The Pause Principle: Step Back to Lead Forward


Kevin Cashman - 2012
    Pub Date :2012-09-24 Pages: 192 Language: English Publisher: Berrett-Koehler Publishers Nearly all of us experience the suffering of overwork. over-stimulation. overachievement and hyper-expectation We are asked to do more with less. . but where is the energy and capacity going to come from Rather than doing more. we need to learn to do differently in order to achieve. We need to slow down to go fast. step back to energize. take a breath to connect with presence . and look at the same situations with fresh. innovative thinking. Otherwise we will continue to crash economically. personally. and collectively. In todays dynamic world. Pause will become the new transformative principle. the catalyst for purpose-filled innovation and renewal. More than just a work or philosophy or spirituality. The Pause Principle provides real tools and practices to make pausing a part...

Modern Operating Systems


Andrew S. Tanenbaum - 1992
    What makes an operating system modern? According to author Andrew Tanenbaum, it is the awareness of high-demand computer applications--primarily in the areas of multimedia, parallel and distributed computing, and security. The development of faster and more advanced hardware has driven progress in software, including enhancements to the operating system. It is one thing to run an old operating system on current hardware, and another to effectively leverage current hardware to best serve modern software applications. If you don't believe it, install Windows 3.0 on a modern PC and try surfing the Internet or burning a CD. Readers familiar with Tanenbaum's previous text, Operating Systems, know the author is a great proponent of simple design and hands-on experimentation. His earlier book came bundled with the source code for an operating system called Minux, a simple variant of Unix and the platform used by Linus Torvalds to develop Linux. Although this book does not come with any source code, he illustrates many of his points with code fragments (C, usually with Unix system calls). The first half of Modern Operating Systems focuses on traditional operating systems concepts: processes, deadlocks, memory management, I/O, and file systems. There is nothing groundbreaking in these early chapters, but all topics are well covered, each including sections on current research and a set of student problems. It is enlightening to read Tanenbaum's explanations of the design decisions made by past operating systems gurus, including his view that additional research on the problem of deadlocks is impractical except for "keeping otherwise unemployed graph theorists off the streets." It is the second half of the book that differentiates itself from older operating systems texts. Here, each chapter describes an element of what constitutes a modern operating system--awareness of multimedia applications, multiple processors, computer networks, and a high level of security. The chapter on multimedia functionality focuses on such features as handling massive files and providing video-on-demand. Included in the discussion on multiprocessor platforms are clustered computers and distributed computing. Finally, the importance of security is discussed--a lively enumeration of the scores of ways operating systems can be vulnerable to attack, from password security to computer viruses and Internet worms. Included at the end of the book are case studies of two popular operating systems: Unix/Linux and Windows 2000. There is a bias toward the Unix/Linux approach, not surprising given the author's experience and academic bent, but this bias does not detract from Tanenbaum's analysis. Both operating systems are dissected, describing how each implements processes, file systems, memory management, and other operating system fundamentals. Tanenbaum's mantra is simple, accessible operating system design. Given that modern operating systems have extensive features, he is forced to reconcile physical size with simplicity. Toward this end, he makes frequent references to the Frederick Brooks classic The Mythical Man-Month for wisdom on managing large, complex software development projects. He finds both Windows 2000 and Unix/Linux guilty of being too complicated--with a particular skewering of Windows 2000 and its "mammoth Win32 API." A primary culprit is the attempt to make operating systems more "user-friendly," which Tanenbaum views as an excuse for bloated code. The solution is to have smart people, the smallest possible team, and well-defined interactions between various operating systems components. Future operating system design will benefit if the advice in this book is taken to heart. --Pete Ostenson

Investigating the Social World: The Process and Practice of Research


Russell K. Schutt - 1995
    In this new Seventh Edition of his perennially successful social research text, author Russell K. Schutt continues to make research come alive through stories that illustrate the methods presented in each chapter, and hands-on exercises that help students learn by doing. Investigating the Social World helps readers understand research methods as an integrated whole, appreciate the value of both qualitative and quantitative methodologies, and understand the need to make ethical research decisions. New to this Edition: * upgraded coverage of research methods to include the spread of cell phones and the use of the Internet, including expanded coverage of Web surveys * larger page size in full color allows for better display of pedagogical features * new 'Research in the News' boxes included within chapters * more international examples * expanded statistics coverage now includes more coverage of inferenctial statistics and regression analysi

Introduction to Algorithms


Thomas H. Cormen - 1989
    Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.

Sentence Composing for High School: A Worktext on Sentence Variety and Maturity


Don Killgallon - 1998
    In this expanded series, Killgallon presents the same proven methodology but offers all-new writing exercises for middle school, high school, and college students.Unlike traditional grammar books that emphasize sentence analysis, these worktexts asks students to imitate the sentence styles of professional writers, making the sentence composing process enjoyable and challenging. Killgallon teaches subliminally, nontechnically-the ways real writers compose their sentences, the ways students subsequently intuit within their own writing.Designed to produce sentence maturity and variety, the worktexts offer extensive practice in four sentence-manipulating techniques: sentence unscrambling, sentence imitating, sentence combining, and sentence expanding. It's demonstrably true that Sentence Composing can work anywhere--in any school, with any student.

OCA Java SE 7 Programmer I Certification Guide: Prepare for the 1ZO-803 exam


Mala Gupta - 2012
    You'll explore a wide range of important Java topics as you systematically learn how to pass the certification exam. Each chapter starts with a list of the exam objectives covered in that chapter. You'll find sample questions and exercises designed to reinforce key concepts and to prepare you for what you'll see in the real exam, along with numerous tips, notes, and visual aids throughout the book.About This BookTo earn the OCA Java SE 7 Programmer Certification, you need to know your Java inside and out, and to pass the exam it's good to understand the test itself. This book cracks open the questions, exercises, and expectations you'll face on the OCA exam so you'll be ready and confident on test day.OCA Java SE 7 Programmer I Certification Guide is a comprehensive guide to the 1Z0-803 exam. You'll explore important Java topics as you systematically learn what is required. Each chapter starts with a list of exam objectives, followed by sample questions and exercises designed to reinforce key concepts. It provides multiple ways to digest important techniques and concepts, including analogies, diagrams, flowcharts, and lots of well-commented code.Written for developers with a working knowledge of Java who want to earn the OCA Java SE 7 Programmer I Certification.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideCovers all exam topicsHands-on coding exercisesHow to avoid built-in traps and pitfallsAbout the AuthorMala Gupta has been training programmers to pass Java certification exams since 2006. She holds OCA Java SE7 Programmer I, SCWCD, and SCJP certifications.Table of ContentsIntroductionJava basicsWorking with Java data typesMethods and encapsulationString, StringBuilder, Arrays, and ArrayListFlow controlWorking with inheritanceException handlingFull mock exam

Keepin' It Real: School Success Beyond Black and White


Prudence L. Carter - 2005
    In Keepin' It Real: School Success beyond Black and White, Prudence Carter turns the conventional wisdom on its head arguing that what is needed is a broader recognition of the unique cultural styles and practices that non-white students bring to the classroom. Based on extensive interviews and surveys of students in New York, she demonstrates that the most successful negotiators of our school systems are the multicultural navigators, culturally savvy teens who draw from multiple traditions, whether it be knowledge of hip hop or of classical music, to achieve their high ambitions. Keepin' it Real refutes the common wisdom about teenage behavior and racial difference, and shows how intercultural communication, rather than assimilation, can help close the black-white gap.

Social Research Methods: Quantitative and Qualitative Approaches


W. Lawrence Neuman - 1991
    It provides dozens of new examples from actual research studies are used to provide illustrations of concepts and methods. Key terms are now called out and defined in boxes at the bottom of the pages where they appear, for easier study and review. In chapter 1, there are now separate descriptions and examples of the steps in the research process for quantitative and qualitative approaches, to underscore some of the fundamental differences. Chapter 2 has new discussions of participatory action research, instrumental and reflexive knowledge, the various audiences for social research findings, and researcher autonomy when research is commissioned. The discussion of social theories in Chapter 3 now covers levels of abstraction, and relationships among concepts

Race, Class, & Gender: An Anthology


Margaret L. Andersen - 1992
    The author's selection of very accessible articles show how race, class, and gender shape people's experiences, and help students to see the issues in an analytic, as well as descriptive way. The book also provides conceptual grounding in understanding race, class, and gender; has a strong historical and sociological perspective; and is further strengthened by conceptual introductions by the authors.Students will find the readings engaging and accessible, but may gain the most from the introduction sections that highlight key points and relate the essential concepts. Included in the collection of readings are narratives aimed at building empathy, and articles on important social issues such as prison, affirmative action, poverty, immigration, and racism, among other topics.IncludesWhy race, class, and gender still matter by M.L. Andersen and P.H. CollinsMissing people and others, joining together to expand the circle by A. MadridSystems of power and inequality by M.L. Andersen and P.H. CollinsRace and racism, Racism without "racists" by E. Bonilla-SilvaClass and inequality, Growing gulf between rich and the rest of us by H. SklarGender and sexism, Sex and gender through the prism of difference by M.B. Zinn, P. Hondahneu-Sotelo, and M. MessnerEthnicity and nationality, Is this a white country, or what? by L. RubinSexuality and heterosexism, "You talkin' to me?" by J. KilbourneStructure of social institutions by M.L. Andersen and P.H. CollinsWork and economic transformation, Race, class, gender, and women's works by T. Amott and J. MatthaeiFamilies, Our mothers' grief, racial-ethnic women and the maintenance of families by B.T. DillMedia and culture, Racist stereotyping in the English language by R.B. MooreHealth and social welfare, Can education eliminate race, class, and gender inequality? by R.A. Mickelson and S.S. SmithState institutions and violence, First Americans, American Indians by C.M. SnippSocial change and sites of change by M.L. Andersen and P.H. CollinsSites of change, Starbucks paradox by K. FellnerProcesses of change, How the new working class transform urban America by R.D.G. Kelley

Compilers: Principles, Techniques, and Tools


Alfred V. Aho - 1986
    The authors present updated coverage of compilers based on research and techniques that have been developed in the field over the past few years. The book provides a thorough introduction to compiler design and covers topics such as context-free grammars, fine state machines, and syntax-directed translation.

Applied Cryptography: Protocols, Algorithms, and Source Code in C


Bruce Schneier - 1993
    … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations

Bleeding Talent: How the US Military Mismanages Great Leaders and Why It's Time for a Revolution


Tim Kane - 2012
    The first part recognizes, indeed celebrates, what the military has done well in attracting and developing leadership talent. The book then examines the causes and consequences of the modern military's stifling personnel system, with a close look at strategic failures in Iraq and Afghanistan. The book also reports a new survey of active duty officers (done by the author) that reports what is driving the best and brightest to leave the service in frustration. Solutions round out the book, grounded in an economic emphasis on market forces.

The Paper Mill Girl


Glenda Young - 2020
    

The Devil's Advocate


Iain Morley - 2005
    Written in a humorous and engaging style, this pocket-sized ready-reckoner is easy to read with the text presented in easily absorbable sections. The author steers the reader through the key principles and practical applications of advocacy, step by step in a clear and logical manner.

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).