Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Comparative Information Technology: Languages, Societies and the Internet (Globalisation, Comparative Education and Policy Research)
Comparative Information Technology: Languages, Societies and the Internet (Globalisation, Comparative Education and Policy Research)
This volume offers a critique of the nexus between ICT and its impact on society, individuals and educational institutions. One of the most significant dimensions of globalisation has been the rapid development of information and communications technologies (ICTs). Our lives have been changed by ICTs in numerous ways and the implications for...
Identity Theft Handbook: Detection, Prevention, and Security
Identity Theft Handbook: Detection, Prevention, and Security
The magnitude of the identity theft and fraud problem is enormous. Identity fraud was identified as one of the top priorities of the Department of Justice, just prior to the terrorist attacks of 9/11. Naturally, everyone’s priorities changed after 9/11. The impact of identity theft and identity fraud is reaching a proportion and a level of...
Erikson on Development in Adulthood: New Insights from the Unpublished Papers
Erikson on Development in Adulthood: New Insights from the Unpublished Papers

Erik Erikson (1902-1994) was one of the most eminent and prolific psychologists of the 20th century. Over his long career he published a dozen books, including classics such as Childhood and Society; Identity, Youth, and Crisis; and Young Man Luther . He was awarded the Pulitzer Prize and the National Book Award in 1970 for...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Civilization: A History of the World in 1000 Objects
Civilization: A History of the World in 1000 Objects

Discover how humans created their world from the objects they left behind - from the US Constitution to the first iPhone - in DK's latest history book.

From the beginning of human history, the one thing that has defined us is our talent for making things, from basic technology and everyday objects, such
...

Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
Host Identity Protocol (HIP): Towards the Secure Mobile Internet (Wiley Series on Communications Networking &Distributed Systems)
“Within the set of many identifier-locator separation designs for the Internet, HIP has progressed further than anything else we have so far. It is time to see what HIP can do in larger scale in the real world. In order to make that happen, the world needs a HIP book, and now we have it.” - Jari Arkko, Internet Area...
Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference
Troubleshooting Windows 7 Inside Out: The ultimate, in-depth troubleshooting reference

You're beyond the basics, so dive right into troubleshooting Windows 7 -- and really put your PC to work! This supremely organized reference describes hundreds of prevention tips, troubleshooting techniques, and recovery tools in one essential guide. It's all muscle and no fluff. Discover how the experts keep their...

Institutions as Conscious Food Consumers: Leveraging Purchasing Power to Drive Systems Change
Institutions as Conscious Food Consumers: Leveraging Purchasing Power to Drive Systems Change

Institutions like schools, hospitals, and universities are not well known for having quality, healthy food. In fact, institutional food often embodies many of the worst traits of our industrialized food system, with long supply chains that are rife with environmental and social problems and growing market concentration in many stages...

Exam Ref 70-417: Upgrading Your Skills to MCSA Windows Server 2012
Exam Ref 70-417: Upgrading Your Skills to MCSA Windows Server 2012

Prepare for Exam 70-417—and help demonstrate your real-world mastery of Windows Server 2012 core infrastructure services. Microsoft Exam 70-417 is an upgrade exam that is a composite of three standalone exams: 70-410, 70-411, and 70-412. Exam 70-417 validates skills related to the core technology features and functionality of...

Self-Constitution: Agency, Identity, and Integrity
Self-Constitution: Agency, Identity, and Integrity
Christine M. Korsgaard presents an account of the foundation of practical reason and moral obligation. Moral philosophy aspires to understand the fact that human actions, unlike the actions of the other animals, can be morally good or bad, right or wrong. Few moral philosophers, however, have exploited the idea that actions might be morally good or...
Internet Forensics
Internet Forensics

Because it's so large and unregulated, the Internet is a fertile breeding ground for all kinds of scams and schemes. Usually it's your credit card number they're after, and they won't stop there. Not just mere annoyances, these scams are real crimes, with real victims. Now, thanks to ...

Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions
Hacking Exposed VoIP: Voice Over IP Security Secrets & Solutions

Block debilitating VoIP attacks by learning how to look at your network and devices through the eyes of the malicious intruder. Hacking Exposed VoIP shows you, step-by-step, how online criminals perform reconnaissance, gain access, steal data, and penetrate vulnerable systems. All hardware-specific and network-centered security issues...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy