|
|
|
|
Mapping Dalit Feminism: Towards an Intersectional Standpoint
In this path-breaking study, a first in many ways, Anandita Pan argues that dalit women are an intersectional category, simultaneously affected by caste and gender. The use of intersectionality permits observation of the ways in which different forms of discrimination combine and overlap, challenging... | | HTTP: The Definitive GuideBehind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration. While the basics of HTTP are elegantly... | | The SSCP Prep Guide: Mastering the Seven Key Areas of System SecurityA one-stop source of security and privacy information for IT professionals, covering everything you’ll need to know to pass the Systems Security Certified Practitioner examination
This prep guide and general reference will help you breeze through the SSCP security certification test by greatly enhancing your understanding of how to... |
|
|
MCTS Windows Vista Client Configuration Study Guide (Exam 70-620) (Study Guide & CD)Windows Vista is the latest iteration of the Windows product, bringing a number of new features to the Windows operating system and to the Windows networking. This book is designed to help you learn all about Windows Vista in preparation for Exam 70-620, Configuring Microsoft Windows Vista Client. The Windows Vista MCTS exam tests your ability to... | | Maintaining Team Performance (Center for Creative Leadership)Between the time a team is launched and the time it delivers results, managers need to know that the team is on course. Whether they have launched a team to achieve a business objective or have inherited a team, they need to monitor effectiveness on an ongoing basis and make course corrections that keep small problems from becoming major... | | Cryptography and Security Services: Mechanisms and ApplicationsToday's information technology and security networks demand increasingly complex algorithms and cryptographic systems. Individuals implementing security policies for their companies must utilize technical skill and information technology knowledge to implement these security mechanisms. Cryptography and Security Devices: Mechanisms and... |
|
Social Thinking--Software PracticeSoftware practice is everywhere: software development, design, and use as well as related management are shaping today’s technology and changing the way we engage in social relations at work and at home, in small groups and in the larger society. Scientific reflection on software practice aims at understanding and improvement; at the same... | | | | Intranets - a guide to their design, implementation and managementThis book may appeal to anyone requiring an overview of the technological and cultural implications of adopting information and knowledge management solutions using Internet technologies.
The book examines the tactical issues addressed at a functional or departmental level and their impact upon the organisation as a whole from a... |
|
|
Result Page: 572 571 570 569 568 567 566 565 564 563 562 561 560 559 558 557 556 555 554 |