Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Migrants Before the Law: Contested Migration Control in Europe
Migrants Before the Law: Contested Migration Control in Europe
This book traces the practices of migration control and its contestation in the European migration regime in times of intense politicization. The collaboratively written work brings together the perspectives of state agents, NGOs, migrants with precarious legal status, and their support networks, collected through multi-sited fieldwork...
Liberalism, Diversity and Domination: Kant, Mill and the Government of Difference
Liberalism, Diversity and Domination: Kant, Mill and the Government of Difference
This study addresses the complex and often fractious relationship between liberal political theory and difference by examining how distinctive liberalisms respond to human diversity. Drawing on published and unpublished writings, private correspondence and lecture notes, the study offers comprehensive reconstructions of Immanuel Kant's and...
Encyclopedia of E-commerce, E-government and Mobile Commerce
Encyclopedia of E-commerce, E-government and Mobile Commerce
The Encyclopedia of E-Commerce, E-Government, and Mobile Commerce provides the most inclusive and up-to-date coverage of the e-technologies field. This two-volume encyclopedia includes quality contributions highlighting current concepts, trends, challenges, applications, and dot-com experiences in the field of e-commerce, e-government, and mobile...
Implementing and Managing eGovernment: An International Text
Implementing and Managing eGovernment: An International Text
Check out the companion website at www.sagepub.co.uk/heeks 

Implementing and Managing eGovernment fills an important gap. It provides comprehensive coverage of the e-government issues faced by managers, consultants and other practitioners.

Richard Heeks draws on international examples to guide readers through...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Parallel and Distributed Computing and Networks: International Conference, PDCN 2010
Parallel and Distributed Computing and Networks: International Conference, PDCN 2010

We are delighted to present the proceedings of the 2010 International Conference on Parallel and Distributed Computing and Networks (PDCN 2010) held in Chongqing, China, during 13–14 December, 2010. The objective of PDCN is to provide a forum for researchers, educators, engineers, and government officials involved in the general...

Microsoft Encyclopedia of Security
Microsoft Encyclopedia of Security

Get the single resource that defines—and illustrates—the rapidly evolving world of computer and network security. The Microsoft Encyclopedia of Security delivers more than 1000 cross-referenced entries detailing the latest security-related technologies, standards, products, services, and issues—including sources...

Creating Digital Content : Video Production for Web, Broadcast, and Cinema
Creating Digital Content : Video Production for Web, Broadcast, and Cinema
JOIN THE DIGITAL PRODUCTION REVOLUTION!

Not very long ago, there was television, film, video, and other forms of moving imagery. Now, in the Digital Era, all of this is "content," a stream of bits providing superior picture and audio quality and options for HDTV, interactivity, e-commerce, and new ways to create and consume the...

Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)
Network Analysis, Architecture and Design, Second Edition (The Morgan Kaufmann Series in Networking)

Network Analysis, Architecture, and Design, 2nd Edition, uses a systems methodology approach to teaching these concepts, which views the network (and the environment it impacts) as part of the larger system, looking at interactions and dependencies between the network and its users, applications, and devices. This approach matches the...

The Computer Contradictionary: 2nd Edition
The Computer Contradictionary: 2nd Edition
"Ascertain the meaning before consulting this dictionary," warns the author of this collection of deliberately satirical misdefinitions.

New computer cultures and their jargons have burgeoned since this book's progenitor, The Devil's DP Dictionary, was published in 1981. This updated version of Stan
...
International Law
International Law
Fully revised and updated to December 2002, Malcolm Shaw's bestselling textbook on international law is a clear, authoritative and comprehensive introduction to the subject. The fifth edition includes new material on Inter-state Courts and Tribunals, arbitration tribunals and the role of international institutions such as the WTO. It will remain an...
Breakthrough IT Change Management: How to Get Enduring Change Results
Breakthrough IT Change Management: How to Get Enduring Change Results

Note the wide range of the items listed. All of these and many others have the goal of change and improvement in common. Human beings have been concerned about change since the written word. Some societies were afraid of change while others have embraced it. The above methods were created to address change.

This is a *different*...

unlimited object storage image
Result Page: 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy