-
-
疯癫与文明: 理性时代的疯癫史 -Feng dian yu wen meng 电子书下载
这部著作是对知识的清洗和质疑。它把“自然”的一个片段交还给历史,改造了疯癫,即把我们当做医学现象的东西变成了一种文明现象。实际上,福柯从未界定疯癫;疯癫并不是认识对象,其历史需要重新揭示;可以说,它不过是这种认识本身;疯癫不是一种疾病,而是一种随时间而变的异 ...
05-05 [ None ]
-
Tuscany SCA in Action - Simon Laws, Mark Combellack, Raymond Feng, Haleh Mahbod and Simon Nash 电子书下载
Tuscany SCA in Action - Simon Laws, Mark Combellack, Raymond Feng, Haleh Mahbod and Simon NashSimon Laws, Mark Combellack, Raymond Feng, Haleh Mahbod ...
02-05 [ computer ]
-
-
-
Sweden and Ecological Governance: Straddling the Fence 电子书下载
The time of our reckless consumption of fossil fuels disperses greenhouse gases that accelerate climate change and guarantee a fu ...
05-25 [ None ]
-
-
-
Mastering Active Directory for Windows Server 2008 - John A. Price, Brad Price and Scott Fenstermacher 电子书下载
Mastering Active Directory for Windows Server 2008 - John A. Price, Brad Price and Scott FenstermacherJohn A. Price, Brad Price and Scott Fenstermache ...
02-05 [ computer ]
-
Review of the Department of Defense Research Program on Low-Level Exposures to Chemical Warfare Agents 电子书下载
Research related to chemical warfare agents (CWA`s) has historically focused on life threatening battlefield effects caused by hi ...
05-24 [ None ]
-
Cross Site Scripting Attacks: XSS Exploits and Defense - Jeremiah Grossman 电子书下载
Cross Site Scripting Attacks: XSS Exploits and Defense - Jeremiah GrossmanJeremiah Grossman ...
02-05 [ computer ]
-
-
End-to-End Network Security Defense-in-Depth - Omar Santos 电子书下载
End-to-End Network Security Defense-in-Depth - Omar SantosOmar Santos ...
02-05 [ computer ]
-
-
On Christian Belief: A Defence of a Cognitive Conception of Religious Belief in a Christian Context 电子书下载
Routledge Studies in Critical Realism Series ...
08-18 [ None ]
-
-
Defensive Security Handbook - Lee Brotherston and Amanda Berlin 电子书下载
Defensive Security Handbook - Lee Brotherston and Amanda BerlinLee Brotherston and Amanda Berlin ...
02-05 [ computer ]
-
Australia and Cyber-warfare (Canberra Papers on Strategy and Defence No. 168) 电子书下载
This book explores Australia’s prospective cyber-warfare requirements and challenges. It describes the current state of planning ...
08-11 [ None ]