All counter of AlamanShop


Nancy Varian Berberick
Prisoner of Haven (Dragonlance: Age of Mortals)

2004 y.
Publisher: —
Description: Book Description The latest title in a series based on characters from the best-selling War of Souls trilogy. This title is the next in a series that explores the lives of key characters from Margaret Weis &, Tracy Hickman`s New York Times best-selling War of Souls trilogy. Prisoner of Haven describes events that directly overlap events during the War of Souls, and it features a character originally introduced in Dragons of Summer Flame. Author Berberick also wrote The Lioness, a previous titlein this same series. [detailed...]

ISBN: 0786933275
Book size: —; Page extent: 320.

 

PUT TO
THE BASKET
Sarah Ash
Prisoner of the Iron Tower (The Tears of Artamon, Book 2)

2004 y.
Publisher: Spectra
Description: After nearly killing the woman he loves, Gavril Nagarian succeeds in extricating himself from the bond that has tied him, body and soul, to a dragon-daemon. But in so doing, he betrays his countrymen, for without the daemon, Gavril is just an ordinary man, lacking magical powers and unable to defend his small holding against Eugene, would-be emperor of the five princedoms. Eugene wants more than a crown, however, he wants power and revenge, and when he unlocks the fabled Serpent`s Gate, he gets all that he desires and, perhaps, a bit more than he can handle. He quickly learns that the power of the Drakhaoul can destroy not only his enemies but also his new empress and unborn child, his adored and badly crippled daughter--in short, everything he cares for. Even his own life is imperiled. But as the daemon gains strength and power, becoming one with its host, Eugene begins to lose sight of his most precious gift, his own human heart. Solid, wonderful fantasy, sparkling and imaginative! [detailed...]

ISBN: 055338211X
Book size: —; Page extent: 480.

 

PUT TO
THE BASKET
Anatol and Chamman, Albert Rapoport
Prisoner`s Dilemma

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0472061658
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Greg Farshtey
Prisoners Of The Pit

2007 y.
Publisher: Scholastic
Description: Reading level: Ages 9-12 Trapped in the ocean`s depths, mutated beyond recognition, the Toa must face their greatest challenges. Can they convince the Matoran who live in the watery city of Mahri Nui to trust them? Can they retreive the Mask ofLife before the Barraki figure out how to control it? And will they be able to overcome the greatest challenge of all: the return of Makuta? What does this shadowy figure want from Matoro? And will Matoro end up betraying his friends before it`s all over?Enter the unknown where friends can become enemies and enemies might be the only ones you can trust. [detailed...]

ISBN: 0439890349
Book size: —; Page extent: 144.

 

PUT TO
THE BASKET
Randall Parrish
Prisoners of Chance

2008 y.
Publisher: —
Description: I am Geoffrey Benteen Gentleman Adventurer with much experience upon the border where I have passed my life. My father was that Robert Benteen merchant in furs the first of the English race to make permanent settlement in New Orleans. Here he established a highly profitable trade with the Indians his bateaux voyaging as far northward as the falls of the Ohio while his influence among the tribesmen extended to the eastern mountains. (Excerpt) [detailed...]

ISBN: 0554358328
Book size: —; Page extent: 344.

 

PUT TO
THE BASKET
Alex Pattakos
Prisoners of Our Thoughts: Viktor Frankl`s Principles at Work

2004 y.
Publisher: —
Description: This timely book expands on Viktor Frankl`s seminal Man`s Search for Meaning, examining the book`s concepts in depth and widening the market for them by introducing an entirely new way to look at work and the workplace. Alex Pattakos, a former colleague of Frankl`s, brings the search for meaning at work within the grasp of every reader using simple, straightforward language. The author distills Frankl`s ideas into seven core principles: Exercise the freedom to choose your attitude, Realize your will to meaning, Detect the meaning of life`s moments, Don`t work against yourself, Look at yourself from a distance, Shift your focus of attention, and Extend beyond yourself. By demonstrating how Dr. Frankl`s key principles can be applied to all kinds of work situations, Prisoners of Our Thoughts opens up new opportunities for finding personal meaning and living an authentic work life. [detailed...]

ISBN: 1576752887
Book size: —; Page extent: 200.

 

PUT TO
THE BASKET
Mike Davis
Prisoners of the American Dream: Politics and Economy in the History of the US Working Class

— y.
Publisher: —
Description: Mike Davis`s brilliant exegesis attempts to answer the question: Why has the world`s most industrially advanced nation never spawned a mass party of the working class? [detailed...]

ISBN: 1859842488
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
David L. Hudson
Prisoners` Rights (Point/Counterpoint)

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 0791092771
Book size: —; Page extent: 128.

 

PUT TO
THE BASKET

Prisons (Introducing Issues With Opposing Viewpoints)

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 0737735783
Book size: —; Page extent: 143.

 

PUT TO
THE BASKET

Privacy Enhancing Technologies: 8th International Symposium, PETS 2008 Leuven, Belgium, July 23-25, 2008 Proceedings (Lecture Notes in Computer Science)

2008 y.
Publisher: —
Description: This book constitutes the thoroughly refereed post-proceedings of the 8th International Symposium on Privacy Enhancing Technologies, PET 2008, held in Leuven, Belgium, in July 2008 in conjunction with WOTE 2008, the IAVoSS Workshop on Trustworthy Election The 13 revised full papers presented were carefully selected from 48 submissions during two rounds of reviewing and improvement. The papers - both from academia and industry - cover design and realization of privacy services for the internet and other conication networks and present novel research on all theoretical and practical aspects of privacy technologies, as well as experimental studies of fielded systems. [detailed...]

ISBN: 3540706291
Book size: —; Page extent: 237.

 

PUT TO
THE BASKET
Roger Dingledine, Paul Syverson
Privacy Enhancing Technologies: Second International Workshop, Pet 2002, San Francisco, Ca, Usa, April 2002 : Revisd Papers (Lecture Notes in Computer Science, 2482)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 354000565X
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Pet 200, Roger Dingledine
Privacy Enhancing Technologies: Third International Workshop, Pet 2003, Dresden, Germany, March 2003 : Revisd Papers (Lecture Notes in Computer Science, 2760)

— y.
Publisher: —
Description: — [detailed...]

ISBN: 3540206108
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Albert J. Marcella, Carol Stucki
Privacy Handbook : Guidelines, Exposures, Policy Implementation, and International Issues

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0471232092
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Josep Domingo-Ferrer, Vicenc Torra
Privacy In Statistical Databases: Casc Project International Workshop, Psd 2004, Barcelona, Spain, June 9-11, 2004, Proceedings (LECTURE NOTES IN COMPUTER SCIENCE)

— y.
Publisher: —
Description: This book constitutes the refereed proceedings of the International Workshop on Privacy in Statistical Databases, PSD 2004, held in June 2004 in Barcelona, Spain as the final conference of the European IST Project Computational Aspects of Statistical Confidentiality. The 29 revised full papers presented were carefully reviewed and selected from 44 submissions. The papers are organized in topical sections on foundations of tabular protection, methods for tabular protection, masking for microdata protection, risks in microdata protection, synthetic data, and software and case studies. [detailed...]

ISBN: 3540221182
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Joseph Campana
Privacy MakeOver: The Essential Guide to Best Practices: How to Protect Assets and Foster Consumer Loyalty

2008 y.
Publisher: —
Description: Privacy Makeover is a do-it-yourself guide to privacy best practices filled with practical step-by-step guidelines, checklists, procedures, and thousands of dollars worth of policy and document templates. Every enterprise--businesses, not-for-profits, schools, and local government--are subject to state, federal or industry regulations to protect sensitive information and the privacy of their customers, clients, constituents and employees. For example, the FACT Act Red Flags Rule applies to over 10 million enterprises, while the Disposal Rule applies to as many as 25 million. Author Joseph E. Campana, Ph.D., a certified privacy and identity theft risk management professional, guides you through a simple, four-step privacy best practices process with the goal of achieving the protection of safe harbor. When you reach the last page of the book, you can have a reasonable and appropriate privacy-compliance program in place with relative ease by investing a minimum of time and expense. [detailed...]

ISBN: 098205730X
Book size: —; Page extent: 320.

 

PUT TO
THE BASKET
Michael Silverman
Privacy Matters: Leading CTOs and Lawyers on What Every Business Professional Should Know About Privacy, Technology &, the Internet (Inside the Minds)

— y.
Publisher: —
Description: Inside the Minds: Privacy Matters Is the most authoritative book ever written on privacy issues, written by an unprecedented collection of privacy lawyers and chief technology officers. These visionaries share how their companies and clients cope with privacy issues and how individuals and businesses worldwide should address these important matters. A must-read for every business professional as the privacy landscape continues to broaden and impact every facet of the business world. [detailed...]

ISBN: 1587621185
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Jaideep Vaidya, Chris Clifton, Michael Zhu
Privacy Preserving Data Mining (Advances in Information Security)

2005 y.
Publisher: —
Description: Data mining has emerged as a significant technology for gaining knowledge from vast quantities of data. However, concerns are growing that use of this technology can violate individual privacy. These concerns have led to a backlash against the technology, for example, a `Data-Mining Moratorium Act` introduced in the U.S. Senate that would have banned all data-mining programs (including research and development) by the U.S. Department of Defense. Privacy Preserving Data Mining provides a comprehensive overview of available approaches, techniques and open problems in privacy preserving data mining. This book demonstrates how these approaches can achieve data mining, while operating within legal and commercial restrictions that forbid release of data. Furthermore, this research crystallizes much of the underlying foundation, and inspires further research in the area. Privacy Preserving Data Mining is designed for a professional audience composed of practitioners and researchers in… [detailed...]

ISBN: 0387258868
Book size: —; Page extent: 121.

 

PUT TO
THE BASKET
Michael A. Caloyannides
Privacy Protection and Computer Forensics, Second Edition

2004 y.
Publisher: —
Description: This edition has been updated to offer more detailed how-to guidance on protecting the confidentiality of data stored on computers, and specific information on the vulnerabilities of commonly used ancillary computing devices, such as PDAs, cellular telones, smart cards, and GPS devices. [detailed...]

ISBN: 1580538304
Book size: —; Page extent: 364.

 

PUT TO
THE BASKET

Privacy Protection for E-Services

2006 y.
Publisher: —
Description: There is a deep need for privacy education and technology with which to educate the e-services industry, and provide it the tools to build privacy preserving e-services. Privacy Protection for E-Services fulfills this need by reporting on the latest advances in privacy protection issues and technologies for e-services, covering important material, such as: consumer empowerment, assessing privacy risks, security technologies needed for privacy protection, systems for privacy policy enforcement, and even methods for assessing privacy technologies. Privacy Protection for E-Services is a must-read for consumers, educators, researchers, designers, and developers who are interested in the protection of consumer privacy for Internet services. [detailed...]

ISBN: 1591409144
Book size: —; Page extent: 304.

 

PUT TO
THE BASKET

Privacy and Personality

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 0202309797
Book size: —; Page extent: 275.

 

PUT TO
THE BASKET

Privacy and Technologies of Identity: A Cross-Disciplinary Conversation

2005 y.
Publisher: —
Description: Privacy and Technologies of Identity: A Cross-Disciplinary Conversation provides an overview of ways in which technological changes raise privacy concerns. It then addresses four major areas of technology: RFID and location tracking technology, biometric technology, data mining, and issues with anonymity and authentication of identity. Many of the chapters are written with the non-specialist in mind, seeking to educate a diverse audience on the `basics` of the technology and the law and to point out the promise and perils of each technology for privacy. The material in this book provides an interface between legal and policy approaches to privacy and technologies that either threaten or enhance privacy. This book grew out of the Fall 2004 CIPLIT(r) Symposium on Privacy and Identity: The Promise and Perils of a Technological Age, co-sponsored by DePaul University`s College of Law and School of Computer Science, Telecommunications and Information Systems. The Symposium brought together… [detailed...]

