Calculus [with CD]


Howard Anton - 1992
    New co-authors--Irl Bivens and Stephen Davis--from Davidson College; both distinguished educators and writers.* More emphasis on graphing calculators in exercises and examples, including CAS capabilities of graphing calculators.* More problems using tabular data and more emphasis on mathematical modeling.

Make: Analog Synthesizers


Ray Wilson - 2013
    If you’re a musician or a hobbyist with experience in building electronic projects from kits or schematics, this do-it-yourself guide will walk you through the parts and schematics you need, and how to tailor them for your needs. Author Ray Wilson shares his decades of experience in synth-DIY, including the popular Music From Outer Space (MFOS) website and analog synth community.At the end of the book, you’ll apply everything you’ve learned by building an analog synthesizer, using the MFOS Noise Toaster kit. You’ll also learn what it takes to create synth-DIY electronic music studio. Get started in the fun and engaging hobby of synth-DIY without delay.With this book, you’ll learn:The differences between analog and digital synthesizersAnalog synthesizer building blocks, including VCOs, VCFs, VCAs, and LFOsHow to tool up for synth-DIY, including electronic instruments and suggestions for home-made equipmentFoundational circuits for amplification, biasing, and signal mixingHow to work with the MFOS Noise Toaster kitSetting up a synth-DIY electronic music studio on a budget

Public Administration: Concepts and Cases


Richard J. Stillman II - 1976
    Case studies and examples cover topics such as the Columbia space shuttle disaster, the shootings at Columbine High School, and the war in Iraq--making it easy to engage students in the readings.

Introduction to Fluid Mechanics [With CDROM]


Robert W. Fox - 2003
    This new edition simplifies many of the steps involved in analysis by using the computer application Excel. Over 100 detailed example problems illustrate important fluid mechanics concepts: Approximately 1300 end-of-chapter problems are arranged by difficulty level and include many problems that are designed to be solved using Excel. The CD for the book includes: A Brief Review of Microsoft Excel and numerous Excel files for the example problems and for use in solving problems. The new edition includes an expanded discussion of pipe networks, and a new section on oblique shocks and expansion waves.

Core Java 2, Volume I--Fundamentals (Core Series)


Cay S. Horstmann - 1999
    A no-nonsense tutorial and reliable reference, this book features thoroughly tested real-world examples. The most important language and library features are demonstrated with deliberately simple sample programs, but they aren't fake and they don't cut corners. More importantly, all of the programs have been updated for J2SE 5.0 and should make good starting points for your own code. You won't find any toy examples here. This is a book for programmers who want to write real code to solve real problems. Cay S. Horstmann is a professor of computer science at San Jose State University. Previously he was vice president and chief technology officer of Preview Systems Inc. and a consultant on C++, Java, and Internet programming for major corporations, universities, and organizations. Gary Cornell has written or cowritten more than twenty popular computer books. He has a Ph.D. from Brown University and has been a visiting scientist at IBM Watson Laboratories, as well as a professor at the University of Connecticut.

Negotiation: Readings, Exercises, Cases


Roy J. Lewicki - 1992
    This edition explores the major concepts and theories of the psychology of bargaining and negotiation, and the dynamics of interpersonal and intergroup conflict and its resolution.

Planning, Implementing, and Evaluating Health Promotion Programs: A Primer


James F. McKenzie - 1992
    The Fifth Edition features updated information throughout, including new theories and models such as the Healthy Action Process Approach (HAPA) and the Community Readiness Model (CRM), sections on grant writing and preparing a budget, real-life examples of marketing principles and processes, and a new classification system for evaluation approaches and designs. Health Education, Health Promotion, Health Educators, and Program Planning, Models for Program Planning in Health Promotion, Starting the Planning Process, Assessing Needs, Measurement, Measures, Measurement Instruments and Sampling, Mission Statement, Goals, and Objectives, Theories and Models Commonly Used for Health Promotion Interventions, Interventions, Community Organizing and Community Building, Identification and Allocation of Resources, Marketing: Making Sure Programs Respond to Wants and Needs of Consumers, Implementation: Strategies and Associated Concerns, Evaluation: An Overview, Evaluation Approaches and Designs, Data Analysis and Reporting. Intended for those interested in learning the basics of planning, implementing, and evaluating health promotion programs

Educational Research: Competencies for Analysis and Applications


Lorraine R. Gay - 1976
    The reorganized text reflects a more balanced coverage of both quantitative and qualitative methodologies. Unique features of this revised edition include an approachable text your students won't mind reading and will want to keep; the accessible writing style, clear and concise explanations, and humorous tone demystify the research process; eleven cumulative Tasks throughout the text provide practice and skill development in doing research, step by step; expanded coverage of qualitative research and mixed methods Chapter 16 covering Narrative Research, and Chapter 17 covering Ethnographic Research, are new to this edition. Chapter 19, Mixed Methods, is also new to this edition. There is an expanded coverage of technology and an increased coverage of how to use technology in the research process. The 39 articles provided in the package (Text, Student Study Guide, and Website) are accompanied by a variety of pedagogical aids to help students learn to read research. research.

Operations Research: Applications and Algorithms (with CD-ROM and InfoTrac)


Wayne L. Winston - 1987
    It moves beyond a mere study of algorithms without sacrificing the rigor that faculty desire. As in every edition, Winston reinforces the book's successful features and coverage with the most recent developments in the field. The Student Suite CD-ROM, which now accompanies every new copy of the text, contains the latest versions of commercial software for optimization, simulation, and decision analysis.

Security in Computing


Charles P. Pfleeger - 1988
    In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv

Discovering the Universe [with CD-ROM]


Neil F. Comins - 1984
    The accompanying CD-ROM features a special student version of the award-winning virtual planetarium software Starry Night plus software animations and videos, all illustrations from the text, interactive Q&A and exercises, and supplementary resources. Material can be updated periodically from the Freeman Web site. www.whfreeman.com/astronomy. There is an online study guide offering a CD-Web guide, chapter objectives, key terms, review questions, Starry Night observations exercises and online tutorials.

Essentials of Obstetrics and Gynecology [with PDA Supplement]


Neville F. Hacker - 1986
    The 4th Edition of this bestseller has been completely revised and reorganized to present a more up-to-date approach to the field, with less emphasis on traditional hospital-based practice. It uses the APGO/CREOG curriculum objectives as a framework, with a special emphasis on women's health issues. A new, full-color design with many illustrations and photographs complements the text. Plus, a free downloadable PDA software program provides a complete guide to the most common disorders. The smart way to study Elsevier titles STUDENT CONSULT will help you master difficult concepts and study more efficiently in print and online Perform rapid searches. Integrate bonus content from other disciplines. Download text to your handheld device. And a lot more. Each STUDENT CONSULT title comes with full text online, a unique image library, case studies, USMLE style questions, and online note-taking to enhance your learning experience.

Cryptography and Network Security


Behrouz A. Forouzan - 2007
    In this new first edition, well-known author Behrouz Forouzan uses his accessible writing style and visual approach to simplify the difficult concepts of cryptography and network security. This edition also provides a website that includes Powerpoint files as well as instructor and students solutions manuals. Forouzan presents difficult security topics from the ground up. A gentle introduction to the fundamentals of number theory is provided in the opening chapters, paving the way for the student to move on to more complex security and cryptography topics. Difficult math concepts are organized in appendices at the end of each chapter so that students can first learn the principles, then apply the technical background. Hundreds of examples, as well as fully coded programs, round out a practical, hands-on approach which encourages students to test the material they are learning.

Microsoft Manual of Style


Microsoft Corporation - 2004
    Direct from the Editorial Style Board at Microsoft—you get a comprehensive glossary of both general technology terms and those specific to Microsoft; clear, concise usage and style guidelines with helpful examples and alternatives; guidance on grammar, tone, and voice; and best practices for writing content for the web, optimizing for accessibility, and communicating to a worldwide audience. Fully updated and optimized for ease of use, the Microsoft Manual of Style is designed to help you communicate clearly, consistently, and accurately about technical topics—across a range of audiences and media.

Perl Cookbook


Tom Christiansen - 1998
    Perl Cookbook is a comprehensive collection of problems, solutions, and practical examples for anyone programming in Perl. The book contains hundreds of rigorously reviewed Perl "recipes" and thousands of examples ranging from brief one-liners to complete applications.The second edition of Perl Cookbook has been fully updated for Perl 5.8, with extensive changes for Unicode support, I/O layers, mod_perl, and new technologies that have emerged since the previous edition of the book. Recipes have been updated to include the latest modules. New recipes have been added to every chapter of the book, and some chapters have almost doubled in size.Covered topic areas include: • Manipulating strings, numbers, dates, arrays, and hashes • Pattern matching and text substitutions • References, data structures, objects, and classes • Signals and exceptions • Screen addressing, menus, and graphical applications • Managing other processes • Writing secure scripts • Client-server programming • Internet applications programming with mail, news, ftp, and telnet • CGI and mod_perl programming • Web programmingSince its first release in 1998, Perl Cookbook has earned its place in the libraries of serious Perl users of all levels of expertise by providing practical answers, code examples, and mini-tutorials addressing the challenges that programmers face. Now the second edition of this bestselling book is ready to earn its place among the ranks of favorite Perl books as well.Whether you're a novice or veteran Perl programmer, you'll find Perl Cookbook, 2nd Edition to be one of the most useful books on Perl available. Its comfortable discussion style and accurate attention to detail cover just about any topic you'd want to know about. You can get by without having this book in your library, but once you've tried a few of the recipes, you won't want to.