World of Books - Find your book here

The Internet Encyclopedia, Volume 2 (G - O)

The Internet Encyclopedia, Volume 2 (G - O)

Preview

Hossein Bidgoli. THE INTERNET ENCYCLOPEDIA Volume 2 G–O THE INTERNET ENCYCLOPEDIA Volume 2 G–O. Hossein Bidgoli Editor-in-Chief California State University Bakersfield, California Hossein Bidgoli Editor-in-Chief California ...
MIS5

MIS5

Hossein Bidgoli

Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
MIS

MIS

Hossein Bidgoli

This option is perfect for those students who focus on the textbook as their main course resource. Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.
The Internet Encyclopedia

The Internet Encyclopedia

Hossein Bidgoli

The Internet Encyclopedia in a 3-volume reference work on the internet as a business tool, IT platform, and communications and commerce medium.
The Handbook of Technology Management, 3 Volume Set

The Handbook of Technology Management, 3 Volume Set

Hossein Bidgoli

The Handbook of Technology Management fills that gap with coverage of all the core topics and applications in the field.
Electronic Commerce: Principles and Practice

Electronic Commerce: Principles and Practice

Hossein Bidgoli

This four-part overview of electronic commerce offers a more thorough and technical view of the subject than many recent books on the subject. The book provides a balance of theories, applications, and hands-on material.
Handbook of Business Data Communications: A Managerial ...

Handbook of Business Data Communications: A Managerial ...

Hossein Bidgoli

This book provides comprehensive coverage of four major areas: The Internet and Data Communications Basics, Popular Types of Networks, Design, Implementation, and Management Issues in a Network Environment, and Data Communication and ...
Handbook of Information Security, Threats, Vulnerabilities, ...

Handbook of Information Security, Threats, Vulnerabilities, ...

Hossein Bidgoli

The Handbook of Information Security is a definitive 3-volume handbook that offers coverage of both established and cutting-edge theories and developments on information and computer security.
The Handbook of Technology Management, Supply Chain ...

The Handbook of Technology Management, Supply Chain ...

Hossein Bidgoli

... Canada Jody Spiro New York University J. Richard Stevens University Of Colorado, Boulder Edward A. Stohr Stevens Institute of Technology Judy Strauss University of Nevada, Reno Wayne C. Summers Columbus State University Stephen ...
Iran and the United States: An Insider’s View on the Failed ...

Iran and the United States: An Insider’s View on the Failed ...

Seyed Hossein Mousavian

With so much at stake, the book concludes with a roadmap for peace that both nations so desperately need.
The Boundaries of Australian Property Law

The Boundaries of Australian Property Law

Hossein Esmaeili

... 757–8; See also the discussion (and warning) about indefeasibility not extending to so-called 'all moneys mortgages' in Matthew Bransgrove, 'Torrens Ceases to Assure: A Wake-Up Call for Lenders' (2014) 88 Australian Law Journal 82.
Proceedings of the International Conference on Data ...

Proceedings of the International Conference on Data ...

Preview

Mohammad Hossein Moaiyeri, Ali Jahanian, and Keivan Navi. Comparative performance evaluation of large FPGAs with CNFET-and CMOS-based switches in nanoscale. Nano-Micro Letters, 3(3):178–177 (2011). 5. Sharma, Jyoti, Mohd ...
Japanese Questions: Discourse, Context and Language

Japanese Questions: Discourse, Context and Language

Lidia Tanaka

A very special thank you to my friends and members of the Discourse Group: Kerry Mullan, Joe Taylor, Novi Djenar, Clodagh Norwood, Sandra Masel, Averil Grieve, Shimako Iwasaki, Hossein Shokouhi. Our meetings contributed to the ...
The Political Economy of U.S. Militarism

The Political Economy of U.S. Militarism

I. Hossein-zadeh

James Cypher, “The Basic Economics of Rearming America,” Monthly Review, 33, no. 6 (1981): 12–13. Ibid., 15. James Cypher, “Return of the Iron Triangle: The New Military Buildup,” Dollars & Sense, no. 239 (January/February 2002): 19.
Politicized Microfinance: Money, Power, and Violence in the ...

Politicized Microfinance: Money, Power, and Violence in the ...

Caroline Shenaz Hossein

My new colleagues at York University – including Mark Peacock, Amanda Glasbeek (my mentor), Joseph Mensah, Jan Kainer, Jennifer Hyndman, Tokunbo Ojo (my rock), Kabita Chakraborthy, Kamala Kempadoo, Kimberley White, Richard ...
Politicized Microfinance: Money, Power, and Violence in the ...

Politicized Microfinance: Money, Power, and Violence in the ...

Caroline Shenaz Hossein

Brody, Alyson, Martin Greenley, and Katie WrightRevolledo, 2005. Money with a Mission: Managing the Social Performance of Microfinance. BourtononDunsmore . UK: ITDG. http://dx.doi.org/10.3362/9781780440873 Brohman, John. 1995.
Time Frames: Conservation Policies for Twentieth-Century ...

Time Frames: Conservation Policies for Twentieth-Century ...

Preview

(Ho Yin Lee, 2008) Walter Sykes George, Tuberculosis Association Building, New Delhi, 1950–1952. (Saptarshi Sanyal, 2015) Soejoedi Wirjoatmodjo, Parliament complex, Jakarta, 1958– 1962. (Gregorius Antar Awal, 2005) Hossein Amanat, ...
Sanctioning Iran: Anatomy of a Failed Policy

Sanctioning Iran: Anatomy of a Failed Policy

Hossein Alikhani

AMIRAHMADI, HOOSHANG and PARVIN, MANOUCHER (eds), Post- Revolutionary Iran, Westview Press, 1988. AMIRAHMADI, HOOSHANG (ed.), Revisiting Iran's Strategic Significance in the Emerging Regional Order, US-Iran Conference, ...
The State of Social Progress of Islamic Societies: Social, ...

The State of Social Progress of Islamic Societies: Social, ...

Preview

and Intellectual Changes in Iran Ali Paya, Hossein Raghfar, Abbas Abdi, Daryoush Mohammad Poor, and Marjan Fadavi-Ardekani H. Tiliouine, R.J. Estes (eds.), The State of Social Progress of Islamic Societies, International Handbooks of ...

who called from an unknown number?