|
|
|
|
Drug Use and Abuse: A Comprehensive Introduction
Packed with the latest data and research, the powerful new DRUG USE AND ABUSE: A COMPREHENSIVE INTRODUCTION, 8e delivers a thorough, interdisciplinary survey of all aspects of drug and alcohol abuse. The text draws from the many disciplines of history, law, pharmacology, political science, social work, counseling, psychology, sociology, and... | | | | International LawFully revised and updated to December 2002, Malcolm Shaw's bestselling textbook on international law is a clear, authoritative and comprehensive introduction to the subject. The fifth edition includes new material on Inter-state Courts and Tribunals, arbitration tribunals and the role of international institutions such as the WTO. It will remain an... |
|
|
The School of History: Athens in the Age of SocratesHistory, political philosophy, and constitutional law were born in Athens in the space of a single generation--the generation that lived through the Peloponnesian War (431-404 b.c.e.). This remarkable age produced such luminaries as Socrates, Herodotus, Thucydides, Sophocles, Euripides, Aristophanes, and the sophists, and set the stage for the... | | Going off the Rails: Global Capital and the Crisis of LegitimacyIn this thought-provoking work, writer and journalist John Plender explores the model of capitalism advocated by English-speaking countries and asks the following pertinent questions:
- Why are developing countries financing the world's richest economy, instead of the other way round?
- How have the markets come
... | | |
|
Handbook of Psychology in Legal ContextsThe second edition of this popular international handbook highlights the developing relationship between psychology and the law. Consisting of all-new material and drawing on the work of practitioners and academics from the UK, Europe, North America and elsewhere, this volume looks not only at the more traditional elements of psychology and the law... | | Network Security: A Beginner's Guide, Second EditionEssential Skills--Made Easy!
Protect your digital knowledge, data, and capabilities from misuse or tampering. This fully updated guidebook provides step-by-step instruction on implementing firewalls, wireless security, desktop protection, biometrics, and many of today's essential security measures. Understand the four primary forms of attack... | | Book of Numbers
This book, more than any other I’ve written up to this point in my life, was a labor of love. It allowed me to combine the knowledge and experience of two careers (over a decade in government and law enforcement, and close to another decade in the computer field, encompassing almost 20 years of working with computers as a hobbyist).When... |
|
|
Result Page: 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 |