Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Classroom Wars: Language, Sex, and the Making of Modern Political Culture
Classroom Wars: Language, Sex, and the Making of Modern Political Culture

The schoolhouse has long been a crucible in the construction and contestation of the political concept of "family values." Through Spanish-bilingual and sex education, moderates and conservatives in California came to define the family as a politicized and racialized site in the late 1960s and 1970s. Sex education became a vital...

Reinforcement Learning with TensorFlow: A beginner's guide to designing self-learning systems with TensorFlow and OpenAI Gym
Reinforcement Learning with TensorFlow: A beginner's guide to designing self-learning systems with TensorFlow and OpenAI Gym

Leverage the power of reinforcement learning techniques to develop self-learning systems using TensorFlow

Key Features

  • Explore reinforcement learning concepts and their implementation using TensorFlow
  • Discover different problem-solving methods for reinforcement...
Windows .NET Server 2003 Registry
Windows .NET Server 2003 Registry

Provides a historical overview of the Registry and outlines the differences between Windows 9x/ME and Windows NT/2000/XP/.NET Registries.


Enabling system, network, and security administrators to master Registry concepts and architecture, this book provides a historical overview of the Registry and outlines the differences...

Critical Information Infrastructures: Resilience and Protection
Critical Information Infrastructures: Resilience and Protection
A very interesting and informative book that covers a wide but interlinked set of subjects. Indeed, attention has been paid to assisting the reader to understand complex and current issues, and it can be said that the work is extremely well researched, up-to-date and of interest to a wide audience including practising managers, government...
Encyclopedia of Human Resource Management, Key Topics and Issues (Volume 1)
Encyclopedia of Human Resource Management, Key Topics and Issues (Volume 1)

Human resource management is a vital function of any organization, at the nexus of business practice, psychology, and law. This one-of-a-kind and all-in-one print and online encyclopedia offers access to information on all manner of topics and issues related to the "people" side of business. Volume 1 covers an A-Z spectrum of all...

Macroeconomic Policy in Fragile States
Macroeconomic Policy in Fragile States
Setting macroeconomic policy is especially difficult in fragile states. Political legitimacy concerns are heightened, raising issues such as who the policymakers are, what incentives they face, and how the process of policymaking is likely to work under limited legitimacy and high uncertainty
both about the macroeconomic environment
...
Social and Economic Transformation in the Digital Era
Social and Economic Transformation in the Digital Era
This book covers all key subject areas of the Information Society an presents innovative business models, case studies, normative theories and social explanations.

The advent of the Information Society is marked by the explosive penetration of information technologies in all aspects of life and by a related fundamental transformation in
...
Mastering Microsoft Windows Server 2008 R2
Mastering Microsoft Windows Server 2008 R2

The one book you absolutely need to get up and running with Windows Server 2008 R2.

One of the world's leading Windows authorities and top-selling author Mark Minasi explores every nook and cranny of the latest version of Microsoft's flagship network operating system, Windows Server 2008 R2, giving you the most in-depth...

Privacy in Context: Technology, Policy, and the Integrity of Social Life
Privacy in Context: Technology, Policy, and the Integrity of Social Life

Privacy is one of the most urgent issues associated with information technology and digital media. This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself―most people understand that this is crucial to social life ―but the...

Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack
Cloud Security Automation: Get to grips with automating your cloud security on AWS and OpenStack

Secure public and private cloud workloads with this comprehensive learning guide.

Key Features

  • Take your cloud security functions to the next level by automation
  • Learn to automate your security functions on AWS and OpenStack
  • Practical approach towards...
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics
Cybersecurity – Attack and Defense Strategies: Infrastructure security with Red Team and Blue Team tactics

Enhance your organization's secure posture by improving your attack and defense strategies

Key Features

  • Gain a clear understanding of the attack methods, and patterns to recognize abnormal behavior within your organization with Blue Team tactics.
  • Learn to unique...
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The Secure Online Business: E-Commerce, It Functionality & Business Continuity
The effective management of risks online is likely to be the greatest business enabler / destroyer of the next decade. Clearly, organizations that do not move to full e-commerce functionality are unlikely to flourish; whereas those that ignore cyber crime and the "dark side" of the Internet are likely to get badly burnt.

This...

unlimited object storage image
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy