Inorganic Chemistry


Catherine E. Housecroft - 2001
    It offers superior coverage of all key areas, including descriptive chemistry, MO theory, bonding, and physical inorganic chemistry. Chapter topics are presented in logical order and include: basic concepts; nuclear properties; an introduction to molecular symmetry; bonding in polyatomic molecules; structures and energetics of metallic and ionic solids; acids, bases, and ions in aqueous solution; reduction and oxidation; non-aqueous media; and hydrogen. Four special topic chapters, chosen for their currency and interest, conclude the book. For researchers seeking the latest information in the field of inorganic chemistry.

Dead Men Tell Tales: The Memoir of a Police Surgeon


B. Umadathan - 2021
    Umadathan.Popularly known as the 'Sherlock Holmes of Kerala', Dr Umadathan revisits some of his strangest and most interesting cases, like the Chacko murder masterminded by Sukumara Kurup; the sensational Polakkulam case; and the baffling Panoor Soman case.Chilling, shocking and, at times, downright bizarre, Dead Men Tell Tales is unputdownable.

What Algorithms Want: Imagination in the Age of Computing


Ed Finn - 2017
    It's as if we think of code as a magic spell, an incantation to reveal what we need to know and even what we want. Humans have always believed that certain invocations—the marriage vow, the shaman's curse—do not merely describe the world but make it. Computation casts a cultural shadow that is shaped by this long tradition of magical thinking. In this book, Ed Finn considers how the algorithm—in practical terms, “a method for solving a problem”—has its roots not only in mathematical logic but also in cybernetics, philosophy, and magical thinking.Finn argues that the algorithm deploys concepts from the idealized space of computation in a messy reality, with unpredictable and sometimes fascinating results. Drawing on sources that range from Neal Stephenson's Snow Crash to Diderot's Encyclopédie, from Adam Smith to the Star Trek computer, Finn explores the gap between theoretical ideas and pragmatic instructions. He examines the development of intelligent assistants like Siri, the rise of algorithmic aesthetics at Netflix, Ian Bogost's satiric Facebook game Cow Clicker, and the revolutionary economics of Bitcoin. He describes Google's goal of anticipating our questions, Uber's cartoon maps and black box accounting, and what Facebook tells us about programmable value, among other things.If we want to understand the gap between abstraction and messy reality, Finn argues, we need to build a model of “algorithmic reading” and scholarship that attends to process, spearheading a new experimental humanities.

Technology Matters: Questions to Live with


David E. Nye - 2006
    This book addresses questions such as: can we define technology? Does technology shape us, or do we shape it? Is technology inevitable or unpredictable?

A New Day Yesterday: UK Progressive Rock & The 1970s


Mike Barnes - 2020
    He examines the myths and misconceptions that have grown up around progressive rock and paints a vivid, colourful picture of the Seventies based on hundreds of hours of his own interviews with musicians, music business insiders, journalists and DJs, and from the personal testimonies of those who were fans of the music in that extraordinary decade.

The Midnight Dog Walkers: Positive Training and Practical Advice for Living With Reactive and Aggressive Dogs


Annie Phenix - 2016
    Statistics show that aggression is not only the most serious problem in dogs but also the top reason for owners to seek out professional help for their pets. Left unchecked, an aggressive dog can become a dangerous dog, and this informative volume comes to the aid of many heartbroken owners who feel that they have tried everything to correct their dogs’ unpredictable and inappropriate behavior. Author and certified dog trainer Annie Phenix shares her belief that many reactive dogs can be rehabilitated with the right training, and she offers her expertise in positive, force-free training methods to desperate owners who have resorted to extreme measures to keep their dogs away from other people and animals.Inside The Midnight Dog Walkers:Stories and practical examples from the author based on aggressive dogs she’s trained and ownedBehavioral warning signs that owners should recognizeDefinitions of different types of aggression and why they occurTips on how to handle a potentially aggressive or aggressive dogThe author’s force-free training philosophy and how she applies it with her clients to effect positive changesPopular myths and misconceptions about training these "grumpy growlers"

Applying UML and Patterns: An Introduction to Object-Oriented Analysis and Design and Iterative Development


Craig Larman - 2000
    Building on two widely acclaimed previous editions, Craig Larman has updated this book to fully reflect the new UML 2 standard, to help you master the art of object design, and to promote high-impact, iterative, and skillful agile modeling practices.Developers and students will learn object-oriented analysis and design (OOA/D) through three iterations of two cohesive, start-to-finish case studies. These case studies incrementally introduce key skills, essential OO principles and patterns, UML notation, and best practices. You won’t just learn UML diagrams - you’ll learn how to apply UML in the context of OO software development.Drawing on his unsurpassed experience as a mentor and consultant, Larman helps you understand evolutionary requirements and use cases, domain object modeling, responsibility-driven design, essential OO design, layered architectures, “Gang of Four” design patterns, GRASP, iterative methods, an agile approach to the Unified Process (UP), and much more. This edition’s extensive improvements include:- A stronger focus on helping you master OOA/D through case studies that demonstrate key OO principles and patterns, while also applying the UML- New coverage of UML 2, Agile Modeling, Test-Driven Development, and refactoring- Many new tips on combining iterative and evolutionary development with OOA/D- Updates for easier study, including new learning aids and graphics- New college educator teaching resources- Guidance on applying the UP in a light, agile spirit, complementary with other iterative methods such as XP and Scrum- Techniques for applying the UML to documenting architectures- A new chapter on evolutionary requirements, and much moreApplying UML and Patterns, Third Edition, is a lucid and practical introduction to thinking and designing with objects - and creating systems that are well crafted, robust, and maintainable.

Modern Operating Systems


Andrew S. Tanenbaum - 1992
    What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand computer applications--primarily in the areas of multimedia, parallel and distributed computing, and security. The development of faster and more advanced hardware has driven progress in software, including enhancements to the operating system. It is one thing to run an old operating system on current hardware, and another to effectively leverage current hardware to best serve modern software applications. If you don't believe it, install Windows 3.0 on a modern PC and try surfing the Internet or burning a CD. Readers familiar with Tanenbaum's previous text, Operating Systems, know the author is a great proponent of simple design and hands-on experimentation. His earlier book came bundled with the source code for an operating system called Minux, a simple variant of Unix and the platform used by Linus Torvalds to develop Linux. Although this book does not come with any source code, he illustrates many of his points with code fragments (C, usually with Unix system calls). The first half of Modern Operating Systems focuses on traditional operating systems concepts: processes, deadlocks, memory management, I/O, and file systems. There is nothing groundbreaking in these early chapters, but all topics are well covered, each including sections on current research and a set of student problems. It is enlightening to read Tanenbaum's explanations of the design decisions made by past operating systems gurus, including his view that additional research on the problem of deadlocks is impractical except for "keeping otherwise unemployed graph theorists off the streets." It is the second half of the book that differentiates itself from older operating systems texts. Here, each chapter describes an element of what constitutes a modern operating system--awareness of multimedia applications, multiple processors, computer networks, and a high level of security. The chapter on multimedia functionality focuses on such features as handling massive files and providing video-on-demand. Included in the discussion on multiprocessor platforms are clustered computers and distributed computing. Finally, the importance of security is discussed--a lively enumeration of the scores of ways operating systems can be vulnerable to attack, from password security to computer viruses and Internet worms. Included at the end of the book are case studies of two popular operating systems: Unix/Linux and Windows 2000. There is a bias toward the Unix/Linux approach, not surprising given the author's experience and academic bent, but this bias does not detract from Tanenbaum's analysis. Both operating systems are dissected, describing how each implements processes, file systems, memory management, and other operating system fundamentals. Tanenbaum's mantra is simple, accessible operating system design. Given that modern operating systems have extensive features, he is forced to reconcile physical size with simplicity. Toward this end, he makes frequent references to the Frederick Brooks classic The Mythical Man-Month for wisdom on managing large, complex software development projects. He finds both Windows 2000 and Unix/Linux guilty of being too complicated--with a particular skewering of Windows 2000 and its "mammoth Win32 API." A primary culprit is the attempt to make operating systems more "user-friendly," which Tanenbaum views as an excuse for bloated code. The solution is to have smart people, the smallest possible team, and well-defined interactions between various operating systems components. Future operating system design will benefit if the advice in this book is taken to heart. --Pete Ostenson

Diffusion of Innovations


Everett M. Rogers - 1982
    It has sold 30,000 copies in each edition and will continue to reach a huge academic audience.In this renowned book, Everett M. Rogers, professor and chair of the Department of Communication & Journalism at the University of New Mexico, explains how new ideas spread via communication channels over time. Such innovations are initially perceived as uncertain and even risky. To overcome this uncertainty, most people seek out others like themselves who have already adopted the new idea. Thus the diffusion process consists of a few individuals who first adopt an innovation, then spread the word among their circle of acquaintances--a process which typically takes months or years. But there are exceptions: use of the Internet in the 1990s, for example, may have spread more rapidly than any other innovation in the history of humankind. Furthermore, the Internet is changing the very nature of diffusion by decreasing the importance of physical distance between people. The fifth edition addresses the spread of the Internet, and how it has transformed the way human beings communicate and adopt new ideas.

Changing Lives: Gustavo Dudamel, El Sistema, and the Transformative Power of Music


Tricia Tunstall - 2012
    What began in Venezuela has now reached children in Los Angeles, New York City, Baltimore, and cities around the world. No matter the location, the overarching goal of El Sistema is unwavering: to rescue children from the depredations of poverty through music. Part history, part reportage, this book reveals that arts education can indeed effect positive social change.

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Epidemiology for Public Health Practice


Robert H. Friis - 1996
    With extensive treatment of the heart of epidemiology-from study designs to descriptive epidemiology to quantitative measures-this reader-friendly text is accessible and interesting to a wide range of beginning students in all health-related disciplines. A unique focus is given to real-world applications of epidemiology and the development of skills that students can apply in subsequent course work and in the field. The text is also accompanied by a complete package of instructor and student resources available through a companion Web site.

Ordinary Level Physics


A.F. Abbott - 1969
    

Overcome Social Anxiety and Shyness: A Step-By-Step Self Help Action Plan to Overcome Social Anxiety, Defeat Shyness and Create Confidence


Matt Lewis - 2017
     Maybe, you’ve only recently started to struggle with social anxiety or shyness, or have lived with it for a very long time. This maybe the first time you’ve looked for help, or you may have tried different methods to manage your social anxiety or shyness before and remained stuck, or after some initial improvement you found yourself bogged down with same anxious thoughts and feelings. Books and methods that promise instant and magical transformations to overcoming social anxiety and shyness lose their impact when we have to leave our comfort zone and the fairy dust blows away. Whatever the case, you’re probably looking for something that really works, something that is effective, practical, real, and evidence based. There are four main steps in this revolutionary approach and I’ve seen it change people’s lives time and time again. You’re going to learn how to: Understand how social anxiety and shyness develops Build a solid foundation for behaviour change Effectively manage anxious thoughts and feelings Be confident in social situations In Overcome Social Anxiety and Shyness: A Step-by-Step Self Help Action Plan to Overcome Social Anxiety, Defeat Shyness and Create Confidence, university academic and mental health teacher Dr Matt Lewis will take you through a step-by-step programme, in a workbook format, using simple but powerful exercises that will take just a few minutes each day, allowing you to start overcoming social anxiety and shyness, and being back in control and able to enjoy life. Social anxiety can make us feel paralysed and sometimes the smallest and quickest of tasks can seem insurmountable, so the information has been reduced into small chunks, using brief chapters that can be digested easily and quickly. The book contains practical exercises in a workbook format, access to audio exercises and online resources, and an end of book project to help put all the learned skills into real life practice. The principles and practices you will learn in the book go beyond managing social anxiety and shyness. They will also help you to become unstuck, build confidence and really live. Using referenced scientific and academic research, the book teaches you how to: Understand how and why social anxiety and shyness develops. Learn how living in ‘safety mode’ can diminish your life. Create a mindset that will allow you to believe change is possible. Build the foundations for a calm and peaceful mind. Avoid mental exhaustion and increase energy. Effectively handle anxious thoughts and feelings as they arise. Tame the voice in your head and reduce anxiety in social situations. Become unstuck and able to take action in situations you would normally avoid, withdraw, or distract yourself from. Build your confidence step-by-step in both small and large social situations. Take steps to create a fulfilling and meaningful life. This book will be helpful for those who struggle with: Social Anxiety Shyness Low confidence Anxiety Disorder Panic Attacks Panic Disorder Agoraphobia If you f

Persuasive Technology: Using Computers to Change What We Think and Do


B.J. Fogg - 2002
    B.J. Fogg, director of the Persuasive Technology Lab at Stanford University. Fogg has coined the phrase Captology(an acronym for computers as persuasive technologies) to capture the domain of research, design, and applications of persuasive computers.In this thought-provoking book, based on nine years of research in captology, Dr. Fogg reveals how Web sites, software applications, and mobile devices can be used to change people's attitudes and behavior. Technology designers, marketers, researchers, consumers--anyone who wants to leverage or simply understand the persuasive power of interactive technology--will appreciate the compelling insights and illuminating examples found inside.Persuasive technology can be controversial--and it should be. Who will wield this power of digital influence? And to what end? Now is the time to survey the issues and explore the principles of persuasive technology, and B.J. Fogg has written this book to be your guide.