Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
Post-War Eugenics, Reproductive Choices and Population Policies in Greece, 1950s–1980s
This book sheds light on the history of Greek eugenics during the post-war period. At this time, eugenics had already been condemned by international declarations. Alexandra Barmpouti, however, challenges the assumption that eugenics disappeared and confirms the continuity of eugenics after the Second World War. She looks at the Greek...
Operations Management
Operations Management
Operation is that part of as organization, which is concerned with the transformation of a range of inputs into the required output (services) having the requisite quality level. Management is the process, which combines and transforms various resources used in the operations subsystem of the organization into value added services in...
Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Hacking For Dummies
Hacking For Dummies

Updated for Windows 8 and the latest version of Linux

The best way to stay safe online is to stop hackers before they attack - first, by understanding their thinking and second, by ethically hacking your own site to measure the effectiveness of your security. This practical, top-selling guide will help you do both. Fully...

Innovation in Developing Countries: Lessons from Vietnam and Laos (Kobe University Monograph Series in Social Science Research)
Innovation in Developing Countries: Lessons from Vietnam and Laos (Kobe University Monograph Series in Social Science Research)

The main focus of this book is innovation for developing countries: what is the innovation for, what are the current conditions of the innovation, and how to effectively innovate in developing economies. It contains the latest insights and analyses of innovation based on intensive interviews as well as primary and secondary data of...

Marginality: Addressing the Nexus of Poverty, Exclusion and Ecology
Marginality: Addressing the Nexus of Poverty, Exclusion and Ecology

This book takes a new approach on understanding causes of extreme poverty and promising actions to address it. Its focus is on marginality being a root cause of poverty and deprivation. “Marginality” is the position of people on the edge, preventing their access to resources, freedom of choices, and the development of...

Crushing the IT Gender Bias: Thriving as a Woman in Technology
Crushing the IT Gender Bias: Thriving as a Woman in Technology
When my career first began, I was on a team of five women Database Administrators (DBAs). Within 9 months, one of the five who was hired at the same time as I was left the industry. She was young, single, had a degree in Computer Science (CS) with a focus on database technology, and had no children. I had difficulty understanding...
Critical Indigenous Rights Studies (Routledge Research in Human Rights Law)
Critical Indigenous Rights Studies (Routledge Research in Human Rights Law)

The field of ‘critical indigenous rights studies’ is a complex one that benefits from an interdisciplinary perspective and a realist (as opposed to an idealised) approach to indigenous peoples. This book draws on sociology of law, anthropology, political sciences and legal sciences in order to address emerging issues in...

Wireless Operational Security
Wireless Operational Security

Wireless Operational Security addresses the operational and day-to-day security management requirements of 21st Century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes...

OCP: Oracle 10g New Features for Administrators Study Guide : Exam 1Z0-040 (Certification Study Guide)
OCP: Oracle 10g New Features for Administrators Study Guide : Exam 1Z0-040 (Certification Study Guide)

Here's the book you need to prepare for Oracle's 10g upgrade exam, Oracle Database 10g: New Features for Administrators (1Z0-040). This Study Guide was developed to meet the exacting requirements of...

How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers
How to Secure Your H-1B Visa: A Practical Guide for International Professionals and Their US Employers

"James Bach and Robert Werner’s How to Secure Your H-1B Visa is written for both employers and the workers they hire." Andrew Hacker, "The Frenzy about High-Tech Talent", The New York Review of Books, July 9, 2015

The H-1B visa is the gateway for the world’s best and...

SELinux by Example: Using Security Enhanced Linux
SELinux by Example: Using Security Enhanced Linux

SELinux: Bring World-Class Security to Any Linux Environment!

 

SELinux offers Linux/UNIX integrators, administrators, and developers a state-of-the-art platform for building and maintaining highly secure...

unlimited object storage image
Result Page: 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy