Search Results - "IT security"

Refine Results
  1. 7121

    Gender and power relations in Nigeria

    Published 2013
    Table of Contents: “…Oladoyin -- African women and the changing notion of security / Funso Adesola -- "Unknown soldier" : women's radicalism and activism and state violence in 20th century Nigeria / Moj�ub�aol�u Ol�uf�unk�e Okome -- Women, grass roots movements and democratization in Nigeria / Iwebunor Okwechime and Akin Iwilade -- Gender and the Niger Delta crises : the challenge of local feminisms / Mashood Omotosho -- Gender, environment and human rights violations in Nigeria's Niger Delta region / Iwebunor Okwechime and Akin Iwilade.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 7122

    American spies : espionage against the US from the Cold War to the present / by Sulick, Michael J.

    Published 2013
    Table of Contents: “…The Cold War: 1950-1970 -- The KGB rebuilds -- Spies in the enlisted ranks -- Vietnam and the 1960s -- Decade of turmoil: the 1970s -- Espionage and the 1970s -- Soviet science and technology espionage -- James Angleton and the spy hunt in the CIA -- The decade of the spy: Soviet spies of the 1980s -- Espionage in the 1980s -- Evil spy for the evil empire: John Walker -- The spy in the National Security Agency: Ronald Pelton -- A spy in the CIA: Edward Lee Howard -- The spy in the US Marine Corps: Clayton Lonetree -- The decade of the spy: other spies of the 1980s -- An illegal in the CIA: Karl Koecher -- The Army's John Walker: Clyde Conrad -- Spies for East Germany: James Michael Hall and Jeffrey Carney -- The spy for China: Larry Wu-Tai Chin -- The spy for Israel: Jonathan Pollard -- Espionage and the new world order: the 1990s -- The end of the Cold War and US counterespionage -- Aldrich Ames and his impact on the CIA -- The spy in the FBI: Robert Hanssen -- The last vestiges of Cold War espionage -- Espionage in the new millennium -- New threats, old threats -- Chinese nuclear espionage and Wen Ho Lee -- Spies for China -- Spies for Cuba I: Ana Belen Montes -- Spies for Cuba II: Kendall and Gwendolyn Myers -- Espionage and the war on terrorism -- Cyberespionage.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 7123

    Central and East European politics : from communism to democracy /

    Published 2015
    Table of Contents: “…POLICIES AND ISSUES -- The political transition / Valerie Bunce -- Re-creating the market / Sharon Fisher -- Social aspects of transformation / Alfio Cerami -- Ethnicity, nationalism, and the expansion of democracy / Zsuzsa Csergo -- Women's participation in postcommunist politics / Marilyn Rueschemeyer -- Transitional justice in Central and Eastern Europe / Peter Ro�zi�c and Brian Grodsky -- EU accession and after / Ronald Linden with Shane Killian -- Security issues : NATO and beyond / Joshua Spero -- PART 3. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 7124
  5. 7125
  6. 7126
  7. 7127
  8. 7128
  9. 7129

    A Study of Crisis / by Brecher, Michael, Wilkenfeld, Jonathan

    Published 2022
    Full text available:
    Electronic eBook
  10. 7130
  11. 7131

    War Pictures : Cinema, Violence, and Style in Britain, 1939-1945 / by Puckett, Kent

    Published 2017
    Full text available:
    Electronic eBook
  12. 7132

    Unemployment Insurance Reform : Fixing a Broken System /

    Published 2018
    Full text available:
    Electronic eBook
  13. 7133

    Making Refuge : Somali Bantu Refugees and Lewiston, Maine / by Besteman, Catherine Lowe

    Published 2016
    Full text available:
    Electronic eBook
  14. 7134

    The Art of Neighbouring : Making Relations Across China's Borders /

    Published 2017
    Full text available:
    Electronic eBook
  15. 7135

    Regulatory breakdown the crisis of confidence in U.S. regulation /

    Published 2012
    Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  16. 7136

    The ten-minute inservice 40 quick training sessions that build teacher effectiveness / by Whitaker, Todd, 1959-

    Published 2013
    Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  17. 7137

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 7138

    Regulatory breakdown the crisis of confidence in U.S. regulation /

    Published 2012
    Table of Contents: “…Moffitt -- Reforming securities law enforcement : politics and money at the public, [and] private divide / William W. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 7139

    The ten-minute inservice 40 quick training sessions that build teacher effectiveness / by Whitaker, Todd, 1959-

    Published 2013
    Table of Contents: “…Securing students' attention -- Establishing rules and procedures -- Effective ways to address misbehavior -- Sharing classroom management tips -- A scream to blow off steam -- The biggest mistake teachers make -- Learn to ignore more -- Simple ways to defuse anger -- Effective teaching, part 1 -- Effective teaching, part 2 -- Bell-to-bell teaching -- Teaching with enthusiasm -- Teaching like a great coach -- Be here, there, and everywhere -- Making lessons meaningful -- Fifty ways to make learning fun -- Getting parents involved -- Greeting students daily -- A kind reminder -- Twenty-five reasons to be proud of our school -- Student appreciation week -- Dealing with negative co-workers -- The ten-minute classroom makeover -- The teachers? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  20. 7140

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook