Management: Leading & Collaborating in the Competitive World


Thomas S. Bateman - 2005
    This text discusses and explains the traditional, functional approach to management, through planning, organising, leading and controlling.

Integrating Educational Technology Into Teaching


Margaret D. Roblyer - 1996
    It shows teachers how to create an environment in which technology can effectively enhance learning. It contains a technology integration framework that builds on research and the TIP model.

Abnormal Psychology: Clinical Perspectives on Psychological Disorders


Richard P. Halgin - 1998
    In Richard Halgin and Susan Krauss Whitbourne’s Abnormal Psychology: Clinical Perspectives on Psychological Disorders, students are shown the human side of Abnormal Psychology. Through the wide

Why You Need to Start Network Marketing: How to Remove Risk and Have a Better Life


Keith Schreiter - 2016
    Discover the real reason why people around the world are adding network marketing to their lives. In this book you will learn: * Why network marketing is a natural thing for us to do. * How to present network marketing so that prospects "get it." * The real power behind our business. * Why jobs are nice, but risky ... and what we can do about it. * How to take a different view of the big picture. * Chances of failure and the absence of guarantees. * Understanding wealth ... and being broke. * The easiest way to spread your message. Short, compact, and to the point. A fast read, and a faster life-changer. Here is your chance to see what others see. Scroll up and get your copy now!

Pass CCRN! [With CDROM]


Robin Donohoe Dennison - 1996
    This book contains a review of critical care nursing and practice questions and answers designed to prepare nurses to earn AACN certification (or renew AACN certification) by passing the required exam. Utilizing an outline format and the revised blueprint for the certification examination, it's the easy to follow, comprehensive and portable, quick-study tool that nurses can take anywhere.

Bash Command Line Pro Tips


Jason Cannon - 2014
     As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of 10 techniques that you can put to use right away to increase your efficiency at the command line. Here is what you will learn by reading Bash Command Line Pro Tips: Tip 1: Tab Completion Tip 2: Change to the Previous Directory Tip 3: Reuse the Last Item from the Previous Command Line Tip 4: Rerun a Command That Starts with a given String Tip 5: Command Substitution Tip 6: Use a for Loop at the Command Line Tip 7: Rerun the Previous Command with Root Privileges Tip 8: Rerun the Previous Command While Substituting a String Tip 9: Reuse a Word on the Same Command Line Tip 10: Fix Typos and Shorten Lengthy Commands with Aliases Scroll up, click the "Buy Now With 1-Click" button to start leaning these powerful Linux Command Line Tips.

The Craft of Scientific Writing


Michael Alley - 1986
    -Emest Hemingway In October 1984, the weak writing in a scientific report made national news. The report, which outlined safety procedures during a nuclear attack, advised industrial workers "to don heavy clothes and immerse themselves in a large body of water. " The logic behind this advice was sound: Water is a good absorber of heat, neutrons, and gamma rays. Unfortunately, the way the advice was worded was unclear. Was everyone supposed to be com- up for air? Be- pletely submerged? Was it safe to come sides being unclear, the writing conveyed the wrong im- pression to the public. The report came across as saying "go jump in a lake"-not the impression you want to give someone spending thousands of dollars to fund your re- search. Chances are that Dan Rather will not quote sentences from your documents on national television, no matter how weak the writing iso Still, your writing is important. On a personal level, your writing is the principal way in which people learn about your work. When you commu- nicate weIl, you receive credit for that work. When you do not communicate weIl or are too slow to communi- cate, the credit often go es to someone else. On a larger level, your writing and the writing of other scientists and vii viii Foreword engineers influenees publie poliey about scienee and en- gineering.

Domain-Driven Design in PHP


Carlos Buenosvinos
    Explore applying the Hexagonal Architecture within your application, whether within an open source framework or your own bespoke system. Finally, look into integrating Bounded Contexts, using REST and Messaging approaches.

Clinician's Thesaurus: The Guide to Conducting Interviews and Writing Psychological Reports


Edward L. Zuckerman - 2010
    More than a giant collection of synonyms, the book includes thousands of useful words, phrases, clinical tips, and interview questions to help practitioners conduct thorough assessments, accurately describe nearly any clinical situation, and shape raw data into effective reports. Updated for compliance with HIPAA privacy regulations, the sixth edition features easier-to-navigate, reorganized contents; numerous additional terms; matched listings for DSM-IV-TR and ICD-9 diagnostic criteria; many helpful website addresses; and much more.

Introductory Linear Algebra: An Applied First Course


Bernard Kolman - 1988
    Calculus is not a prerequisite, although examples and exercises using very basic calculus are included (labeled Calculus Required.) The most technology-friendly text on the market, Introductory Linear Algebra is also the most flexible. By omitting certain sections, instructors can cover the essentials of linear algebra (including eigenvalues and eigenvectors), to show how the computer is used, and to introduce applications of linear algebra in a one-semester course.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Theories of Counseling and Psychotherapy: A Case Approach


Nancy L. Murdock - 2003
    At the beginning each chapter, readers “meet” a new client through a case example. The author then presents the theory’s basic philosophical assumptions; its beliefs about what motivates human behavior; its central constructs; its picture of how humans develop; its ideas about what constitutes mental health and dysfunction; its perspective on how our relationships with those around us impact our functioning; and its view of how our behavior, thoughts, and emotion impact our functioning. Throughout each chapter, the author immediately illustrates the application of a construct or process by showing how it relates to the client case described at the beginning of the chapter, demonstrating the translation of each theory into practice. The second edition includes three new chapters (Chapter 3: Neoanalytic Approaches, Chapter 6: Existential Psychotherapy, Chapter 15: Narrative Therapy) and a companion DVD to accompany the texts. See applications of theory come to life! The Theories in Action DVD illustrates six therapists of different theoretical orientations working with the same client.

Head First EJB


Kathy Sierra - 2003
    As the industry standard for platform-independent reusable business components, EJB has just become Sun Microsystem's latest developer certification. Whether you want to be certifiable or just want to learn the technology inside and out, Head First EJB will get you there in the least painful way. And with the greatest understanding.You'll learn not just what the technology is, but more importantly, why it is, and what it is and isn't good for. You'll learn tricks and tips for EJB development, along with tricks and tips for passing this latest, very challenging Sun Certified Business Component Developer (SCBCD) exam. You'll learn how to think like a server. You'll learn how to think like a bean. And because this is a Head First book, you'll learn how to think about thinking.Co-author Kathy Sierra was one of Sun's first employees to teach brave, early adopter customers how to use EJB. She has the scars. But besides dragging you deep into EJB technology, Kathy and Bert will see you through your certification exam, if you decide to go for it. And nobody knows the certification like they do - they're co-developers of Sun's actual exam!As the second book in the Head First series, Head First EJB follows up the number one best-selling Java book in the US, Head First Java. Find out why reviewers are calling it a revolution in learning tough technical topics, and why Sun Chairman and CEO Scott McNealy says, "Java technology is everywhere...if you develop software and haven't learned Java, it's definitely time to dive in "Head First."And with Head First book, you don't even have to feel guilty about having fun while you're learning; it's all part of the learning theory. If the latest research in cognitive science, education, and neurobiology suggested that boring, dry, and excruciatingly painful was the best way to learn, we'd have done it. Thankfully, it's been shown that your brain has a sense of style, a sense of humour, and a darn good sense of what it likes and dislikes.In Head First EJB, you'll learn all about:Component-based and role-based development The architecture of EJB, distributed programming with RMI Developing and Deploying an EJB application The Client View of a Session and Entity bean The Session Bean Lifecycle and Component Contract The Entity bean Lifecycle and Component Contract Container-managed Persistence (CMP) Container-managed Relationships (CMR) EJB-QL Transactions Security EJB Exceptions The Deployment Descriptor The Enterprise Bean Environment in JNDI Programming Restrictions and PortabilityThe book includes over 200 mock exam questions that match the tone, style, difficulty, and topics on the real SCBCD exam. See why Kathy and Bert are responsible for thousands of successful exam-passers--"The Sun certification exam was certainly no walk in the park, but Kathy's material allowed me to not only pass the exam, but Ace it!" --Mary Whetsel, Sr. Technology Specialist, Application Strategy and Integration, The St. Paul Companies"Kathy Sierra and Bert Bates are two of the few people in the world who can make complicated things seem damn simple, and as if that isn't enough, they can make boring things seem interesting." --Paul Wheaton, The Trail Boss, javaranch.com"Who better to write a Java study guide than Kathy Sierra, reigning queen of Java instruction? Kathy Sierra has done it again. Here is a study guide that almost guarantees you a certification!" --James Cubetta, Systems Engineer, SGI

Test-Driven JavaScript Development


Christian Johansen - 2010
     Test-Driven JavaScript Development is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript developer Christian Johansen covers all aspects of applying state-of-the-art automated testing in JavaScript environments, walking readers through the entire development lifecycle, from project launch to application deployment, and beyond.Using real-life examples driven by unit tests, Johansen shows how to use TDD to gain greater confidence in your code base, so you can fearlessly refactor and build more robust, maintainable, and reliable JavaScript code at lower cost. Throughout, he addresses crucial issues ranging from code design to performance optimization, offering realistic solutions for developers, QA specialists, and testers.Coverage includes - Understanding automated testing and TDD - Building effective automated testing workflows - Testing code for both browsers and servers (using Node.js) - Using TDD to build cleaner APIs, better modularized code, and more robust software - Writing testable code - Using test stubs and mocks to test units in isolation - Continuously improving code through refactoring - Walking through the construction and automated testing of fully functional softwareThe accompanying Web site, tddjs.com, contains all of the book's code listings and additional resources.

The Imperial Japanese Navy in the Pacific War (General Military)


Mark Stille - 2014
    The Imperial Japanese Navy in the Pacific War pulls from many of Osprey's bestselling books on the subject in addition to the most recent research on the subject, including many sources from Japan, and is the most recent and accurate book on this fascinating force.Even after its setback at midway, the IJN remained a powerful force and inflicted sever setbacks on the US Navy at Guadalcanal and elsewhere. The Imperial Japanese Navy focuses on the Japanese ships which fought the battles in the Pacific including design details, where and when they were engaged and their ultimate effectiveness. In addition, the construction, design and service history of each ship from destroyer size on up is included. A comprehensive survey of the submarine force is also included. Modifications of each ship are covered making this a valuable reference source for Pacific War enthusiasts and historians, as well as ship modelers.A short history of the IJN during the Pacific War places all warship design and history in proper context. Finally, a chapter discussing the strengths and weaknesses of the IJN is included ultimately asking the question of whether the IJN really was a modern Navy which was fully prepared for the rigors of combat in the Pacific.