Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Migrants Before the Law: Contested Migration Control in Europe
Migrants Before the Law: Contested Migration Control in Europe
This book traces the practices of migration control and its contestation in the European migration regime in times of intense politicization. The collaboratively written work brings together the perspectives of state agents, NGOs, migrants with precarious legal status, and their support networks, collected through multi-sited fieldwork...
Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Implementing and Managing eGovernment: An International Text
Implementing and Managing eGovernment: An International Text
Check out the companion website at www.sagepub.co.uk/heeks 

Implementing and Managing eGovernment fills an important gap. It provides comprehensive coverage of the e-government issues faced by managers, consultants and other practitioners.

Richard Heeks draws on international examples to guide readers through...

Wired for Innovation: How Information Technology is Reshaping the Economy
Wired for Innovation: How Information Technology is Reshaping the Economy
A wave of business innovation is driving the productivity resurgence in the U.S. economy. In Wired for Innovation, Erik Brynjolfsson and Adam Saunders describe how information technology directly or indirectly created this productivity explosion, reversing decades of slow growth. They argue that the companies with the highest level of...
Digital Terrain Modelling: Development and Applications in a Policy Support Environment (Lecture Notes in Geoinformation and Cartography)
Digital Terrain Modelling: Development and Applications in a Policy Support Environment (Lecture Notes in Geoinformation and Cartography)

This publication is the first book on the development and application of digital terrain modelling for regional planning and policy support. It is a compilation of research results by international research groups at the European Commission's Joint Research Centre, providing scientific support to the development and implementation of EU...

Improving Research through User Engagement (Improving Learning)
Improving Research through User Engagement (Improving Learning)

There are increasing calls for social science researchers to work more closely with research users. References to engaging users in and with research are now common in research funding requirements, national research strategies and large-scale research programmes. User engagement has therefore become part of the rhetoric of educational and...

Drug Use and Abuse: A Comprehensive Introduction
Drug Use and Abuse: A Comprehensive Introduction

Packed with the latest data and research, the powerful new DRUG USE AND ABUSE: A COMPREHENSIVE INTRODUCTION, 8e delivers a thorough, interdisciplinary survey of all aspects of drug and alcohol abuse. The text draws from the many disciplines of history, law, pharmacology, political science, social work, counseling, psychology, sociology, and...

Privacy and Big Data
Privacy and Big Data

Much of what constitutes Big Data is information about us. Through our online activities, we leave an easy-to-follow trail of digital footprints that reveal who we are, what we buy, where we go, and much more. This eye-opening book explores the raging privacy debate over the use of personal data, with one undeniable conclusion: once...

Windows Security Monitoring: Scenarios and Patterns
Windows Security Monitoring: Scenarios and Patterns

Dig deep into the Windows auditing subsystem to monitor for malicious activities and enhance Windows system security

Written by a former Microsoft security program manager, DEFCON "Forensics CTF" village author and organizer, and CISSP, this book digs deep into the Windows security auditing subsystem to help you...

Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
Deploying Citrix MetaFrame Presentation Server 3.0 with Windows Server 2003 Terminal Services
PLAN, INSTALL, CONFIGURE, SECURE, OPTIMIZE AND TROUBLESHOOT! Citrix MetaFrame is the de facto standard for hosting and delivering applications from Windows-based servers. Citrix MetaFrame Presentation Server 3.0 is optimized for performance under Windows Server 2003, particularly Terminal Services. This book covers all the topics...
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks
Today's aggressively competitive networking market requires offering the maximum range of services using prevailing assets, not building bigger, more complicated networks, but smarter, more scalable infrastructures. It isn't an easy thing to do.

The challenge is to develop an existing network so as to maximise its...

Web Site Privacy with P3P
Web Site Privacy with P3P
Introducing the long-awaited first step to personal privacy on the Web!

Privacy on the Internet is a very complicated–and delicate–subject. It is about making sure that sites are honest with the people using their services, and providing the end user with the choice of whether or not to share information with the original server....

unlimited object storage image
Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 48 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy