Home | Amazing | Today | Tags | Publishers | Years | Search 
Non-Muslims in the Early Islamic Empire: From Surrender to Coexistence (Cambridge Studies in Islamic Civilization)
Non-Muslims in the Early Islamic Empire: From Surrender to Coexistence (Cambridge Studies in Islamic Civilization)

The Muslim conquest of the East in the seventh century entailed the subjugation of Christians, Jews, Zoroastrians, and others. Although much has been written about the status of non-Muslims in the Islamic empire, no previous works have examined how the rules applying to minorities were formulated. Milka Levy-Rubin's remarkable book traces...

Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records
Healthcare Information Privacy and Security: Regulatory Compliance and Data Security in the Age of Electronic Health Records

Healthcare IT is the growth industry right now, and the need for guidance in regard to privacy and security is huge. Why? With new federal incentives and penalties tied to the HITECH Act, HIPAA, and the implementation of Electronic Health Record (EHR) systems, medical practices and healthcare systems are implementing new software at breakneck...

CFO Techniques: A Hands-on Guide to Keeping Your Business Solvent and Successful
CFO Techniques: A Hands-on Guide to Keeping Your Business Solvent and Successful

CFO Techniques: A Hands-on Guide to Keeping Your Business Solvent and Successful is a comprehensive and instructive working manual for multitasking chief financial officers and controllers working in the fast-paced commercial environment. Every senior financial professional with an ever-broadening span of control...

The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value
The Privacy Engineer's Manifesto: Getting from Policy to Code to QA to Value

"It's our thesis that privacy will be an integral part of the next wave in the technology revolution and that innovators who are emphasizing privacy as an integral part of the product life cycle are on the right track." --The authors of The Privacy Engineer's Manifesto

The Privacy Engineer's Manifesto: Getting...

How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers
How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers

"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015

The H-1B visa is the gateway for the world’s best and...

The Rights of Public Employees, Second Edition: The Basic ACLU Guide to the Rights of Public Employees (ACLU Handbook)
The Rights of Public Employees, Second Edition: The Basic ACLU Guide to the Rights of Public Employees (ACLU Handbook)

In this revised and updated edition of The Rights of Public Employees, Robert M. O’Neil broadens the focus from government employees to all public employees, emphasizing the public-service nature of the occupations and professions of such individuals. Using a question-and-answer format, O’Neil covers such topics as...

Building Internet Firewalls
Building Internet Firewalls

More than a million systems are now connected to the Internet, and something like 15 million people in 100 countries on all seven continents use Internet services. More than 100 million email messages are exchanged each day, along with countless files, documents, and audio and video images.Everyone is jumping on the Internet bandwagon. Once a...

Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

Broken Markets: A User's Guide to the Post-Finance Economy
Broken Markets: A User's Guide to the Post-Finance Economy

"I would sleep better if I knew that Bernanke, Geithner, Bachus, Sen. Tim Johnson, Obama and Romney all kept dog-eared copies of Kevin Mellyn's Broken Markets on their nightstands. . . . Mellyn's work is a fascinating, important, and eminently good read and should inform the debate on overhauling the U.S. and...

Power Plays: Energy Options in the Age of Peak Oil
Power Plays: Energy Options in the Age of Peak Oil

Many people wonder: Are we really running out of oil, or is it all a ruse to drive prices up? Is nuclear power safe and economical? Is solar energy really the key to providing plenty of carbon-free energy? Do we have enough natural gas or coal to make any loss of oil production irrelevant?

In Power Plays: Energy Options in the...

Exploring C++ 11 (Expert's Voice in C++)
Exploring C++ 11 (Expert's Voice in C++)

Exploring C++ divides C++ up into bite-sized chunks that will help you learn the language one step at a time. Assuming no familiarity with C++, or any other C-based language, you’ll be taught everything you need to know in a logical progression of small lessons that you can work through as quickly or as slowly as you need.

...
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others
Reputation, Stock Price, and You: Why the Market Rewards Some Companies and Punishes Others

“All of our working lives we have heard the mantra, ‘a reputation lost is never regained.’ Still, the firms we work for, admire and invest in seem to take costly reputation hits all too often. Everyone interested in managing, regulating or investing in public firms will find Nir Kossovsky’s book a wonderful read...

Result Page: 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy