Book picks similar to
Small Animal Surgery by Theresa Welch Fossum


veterinary-medicine
veterinary
textbooks
veterinary-books

Essential Research Methods for Social Work


Allen Rubin - 2006
    Illustrations and examples throughout show you how you can apply research to practice. Studying is made easy with a book-specific website that provides you with tutorial quizzes and links to additional related concepts. Outlines, introductions, boxes, chapter endings with main points, review questions and exercises, and internet exercises provide you with the information and practice you need to succeed in this course.

The Psychology of Gender


Vicki S. Helgeson - 2004
    It reviews the research from multiple perspectives, but emphasizes the implications of social roles, status, and gender-related traits, particularly for relationships and health-areas that are central to students' lives and that have a great impact on their day-to-day functioning. The text is designed for upper-level undergraduate/graduate-level gender-focused courses in a variety of departments.

The Nick Tosches Reader


Nick Tosches - 2000
    He can be elegant as a slow blues." The Nick Tosches Reader is the author's own selection of his best work over the past thirty years, including fiction, poetry, interviews, rock writing, investigative journalism, and criticism. First published in major magazines, obscure underground periodicals, and his own best-selling books, many of these selections deal with rock 'n' roll and cultural icons—but there are also pieces on everything from William Faulkner to organized crime to heavyweight boxing, including the Vanity Fair feature that gave rise to Tosches's major new book on Sonny Liston, published by Little, Brown. Here is "a unique and darkly impressionistic cultural history" of the last three decades as only Nick Tosches could write it.

The Standard for Program Management


Project Management Institute - 2006
    This helps to ensure proper metrics are developed so that organizations can successfully manage large and complex programs.

Concepts of Genetics


William S. Klug - 2005
    The authors capture students' interest with up-to-date coverage of cutting edge topics and research. This text will help students connect the science of genetics to the issues of today through interesting and thought-provoking applications. The sixth edition boasts the next generation of media integration including Gen CD-X (student CD-ROM and Companion Website).

The C++ Programming Language


Bjarne Stroustrup - 1986
    For this special hardcover edition, two new appendixes on locales and standard library exception safety (also available at www.research.att.com/ bs/) have been added. The result is complete, authoritative coverage of the C++ language, its standard library, and key design techniques. Based on the ANSI/ISO C++ standard, The C++ Programming Language provides current and comprehensive coverage of all C++ language features and standard library components. For example:abstract classes as interfaces class hierarchies for object-oriented programming templates as the basis for type-safe generic software exceptions for regular error handling namespaces for modularity in large-scale software run-time type identification for loosely coupled systems the C subset of C++ for C compatibility and system-level work standard containers and algorithms standard strings, I/O streams, and numerics C compatibility, internationalization, and exception safety Bjarne Stroustrup makes C++ even more accessible to those new to the language, while adding advanced information and techniques that even expert C++ programmers will find invaluable.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Introduction to Topology


Bert Mendelson - 1975
    It provides a simple, thorough survey of elementary topics, starting with set theory and advancing to metric and topological spaces, connectedness, and compactness. 1975 edition.

Justice: A Reader


Michael J. Sandel - 2007
    With readings from major thinkers from the classical era up to the present, the collection provides a thematic overview of the concept of justice. Moreover, Sandel's organization of thereadings and his own commentaries allow readers to engage with a variety of pressing contemporary issues. Looking at a host of ethical dilemmas, including affirmative action, conscription, income distribution, and gay rights, from a variety of angles--morally, legally, politically--the collectionengages with the core concerns of political philosophy: individual rights and the claims of community, equality and inequality, morality and law, and ultimately, justice. With concise section introductions that put the readings in context, this anthology is an invaluable tool for students, teachers, and anyone who wishes to engage in the great moral debates that have animated politics from classical times to our own.

How to Fix Copyright


William Patry - 2011
    We all share the goals of increasing creative works, ensuring authors can make a decent living, furthering culture and competitiveness and ensuring that knowledge is widely shared, but what role does copyright law actually play in making these things come true in the real world? Simply believing in lofty goals isn't enough. If we want our goals to come true, we must go beyond believing in them; we must ensure they come true, through empirical testing and adjustment. Patry argues that laws must be consistent with prevailing markets and technologies because technologies play a large (although not exclusive) role in creating consumer demand; markets then satisfy that demand. Patry discusses how copyright laws arose out of eighteenth-century markets and technology, the most important characteristic of which was artificial scarcity. Artificial scarcity was created by the existence of a small number gatekeepers, by relatively high barriers to entry, and by analog limitations on copying. Markets and technologies change, in a symbiotic way, Patry asserts. New technologies create new demand, requiring new business models. The new markets created by the Internet and digital tools are the greatest ever: Barriers to entry are low, costs of production and distribution are low, the reach is global, and large sums of money can be made off of a multitude of small transactions. Along with these new technologies and markets comes the democratization of creation; digital abundance is replacing analog artificial scarcity. The task of policymakers is to remake our copyright laws to fit our times: our copyright laws, based on the eighteenth century concept of physical copies, gatekeepers, and artificial scarcity, must be replaced with laws based on access not ownership of physical goods, creation by the masses and not by the few, and global rather than regional markets. Patry's view is that of a traditionalist who believes in the goals of copyright but insists that laws must match the times rather than fight against the present and the future.

Essentials of Geology


Frederick K. Lutgens - 2007
    

Spike Lee's Gotta Have It: Inside Guerilla Filmmaking


Spike Lee - 1987
    Shot on a shoe-string budget of $175,000 in black-and-white 16mm, the film was made with Spike Lee's persistence and talent plus the help of family and friends. It grossed $8 million at the box office and proved to be a major hit with both critics and audiences. Now Spike Lee reveals how he did it, mapping out the entire creative and production processes-from early notebook jottings to film festival awards. Spike Lee's Gotta Have It is a unique document in film literature - it's funny, absorbing, and fresh as the hit film itself.

Lippincott's Illustrated Reviews: Microbiology


Richard A. HarveyVictor Stollar - 2001
    The book has the hallmark features for which Lippincott's Illustrated Reviews volumes are so popular: an outline format, over 600 full-color illustrations, end-of-chapter summaries, review questions, plus an entire section of clinical case studies with full-color illustrations. This edition's medical/clinical focus has been sharpened to provide a high-yield review. Five additional case studies have been included, bringing the total to nineteen. Review questions have been reformatted to comply with USMLE Step 1 style, with clinical vignettes.

Foundations in Microbiology


Kathleen Park Talaro - 1992
    It uses a taxonomic approach for the study of pathogens.

Ethics in Information Technology


George W. Reynolds - 2002
    This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.