin American cultural production. In her study, Gabriela Polit Dueñas juxtaposes two infamous narco regions, Culiacán, Mexico, and Medellín, Colombia, to demonstrate the powerful forces of violence,...
Nonprofit Internet Strategies: Best Practices for Marketing, Communications, and Fundraising Success
Nonprofit Internet Strategies: Best Practices for Marketing, Communications, and Fundraising Success
Nonprofit Internet Strategies offers every charitable organization the opportunity to analyze their options and select the appropriate strategy to integrate traditional marketing, communications, and fundraising practices with their online efforts.

It is an excellent how-to guide--a practical manual for nonprofit staff
...
The Retrieval of Ethics
The Retrieval of Ethics

Talbot Brewer presents an invigorating new approach to ethical theory, in the context of human selfhood and agency. The first main theme of the book is that contemporary ethical theorists have focused too narrowly on actions and the discrete episodes of deliberation through which we choose them, and that the subject matter of the field looks...

Ethics for CPAs: Meeting Expectations in Challenging Times
Ethics for CPAs: Meeting Expectations in Challenging Times

Accountants are under attack. Recent investigations of Enron, Global Crossing, WorldCom, and Adelphia, just to name a few, along with the remarkable collapse of Arthur Andersen, have focused the nation’s attention on the accounting profession and the need for reforms. All parties agree that accounting firms must change their priorities and...

Chained Exploits: Advanced Hacking Attacks from Start to Finish
Chained Exploits: Advanced Hacking Attacks from Start to Finish
The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them

 

Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve...

Workplace Safety and Health: Assessing Current Practices and Promoting Change in the Profession (Occupational Safety & Health Guide Series)
Workplace Safety and Health: Assessing Current Practices and Promoting Change in the Profession (Occupational Safety & Health Guide Series)

Are the tried and true safety practices still effective in the changing workplace? Is there a better way of safeguarding employees from accidents and injuries? In short, why do you perform the safety activities that you do on a daily basis and do they produce the results necessary to keep your safety program and your company competitive in...

Tumors of the Chest: Biology, Diagnosis and Management
Tumors of the Chest: Biology, Diagnosis and Management

The purpose of this textbook is to meticulously depict all aspects of chest tumors in a comprehensive volume format that encompasses their biology, clinical presentation and management. It is the only book to do this. Chapters of specific interest have also been included to cover such wide-ranging topics as management of the elderly and...

Mobile Telemedicine: A Computing and Networking Perspective
Mobile Telemedicine: A Computing and Networking Perspective
Wireless and mobile telemedicine has drawn attention from health care providers and recipients, governments, industry, and researchers. Th ough various practices have been exercised, the realization of telemedicine depends on advances in computing and networking techniques. In recent decades technological development in computing and networking has...
Microwave Transmission Networks, Second Edition
Microwave Transmission Networks, Second Edition

It has been six years since the first edition of this book was prepared and published, during which time it was very well received among engineers, project managers, and everyone else interested in learning more about the terrestrial point-to-point microwave systems.

During that period of time there have been a number of new...

Hiding in Plain Sight: Steganography and the Art of Covert Communication
Hiding in Plain Sight: Steganography and the Art of Covert Communication
Your hands-on guide to understanding, detecting, and using today’s most potent tool for secret communication–steganography

These days, encryption of confidential data and communications is an increasingly important part of doing business. But steganography can take data confidentiality to a whole new level, since it hides encrypted...

unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy