Physics, Volume 1


Robert Resnick - 1966
    The Fourth Edition of volumes 1 and 2 is concerned with mechanics and E&M/Optics. New features include: expanded coverage of classic physics topics, substantial increases in the number of in-text examples which reinforce text exposition, the latest pedagogical and technical advances in the field, numerical analysis, computer-generated graphics, computer projects and much more.

The Student's Guide to Cognitive Neuroscience


Jamie Ward - 2006
    Following an introduction to neural structure and function, all the key methods and procedures of cognitive neuroscience are explained, with a view to helping students understand how they can be used to shed light on the neural basis of cognition.The second part of the book goes on to present an up-to-date overview of the latest theories and findings in all the key topics in cognitive neuroscience, including vision, attention, memory, speech and language, numeracy, executive function and social and emotional behaviour. Throughout, case studies, newspaper reports and everyday examples are used to provide an easy way in to understanding the more challenging ideas that underpin the subject.In addition each chapter includes:Summaries of key terms and points Example essay questions to aid exam preparation Recommended further reading Feature boxes exploring interesting and popular questions and their implications for the subject.Written in an engaging style by a leading researcher in the field, this book will be invaluable as a core text for undergraduate modules in cognitive neuroscience. It can also be used as a key text on courses in cognition, cognitive neuropsychology or brain and behaviour. Those embarking on research will find it an invaluable starting point and reference.We offer CD-ROM-based resources free of charge to instructors who recommend The Student's Guide to Cognitive Neuroscience by Jamie Ward. These resources include:A chapter-by-chapter, illustrated slideshow lecture course An innovative bank of multiple-choice questions, graded according to difficulty and which allow for confidence-weighted answers Comprehensive lecture planning advice tailored to different length courses.Jamie Ward has researched and taught extensively in many areas of cognitive neuroscience. He is a leading authority on the subject of synaesthesia and has contributed to a wider understanding of it in both academic and lay circles.

Information Theory: A Tutorial Introduction


James V. Stone - 2015
    In this richly illustrated book, accessible examples are used to show how information theory can be understood in terms of everyday games like '20 Questions', and the simple MatLab programs provided give hands-on experience of information theory in action. Written in a tutorial style, with a comprehensive glossary, this text represents an ideal primer for novices who wish to become familiar with the basic principles of information theory.Download chapter 1 from http://jim-stone.staff.shef.ac.uk/Boo...

Psychology: From Inquiry to Understanding


Scott O. Lilienfeld - 2007
    By encouraging students to question, and teaching students how to test their assumptions, Lilienfeld motivates students to use scientific thinking skills to better understand the complex world of psychology.

Computer Organization


V. Carl Hamacher - 1978
    *A comprehensive overview of hardware and software issues make this a "must-have" for electrical and computer engineers*Contains new material on RISC processors, performance analysis, multiprocessors and memory systems*New two-color design and illustrations illuminate the text

Mostly Harmless Econometrics: An Empiricist's Companion


Joshua D. Angrist - 2008
    In the modern experimentalist paradigm, these techniques address clear causal questions such as: Do smaller classes increase learning? Should wife batterers be arrested? How much does education raise wages? Mostly Harmless Econometrics shows how the basic tools of applied econometrics allow the data to speak.In addition to econometric essentials, Mostly Harmless Econometrics covers important new extensions--regression-discontinuity designs and quantile regression--as well as how to get standard errors right. Joshua Angrist and Jorn-Steffen Pischke explain why fancier econometric techniques are typically unnecessary and even dangerous. The applied econometric methods emphasized in this book are easy to use and relevant for many areas of contemporary social science.An irreverent review of econometric essentials A focus on tools that applied researchers use most Chapters on regression-discontinuity designs, quantile regression, and standard errors Many empirical examples A clear and concise resource with wide applications

Internet & World Wide Web: How to Program


Paul Deitel - 1999
    Internet and World Wide Web How to Program, 4e introduces students with little or no programming experience to the exciting world of Web-Based applications. The book has been substantially revised to reflect today's Web 2.0 rich Internet application-development methodologies. A comprehensive book that teaches the fundamentals needed to program on the Internet, this text provides in-depth coverage of introductory programmming principles, various markup languages (XHTML, Dynamic HTML and XML), several scripting languages (JavaScript, PHP, Ruby/Ruby on Rails and Perl); AJAX, web services, Web Servers (IIS and Apache) and relational databases (MySQL/Apache Derby/Java DB) -- all the skills and tools needed to create dynamic Web-based applications. The text contains comprehensive introductions to ASP.NET 2.0 and JavaServer Faces (JSF). Hundreds of live-code examples of real applications throughout the book available for download allow readers to run the applications and see and hear the outputs.The book provides instruction on building Ajax-enabled rich Internet applications that enhance the presentation of online content and give web applications the look and feel of desktop applications. The chapter on Web 2.0 and Internet business exposes readers to a wide range of other topics associated with Web 2.0 applications and businesses After mastering the material in this book, students will be well prepared to build real-world, industrial strength, Web-based applications.

Introduction to Probability


Joseph K. Blitzstein - 2014
    The book explores a wide variety of applications and examples, ranging from coincidences and paradoxes to Google PageRank and Markov chain Monte Carlo MCMC. Additional application areas explored include genetics, medicine, computer science, and information theory. The print book version includes a code that provides free access to an eBook version. The authors present the material in an accessible style and motivate concepts using real-world examples. Throughout, they use stories to uncover connections between the fundamental distributions in statistics and conditioning to reduce complicated problems to manageable pieces. The book includes many intuitive explanations, diagrams, and practice problems. Each chapter ends with a section showing how to perform relevant simulations and calculations in R, a free statistical software environment.

Applied Cryptography: Protocols, Algorithms, and Source Code in C


Bruce Schneier - 1993
    … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

Janeway's Immunobiology


Kenneth M. Murphy - 2007
    The Eighth Edition has been thoroughly revised and updated and is available in both print and e-book formats.Janeway s Immunobiology continues to set the standard for currency and authority with its clear writing style and organization, uniform art program, and scientific accuracy. It presents a consistent point of view throughout that of the host s interaction with an environment containing many species of potentially harmful microorganisms. The full-color art program is conceptually coherent and illustrates the processes and mechanisms underlying the concepts in the text. The 16 chapters in this readable, accessible textbook are organized and presented in such a way as to help deliver a complete one-semester immunology course, beginning with innate immunity, then moving to adaptive immunity, and ending with applied clinical immunology.Discussion questions are provided at the end of Chapters 2 to 16. These questions can be used for review, or as the basis for discussion in class or in informal study groups. Summaries conclude each section and each chapter. As in previous editions, a caduceus icon in the margins indicates topics which are correlated to Case Studies in Immunology, Sixth Edition by Geha and Notarangelo.New in the Eighth EditionInnate immunity has been updated and expanded and is now presented in two separate chapters (Chapters 2 and 3), as well as being further emphasized in the rest of the textbook. Chapter 2 covers antimicrobial peptides and the complement system, and Chapter 3 deals with cellular innate receptors and cell-mediated innate immunity (e.g. TLRs, phagocytosis, NK cells, interferon production, innate-like lymphocytes). The section on complement has been reworked and reconceived explaining the lectin pathway first making it easier to teach by placing it into the context of innate recognition. Evolution is now incorporated throughout the text, helping students see similar strategies used by different organisms. The text and figures of Chapter 7 Signaling Through Immune System Receptors have been revised to present a cohesive synthesis of signaling for immunology, focusing on improved illustration of antigen recognition signaling and lymphocyte activation. Signaling through other receptors is dealt with wherever appropriate throughout the book. Updated chapter on B-cell immune responses (Chapter 10), especially on trafficking of B cells in peripheral lymphoid organs (e.g. lymph nodes) and the locations at which they encounter antigen. Coverage of mucosal immunity (Chapter 12) has been brought up to date, including responses to the commensal microbiota and the role of specialized dendritic cells and the regulatory T cells in maintaining tolerance to food antigens and commensal bacteria. Chapter 13, Failures of Host Defense Mechanisms, has been reorganized and revised to structure an understanding of primary immunodeficiencies in the context of developmental pathways. Chapter 16, Manipulation of the Immune Response, has been heavily revised to include a greater emphasis on clinical issues and a complete update of immunotherapeutics and vaccines. Many new and revised figures illustrate the processes and mechanisms underlying the concepts presented in the text. The icons used have been updated and expanded to incorporate a new emphasis on signaling pathways. New references have been added throughout the text.

Cracking the GMAT 2008 [with DVD]


The Princeton Review - 1996
    We also bring you over 200 practice questions in the book and exclusive free access to 4 practice exams and expert advice online. Of course, you'll also get all the test-prep techniques you expect from The Princeton Review. In Cracking the GMAT, we'll teach you how to think like the test writers and ·Solve complex sentence correction problems by recognizing key errors·Crack tough data sufficiency questions using simple techniques·Practice online with full-length tests, lessons, and drills ·Get the most out of your prep time with the study plan that's right for youWe give you plenty of practice problems to help you master our proven techniques. Our practice questions are just like those you'll see on the real GMAT--but with detailed answers and explanations for every question.

Introduction to Error Analysis: The Study of Uncertainties in Physical Measurements


John R. Taylor - 1982
    It is designed as a reference for students in the physical sciences and engineering.

UNIX and Linux System Administration Handbook


Evi Nemeth - 2010
    This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against." -From the Foreword by Tim O'Reilly, founder of O'Reilly Media "This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems' history but doesn't bloviate. It's just straightfoward information delivered in colorful and memorable fashion." -Jason A. Nunnelley"This is a comprehensive guide to the care and feeding of UNIX and Linux systems. The authors present the facts along with seasoned advice and real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." -Pat Parseghian The twentieth anniversary edition of the world's best-selling UNIX system administration book has been made even better by adding coverage of the leading Linux distributions: Ubuntu, openSUSE, and RHEL. This book approaches system administration in a practical way and is an invaluable reference for both new administrators and experienced professionals. It details best practices for every facet of system administration, including storage management, network design and administration, email, web hosting, scripting, software configuration management, performance analysis, Windows interoperability, virtualization, DNS, security, management of IT service organizations, and much more. UNIX(R) and Linux(R) System Administration Handbook, Fourth Edition, reflects the current versions of these operating systems: Ubuntu(R) LinuxopenSUSE(R) LinuxRed Hat(R) Enterprise Linux(R)Oracle America(R) Solaris(TM) (formerly Sun Solaris)HP HP-UX(R)IBM AIX(R)

ServSafe Coursebook [with Answer Sheet]


National Restaurant Association - 2001
    It is the ideal solution for the academic setting, multiple-day training, or individuals in need of more extensive food safety training. Food safety has never been more important to the restaurant industry and its customers. Based on the "2013""FDA Food Code, " the "ServSafe Coursebook" focuses on the preventative measures to keep food safe. The content in the "ServSafe Coursebook" goes beyond the principles found in the "ServSafe""Manager Book" and adds greater depth and breadth of food safety practices by featuring expanded sections on food defense, high-risk populations, active managerial control, and crisis management. Food safety topics are presented in a user-friendly, practical way with more real-world case studies and stories to help readers understand the day-to-day importance of food safety. Developed by the industry, for the industry, ServSafe(R) is a proven way to minimize risk and maximize protection for foodservice owners, employees, and customers. Recognized as the industry standard, ServSafe offers a complete suite of printed and online products and is the most important ingredient to food safety training and certification success. The "ServSafe Coursebook" is available packaged with MyServSafeLab(TM). MyServSafeLab is an online homework, tutorial, and assessment program that truly engages students in learning. It helps students better prepare for class, quizzes, and exams-resulting in better performance in the course-and provides educators a dynamic set of tools for gauging individual and class progress. The "ServSafe Coursebook" 6th Edition is available packaged in a number of ways to suit your specific needs. ISBN: 0133883507 is a package containing the book and the answer sheet for the pencil/paper version of the ServSafe Food Protection Manager exam" ServSafe Coursebook with Answer Sheet 6th Edition " Also available: Stand-alone book: "ServSafe Coursebook "6th Edition ISBN: 0133883604A package containing the book, the answer sheet for the pencil/paper version of the ServSafe Food Protection Manager exam, AND MyServSafeLab with Pearson eText Access Card: " ServSafe Coursebook with Answer Sheet, Revised Plus NEW MyServSafeLab with Pearson eText -- Access Card Package, "6/e ISBN: 0133962733A package containing the book and online exam voucher: "ServSafe Coursebook with Online Exam Voucher 6th Edition "ISBN: 0133883515A package containing the book, online exam voucher, AND MyServSafeLab with Pearson eText Access Card: "ServSafe Coursebook with Online Exam Voucher, Revised Plus NEW MyServSafeLab with Pearson eText -- Access Card Package, 6/e "ISBN: 0133962725Students, if interested in purchasing this title with MyServSafeLab, ask your instructor for the correct package ISBN. MyServSafeLab is not a self-paced technology and should only be purchased when required by an instructor. Instructors, contact your Pearson representative for more information.

Automate the Boring Stuff with Python: Practical Programming for Total Beginners


Al Sweigart - 2014
    But what if you could have your computer do them for you?In "Automate the Boring Stuff with Python," you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand no prior programming experience required. Once you've mastered the basics of programming, you'll create Python programs that effortlessly perform useful and impressive feats of automation to: Search for text in a file or across multiple filesCreate, update, move, and rename files and foldersSearch the Web and download online contentUpdate and format data in Excel spreadsheets of any sizeSplit, merge, watermark, and encrypt PDFsSend reminder emails and text notificationsFill out online formsStep-by-step instructions walk you through each program, and practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks.Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in "Automate the Boring Stuff with Python.""