Kirjojen hintavertailu. Mukana 12 390 323 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

988 tulosta hakusanalla Shulman Alexandra

Issues for Libraries and Information Science in the Internet Age
Are libraries destined for extinction as more people turn to the Web for their information needs? Or will the role of libraries expand to bridge the gap between information haves and have-nots? How will censorship issues, information overload, and archiving affect libraries in years to come? The immense changes brought by the Internet pose many questions and dilemmas for today's librarians, challenging many fundamental beliefs and practices. This timely work addresses a number of major critical issues facing libraries and our society. Join author Bruce Shuman to explore the challenges and possible solutions in this lively and thought-provoking discussion. A fascinating read for anyone working in the information industry-from library managers and practitioners to faculty and students of library and information science. It is also of interest to researchers and Internet users.
Case Studies in Library Security

Case Studies in Library Security

Bruce A. Shuman

Libraries Unlimited Inc
2002
nidottu
This book employs a familiar vehicle in library literature—the case study—but in a departure from the expected, takes that time-honored genre into a new dimension. Shuman uses the conversational narrative as a vehicle for portraying 40 security and safety issues that may arise in libraries, disturbing or vexing patrons and library staff members, alike. Unlike the traditional narrative approach of other case study books, in this work, each case is presented as a soliloquy, within a fictional but plausible library situation, whereby the protagonist uses his or her own colorful mode of expression to describe not only what happened, but the thought processes that went into decisions reached, and how he or she felt about it afterwards. This approach is designed to make reading about library security not just informative but also interesting and fun to read. The case studies are accompanied by discussion questions.
The Camera III: Final Exposure

The Camera III: Final Exposure

Eric a. Shelman

Independently Published
2019
nidottu
re-an-i-mate/rē anəˈmāt/nounA dead thing that has been given life or consciousness again; something that has been revived."... the reanimate took in her surroundings, understanding little except her insatiable hunger."People - lots of them - are going missing on the island nation of Aruba. Jack Hunger has a funny feeling it's not by natural causes. Fearing the worst, he and Wayne Olsen must hop a flight from south Florida to the Caribbean to find out the truth.Allyson Hayes and Chad Steiner were set loose on the promise they had become human again; that they no longer required or desired human flesh to live. Did they lie? Or is something or someone else taking the lives of the citizens of Aruba?Join our gruff and sometimes hapless ex-cops as they try to find and track down the bride and the skater boy - two reanimates they probably should never have trusted. It was one thing letting them go; it will be another thing entirely to find them and figure out how to deal with them.I mean, how do you kill what's already dead?This is the last book in The Camera trilogy. It is the Final Exposure.
Human Hacking Lib/E: Win Friends, Influence People, and Leave Them Better Off for Having Met You
A global security expert draws on psychological insights to help you master the art of social engineering--human hacking. Make friends, influence people, and leave them feeling better for having met you by being more empathetic, generous, and kind. Eroding social conventions, technology, and rapid economic change are making human beings more stressed and socially awkward and isolated than ever. We live in our own bubbles, reluctant to connect, and feeling increasingly powerless, insecure, and apprehensive when communicating with others.A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good--to help you regain your confidence and control. Human Hacking provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other's decisions, and protect yourself from manipulators. Ultimately, you'll become far more self-aware about how you're presenting yourself--and able to use it to improve your life. Hadnagy includes lessons and interactive "missions"--exercises spread throughout the book to help you learn the skills, practice them, and master them. With Human Hacking, you'll soon be winning friends, influencing people, and achieving your goals.Supplemental enhancement PDF accompanies the audiobook.
Human Hacking: Win Friends, Influence People, and Leave Them Better Off for Having Met You
A global security expert draws on psychological insights to help you master the art of social engineering--human hacking. Make friends, influence people, and leave them feeling better for having met you by being more empathetic, generous, and kind. Eroding social conventions, technology, and rapid economic change are making human beings more stressed and socially awkward and isolated than ever. We live in our own bubbles, reluctant to connect, and feeling increasingly powerless, insecure, and apprehensive when communicating with others.A pioneer in the field of social engineering and a master hacker, Christopher Hadnagy specializes in understanding how malicious attackers exploit principles of human communication to access information and resources through manipulation and deceit. Now, he shows you how to use social engineering as a force for good--to help you regain your confidence and control. Human Hacking provides tools that will help you establish rapport with strangers, use body language and verbal cues to your advantage, steer conversations and influence other's decisions, and protect yourself from manipulators. Ultimately, you'll become far more self-aware about how you're presenting yourself--and able to use it to improve your life. Hadnagy includes lessons and interactive "missions"--exercises spread throughout the book to help you learn the skills, practice them, and master them. With Human Hacking, you'll soon be winning friends, influencing people, and achieving your goals.Supplemental enhancement PDF accompanies the audiobook.
Political Asylum Deceptions

Political Asylum Deceptions

Carol Bohmer; Amy Shuman

Springer International Publishing AG
2018
nidottu
This book explores the legitimacy of political asylum applications in the US and UK through an examination of the varieties of evidence, narratives, and documentation with which they are assessed. Credibility is the central issue in determining the legitimacy of political asylum seekers, but the line between truth and lies is often elusive, partly because desperate people often have to use deception to escape persecution. The vetting process has become infused with a climate of suspicion that not only assesses the credibility of an applicant’s story and differentiates between the economic migrant and the person fleeing persecution, but also attempts to determine whether an applicant represents a future threat to the receiving country. This innovative text approaches the problem of deception from several angles, including increased demand for evidence, uses of new technologies to examine applicants’ narratives, assessments of forged documents, attempts to differentiate betweenvictims and persecutors, and ways that cultural misunderstandings can compromise the process. Essential reading for researchers and students of Political Science, International Studies, Refugee and Migration Studies, Human Rights, Anthropology, Sociology, Law, Public Policy, and Narrative Studies.
Hypothalamic Control of Lactation

Hypothalamic Control of Lactation

Felix G. Sulman

Springer-Verlag Berlin and Heidelberg GmbH Co. K
2012
nidottu
The contents of this monograph "Hypothalamic Control of Lacta­ tion" are the result of studies by a nine-man team which has worked together for nine years. The topic is so fascinating that new research students are attracted to it every year, and the circle is growing steadily. This is, in fact, part of a much more extensive research field to which our Department is applying itself at present, viz. "Hypo­ thalamic Pharmacology". Our work in this sphere was made possible by a generous grant from the United States Department of Agriculture, which helped us during the first 5 years of research with Grant No. FG-IS-147, Project No. A10-AH-3, and recently with another grant for a further 5-year period, No. FG-IS-259, Project No. A10-AH-33. Our thanks are due to Dr. JOEL BITMAN, Hormone Physiology Leader of the USDA Agri­ cultural Research Service at Beltsville, Md., the sponsor of this research. As this monograph contains mainly references connected with our own work, the reader who wishes to make a survey of lactation should study the references cited in the bibliography, such as COWIE (1961, 1966), COWIE and FOLLEY (1957, 1961), FOLLEY (1952, 1956), JACOB­ SOHN (1961), LYONS and DIXON (1966), MEITES (1959a, 1961, 1966), MEITES and NICOLL (1966).