Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Identity and Access Management: Business Performance Through Connected Intelligence
Identity and Access Management: Business Performance Through Connected Intelligence

Identity and Access Management: Business Performance Through Connected Intelligence provides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide implementation. The hands-on, end-to-end approach includes a...

Conflicted American Landscapes
Conflicted American Landscapes
How conflicting ideas of nature threaten to fracture America's identity.

Amber waves of grain, purple mountain majesties: American invest much of their national identity in sites of natural beauty. And yet American lands today are torn by conflicts over science, religion, identity, and politics. Creationists
...
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
Beginning Information Cards and CardSpace: From Novice to Professional (Expert's Voice in .Net)
If you work at all with Internet-facing solutions, you know that the lack of an identity metasystem is a critical vulnerability in the design. Various consortiums have worked to define a system of identity--a platform-agnostic way of communicating and validating claims of identity. If you work with identity solutions or structures, you will find...
Asianization of Migrant Workers in the Gulf Countries
Asianization of Migrant Workers in the Gulf Countries

This edited volume contains sixteen chapters by eminent scholars on one of the largest migration corridors in the world i.e., between South and South-East Asia and the Gulf region. Asia’s trade and cultural contact with the Gulf date back to ancient historical times. Since the 1970s, the economic rise of the Gulf Cooperation...

Speaking Like a State: Language and Nationalism in Pakistan
Speaking Like a State: Language and Nationalism in Pakistan
Alyssa Ayres' fascinating study examines Pakistan's troubled history by exploring the importance of culture to political legitimacy. Early leaders selected Urdu as the natural symbol of the nation's great cultural past, but due to its limited base great efforts would be required to make it truly national. This paradox underscores the importance of...
Gay Liberation to Campus Assimilation: Early Non-Heterosexual Student Organizing at Midwestern Universities
Gay Liberation to Campus Assimilation: Early Non-Heterosexual Student Organizing at Midwestern Universities

Association for the Study of Higher Education Outstanding Book Award Winner, 2020

This book outlines the beginning of student organizing around issues of sexual orientation at Midwestern universities from 1969 to the early 1990s. Collegiate organizations were vitally important to establishing a public presence as...

Advertising 2.0: Social Media Marketing in a Web 2.0 World
Advertising 2.0: Social Media Marketing in a Web 2.0 World
Every day, print and online trade magazines and news sources tout developments in online advertising, branding, and marketing. Seismic shifts in the industry—like major advertisers setting up shop in Second Life and other alternate realities—have forced marketers and advertisers, ready or not, to employ new advertising models. But the...
Sign Languages in Contact (Sociolinguistics in Deaf Communities Series, Vol. 13)
Sign Languages in Contact (Sociolinguistics in Deaf Communities Series, Vol. 13)

The 13th Volume in the Sociolinguistics in Deaf Communities Series This volume collects for the first time various accounts of contact between sign languages throughout the world, presenting an exciting opportunity to further understand the structural and social factors of this linguistic component in Deaf communities. Editor...

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Encyclopedia of World Cultures: South America
Encyclopedia of World Cultures: South America
This volume addresses the cultures of South America south of Panama. As the fourth-largest continent and the southernmost part of the New World land masses, South America encompasses 17,814,435 square kilometers. The continent is politically divided into twelve sovereign republics-Argentina, Bolivia, Brazil, Chile, Colombia, Ecuador, Guyana,...
Modal Logic: An Introduction to its Syntax and Semantics
Modal Logic: An Introduction to its Syntax and Semantics
In this text, a variety of modal logics at the sentential, first-order, and second-order levels are developed with clarity, precision and philosophical insight. All of the S1-S5 modal logics of Lewis and Langford, among others, are constructed. A matrix, or many-valued semantics, for sentential modal logic is formalized, and an important result...
Personality, Identity, and Character: Explorations in Moral Psychology
Personality, Identity, and Character: Explorations in Moral Psychology
Moral notions are foundational questions that have commanded deep reflection since antiquity, reflection that psychological science cannot evade, because the moral formation of children is a central concern of parents, schools, and communities charged with educating the next generation. In this respect there are few domains of study more crucial...
unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy