Clinical Psychopharmacology Made Ridiculously Simple


John D. Preston - 1990
    Pocket-sized text provides an overview of clinical psychopharmacology. Surveys psychotropic medications focusing on diagnostic findings. Discusses medications for depression, bipolar illness, anxiety disorders, psychotic disorders, and cites real-life case examples. Previous edition: c2003. Softcover.Current edition is a 2011 update (i.e. copyright 2011Thanks...John Preston...author

Nikon D3100 for Dummies


Julie Adair King - 2010
    Say you?re already an experienced photographer? The helpful tips and tricks in this friendly book will get you quickly up to speed on the D3100's new 14-megapixel sensor, continous video/live focus, full HD video, expanded autofocus, and more. As a seasoned instructor at the Palm Beach Photographic Center, Julie anticipates all questions, whether you?re a beginner or digital camera pro, and offers pages of easy-to-follow advice.Helps you get every bit of functionality out of the new Nikon D3100 camera Walks you through its exciting new features, including the 14-megapixel sensor, continous video/live focus, full HD video, expanded autofocus, and the updated in-camera menu Explores shooting in Auto mode, managing playback options, and basic troubleshooting Explains how to adjust the camera's manual settings for your own preferred exposure, lighting, focus, and color style Covers digital photo housekeeping tips?how to organize, edit, and share your files Tap all the tools in this hot new DSLR camera and start taking some great pix with Nikon D3100 For Dummies.

Dust: The Archive and Cultural History


Carolyn Steedman - 2001
    Dust: The Archive and Cultural History considers our stubborn set of beliefs about an objective material world inherited from the nineteenth century with which modern history writing and its lack of such a belief, attempts to grapple. Drawing on her own published and unpublished writing, Carolyn Steedman has produced a sustained argument about the way in which history writing belongs to the currents of thought shaping the modern world.Steedman begins by asserting that in recent years much attention has been paid to the archive by those working in the humanities and social sciences; she calls this practice "archivization." By definition, the archive is the repository of "that which will not go away," and the book goes on to suggest that, just like dust, the "matter of history" can never go away or be erased.This unique work will be welcomed by all historians who want to think about what it is they do.

The Leadership Contract: The Fine Print to Becoming a Great Leader


Vince Molinaro - 2013
    How can we ever get our organizations to succeed if so few employees believe in their senior leaders? The Leadership Contract explains why leadership, and specifically leadership culture, is the only real differentiator between the organizations that thrive and those that fall behind. This book explains how to establish a leadership contract that is fully understood and agreed upon by business leaders to ensure the success of their company.The book lays out the four terms and conditions of the leadership contract and enlists leaders in making a conscious decision to lead, including the understanding that leadership is a decision, entails an obligation, is difficult, and requires a community.Designed for top-level executives, mid-level managers, front-line leaders, and emerging leaders, the book identifies the shortcomings of current leadership methods and explains how to adopt new policies and mentalities to make you a better leader and ensure business success Author Vince Molinaro, Ph.D., CMC is the author of two successful books, Leadership Solutions and The Leadership Gap and is also a Certified Management Consultant Create the contract that ensures your leadership will take your organization to new heights.

Using Information Technology


Brian K. Williams - 1990
    This text is user-focused and has been highly updated including topics, pictures and examples. The Williams text contains less theory and more application to engage students who might be more familiar with technology. Continually published and updated for over 15 years, Using Information Technology was the first text to foresee and define the impact of digital convergence--the fusion of computers and communications. It was also the first text to acknowledge the new priorities imposed by the Internet and World Wide Web and bring discussion of them from late in the course to the beginning. Today, it is directed toward the "Always On" generation that is at ease with digital technology--comfortable with iPhones, MySpace, Facebook, Twitter, Wikipedia, and the blogosphere--but not always savvy about its processes, possibilities, and liabilities. This 8th edition continues to address the two most significant challenges that instructors face in teaching this course: -Trying to make the course interesting and challenging, and -Trying to teach to students with a variety of computer backgrounds. In addition, this text correlates with Simnet Online for full integration of resources within the Computing Concepts course.

Meggs' History of Graphic Design


Philip B. Meggs - 1983
    Under the new authorial leadership of Alston Purvis, this authoritative book offers more than 450 new images, along with expansive coverage of such topics as Italian, Russian, and Dutch design. It reveals a saga of creative innovators, breakthrough technologies, and important design innovations.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

On Book Design


Richard Hendel - 1998
    They consider the problems posed by a wide range of projects—selection of a book’s size and shape, choice of typeface for text and display, arrangement of type on the page, and determination of typographic details for all parts of the book within manufacturing and budget limitations.As omnipresent as books are, few readers are aware of the “invisible” craft of book designing. The task a book designer faces is different from that faced by other designers. The challenge, says Hendel, isn’t to create something different or pretty or clever but to discover how to best serve the author’s words. Hendel does not espouse a single philosophy of design or offer a set of instructions; he shows that there are many ways to design a book. In detailed descriptions of the creative process, Hendel and the eight other designers, who represent extensive experience in trade and scholarly publishing in the United States and Great Britain, show how they achieve the most effective visual presentation of words, offering many examples to illustrate their choices. Written not only for seasoned and novice book designers, this book will fascinate others in publishing as well as all readers and authors who are curious to know how books end up looking the way they do.

Information Dashboard Design: The Effective Visual Communication of Data


Stephen Few - 2006
    Although dashboards are potentially powerful, this potential is rarely realized. The greatest display technology in the world won't solve this if you fail to use effective visual design. And if a dashboard fails to tell you precisely what you need to know in an instant, you'll never use it, even if it's filled with cute gauges, meters, and traffic lights. Don't let your investment in dashboard technology go to waste.This book will teach you the visual design skills you need to create dashboards that communicate clearly, rapidly, and compellingly. Information Dashboard Design will explain how to:Avoid the thirteen mistakes common to dashboard design Provide viewers with the information they need quickly and clearly Apply what we now know about visual perception to the visual presentation of information Minimize distractions, cliches, and unnecessary embellishments that create confusion Organize business information to support meaning and usability Create an aesthetically pleasing viewing experience Maintain consistency of design to provide accurate interpretation Optimize the power of dashboard technology by pairing it with visual effectiveness Stephen Few has over 20 years of experience as an IT innovator, consultant, and educator. As Principal of the consultancy Perceptual Edge, Stephen focuses on data visualization for analyzing and communicating quantitative business information. He provides consulting and training services, speaks frequently at conferences, and teaches in the MBA program at the University of California in Berkeley. He is also the author of Show Me the Numbers: Designing Tables and Graphs to Enlighten. Visit his website at www.perceptualedge.com.

Bound by Law?: Tales from the Public Domain


Keith Aoki - 2006
    A cell phone rings, playing the "Rocky" theme song. The filmmaker is told she must pay $10,000 to clear the rights to the song. Can this be true? "Eyes on the Prize", the great civil rights documentary, was pulled from circulation because the filmmakers' rights to music and footage had expired. What's going on here? It's the collision of documentary filmmaking and intellectual property law, and it's the inspiration for this comic book. Follow its heroine Akiko as she films her documentary, and navigates the twists and turns of intellectual property. Why do we have copyrights? What's "fair use"? Bound By Law reaches beyond documentary film to provide a commentary on the most pressing issues facing law, art, property and an increasingly digital world of remixed culture.

CISSP Study Guide


Eric Conrad - 2010
    The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.

Lifetypes


Sandra Krebs Hirsh - 1989
    Based on the Myers-Briggs personality test, this guide will help readers develop a complete, accurate psychological self-portrait and show them how to achieve success in life.

Think Python


Allen B. Downey - 2002
    It covers the basics of computer programming, including variables and values, functions, conditionals and control flow, program development and debugging. Later chapters cover basic algorithms and data structures.

Writing Papers in the Biological Sciences


Victoria E. McMillan - 1996
    Designed primarily for undergraduates, this self-help manual offers straightforward solutions to common problems and an overview of the diversity of writing tasks faced by professional biologists.

Unicorns Are Real: A Right-Brained Approach to Learning


Barbara Meister Vitale - 1982
    These simple yet dramatically effective ideas and activities have helped thousands with learning difficulties. Includes an easy-to-administer screening checklist for parents and teachers which enables them identify individual learning preferences and determine hemisphere dominance. Learn how to utilize colors, shapes, movement, visualizations, touch and sound to help students of all ages learn to read, tell time, add, subtract, and even spell correctly. Included are engaging instructional activities that draw on the intuitive, nonverbal abilities of the right brain, a list of skills associated with each brain hemisphere, and much more.