 |
|
 Encyclopedia of Espionage, Intelligence and SecurityIn composing The Encyclopedia of Espionage, Intelligence, and Security (EEIS), our goal was to shape a modern encyclopedia offering immediate value to our intended readers by emphasizing matters of espionage, intelligence, and security most frequently in the news.
EEIS is not intended as a classical “spy book,” filled with... |  |  The Complete Idiot's Guide to Etiquette, Second EditionMary Mitchell, Ms. Demeanor herself, takes you through Y2K and beyond with The Complete Idiot's Guide to Etiquette, Second Edition. Topics covered include gifts and e-commerce: can you "wrap" an electronic gift?, telecommuting and the home office: the impact on family and friends, and volunteering: the fine line between being Mother... |  |  |
|
 Major Donors: Finding Big Gifts in Your Database and OnlineA winning approach to developing international fundraising strategies
Philanthropy is in a renewed golden age. People want to help, to make a difference, to ensure that the things they value will flourish. In order to capitalize on potential prospects, many nonprofit professionals focus solely on the research of, or communication with,... |  |  How to Do Everything with Windows XPGet the most out of Windows XP using this friendly, solutions-oriented guide. See how much you can do with the world’s most popular operating system--including making movies and playing music--and learn about all its new updates such as networking for both home and office, faster boot features, better security, and improved Web browsing.... |  |  The Psychology of the InternetThis timely volume explores the psychological aspects of cyberspace, a virtual world in which people from around the globe are acting and interacting in many new, unusual, and occasionally alarming ways. Drawing on research in the social sciences, communications, business, and other fields, Patricia Wallace examines how the online environment can... |
|
 Crypto Anarchy, Cyberstates, and Pirate UtopiasIn Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence... |  |  Get Ready for OpenIDThis is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o... |  |  2600: The Hacker Quarterly, Summer 20022600: The Hacker Quarterly, Summer 2002:
2600: The Hacker Quarterly is a quarterly American publication that specializes in publishing technical information on a variety of subjects including telephone switching systems, Internet protocols and services, as well as... |
|
 Teach Yourself VISUALLY ComputersAre you a visual learner? Do you prefer instructions that show you how to do something — and skip the long-winded explanations? If so, then this book is for you. Open it up and you'll find clear, step-by-step screen shots that show you how to tackle more than 135 basic computer tasks. Each task-based spread includes easy, visual directions... |  |  |  |  |
|
Result Page: 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |