Since 2016, millions of Americans have demonstrated, organized and contributed in the cause of political change. Some have been effective; most are wasting their time. While there are few clear rules of political efficacy, there are techniques of campaigning, agitating and lobbying that manifestly work better than others. Making the works of scholars and practitioners accessible to activists, what I have tried to show is how real reform is possible when we put ordinary people back into politics. More than a book of how to do it, it shows why a new politics of interpersonal engagement can help renew our democratic system. Schneier’s books are always sophisticated and readable, appealing not only to undergraduate students but also to activists and people with a general interest in politics. Here he smoothly blends the insights of academics with those of campaign professionals and politicians. Putting People Back in Politics is must reading for people concerned that the long-term future of American democracy may be determined by the 2020 election and who want to do something about it. —Ken Sherrill, Professor Emeritus of Political Science, Hunter College How can we put everyday people at the center of our politics? Ned Schneier not only tells us how, but why it is crucial to counter big money to reform an increasingly dysfunctional political system. From simple but meaningful conversations with neighbors to effective get-out-the-vote efforts to mass mobilizations, Schneier packs a remarkable amount of experience, research and wisdom into a slim and highly readable book. Want to help create the world we want? Read this book now. It will help us forge viable pathways towards a desirable 21st century. A must read for anyone seeking to make a difference in 2020 and beyond! —Ron Hayduk, Professor of Political Science, San Francisco State University
Muslim Democracy explores the relationship between politics and religion in forty-seven Muslim-majority countries, focusing especially on those with democratic experience, such as Indonesia and Turkey, and drawing comparisons with their regional, non-Islamic counterparts. Unlike most studies of political Islam, this is a politically-focused book, more concerned with governing realties than ideology. By changing the terms of the debate from theology to politics, and including the full complement of Islamic countries, Schneier shows that the boundaries between church and state in the Islamic world are more variable and diverse than is commonly assumed. Through case studies and statistical comparisons between Muslim majority countries and their regional counterparts, Muslim Democracy shows that countries with different religions but similar histories are not markedly different in their levels of democratization. What many Islamists and western observers call "Islamic law," moreover, is more a political than a religious construct, with religion more the tool than the engine of politics. "Women who drive in Saudi Arabia," as the author says, "are not warned they will go to hell, but that they will go to jail." With the political salience of religion rising in many countries, this book is essential reading for students of comparative politics, religion, and democratization interested in exploring the shifting boundaries between faith and politics.
Mobilizing the Information Society comprehensively and critically examines the interaction between social, regulatory, and market developments underlying the growing use of new technologies such as the personal computer and the Internet. Based upon empirical research by an international team, it offers insights needed to understand public policy, corporate strategy, and individual choices taken in response to the deluge of new technological opportunities. A principal theme of Mobilizing the Information Society is that changes are governed by public decisions that establish the institutional framework in which the private sector operates. The quality and value of the information society for the citizen is not the inevitable consequence of market and technological forces. Policy choices, however, that fail to take market and technical influences into account will prove ineffective. The authors lay the foundation for improved theories of the process of change, more appropriate strategies to achieve desired aims, and more effective policies for mitigating the effects of dislocation and exclusion from the information society. Mobilizing the Information Society offers unique insights into the social, economic, and political forces that are structuring the pathway to the information society, and their consequences for businesses and citizens in their everyday lives.
Crossing the road, we look both ways. Riding a bicycle at night, we use lights. So why is our attitude towards online security so relaxed? Edward Lucas reveals the ways in which cyberspace is not the secure zone we may hope, how passwords provide no significant obstacle to anyone intent on getting past them, and how anonymity is easily accessible to anyone – malign or benign – willing to take a little time covering their tracks. The internet was designed by a small group of computer scientists looking for a way to share information quickly. In the last twenty years it has expanded rapidly to become a global information superhighway, available to all comers, but also wide open to those seeking invisibility. This potential for anonymity means neither privacy nor secrecy are really possible for law-abiding corporations or citizens. As identities can be faked so easily the very foundations on which our political, legal and economic systems are based are vulnerable. Businesses, governments, national security organisations and even ordinary individuals are constantly at risk and with our ever increasing dependence on the internet and smart-phone technology this threat is unlikely to diminish – in fact, the target for cyber-criminals is expanding all the time. Not only does Cyberphobia lay bare the dangers of the internet, it also explores the most successful defensive cyber-strategies, options for tracking down transgressors and argues that we are moving into a post-digital age where once again face-to-face communication will be the only interaction that really matters.
This book is a must read for professionals who have the responsibility of enforcing security policies within their ATM networks, ATM security devices, or simple need to better understand the mechanisms defined in the ATM Forum Security Specification 1.1 332 pp.
Designed for graduate level courses in adult psychopathology, the Second Edition of this book incorporates the newly released (2013) DSM-5 . Unique in its approach, this text presents a historical context in which current diagnoses are made. Presenting an overview of the issues and methodologies of conducting assessments, each of the major psychological disorders is discussed in a standard format in the chapter dealing with that disorder. The text includes new chapters on nonalcohol substance abuse and contextual factors affecting diagnoses. Each chapter covers: description from DSM, using case examples; epidemiology; basic research, including neurobiology and neuroscience of the disorder; prevalence and consequences of the disorder; behavioral, social, cognitive, and emotional aspects of the disorder; and treatment of the disorder, using clinical examples showing how psychopathology and assessment influence treatment"--
Information Risk and Security explains the complex and diverse sources of risk for any organization and provides clear guidance and strategies to address these threats before they happen, and to investigate them, if and when they do. Edward Wilding focuses particularly on internal IT risk, workplace crime, and the preservation of evidence, because it is these areas that are generally so mismanaged. There is advice on: ¢ preventing computer fraud, IP theft and systems sabotage ¢ adopting control and security measures that do not hinder business operations but which effectively block criminal access and misuse ¢ securing information - in both electronic and hard copy form ¢ understanding and countering the techniques by which employees are subverted or entrapped into giving access to systems and processes ¢ dealing with catastrophic risk ¢ best-practice for monitoring and securing office and wireless networks ¢ responding to attempted extortion and malicious information leaks ¢ conducting covert operations and forensic investigations ¢ securing evidence where computer misuse occurs and presenting this evidence in court and much more. The author's clear and informative style mixes numerous case studies with practical, down-to-earth and easily implemented advice to help everyone with responsibility for this threat to manage it effectively. This is an essential guide for risk and security managers, computer auditors, investigators, IT managers, line managers and non-technical experts; all those who need to understand the threat to workplace computers and information systems.
By examining the institutions of government through the lens of constitution-making, Crafting Constitutional Democracies provides a broad and insightful introduction to comparative politics. Drawn from a series of lectures given in Jakarta, Indonesia, on the drafting of the U.S. constitution, the book illustrates the problems faced by generations of founders, through numerous historic and contemporary examples. Both Indonesia in 1999 and the United States in 1789 faced the same basic issue: how to construct a central government for a large and diverse nation that allowed the majority of the people to govern themselves without intruding on the rights of minorities. What kinds of institutions make for 'good government'? What factors need to be considered in designing a government? Author Edward Schneier explores these questions through a rich variety of examples from both recent and historic transitions to democracy. Drawing frequently upon the arguments of the American Federalist Papers and more contemporary theories of democratization, Crafting Constitutional Democracies lucidly explores the key questions of how and why democracies succeed and fail. A concluding chapter on constitutional change and decline raises provocative and important questions about the lessons that citizens of the world's older democracies might take from the struggles of the new.
Seldom in America has there been a greater outburst of activism than that following the 2016 elections. Many millions have demonstrated, organized, and contributed to the causes of peace, justice, and good government. Most of them are wasting their time. This short book offers a guide to effective political action. While there are few clear rules of political efficacy, there are ways of doing things that manifestly work better than others. What I have tried to do in this short book is to make the sometimes arcane works of scholars and practitioners accessible to a wider audience. As campaigns and elections become increasingly professionalized and money-oriented, real reform is possible when we put ordinary people back in politics. Here is how.
Muslim Democracy explores the relationship between politics and religion in forty-seven Muslim-majority countries, focusing especially on those with democratic experience, such as Indonesia and Turkey, and drawing comparisons with their regional, non-Islamic counterparts. Unlike most studies of political Islam, this is a politically-focused book, more concerned with governing realties than ideology. By changing the terms of the debate from theology to politics, and including the full complement of Islamic countries, Schneier shows that the boundaries between church and state in the Islamic world are more variable and diverse than is commonly assumed. Through case studies and statistical comparisons between Muslim majority countries and their regional counterparts, Muslim Democracy shows that countries with different religions but similar histories are not markedly different in their levels of democratization. What many Islamists and western observers call "Islamic law," moreover, is more a political than a religious construct, with religion more the tool than the engine of politics. "Women who drive in Saudi Arabia," as the author says, "are not warned they will go to hell, but that they will go to jail." With the political salience of religion rising in many countries, this book is essential reading for students of comparative politics, religion, and democratization interested in exploring the shifting boundaries between faith and politics.
For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today’s newest, most sophisticated, and most destructive attacks. For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You’ll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments. Important features of this new edition include All-new “anatomy-of-an-attack” scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and “Google hacking” New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits
This textbook is written for junior/senior undergraduate and first-year graduate students in the electrical and computer engineering departments. Using PSoC mixed-signal array design, the authors define the characteristics of embedd design, embedded mixed-signal architectures, and top-down design. Optimized implementations of these designs are included to illustrate the theory. Exercises are provided at the end of each chapter for practice. Topics covered include the hardware and software used to implement analog and digital interfaces, various filter structures, amplifiers and other signal-conditioning circuits, pulse-width modulators, timers, and data structures for handling multiple similar peripheral devices. The practical exercises contained in the companion laboratory manual, which was co-authored by Cypress Staff Applications Engineer Dave Van Ess, are also based on PSoC. PSoC's integrated microcontroller, highly configurable analog/digital peripherals, and a full set of development tools make it an ideal learning tool for developing mixed-signal embedded design skills.
Innovative and humane treatment of patients with substance use disorders distinguishes this highly esteemed practitioner and major psychodynamic thinker. From his initial contribution of identifying the self-medicating function of abused substances, to the continued elaboration and refinement of his work focusing on the addict's ego deficits of self-regulation and self-care, Edward Khantzian's ideas have become the standard in the field of addictions treatment. His insights into the dynamics of substance abuse have changed the ways that clinicians understand their addicted patients, significantly raising the likelihood of successful treatment. Shifting the focus from a pleasure-seeking to a pain-relieving approach to their patients' substance use enables clinicians to engage in a more positive, compassionate psychotherapeutic relationship, unhampered by countertransference feelings of contempt and condemnation. Passionate, professional, and unfailingly astute, Dr. Khantzian examines his patients' internal worlds, revealing vulnerabilities while uncovering resiliency and strength. This book, comprehensive in scope, abundant in clinical material, and written with clarity and intelligence, provides a depth of understanding of substance use disorders and an increased hope for recovery. A Jason Aronson Book
An introduction to the engineering principles of embedded systems, with a focus on modeling, design, and analysis of cyber-physical systems. The most visible use of computers and software is processing information for human consumption. The vast majority of computers in use, however, are much less visible. They run the engine, brakes, seatbelts, airbag, and audio system in your car. They digitally encode your voice and construct a radio signal to send it from your cell phone to a base station. They command robots on a factory floor, power generation in a power plant, processes in a chemical plant, and traffic lights in a city. These less visible computers are called embedded systems, and the software they run is called embedded software. The principal challenges in designing and analyzing embedded systems stem from their interaction with physical processes. This book takes a cyber-physical approach to embedded systems, introducing the engineering concepts underlying embedded systems as a technology and as a subject of study. The focus is on modeling, design, and analysis of cyber-physical systems, which integrate computation, networking, and physical processes. The second edition offers two new chapters, several new exercises, and other improvements. The book can be used as a textbook at the advanced undergraduate or introductory graduate level and as a professional reference for practicing engineers and computer scientists. Readers should have some familiarity with machine structures, computer programming, basic discrete mathematics and algorithms, and signals and systems.
In this journalistic tour de force, bestselling author Edward Klein, a friend of Jacqueline Onassis's for many years, takes us behind the public image to give us a story that has never been told before. For this myth-shattering portrait, Klein has amassed a wealth of exclusive information from private documents and correspondence; FBI files; and hundreds of interviews with Jackie's friends, the associates of Aristotle Onassis, and people familiar with her longtime companion, the mysterious diamond merchant Maurice Tempelsman. Many people break their silence here for the first time. Much more than a portrait of a famous celebrity, JUST JACKIE: HER PRIVATE YEARS captures the essence of a captivating woman whose passion for wealth was matched only by her deep need for privacy.
Readership: Academics, clinical psychologists and psychiatrists, cognitive behavioural therapists, and undergraduate and postgraduate students in clinical psychology
POLITICS is "the science and art of political government." It is also "factional scheming for power and status within a group" and "crafty or unprincipled methods." That's the Webster definition. It is all of that and more...
A groundbreaking book about how to harness the power of collaboration and work most effectively in groups—coauthored by Getting Things Done’s David Allen When Getting Things Done was published in 2001, it was a game changer. By revealing the principles of healthy high performance at an individual level, it transformed the experience of work and leisure for millions. Twenty years later, it has become clear that the best way to build on that success is at the team level, and one of the most frequently asked questions by dedicated GTD users is how to get an entire team onboard. By building on the effectiveness of what GTD does for individuals, Team will offer a better way of working in an organization, while simultaneously nourishing a culture that allows individuals’ skills to flourish. Using case studies from some of the world’s largest and most successful companies, Team shows how leaders have employed the principles of team productivity to improve communication, enable effective execution, and reduce stress on team members. These principles are increasingly important in the post-pandemic workplace, where the very nature of how people work together has changed so dramatically. Team is the most significant addition to the GTD canon since the original, and in offering a roadmap for building a culture of healthy high performance, will be welcomed by readers working in any sized group or organization.
This book constitutes the refereed proceedings of the International Conference 'Cryptography: Policy and Algorithms', held in Brisbane, Queensland, Australia in July 1995. Over the past few years, issues relating to cryptography policy have made headline news, particularly those concerned with the rights to privacy of the individual, who may choose to use cryptographic systems to maintain confidentiality, against the needs of legal authorities to conduct wiretapping to help combat crime. The 27 revised full contributions in this volume are devoted to both crypto policy matters and the related theory and applications of cryptographic algorithms. The volume is of relevance to cryptology researchers and professionals in industry and administration.
Researching an individual‘s, firm‘s or brands online presence has become standard practice for many employers, investigators, and intelligence officers, including law enforcement. Countless companies and organizations are implementing their own policies, procedures, and practices for Internet investigations, cybervetting, and intelligence.
For more than three decades, Ed Koch has been one of America's most interesting and outspoken political figures. In this provocative new book, Koch with Rafael Medoff guides readers through the major battles in his life-long fight against anti-Semitism. Interviews, speeches, new essays, never-before published personal correspondence, and more highlight his leadership--on campuses, in the media, on the streets of New York City, and in the halls of power in Washington, DC. The book also features personal letters from Henry Louis Gates, former President George Bush, and other prominent figures. Koch will reveal startling information for the first time here, and his writings are controversial, piercing, teasing, and questioning. This book will ignite discussion for years to come
A powerful exposé that calls into question Edward Snowden's hero status and uncovers how vulenerable our national security systems have become. Edward Snowden. Hero, traitor, whistleblower, or spy? In the wake of his 2013 NSA leak, public opinion has been divided over the former IT analyst. In How America Lost Its Secrets, Edward Jay Epstein draws on his extensive journalistic experience and investigative acumen to investigate the Snowden scandal--why, and how, it happened, and what the implications will be. This is a crucial book for anyone hoping to understand national security in the digital age, and what Snowden's revelations mean for America (and Putin's Russia).
Introduction to Security, Tenth Edition, provides an overview of the security industry with an emphasis on the theories of security and loss prevention that have shaped the profession. Security is covered in totality, providing readers with a glimpse of the various and diverse components that make up the security function. This updated book is the latest edition in what has historically been the go-to textbook on the subject for more than 30 years.While this fully updated edition continues to utilize the basic concepts that have made this text the premier primer in the security field, it also focuses heavily on current and future security issues. - Uses a three-part structure (Introduction, Basics of Defense, and Specific Threat and Solutions) that allows for easy progression of learning - Covers the basics of security operations, as well as in-depth information on hot topics like transportation security, workplace violence, retail security, cybersecurity and piracy - Includes information on the latest applied security technologies - Thoroughly examines evolving trends, with a focus on the future of security - Includes recommendations for further reading and other security resources - Serves the needs of multiple audiences as both a textbook and professional desk reference
It was a labor of love to create my memoirs of my experiences as a Certified Public Accountant. I wanted my children, grandchildren and hopefully future great grandchildren to have a record of my life and the trials, tribulations and joys that I have had during my lifetime. They already have a record of my experiences during the Second World War and this memoir should fill in any of the gaps in my life. Included in my memoir are a number of my clients experiences and my relationship with them. I have genuinely enjoyed my chosen profession, including the few bumps along the road that I have included in this memoir. I feel proud that I had the guts to quit ajob and branch out on my own with my wife and family by my side.
An authoritative introduction to the exciting new technologies of digital money Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age. How do Bitcoin and its block chain actually work? How secure are your bitcoins? How anonymous are their users? Can cryptocurrencies be regulated? These are some of the many questions this book answers. It begins by tracing the history and development of Bitcoin and cryptocurrencies, and then gives the conceptual and practical foundations you need to engineer secure software that interacts with the Bitcoin network as well as to integrate ideas from Bitcoin into your own projects. Topics include decentralization, mining, the politics of Bitcoin, altcoins and the cryptocurrency ecosystem, the future of Bitcoin, and more. An essential introduction to the new technologies of digital currency Covers the history and mechanics of Bitcoin and the block chain, security, decentralization, anonymity, politics and regulation, altcoins, and much more Features an accompanying website that includes instructional videos for each chapter, homework problems, programming assignments, and lecture slides Also suitable for use with the authors' Coursera online course Electronic solutions manual (available only to professors)
In Human Resources Business Process Outsourcing, Edward E. Lawler III, Dave Ulrich, Jac Fitz-enz (the foremost experts in the human resource field) and James C. Madden V (the CEO of the top HR outsourcing firm), clearly show how outsourcing offers an effective, low-cost alternative to traditional administration and provides HR managers with new opportunities to contribute directly to their companies' overall strategy and business performance. Step by step, the authors explore how the HR function in corporations is structured and include a template for analyzing a HR department’s value, value added, and cost-to-serve. In this important resource, the authors explain new approaches organizations can take to improve HR administration and demonstrate how HR functions can be best organized.
In Treating Addiction: Beyond the Pain, Edward Khantzian offers a collection of his recent works on the study and treatment of substance abuse and addiction. Based on his five decades of experience in working with substance dependent individuals, this volume builds upon Khantzian’s theory of addiction as self-medication and provides insights into how addiction is rooted in human psychological suffering, and not pleasure seeking or self-destruction. Almost without exception, life histories of human discomfort, disconnection, and unhappiness leave those so burdened to be vulnerable to the appeal of addictive drugs, including alcohol. Khantzian’s sensitive teaching voice weaves together an annotated collection of previously published papers into a powerful and engaging volume of effective practice-based treatments. A timely complement to his earlier collection Treating Addiction as a Human Process, this book provides an inclusive and accessible resource for mental health professionals from any background as well as graduate students and those in training.
Is tax season at your firm a head-long scramble to the finish line? Do you want to start your next tax season with a system that reflects thoughtful planning and training? Get fresh insight into tax preparation—and very likely result in significant improvements to your current system. You will learn to analyze your existing tax season system and target problems so that work will be more efficient, errors will decrease, and personnel, including you, will feel less stressed. Most importantly, a well-run tax season will make your clients happier and more loyal. Every firm has a tax season system, whether documented or not. Tax season management expert Edward Mendlowitz shares specific ideas for improving each aspect of your system, including how to Staff creatively with seasonal staff, interns, and by outsourcing Maximize the effectivness of the tax organizers you send to clients Communicate effectively with clients about the value of your service Use pre-year-end planning to develop tax and financial planning opportunities Empower your preparers to do more return work Make reviews run smoothly Conduct a post-tax season assessment of your process Bill for the real value of your return preparation—and even increase your fees Numerous sample checklists, letters, charts, and Excel tax comparison worksheets will help you implement this guidance in your next tax season. Having a world-class tax department is possible for every firm, and this resource will help you make that goal a reality. Topics Discussed: Improving tax season system Tax return preparation processes Managing seasonality issues Staffing solutions Getting the most out of technology Year-end planning for tax clients Staff tax training program Assignment scheduling Client appointments Preparation and review Billing Determining fees E-filing Extensions Tax auditsClient satisfaction, retention and referrals
Covers: elements of computer security; roles and responsibilities; common threats; computer security policy; computer security program and risk management; security and planning in the computer system life cycle; assurance; personnel/user issues; preparing for contingencies and disasters; computer security incident handling; awareness, training, and education; physical and environmental security; identification and authentication; logical access control; audit trails; cryptography; and assessing and mitigating the risks to a hypothetical computer system.
The proposed book will present key iTV issues, technology solutions and standards assembled from those technologies. Readers of the book will gain an understanding of the various iTV concepts and the relationships between them. In addition to the general discussions, each chapter will contain specific details so as to serve as a starting point for readers who want to become experts in a specific field.
Conn's Current Therapy 2014 is an easy-to-use, in-depth guide to the latest advances in therapeutics for common complaints, acute disease and chronic illness. Family medicine experts, Drs. Edward T. Bope and Rick D. Kellerman present the expertise and knowledge of hundreds of skilled international leaders on evidence-based clinical management options. With key diagnostic points and treatment recommendation tables, you'll have access to the information you need to make accurate clinical decisions. Apply the proven treatment strategies of hundreds of top experts in family and internal medicine. Get quick access to critical information with "Current Diagnosis" and "Current Therapy" boxes at the beginning of each chapter as well as standardized diagnostic points and clinical recommendation tables.
Most New Yorkers have very little knowledge of how influence is wielded in Albany. This acclaimed book offers a chance to look behind those closed doors. The authors - an Albany-based political scientist and a former State Assembly member, now joined by an expert on political blogging and networking - infuse their discussion of institutions and processes with the drama and significance of real power politics. Completely revised and updated with extensive new material, the book covers recent political developments and electoral contests as well as all the basics: constitutional issues; historical, economic, social, and demographic factors; the functioning of executive, legislative, and judicial institutions; urban, local, and special district governments; parties, interest groups, and bureaucracies; and, finance, budgets, health, education, and welfare programs. Throughout, the authors are attentive to the many paradoxes and dualities that distinguish political, social, and economic life in the Empire State.
L'artiste native de Cuba Carmen Herrera (née en 1915) peint depuis plus de sept décennies, mais ce n'est que ces dernières années que la reconnaissance pour son travail a projeté l'artiste vers la notoriété internationale. Ce beau volume offre le premier examen soutenu d'elle, depuis le début de sa carrière en 1948 jusqu'en 1978, et s'étend sur les mondes de l'art de La Havane, de Paris et de New York. Les essais considèrent les premières études de l'artiste à Cuba, son implication dans le Salon des Réalités Nouvelles dans le Paris d'après-guerre et sa sortie révolutionnaire de New York. Puis l'ouvrage situe son travail dans le contexte d'un art d'avant-garde latino-américain plus large. Un essai de Dana Miller considère le travail de New York d'Herrera depuis les années 1950 jusque dans les années 1970, lorsque Herrera arrivait et perfectionnait son style de signature. Des photographies familiales personnelles des archives de Herrera enrichissent le récit, et une chronologie traitant de l'intégralité de sa vie et de sa carrière présente des images documentaires supplémentaires. Plus de quatre-vingts œuvres sont illustrées sous forme de plaques de couleur. Ce livre est la représentation la plus étendue des travaux de Herrera à ce jour. (d'après l'éditeur).
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.