Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Geographies of Girlhood: Identities In-Between (Inquiry and Pedagogy Across Diverse Contexts)
Geographies of Girlhood: Identities In-Between (Inquiry and Pedagogy Across Diverse Contexts)
The real-world, applied research nature of this book - from the viewpoints of girls themselves - adds a nuanced perspective not yet explored in girls' studies....the multidisciplinary nature of the anthology will appeal to sociology, psychology, anthropology, history, religion, and education scholars as well as to women's and girl's studies...
Craniofacial Identification
Craniofacial Identification

The promotion of CCTV surveillance and identity cards, along with ever heightened security at airports, immigration control and institutional access, has seen a dramatic increase in the use of automated and manual recognition. In addition, several recent disasters have highlighted the problems and challenges associated with current disaster...

Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security
Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security

The field of structured P2P systems has seen fast growth upon the introduction of Distributed Hash Tables (DHTs) in the early 2000s. The first proposals, including Chord, Pastry, Tapestry, were gradually improved to cope with scalability, locality and security issues. By utilizing the processing and bandwidth resources  of end users, the...

Adolescent Psychological Development: Rationality, Morality, and Identity
Adolescent Psychological Development: Rationality, Morality, and Identity
Review from the first edition:

...I wish to note how pleasantly surprised I was in becoming acquainted with this volume, after 30 years of teaching adolescence courses. Here students are offered a real vision of a period of life that, in most cases, they have just traversed or are still experiencing. Each part is very precise,...

Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

African Americans and Africa: A New History
African Americans and Africa: A New History
An introduction to the complex relationship between African Americans and the African continent
 
What is an “African American” and how does this identity relate to the African continent? Rising immigration levels, globalization, and the United States’ first African American president
...
Digital Identity
Digital Identity

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval...

Conflict, Contradiction, and Contrarian Elements in Moral Development and Education
Conflict, Contradiction, and Contrarian Elements in Moral Development and Education
The premise of this book is that individuals and societies have an inexorable urge to morally develop by challenging the assumptions of the previous generation in terms of what is right and wrong. The focus is on the nature and functional value of conflicts and challenges to the dominant moral and social values framework. Through this analysis,...
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
Security, Privacy and Trust in Modern Data Management (Data-Centric Systems and Applications)
The vision of ubiquitous computing and ambient intelligence describes a world of technology which is present anywhere, anytime in the form of smart, sensible devices that communicate with each other and provide personalized services. However, associated with these benefits are concerns with respect to security issues. Open interconnected systems...
Automated Fingerprint Identification Systems (AFIS), First Edition
Automated Fingerprint Identification Systems (AFIS), First Edition
There is a world in which every crime is solved in 60 minutes, DNA matches are made “While U Wait,” and staff work on only one case at a time. But it is a fantasy land, an imaginary land; it is not the real world. This book is about the real world of biometric identification technology. It is a fascinating topic. This technology can...
Fashion as Photograph: Viewing and Reviewing Images of Fashion
Fashion as Photograph: Viewing and Reviewing Images of Fashion
Photographic images play a key role in defining global fashion culture and in charting its discursive space. They are seen by many as the driving force behind the fashion system, with cultural pundits and industry creatives heralding the photograph as fashion’s ‘ultimate signifier’ (Saville in Burgoyne 2002: 36). Since the early...
As We Forgive: Stories of Reconciliation from Rwanda
As We Forgive: Stories of Reconciliation from Rwanda
Inspired by the award-winning film of the same name.

If you were told that a murderer was to be released into your neighborhood, how would you feel? But what if it weren’t only one, but thousands?

Could there be a common roadmap to reconciliation? Could there be a shared future after unthinkable evil? If forgiveness
...
unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy