Meer dan een miljoen boeken binnen handbereik!
Bookbot

Keith Brown

    Programming Windows security
    The Past in Question
    Effective Leadership, Management and Supervision in Health and Social Care
    The Dam Builders
    Hughes Electrical and Electronic Technology
    The Cambridge Dictionary of Linguistics
    • 5,0(1)Tarief

      The Cambridge Dictionary of Linguistics provides concise and clear definitions of all the terms any undergraduate or graduate student is likely to encounter in the study of linguistics and English language or in other degrees involving linguistics, such as modern languages, media studies and translation. lt covers the key areas of syntax, morphology, phonology, phonetics, semantics and pragmatics but also contains terms from discourse analysis, stylistics, historical linguistics, sociolinguistics, psycholinguistics, computational linguistics and corpus linguistics. It provides entries for 246 languages, including 'major' languages and languages regularly mentioned in research papers and textbooks. Features include cross-referencing between entries and extended entries on some terms. Where appropriate, entries contain illustrative examples from English and other languages and many provide etymologies bringing out the metaphors lying behind the technical terms. Also available is an electronic version of the dictionary which includes 'clickable' cross-referencing.

      The Cambridge Dictionary of Linguistics
    • 4,3(32)Tarief

      A comprehensive,practical and accessible introduction to the field of electrical and electronic engineering. Keeps mathematics to a minimum, covering only the necessary principles Contains a wealth of worked examples, demonstrating theory in practice Hundreds of end-of-chapter problems test knowledge and allow students to practice solving problems 2-colour illustrations and text throughout aid navigation, highlight key sections and enhance understanding in figures Highlighted key equations, summaries of formulae and key terms and concepts aid the student in locating the most important information and helps with revision

      Hughes Electrical and Electronic Technology
    • This is a vivid account of the schemes which brought electricity to the Scottish Highlands between the end of World War II and 1975. Including eyewitness stories from many of the workers, it tells how the Board had to overcome adverse weather and thrawn geology, as well as political opposition. schovat popis

      The Dam Builders
    • Examines the relationship between national history, identity, and politics in twentieth-century Macedonia. This work focuses on the reverberating power of events surrounding an armed uprising in August 1903, when a revolutionary organization challenged the forces of the Ottoman Empire by seizing control of the mountain town of Krusevo. schovat popis

      The Past in Question
    • Programming Windows security

      • 608bladzijden
      • 22 uur lezen
      4,2(14)Tarief

      Windows 2000 and NT offer programmers powerful security tools that few developers use to the fullest -- and many are completely unaware of. In Programming Windows Security, a top Windows security expert shows exactly how to apply them in enterprise applications. Keith Brown starts with a complete roadmap to the Windows 2000 security architecture, describing every component and how they all fit together. He reviews the "actors" in a secure system, including principals, authorities, authentication, domains, and the local security authority; and the role of trust in secure Windows 2000 applications. Developers will understand the security implications of the broader Windows 2000 environment, including logon sessions, tokens, and window stations. Next, Brown introduces Windows 2000 authorization and access control, including groups, aliases, roles, privileges, security descriptors, DACLs and SACLs - showing how to choose the best access strategy for any application. In Part II, he walks developers through using each of Windows 2000's security tools, presenting techniques for building more secure setup programs, using privileges at runtime, working with window stations and user profiles, and using Windows 2000's dramatically changed ACLs. Finally, Brown provides techniques and sample code for network authentication, working with the file system redirector, using RPC security, and making the most of COM/COM+ security.

      Programming Windows security
    • Mass Control

      • 256bladzijden
      • 9 uur lezen
      4,1(94)Tarief

      Here stands the New Man. His conception of reality is a dance of electronic images fired into his forebrain, a gossamer construction of his masters, designed so that he will not--under any circumstances--perceive the actual. This New Man's happiness is delivered to him through a tube or an electronic connection. His God lurks behind an electronic curtain; when the curtain is pulled away we find the CIA sorcerer, the media manipulator. Jeff Keith is one of the foremost writers and researchers on political conspiracy in the world today.

      Mass Control
    • Scapa

      • 128bladzijden
      • 5 uur lezen
      3,8(11)Tarief

      Through two world wars, Scapa Flow was the main anchorage of the British Home Fleet. This text tells the story of Scapa through photographs that have been culled from collections in the Imperial War Museum and many other sources. schovat popis

      Scapa
    • Mind Control, World Control

      • 228bladzijden
      • 8 uur lezen
      3,8(88)Tarief

      Mind Control is a little known and a highly controversial topic today. Veteran author and investigator Jim Keith uncovers a surprising amount of information on the technology, experimentation and implementation of Mind Control technology. Various chapters in this shocking book are on early CIA experiments such as Project Artichoke and Project RHIC-EDOM, the methodology and technology of implants, Mind Control Assassins and Couriers, various famous “Mind Control" victims such as Sirhan Sirhan and Candy Jones. Also featured in this book are chapters on how Mind Control technology may be linked to some UFO activity and UFO abductions.

      Mind Control, World Control