ISBN: 0387260501
Book size: —; Page extent: 383.

 

PUT TO
THE BASKET
Paul H. Rubin, Thomas M. Lenard
Privacy and the Commercial Use of Personal Information

— y.
Publisher: —
Description: — [detailed...]

ISBN: 0792375815
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Alan Charles Raul
Privacy and the Digital State: Balancing Public Information and Personal Privacy

— y.
Publisher: —
Description: The terrorist attacks against the United States on September 11, 2001 have greatly affected our lives, our livelihoods, and perhaps our way of living. Our Constitution and Bill of Rights were designed to inhibit excessively powerful government. But now, we are counting on it to prevent Americans from being killed with impunity, and to `insure domestic tranquility`. In these times, the government must concentrate more on protecting concrete lives than protecting intangible privacy. The subject of this book - privacy - is where the conflict among our competing interests after September 11 is likely to be sharpest. `The right to be let alone`, pales next to the right not to be blown-up. So `privacy` will inevitably need to accommodate security and safety to a greater extent than before September 11. But for America to continue being America, our constitutional mandates must still be genuinely respected. Privacy and the Digital State argues that `privacy` is inherently relative, and is… [detailed...]

ISBN: 0792375807
Book size: —; Page extent: 0.

 

PUT TO
THE BASKET
Stephen Cobb
Privacy for Business: Web Sites and Email

— y.
Publisher: —
Description: In Brief A comprehensive primer for businesses dealing with privacy issues, designed to offer a solid foundation in privacy for executives, managers, webmasters, system administrators, and all employees who handle personally identifiable information. In Depth These days there are a lot of books for consumers with privacy concerns, but there are very few books about privacy for businesses who must address those concerns. This book changes that. It is written to help businesses deal with the issues surrounding privacy, particularly as they relate to company web sites and email. The book begins with a well-rounded introduction to privacy issues from a business perspective. Then the established principles of privacy in commerce are reviewed,such as the OECD Guidelines and the Fair Information Practice Principles. A review of applicable privacy laws comes next, covering U.S. legislation such as HIPAA, COPPA, and G-L-B, plus the European Union?s privacy laws and… [detailed...]

ISBN: 0972481907
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
James B. Rule
Privacy in Peril: How We are Sacrificing a Fundamental Right in Exchange for Security and Convenience

2007 y.
Publisher: —
Description: - [detailed...]

ISBN: 0195307836
Book size: —; Page extent: 256.

 

PUT TO
THE BASKET
Lisa H. Cassilly, Clare Draper
Privacy in the Workplace: A Guide for Attorneys and HR Professionals

— y.
Publisher: —
Description: The workplace is a pivotal arena for privacy issues and still one of the murkiest. Privacy Issues in the Workplace helps to shed light on the most pressing workplace privacy issues. This book is a must-have for any law library or practice. Each chapter is thoroughly footnoted and authoritatively written by experts in the field of workplace privacy. The chapters and their topics are as follows: l Employee Background Investigations l Confidentiality of Personnel Files l Confidentiality of Medical Records l Employee Drug Testing l Workplace Surveillance l State Constitutional Provisions l The Tort of Invasion of Privacy [detailed...]

ISBN: 0937275107
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Whitfield Diffie, Susan Landau
Privacy on the Line: The Politics of Wiretapping and Encryption, Updated and Expanded Edition

2007 y.
Publisher: —
Description: Telecommunication has never been perfectly secure. The Cold War culture of recording devices in telephone receivers and bugged embassy offices has been succeeded by a post-9/11 world of NSA wiretaps and demands for data retention. Although the 1990s battle for individual and commercial freedom to use cryptography was won, growth in the use of cryptography has been slow. Meanwhile, regulations requiring that the computer and communication industries build spying into their systems for government convenience have increased rapidly. The application of the 1994 Communications Assistance for Law Enforcement Act has expanded beyond the intent of Congress to apply to voice over Internet Protocol (VoIP) and other modern data services, attempts are being made to require ISPs to retain their data for years in case the government wants it, and data mining techniques developed for commercial marketing applications are being applied to widespread surveillance of the population. In … [detailed...]

ISBN: 0262042401
Book size: —; Page extent: 400.

 

PUT TO
THE BASKET
Whitfield Diffie, Susan Landau
Privacy on the Line: The Politics of Wiretapping and Encryption

— y.
Publisher: —
Description: Telecommunication has never been perfectly secure, as a Cold War culture of wiretaps and international spying taught us. Yet many of us still take our privacy for granted, even as we become more reliant than ever on telephones, computer networks, and electronic transactions of all kinds. Whitfield Diffie and Susan Landau argue that if we are to retain the privacy that characterized face-to-face relationships in the past, we must build the means of protecting that privacy into our communication systems. Diffie and Landau strip away the hype surrounding the policy debate to examine the national security, law enforcement, commercial, and civil liberties issues. They discuss the social function of privacy, how it underlies a democratic society, and what happens when it is lost. [detailed...]

ISBN: 0262541009
Book size: —; Page extent: —.

 

PUT TO
THE BASKET
Marta Straznicky
Privacy, Playreading, and Women`s Closet Drama, 1550-1700

2009 y.
Publisher: —
Description: Marta Straznicky offers a detailed historical analysis of the relationship between early modern women`s closet plays and the culture of reading. She reveals that these works, by Elizabeth Cary and Margaret Cavendish among others, were part of an alternative dramatic tradition, an elite and private literary culture, which was understood as intellectually superior to and politically more radical than commercial drama. This study offers a new insight into the place of women`s closet plays both in the history of women`s writing and in the history of English drama. [detailed...]

ISBN: 0521100119
Book size: —; Page extent: 194.

 

PUT TO
THE BASKET

Privacy-Preserving Data Mining: Models and Algorithms (Advances in Database Systems)

2008 y.
Publisher: —
Description: Advances in hardware technology have increased the capability to store and record personal data about consumers and individuals, causing concerns that personal data may be used for a variety of intrusive or malicious purposes. Privacy-Preserving Data Min: Models and Algorithms proposes a number of techniques to perform the data mining tasks in a privacy-preserving way. These techniques generally fall into the following categories: data modification techniques, cryptographic methods and protocols for dataaring, statistical techniques for disclosure and inference control, query auditing methods, randomization and perturbation-based techniques. This edited volume contains surveys by distinguished researchers in the privacy field. Each survey includes the kresearch content as well as future research directions. Privacy-Preserving Data Mining: Models and Algorithms is designed for researchers, professors, and advanced-level students in computer science, and is also suitable for industry… [detailed...]

ISBN: 0387709916
Book size: —; Page extent: 514.

 

PUT TO
THE BASKET
J.C. Cannon
Privacy: What Developers and IT Professionals Should Know

2009 y.
Publisher: —
Description: When you are on a Web site you don`t know well, and you are asked to complete an online form, if you are like most people you immediately weigh in your mind issues of how private the information you provide will be kept. Studies have shown that 64% of consumers have left a Web site because of concerns about privacy, and that online retailers lose $6.2 billion a year in sales because of privacy issues. Lack of privacy conditions in building an application or a web site is a liability, conversely, a web site where the consumer feels that their privacy will be guarded is a competitive advantage. In our securityconscious world privacy is a topic of concern right up there with identity theft and spam. Yet until now there has not been one source of information for developers on how to develop applications and web sites that will take into consideration privacy concerns. JC Cannon draws upon the experience he has learned from his role in the corporate privacy group at Microsoft… [detailed...]

ISBN: 0321617770
Book size: —; Page extent: 384.

 

PUT TO
THE BASKET
Сайт создан в системе uCoz