Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Routledge Companion to Twenty-First Century Literary Fiction (Routledge Literature Companions)
The Routledge Companion to Twenty-First Century Literary Fiction (Routledge Literature Companions)

The study of contemporary fiction is a fascinating yet challenging one. Contemporary fiction has immediate relevance to popular culture, the news, scholarly organizations, and education – where it is found on the syllabus in schools and universities – but it also offers challenges. What is ‘contemporary’? How...

Irish Imperial Networks: Migration, Social Communication and Exchange in Nineteenth-Century India
Irish Imperial Networks: Migration, Social Communication and Exchange in Nineteenth-Century India

This is an innovative study of the role of Ireland and the Irish in the British Empire which examines the intellectual, cultural and political interconnections between nineteenth-century British imperial, Irish and Indian history. Barry Crosbie argues that Ireland was a crucial sub-imperial centre for the British Empire in South Asia that...

Children in Street Situations: A Concept in Search of an Object (Children’s Well-Being: Indicators and Research)
Children in Street Situations: A Concept in Search of an Object (Children’s Well-Being: Indicators and Research)
This book provides new insights on the lives of children in street situations by providing analyses from a qualitative perspective on the sociology of childhood. It proposes some insightful perspectives on the current discussion about the rights of children in street situations. It includes a unique selection of texts, which were...
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000
Designing Secure Web-Based Applications for Microsoft(r) Windows(r) 2000

Although numerous books on security are available, many of them cover only theory or perhaps a security silo—that is, an island of security based on a particular tool, application, or technology. It should be obvious that no complete security solution is a silo; all secure business applications touch many tools and many technologies. Also,...

MCITP Self-Paced Training Kit (Exam 70-647): Windows Server Enterprise Administration
MCITP Self-Paced Training Kit (Exam 70-647): Windows Server Enterprise Administration
Announcing an all-new SELF-PACED TRAINING KIT designed to help maximize your performance on 70-647, a required exam for the new Microsoft® Certified IT Professional (MCITP): Enterprise Administrator certification. This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help assess your skills. It comes...
Youth, Inequality and Social Change in the Global South (Perspectives on Children and Young People, 6)
Youth, Inequality and Social Change in the Global South (Perspectives on Children and Young People, 6)
This book gathers international and interdisciplinary work on youth studies from the Global South, exploring issues such as continuity and change in youth transitions from education to work; contemporary debates on the impact of mobility, marginalization and violence on young lives; how digital technologies shape youth experiences; and...
Encyclopedia of Creation Myths
Encyclopedia of Creation Myths

A myth is a narrative projection of a given cultural group's sense of its sacred past and its significant relationship with the deeper powers of the surrounding world and universe. A myth is a projection of an aspect of a culture's soul. In its complex but revealing symbolism, a myth is to a culture what a dream is to an...

Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Hack Proofing Your Identity
Hack Proofing Your Identity
The use of a seal, card, or other identification while making a purchase or signing
a contract is a custom almost as old as history. As merchants and their customers
have begun using the Internet in recent years to conduct business online, they
have been challenged to find digital forms of identification that mimic traditional,...
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy