Sökt på: Sökresultat
totalt 32 träffar
Transforming Places
In this era of globalization's ruthless deracination, place attachments have become increasingly salient in collective mobilizations across the spectrum of politics. Like …
Five Views on the Extent of the Atonement
Explore the question of the extent of Christ's atonement: to whom will grace be extended in the end? Will only professing Christians be saved? Or does the Bible suggest that the …
Exploring the Illusion of Free Will and Moral Responsibility
Exploring the Illusion of Free Will and Moral Responsibility investigates the philosophical and scientific arguments for free will skepticism and their implications. Skepticism …
Five Riddles for Robin
Batman has been kidnapped by the Riddler The crook has left behind one of his infamous riddles, addressed to Robin. If Robin can solve the puzzle, he will locate the Caped …
State Crime
Current media and political discourse on crime has long ignored crimes committed by States themselves, despite their greater financial and human toll. For the past two decades, …
Communication Impact
Designed as an alternative stand-alone text or supplement to conventional research methods texts, Communication Impact introduces methods through engaging narrative descriptions of …
Surviving Adolescents 2.0
The ERAS® Society Handbook for Obstetrics & Gynecology
The ERAS® Society Handbook for Obstetrics & Gynecology covers all aspects of enhanced recovery care for disciplines of general gynecology, gynecologic oncology, urogynecology and …
The Prince Boofhead Syndrome
CASP+ CompTIA Advanced Security Practitioner Study Guide
Comprehensive coverage of the new CASP+ exam, with hands-on practice and interactive study tools The CASP+ CompTIA Advanced Security Practitioner Study Guide: Exam CAS-003, Third …
How to Cheat at Configuring Open Source Security Tools
The Perfect Reference for the Multitasked SysAdmin This is the perfect guide if network security tools is not your specialty. It is the perfect introduction to managing an …
Hack the Stack
This book looks at network security in a new and refreshing way. It guides readers step-by-step through the "stack" -- the seven layers of a network. Each chapter focuses on one …