Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Oracle Collaboration Suite Handbook (Osborne Oracle Press)
Oracle Collaboration Suite Handbook (Osborne Oracle Press)
Oracle Collaboration Suite 10g is an integrated collection of software applications built upon the foundational technology components of the Oracle Database and Application Server, that provide business users with the ability to communicate, exchange critical information, and work together in real-time regardless of where they are physically...
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Ethics and Intersex (International Library of Ethics, Law, and the New Medicine)
Ethics and Intersex (International Library of Ethics, Law, and the New Medicine)

This collection of 21 articles is designed to serve as a state-of-the art reference book for intersexuals, their parents, health care professionals, ethics committee members, and anyone interested in problems associated with intersexuality. It fills an important need because of its uniqueness as an interdisciplinary effort, bringing together...

Eating the IT Elephant: Moving from Greenfield Development to Brownfield
Eating the IT Elephant: Moving from Greenfield Development to Brownfield
A Practical, Start-to-Finish Approach to Managing, Evolving, and Transforming Legacy IT Systems

 

For every IT executive, manager, architect, program leader, project leader, and lead analyst

 

...
Cyberspace Textuality: Computer Technology and Literary Theory
Cyberspace Textuality: Computer Technology and Literary Theory
Computers were once thought of as number-crunching machines; but for most of us it is their ability to create worlds and process words that have made them into a nearly indispensable part of life. As Jacques Leslie puts it, if computers are everywhere, it is because they have grown into "poetry machines." The term "cyberspace"...
Cryptography and Network Security: Principles and Practice (5th Edition)
Cryptography and Network Security: Principles and Practice (5th Edition)

In this age of universal electronic connectivity, of viruses and hackers, of electronic eavesdropping and electronic fraud, there is indeed no time at which security does not matter.Two trends have come together to make the topic of this book of vital interest. First, the explosive growth in computer systems and their interconnections...

More Than Enough: Claiming Space for Who You Are (No Matter What They Say)
More Than Enough: Claiming Space for Who You Are (No Matter What They Say)
INSTANT NEW YORK TIMES BESTSELLER

WINNER OF THE 2020 NAACP IMAGE AWARD FOR OUTSTANDING LITERARY WORK — BIOGRAPHY/AUTOBIOGRAPHY

NOW OPTIONED FOR DEVELOPMENT AS A TV SERIES BY PARAMOUNT TELEVISION STUDIOS AND ANONYMOUS CONTENT


“The
...
Online Dating as A Strategic Game: Why and How Men in Hong Kong Use QQ to Chase Women in Mainland China
Online Dating as A Strategic Game: Why and How Men in Hong Kong Use QQ to Chase Women in Mainland China

Based on a study using online ethnography as the major research method, this book explains why and how men in Hong Kong use QQ—an online instant messenger—to “chase” women in mainland China, especially in the neighboring city of Shenzhen. Chasing women through QQ is a reciprocal exchange process during which the...

Mapping Dalit Feminism: Towards an Intersectional Standpoint
Mapping Dalit Feminism: Towards an Intersectional Standpoint

In this path-breaking study, a first in many ways, Anandita Pan argues that dalit women are an intersectional category, simultaneously affected by caste and gender. The use of intersectionality permits observation of the ways in which different forms of discrimination combine and overlap, challenging...

Web Navigation: Designing the User Experience
Web Navigation: Designing the User Experience

Web Navigation: Designing the User Experience offers the first in depth look at designing web site navigation. Author Jennifer Fleming offers design strategies to help you uncover solutions that work for your site and audience.Acclaimed Web design author Lynda Weinman says in the foreword to this book: "Kudos to Fleming...

Pro PowerShell for Microsoft Azure
Pro PowerShell for Microsoft Azure

This book is written for Windows professionals who are familiar with PowerShell and want to learn to build, operate, and administer their Windows workloads in the Microsoft cloud. Pro PowerShell for Microsoft Azure is packed with practical examples and scripts, with easy-to-follow explanations for a wide range of day-to-day...

Behavioral Biometrics: A Remote Access Approach
Behavioral Biometrics: A Remote Access Approach

With the advent of the internet as a medium for performing business transactions, the need for a secure communication channel has never been more paramount. The study of behavioral biometrics - the verification and/or identification of individuals based on the way they provide information to an authentication system - originated from the need...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy