Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Gilded Youth: Privilege, Rebellion and the British Public School
Gilded Youth: Privilege, Rebellion and the British Public School
The British public school is an iconic institution, a training ground for the ruling elite and a symbol of national identity and tradition. But beyond the elegant architecture and evergreen playing fields is a turbulent history of teenage rebellion, sexual dissidence, and political radicalism. James Brooke-Smith wades into the...
Look Both Ways: Help Protect Your Family on the Internet
Look Both Ways: Help Protect Your Family on the Internet
Learn the 14 ways in which you can help make the Internet a safer place for you and your family. You teach your children to look both ways before crossing the street. You tell them not to talk to strangers. But do you really know how to teach them to safely use the Internet? In this book, Linda Criddle, a leading child safety expert, offers a...
Jews and Judaism in Modern China (Routledge Jewish Studies Series)
Jews and Judaism in Modern China (Routledge Jewish Studies Series)

Jews and Judaism in Modern China explores and compares the dynamics at work in two of the oldest, intact and starkly contrasting civilizations on earth; Jewish and Chinese. The book studies how they interact in modernity and how each civilization views the other, and analyses areas of cooperation between scholars, activists and...

Looking Through Philosophy in Black: Memoirs (Global Critical Caribbean Thought)
Looking Through Philosophy in Black: Memoirs (Global Critical Caribbean Thought)
This autobiography is a series of interrelated true-life events and decisions taken by a black philosopher that highlight the human drama unfolding in the inferno of the South African apartheid system. Mabogo More details what it means to be a black philosopher in an anti-black apartheid academic world. More’s life story...
GlassFish Security
GlassFish Security

Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.

Learn to secure Java EE...

Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland
Automata, Languages and Programming: 38th International Colloquium, ICALP 2011, Zurich, Switzerland

ICALP 2011, the 38th edition of the International Colloquium on Automata, Languages and Programming, was held in Z¨urich, Switzerland, during July 4–8, 2011. ICALP is a series of annual conferences of the European Association for Theoretical Computer Science (EATCS) which first took place in 1972. This year, the ICALP...

A Quick Start Guide to Podcasting: Creating Your Own Audio and Visual Materials for iPods, Blackberries, Mobile Phones and Websites
A Quick Start Guide to Podcasting: Creating Your Own Audio and Visual Materials for iPods, Blackberries, Mobile Phones and Websites

We live in exciting times. The internet is arguably the fastest

growing cultural phenomenon in the world, ever. You and I are lucky enough to have been born in time to catch one of those moments in human history when everything changes. Right now we’re in the middle of a
...
Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)
Packaging the Brand: The Relationship Between Packaging Design and Brand Identity (Required Reading Range)

 

Welcome to Packaging the Brand, a book that will introduce you to the design and creation of packaging as it forms part of the product branding process. This book aims to explore the many different ways by which brands come to be packaged and to consider
...
No Middle Name: The Complete Collected Jack Reacher Short Stories
No Middle Name: The Complete Collected Jack Reacher Short Stories

NEW YORK TIMES BESTSELLER • Get ready for the ultimate Jack Reacher experience: a thrilling new novella and eleven previously published stories, together for the first time in one pulse-pounding collection from Lee Child.

No Middle Name begins with “Too Much Time,” a brand-new work of
...

Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference
Policies and Research in Identity Management: Second IFIP WG 11.6 Working Conference

The world of the twenty-first century is, more than ever, global and impersonal. Criminal and terrorist threats, both physical and on the Internet, increase by the day. The demand for better methods of identification is growing, not only in companies and organizations, but also in the world at large.

Identity management is put...

Computer Security in the 21st Century
Computer Security in the 21st Century

Computer Security in the 21st Century shares some of the emerging important research trends reflected in recent advances in computer security, including: security protocol design, secure peer-to-peer and ad hoc networks, multimedia security, and intrusion detection, defense and measurement.

Highlights include...

Computer Security Handbook
Computer Security Handbook

The definitive formula for computer security, from power outages to theft and sabotage

Whether you are in charge of many computers, or even one important one, there are immediate steps you can take to safeguard your company’s computer system and its contents. The Computer Security Handbook provides a readable and...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy