Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Queer Aging in North American Fiction
Queer Aging in North American Fiction

Exploring representations of queer aging in North American fiction, this book illuminates a rich yet previously unheeded intersection within American culture. At a time when older LGBTQ persons gradually gain visibility in gerontological studies and in the media, this work provides a critical perspective concerned with the...

iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)
iPhoto '11: The Missing Manual (Missing Manuals) (English and English Edition)

In case you haven’t heard, the digital camera market is exploding. At this point, a staggering 98 percent of cameras sold are digital cameras. It’s taken a few decades—the underlying technology used in most digital cameras was invented in 1969—but film photography has been reduced to a niche activity.

...

Customer Analytics For Dummies
Customer Analytics For Dummies

The easy way to grasp customer analytics

Ensuring your customers are having positive experiences with your company at all levels, including initial brand awareness and loyalty, is crucial to the success of your business. "Customer Analytics For Dummies" shows you how to measure each stage of the customer journey and use...

Dress and Society: contributions from archaeology
Dress and Society: contributions from archaeology

While traditional studies of dress and jewelry have tended to focus purely on reconstruction or descriptions of style, chronology and typology, the social context of costume is now a major research area in archaeology. This refocusing is largely a result of the close relationship between dress and three currently popular topics: identity,...

Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework
Metasploit Penetration Testing Cookbook - Third Edition: Evade antiviruses, bypass firewalls, and exploit complex environments with the most widely used penetration testing framework

Over 100 recipes for penetration testing using Metasploit and virtual machines

Key Features

  • Special focus on the latest operating systems, exploits, and penetration testing techniques
  • Learn new anti-virus evasion techniques and use Metasploit to evade countermeasures
  • ...
Apple Pro Training Series : Optimizing Your Final Cut Pro System
Apple Pro Training Series : Optimizing Your Final Cut Pro System
Welcome to the official training course for optimizing Final Cut Pro systems. This book is a guide to installing, configuring, managing, and troubleshooting Final Cut Pro in real-world post-production workflows. It is intended for independent, commercial, and corporate video editors as well as post-production houses and system integratorsanyone who...
Intrusion Detection and Correlation: Challenges and Solutions
Intrusion Detection and Correlation: Challenges and Solutions

Intrusion Detection and Correlation: Challenges and Solutions presents intrusion detection systems (IDSs) and addresses the problem of managing and correlating the alerts produced. This volume discusses the role of intrusion detection in the realm of network security with comparisons to traditional methods such as firewalls and...

Beyond the Desktop Metaphor: Designing Integrated Digital Work Environments
Beyond the Desktop Metaphor: Designing Integrated Digital Work Environments
The computer's metaphorical desktop, with its onscreen windows and hierarchy of folders, is the only digital work environment most users and designers have ever known. Yet empirical studies show that the traditional desktop design does not provide sufficient support for today's real-life tasks involving collaboration, multitasking, multiple roles,...
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
Cryptographic Hardware and Embedded Systems - CHES 2002: 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, CHES 2002, held in Redwood Shores, California, USA in August 2002.

The 41 revised full papers presented together with two invited contributions were carefully selected from 101 submissions during two...

Design and Analysis of Vaccine Studies (Statistics for Biology and Health)
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)

Widespread immunization has many different kinds of effects in individuals and populations, including in the unvaccinated individuals. The challenge is in understanding and estimating all of these effects. This book presents a unified conceptual framework of the different effects of vaccination at the individual and at the population level....

The Long Emergency: Surviving the Converging Catastrophes of the Twenty-First Century
The Long Emergency: Surviving the Converging Catastrophes of the Twenty-First Century

With his classics of social commentary The Geography of Nowhere and Home from Nowhere, James Howard Kunstler has established himself as one of the great commentators on American space and place. Now, with The Long Emergency, he offers a shocking vision of a post-oil future. As a result of artificially cheap fossil-fuel energy, we have...

Comprehensive Textbook of Genitourinary Oncology
Comprehensive Textbook of Genitourinary Oncology

Thoroughly revised for its Third Edition, this volume is the most comprehensive, multidisciplinary text on genitourinary cancers. This edition has two new editors—Frans M.J. Debruyne and W. Marston Linehan—and more than 50% new contributors. Seventeen new chapters cover familial prostate cancer, biology of bone...

unlimited object storage image
Result Page: 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 49 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy