Getting to Know ArcGIS Desktop


Tim Ormsby - 2001
    Key concepts are combined with detailed illustrations and step-by-step exercises to acquaint readers with the building blocks of ArcGIS® Desktop including ArcMap™, for displaying and querying maps, ArcCatalog™, for organizing geographic data, and ModelBuilder™, for diagramming and processing solutions to complex spatial analysis problems. Its broad scope, simple style, and practical orientation make this book an ideal classroom text and an excellent resource for those learning GIS on their own. A data CD for working through the exercises and a fully functioning 180-day trial ArcGIS® Desktop 10 software is included.

Understanding Human Behavior and the Social Environment


Charles Zastrow - 1987
    Now available with a personalized online learning plan, this social work-specific book looks at lifespan through the lens of social work theory and practice. The authors use an empowerment approach to cover human development and behavior theories within the context of family, organizational, and community systems. Using a chronological lifespan approach, the authors present separate chapters on biological, psychological, and social impacts at the different lifespan stages with an emphasis on strengths and empowerment.

Official Dsa Theory Test for Car Drivers


Driving Standards Agency - 2012
    It is written in an easy-to-remember way which links the theory back to your practical driving experience to help you really understand.

Finish Your Dissertation Once and for All!: How to Overcome Psychological Barriers, Get Results, and Move on with Your Life


Alison B. Miller - 2008
    Combining psychological support with a project management approach that breaks tasks into small, manageable chunks, experienced dissertation coach Alison Miller shows you how to overcome negativity and succeed in completing your dissertation beyond your own expectations.

Physics for Scientists and Engineers, Volume 1


Raymond A. Serway - 2003
    However, rather than resting on that reputation, the new edition of this text marks a significant advance in the already excellent quality of the book. While preserving concise language, state of the art educational pedagogy, and top-notch worked examples, the Eighth Edition features a unified art design as well as streamlined and carefully reorganized problem sets that enhance the thoughtful instruction for which Raymond A. Serway and John W. Jewett, Jr. earned their reputations. Likewise, PHYSICS FOR SCIENTISTS AND ENGINEERS, will continue to accompany Enhanced WebAssign in the most integrated text-technology offering available today. In an environment where new Physics texts have appeared with challenging and novel means to teach students, this book exceeds all modern standards of education from the most solid foundation in the Physics market today.

The Standard for Program Management


Project Management Institute - 2006
    This helps to ensure proper metrics are developed so that organizations can successfully manage large and complex programs.

Concrete Mathematics: A Foundation for Computer Science


Ronald L. Graham - 1988
    "More concretely," the authors explain, "it is the controlled manipulation of mathematical formulas, using a collection of techniques for solving problems."

Python Pocket Reference


Mark Lutz - 1998
    Hundreds of thousands of Python developers around the world rely on Python for general-purpose tasks, Internet scripting, systems programming, user interfaces, and product customization. Available on all major computing platforms, including commercial versions of Unix, Linux, Windows, and Mac OS X, Python is portable, powerful and remarkable easy to use.With its convenient, quick-reference format, "Python Pocket Reference," 3rd Edition is the perfect on-the-job reference. More importantly, it's now been refreshed to cover the language's latest release, Python 2.4. For experienced Python developers, this book is a compact toolbox that delivers need-to-know information at the flip of a page. This third edition also includes an easy-lookup index to help developers find answers fast!Python 2.4 is more than just optimization and library enhancements; it's also chock full of bug fixes and upgrades. And these changes are addressed in the "Python Pocket Reference," 3rd Edition. New language features, new and upgraded built-ins, and new and upgraded modules and packages--they're all clarified in detail.The "Python Pocket Reference," 3rd Edition serves as the perfect companion to "Learning Python" and "Programming Python."

Electronic Instrumentation and Measurements


David A. Bell - 1983
    Measurement methods and measurement precision are also covered.

Structure and Interpretation of Computer Programs


Harold Abelson - 1984
    This long-awaited revision contains changes throughout the text. There are new implementations of most of the major programming systems in the book, including the interpreters and compilers, and the authors have incorporated many small changes that reflect their experience teaching the course at MIT since the first edition was published. A new theme has been introduced that emphasizes the central role played by different approaches to dealing with time in computational models: objects with state, concurrent programming, functional programming and lazy evaluation, and nondeterministic programming. There are new example sections on higher-order procedures in graphics and on applications of stream processing in numerical programming, and many new exercises. In addition, all the programs have been reworked to run in any Scheme implementation that adheres to the IEEE standard.

Introduction to Algorithms


Thomas H. Cormen - 1989
    Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.

Los Logos: A Selected LOGO Collection


Nicholas Bourquin - 2002
    Often deceptively simple, the task of a logo is hardly ever an easy one--via extreme reduction it needs to radically and perfectly distill an image or message into a simple, easily recognizable icon.Assembling the works of designers from around the globe this substantial volume contains an incredible wealth of pictorial representations, providing a broad overview of contemporary logo design of cutting edge designers.

Conditioning for Climbers: The Complete Exercise Guide


Eric J. Hörst - 2008
    Good climbers have to build and maintain each of these assets. This is the first-ever book to provide climbers of all ages and experience with the knowledge and tools to design and follow a comprehensive, personalized exercise program. Part One covers the basics of physical conditioning and goal-setting. Part Two takes readers through warm-up and flexibility routines, entry-level strength training, weight loss tips, and fifteen core-conditioning exercises. Part Three details climbing-specific conditioning, with twenty exercises to target specific muscles of the fingers, arms and upper torso to develop power and endurance. An entire chapter focuses on the antagonist muscle groups that help provide balance and stability, and prevent muscle injury. This section also has a chapter devoted to stamina conditioning, increasing the climber's endurance at high altitudes. Part Four shows how to put together a customized training program to suit the climber's needs. The book includes workout sheets for Beginner, Intermediate, and Advanced skill levels, tips for children and those over age fifty, secrets of good nutrition and an insider's take on avoiding injuries. Eric H�rst is a performance coach who has helped thousands of climbers. His published works include Learning to Climb Indoors, Training for Climbing, and How to Climb 5.12. He lives in Lancaster, Pennsylvania.

Managing Risk and Information Security: Protect to Enable


Malcolm Harkins - 2012
    Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologies—such as social media and the huge proliferation of Internet-enabled devices—while minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: “Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context.  Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies.   The book contains eye-opening security insights that are easily understood, even by the curious layman.” Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel     “As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities.” Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) “The mandate of the information security function is being completely rewritten. Unfortunately most heads of security haven’t picked up on the change, impeding their companies’ agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come.” Dr. Jeremy Bergsman, Practice Manager, CEB     “The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing – and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.

Integrating Educational Technology Into Teaching


Margaret D. Roblyer - 1996
    It shows teachers how to create an environment in which technology can effectively enhance learning. It contains a technology integration framework that builds on research and the TIP model.