164 Results Found Subscribe to search results
000000000000IIE
Print
by 
Mattelart, Armand.
Format: 
Books
Publication Date 
2010
Excerpt: 
Electronic surveillance -- Social aspects.
Available: Copies:
by 
Ivison, Duncan, 1965-
Format: 
Books
Publication Date 
2010
Excerpt: 
multicultural governmentality / Ghassan Hage ; Security warning: Multiculturalism alert! / Rita Kaur Dhamoon
Available: Copies:
by 
Barrientos, Armando.
Format: 
Books
Publication Date 
2010 2008
Excerpt: 
Social security -- Developing countries.
Available: Copies:
Format: 
Books
Publication Date 
2010
Excerpt: 
Issues for debate in social policy : selections from CQ researcher.
Available: Copies:
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Online social networks -- Security measures.
Available: Copies:
by 
Timothy, Dallen J.
Format: 
Books
Publication Date 
2009
Excerpt: 
between supply and demand; safety and security in tourism and lodging. Critically examines a wide range of
Available: Copies:
by 
Foucault, Michel, 1926-1984.
Format: 
Books
Publication Date 
2009 2007
Excerpt: 
Security, territory, population : lectures at the Collège de France, 1977-78 / Foucault, Michel
Available: Copies:
by 
Deegan, Heather.
Format: 
Books
Publication Date 
2009
Excerpt: 
Africa today : culture, economics, religion, security / Deegan, Heather.
Available: Copies:
by 
Zittrain, Jonathan (Jonathan L.), 1969-
Format: 
Books
Publication Date 
2009 2008
Excerpt: 
Internet -- Security measures.
Available: Copies:
by 
Keleher, Helen.
Format: 
Books
Publication Date 
2009 2008
Excerpt: 
Garrard--5. Critical perspectives on public health history / Judith Raftery--Part 2: Understanding social
Available: Copies:
by 
Hayden, Patrick, 1965-
Format: 
Books
Publication Date 
2009
Excerpt: 
intervention / Anthony F. Lang Jr. -- From state security to human security? / Matthew S. Weinert -- Ethics and
Available: Copies:
by 
Ferguson, Ann.
Format: 
Books
Publication Date 
2009
Excerpt: 
humanitarian interventions / Engendering [in]security and terror : on the "protection racket" of security
Available: Copies:
Limit Search Results
Access Level
Author
Language
Subject
Item Available