Detention and deportation are the two most extreme sanctions of an "immigration penality" that enforces borders, polices non-citizens, identifies those who are dangerous, diseased, deceitful, or desti
The U.S. Department of Homeland Security (DHS) is responsible for securing and managing the nation's borders. Over the past decade, DHS has dramatically stepped up its enforcement efforts at the U.S.-
Defend against corporate espionage launched from social networksProtect your organization from devastating social media attacks with instruction from a team of information security experts. Securing t
Securing the Safe Performance of Graphite Reactor Cores provides an account of the recent advances in securing safe performance of graphite-moderated nuclear reactors both within the UK and abroad wh
The Microsoft Official Academic Course (MOAC) textbook for Securing Windows Server 2016 Exam 70-744 is focused primarily on how to secure Windows Server 2016 environments. MOAC offers an official MLO
Port Cybersecurity: Securing Critical Information Infrastructures and Supply Chains examines a paradigm shift in the way ports assess cyber risks and vulnerabilities, as well as relevant risk manageme
Borders of states, borders of citizenship, borders of exclusion. As the lines drawn on international treaty maps become ditches in the ground and roaming barriers in the air, a complex state apparatus
The act of eating defines and redefines borders. What constitutes “American” in our cuisine has always depended on a liberal crossing of borders, from “the line in the sand” th
The act of eating defines and redefines borders. What constitutes “American” in our cuisine has always depended on a liberal crossing of borders, from “the line in the sand” th
Get defensive best practices and a diverse range of triage advice for securing various networks in your organization’s infrastructure. This step-by-step guide demonstrates how to develop and maintain
Securing the Internet of Things provides network and cybersecurity researchers and practitioners with both the theoretical and practical knowledge they need to know regarding security in the Internet
Europe’s borders have always been historically ambiguous and dynamic, whereby borders shift and change character and new borders replace older ones. By focusing upon the title question ‘where are Euro
Securing Development provides policy makers from government finance agencies, security and justice ministries, and international organizations with an introduction to the key issues related to public
Securing social networks and ensuring the privacy of the participants has become a crucial need. There are no books to date that address both social network analytics as well as security and privacy.
Securing the Outdoor Construction Site: Strategy, Prevention, and Mitigation offers a holistic view of security planning for vulnerable capital projects, providing the strategic and tactical plans nee
Securing Social Media in the Enterprise is a concise overview of the security threats posed by the use of social media sites and apps in enterprise network environments. Social media sites and apps ar
Securing VoIP: Keeping Your VoIP Network Safe will show you how to take the initiative to prevent hackers from recording and exploiting your company’s secrets. Drawing upon years of practical experien
Identifying and examining political, socio-psychological and symbolic borders, Language, Borders and Identity encompasses a broad, geographically diverse spectrum of border contexts, taking a multi-di
Identifying and examining political, socio-psychological and symbolic borders, Language, Borders and Identity encompasses a broad, geographically diverse spectrum of border contexts, taking a multi-di
"European-East Asian Borders is an international, trans-disciplinary volume that breaks new ground in the study of borders and bordering practices in global politics. It explores the insights and limi
Cosmopolitan Borders makes the case for processes of bordering being better understood through the lens of cosmopolitanism. Borders are 'cosmopolitan workshops' where 'cultural encounters of a cosmopo
Although virtualization is a widely accepted technology, there are few books dedicated to virtualization and security. Filling this need, Securing Cloud and Mobility: A Practitioner's Guide explains h
What, where, and how to plant colorful borders that will transform any garden Beds and borders provide the framework for a garden, but it can be a daunting task to design and plant them. This book pro
Securing and Excelling in a Pharmacy Residency is a practical guide and handbook for pharmacy students seeking a residency, residents currently enrolled in a program, and residency program leadership.
This accessible guide cuts through all of the jargon surrounding special educational needs (SEN) and walks parents and professionals through the entire journey of securing appropriate educational prov
Securing Europe takes a novel approach to Europeanization among EU member states by employing a sociological institutionalist approach. Watanabe argues that Europeanization as a process of change take
Enhance any display with these beautiful borders that feature full-color photographs of panoramic scenes. Eight 24" x 6" borders connect seamlessly for a total length of 16 feet. For use with Grades P
Enhance any display with these beautiful borders that feature full-color photographs of panoramic scenes. Eight 24" x 6" borders connect seamlessly for a total length of 16 feet. For use with Grades P
Timely and pathbreaking, Securing the Peace is the first book to explore the complete spectrum of civil war terminations, including negotiated settlements, military victories by governments and rebels
Timely and pathbreaking, Securing the Peace is the first book to explore the complete spectrum of civil war terminations, including negotiated settlements, military victories by governments and rebels
Spotting and securing are the two essential safety constituents when it comes to teaching and training gymnastics. This is the first book that explains why assisting is valuable, how spotting can be
Securing Emerging Wireless Systems: Lower-layer Approaches aims to fill a growing need in the research community for a reference that describes the lower-layer approaches as a foundation towards secu
With a focus on "securing" the technical stability of the male voice, this book offers practical advice to students, their teachers, and professional performers, through numerous practical exercises
Are you one of the millions of SysAdmins running a Linux server who can’t find a current book on Linux security? Well….this is the book for you. How to Cheat at Securing Linux Servers is designed to h
Early modern Europe was obsessed with borders and travel. It found, imagined and manufactured new borders for its travellers to cross. It celebrated and feared borders as places or states where meanin
The perfect book for multi-tasked IT managers responsible for securing the latest version of SQL Server 2005. SQL Server is the perfect product for the How to Cheat series. It is an ambitious product
Viable, value-creating solutions for securing global transportation networksSecuring Global Transportation Networks demonstrates how improved security processes can create value across all the busines
The implications for criminology of territorial borders are relatively unexplored. This book presents the first systematic attempt to develop a critical criminology of borders, offering a unique treat