Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Latino Language and Literacy in Ethnolinguistic Chicago
Latino Language and Literacy in Ethnolinguistic Chicago
This volume--along with its companion Ethnolinguistic Chicago: Language and Literacy in the City's Neighborhoods--fills an important gap in research on Chicago and, more generally, on language use in globalized metropolitan areas. Often cited as a quintessential American city, Chicago is, and always has been, a city of immigrants. It...
Liars and Outliers: Enabling the Trust that Society Needs to Thrive
Liars and Outliers: Enabling the Trust that Society Needs to Thrive

Just today, a stranger came to my door claiming he was here to unclog a bathroom drain. I let him into my house without verifying his identity, and not only did he repair the drain, he also took off his shoes so he wouldn’t track mud on my floors. When he was done, I gave him a piece of paper that asked my bank to give him some money....

Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java
Expert Oracle and Java Security: Programming Secure Oracle Database Applications With Java

Expert Oracle and Java Security: Programming Secure Oracle Database Applications with Java provides resources that every Java and Oracle database application programmer needs to ensure that they have guarded the security of the data and identities entrusted to them. You'll learn to consider potential vulnerabilities, and to apply...

Atheist Identities - Spaces and Social Contexts (Boundaries of Religious Freedom: Regulating Religion in Diverse Societies)
Atheist Identities - Spaces and Social Contexts (Boundaries of Religious Freedom: Regulating Religion in Diverse Societies)

The essays in this book not only examine the variety of atheist expression and experience in the Western context, they also explore how local, national and international settings may contribute to the shaping of atheist identities. By addressing identity at these different levels, the book explores how individuals construct their own...

My War Criminal: Personal Encounters with an Architect of Genocide
My War Criminal: Personal Encounters with an Architect of Genocide

An investigation into the nature of violence, terror, and trauma through conversations with a notorious war criminal by Jessica Stern, one of the world's foremost experts on terrorism.

Between October 2014 and November 2016, global terrorism expert Jessica Stern held a series of conversations in a...

CISSP: Certified Information Systems Security Professional Study Guide
CISSP: Certified Information Systems Security Professional Study Guide

CISSP Certified Information Systems Security Professional Study Guide Here's the book you need to prepare for the challenging CISSP exam from (ISC This third edition was developed to meet the exacting requirements of today's security certification candidates, and has been thoroughly updated to cover recent technological advances in...

LinkedIn For Dummies
LinkedIn For Dummies

Relationships matter. Ever since the dawn of time, when caveman Fred asked caveman Barney whether there was any work down at the quarry, human beings have always networked. We’re social creatures who like to reach out and talk to someone. As the Internet developed and grew in popularity, people rapidly took advantage of this new...

Disability Rights and Wrongs Revisited
Disability Rights and Wrongs Revisited

Over the last forty years, the field of disability studies has emerged from the political activism of disabled people. In this challenging review of the field, leading disability academic and activist Tom Shakespeare argues that disability research needs a firmer conceptual and empirical footing.

This new edition is updated...

Good Credit Is Sexy
Good Credit Is Sexy

This book contains everything you need to NEED to know about your credit, even if it is excellent. Good credit is sexy covers topics such as identity theft, getting rid of junk mail, getting a mortgage or auto lease, and of course, how to fix your credit......

Do you carry around a pocket full of cash, telling your friends that cash is...

Social Engineering: The Art of Human Hacking
Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the...

Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)
Biometrics: Theory, Methods, and Applications (IEEE Press Series on Computational Intelligence)

An in-depth examination of the cutting edge of biometrics

This book fills a gap in the literature by detailing the recent advances and emerging theories, methods, and applications of biometric systems in a variety of infrastructures. Edited by a panel of experts, it provides comprehensive coverage of:

Land of Nuclear Enchantment: A New Mexican History of the Nuclear Weapons Industry
Land of Nuclear Enchantment: A New Mexican History of the Nuclear Weapons Industry

In this thoughtful social history of New Mexico's nuclear industry, Lucie Genay traces the scientific colonization of the state in the twentieth century from the points of view of the local people. Genay focuses on personal experiences in order to give a sense of the upheaval that accompanied the rise of the nuclear era. She...

unlimited object storage image
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy