Instructional Technology and Media for Learning


Sharon E. Smaldino - 1999
    This unique case-based text places the reader squarely in the classroom while providing a framework that teaches readers to apply in-depth coverage of current and future computer, multimedia, Internet/intranet, distance learning, and audio/visual technologies to classroom instruction. Don't just read about technology integration - experience it! In addition to its' unique case-based approach the new edition now includes a new ASSURE Learning in Action DVD. This dvd, located in every copy of the text, provides current video of today's teachers using technology and media to improve learning for students across grade levels and content areas, rubric templates, a lesson plan builder, and skill-builder activites.

Starting Out with Java: From Control Structures Through Objects


Tony Gaddis - 2009
    If you wouldlike to purchase both the physical text and MyProgrammingLab search for ISBN-10: 0132989999/ISBN-13: 9780132989992. That packageincludes ISBN-10: 0132855836/ISBN-13: 9780132855839 and ISBN-10: 0132891557/ISBN-13: 9780132891554. MyProgrammingLab should only be purchased when required by an instructor. In "Starting Out with Java: From Control Structures through Objects", Gaddis covers procedural programming control structures and methods before introducing object-oriented programming. As with all Gaddis texts, clear and easy-to-read code listings, concise and practical real-world examples, and an abundance of exercises appear in every chapter. "

Tubes: A Journey to the Center of the Internet


Andrew Blum - 2012
    But what is it physically? And where is it really? Our mental map of the network is as blank as the map of the ocean that Columbus carried on his first Atlantic voyage. The Internet, its material nuts and bolts, is an unexplored territory. Until now.In Tubes, journalist Andrew Blum goes inside the Internet's physical infrastructure and flips on the lights, revealing an utterly fresh look at the online world we think we know. It is a shockingly tactile realm of unmarked compounds, populated by a special caste of engineer who pieces together our networks by hand; where glass fibers pulse with light and creaky telegraph buildings, tortuously rewired, become communication hubs once again. From the room in Los Angeles where the Internet first flickered to life to the caverns beneath Manhattan where new fiber-optic cable is buried; from the coast of Portugal, where a ten-thousand-mile undersea cable just two thumbs wide connects Europe and Africa, to the wilds of the Pacific Northwest, where Google, Microsoft, and Facebook have built monumental data centers—Blum chronicles the dramatic story of the Internet's development, explains how it all works, and takes the first-ever in-depth look inside its hidden monuments.This is a book about real places on the map: their sounds and smells, their storied pasts, their physical details, and the people who live there. For all the talk of the "placelessness" of our digital age, the Internet is as fixed in real, physical spaces as the railroad or telephone. You can map it and touch it, and you can visit it. Is the Internet in fact "a series of tubes" as Ted Stevens, the late senator from Alaska, once famously described it? How can we know the Internet's possibilities if we don't know its parts?Like Tracy Kidder's classic The Soul of a New Machine or Tom Vanderbilt's recent bestseller Traffic, Tubes combines on-the-ground reporting and lucid explanation into an engaging, mind-bending narrative to help us understand the physical world that underlies our digital lives.

Subjects Matter: Exceeding Standards Through Powerful Content-Area Reading


Harvey Daniels - 2014
    This book is about making those encounters as compelling as we can make them." -Harvey "Smokey" Daniels and Steven ZemelmanWe are specialists to the bone-in science, math, social studies, art, music, business, and foreign language. But now, the Common Core and state standards require us to help our students better understand the distinctive texts in our subject areas. "Nobody's making us into reading teachers," write Smokey Daniels and Steve Zemelman, "but we must become teachers of disciplinary thinking through our students' reading."If this shift sounds like a tough one, Subjects Matter, Second Edition is your solution. Smokey and Steve, two of America's most popular educators, share exactly what you need to help students read your nonfiction content closely and strategically: 27 proven teaching strategies that help meet-and exceed-the standards how-to suggestions for engaging kids with content through wide, real-world reading a lively look at using "boring" textbooks motivating instruction that's powered by student collaboration specifics for helping struggling readers succeed.Subjects Matter, Second Edition enables deep, thoughtful learning for your students, while keeping the irreverent, inspiring heart that's made the first edition indispensable. You'll discover fresh and re-energized lessons, completely updated research, and vibrant vignettes from new colleagues and old friends who have as much passion for their subjects as you do."We'll be using methods particular to our fields as well as engaging reading materials that help students understand and remember our content better," write Smokey and Steve. "We can realize that vision of the light going on in kids' heads and maybe fill them with enthusiasm about the amazing subject matter that we have to offer. Sound good? Let's get to work." Read a sample chapter from Subjects Matter, Second Edition.

Access 2007: The Missing Manual


Matthew MacDonald - 2006
    It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Criminal Law


Joel Samaha - 2007
    With a balanced blend of case excerpts and author commentary, Samaha guides you as you hone your critical thinking and legal analysis skills. You'll see the principles, defenses, and elements of crime at work as you progress through the book-and you'll learn about the general principles of criminal liability and its defenses, as well as the elements of crimes against persons property, society, and crimes against the state. Featuring the latest topics and court cases, as well as many study tools to help you do well in this course, Samaha's CRIMINAL LAW is a text you will want to keep as a valuable reference even after you graduate and begin your career in the criminal justice field of your choosing.

Introducing Windows 8.1 for It Professionals


Ed Bott - 2013
    It is offered for sale in print format as a convenience.Get a head start evaluating Windows 8.1 - with early technical insights from award-winning journalist and Windows expert Ed Bott. Based on the Windows 8.1 Preview release, this guide introduces new features and capabilities, with scenario-based advice on how Windows 8.1 can meet the needs of your business. Get the high-level overview you need to begin preparing your deployment now.Preview new features and enhancements, including:How features compare to Windows 7 and Windows XP The Windows 8.1 user experience Deployment Security features Internet Explorer 11 Delivering Windows apps Recovery options Networking and remote access Managing mobile devices Virtualization Windows RT 8.1

CCNA Routing and Switching Study Guide: Exams 100-101, 200-101, and 200-120


Todd Lammle - 2013
    This all-purpose CCNA study guide methodically covers all the objectives of the ICND1 (100-101) and ICND2 (200-101) exams as well as providing additional insight for those taking CCNA Composite (200-120) exam. It thoroughly examines operation of IP data networks, LAN switching technologies, IP addressing (IPv4/IPv6), IP routing technologies, IP services, network device security, troubleshooting, and WAN technologies.Valuable study tools such as a companion test engine that includes hundreds of sample questions, a pre-assessment test, and multiple practice exams. Plus, you'll also get access to hundreds of electronic flashcards, author files, and a network simulator.CCNA candidates may choose to take either the ICND1(100-101) and ICND2 (200-101) exams or the CCNA Composite exam (200-120); this study guide covers the full objectives of all three Written by bestselling Sybex study guide author Todd Lammle, an acknowledged authority on all things Cisco Covers essential Cisco networking topics such as operating an IP data network, IP addressing, switching and routing technologies, troubleshooting, network device security, and much more Includes a comprehensive set of study tools including practice exams, electronic flashcards, comprehensive glossary of key terms, videos, and a network simulator that can be used with the book's hands-on labs Bonus Content: Access to over 40 MicroNugget videos from CBT Nuggets CCNA Routing and Switching Study Guide prepares you for CCNA certification success.

Special Education: Contemporary Perspectives for School Professionals


Marilyn Friend - 2004
    Contemporary concepts and evidence-based practices prepare new teachers for their roles in the education and well-being of students with disabilities and other special needs. Marilyn Friend combines research-informed concepts and skills with practical information for educators working in this challenging age of high standards and accountability, curriculum access, inclusive practices, professional collaboration, and student diversity. The third edition integrates the requirements of the NCLB and IDEA legislation with evidence-based practices so that readers understand the expectations for educators and students, and learn how critical concepts translate into educational practices. Real People, Real Classrooms:"Chapter Opening Vignettes "describe the experiences of three different students of varying ages as they relate to the topics discussed in each chapter and are referenced at key points in the chapter."Firsthand Account"features real life stories from teachers, students, parents, and school professionals sharing their own experiences and perspectives relating to life and learning with special needs."""Speaking from Experience "features capture the insights and advice of experienced teachers on topics ranging from working effectively with colleagues to finding ways to juggle all the responsibilities of being a special educator to addressing a variety of professional challenges, including those related to student behavior and family concerns.Real Research:Instruction in Action highlight teaching application for intensive instruction delivered by special education teachers in various educational settings.Positive Behavioral Supports illustrates the many positive, proactive ways to address students' behavior/social issues as part of overall classroom teaching and learning.Cutting Edge InformationTechnology Notes features showcase fascinating instructional and assistive technology applications for teaching students with exceptional needs in special educational settings as well as links to information that can help beginning teachers plan their lessons, motivate their students, and keep abreast of their rapidly changing field.Professional Edge features describe conceptual materials and cutting edge information that connect theory to practice.

Human Resources Management In Canada


Gary Dessler - 1992
    

C++ Programming: From Problem Analysis to Program Design


D.S. Malik - 2002
    Best-selling author D.S. Malik employs a student-focused approach, using complete programming examples to teach introductory programming concepts. This third edition has been enhanced to further demonstrate the use of OOD methodology, to introduce sorting algorithms (bubble sort and insertion sort), and to present additional material on abstract classes. In addition, the exercise sets at the end of each chapter have been expanded, and now contain several calculus and engineering-related exercises. Finally, all programs have been written, compiled, and quality-assurance tested with Microsoft Visual C++ .NET, available as an optional compiler with this text.

Data Smart: Using Data Science to Transform Information into Insight


John W. Foreman - 2013
    Major retailers are predicting everything from when their customers are pregnant to when they want a new pair of Chuck Taylors. It's a brave new world where seemingly meaningless data can be transformed into valuable insight to drive smart business decisions.But how does one exactly do data science? Do you have to hire one of these priests of the dark arts, the "data scientist," to extract this gold from your data? Nope.Data science is little more than using straight-forward steps to process raw data into actionable insight. And in Data Smart, author and data scientist John Foreman will show you how that's done within the familiar environment of a spreadsheet. Why a spreadsheet? It's comfortable! You get to look at the data every step of the way, building confidence as you learn the tricks of the trade. Plus, spreadsheets are a vendor-neutral place to learn data science without the hype. But don't let the Excel sheets fool you. This is a book for those serious about learning the analytic techniques, the math and the magic, behind big data.Each chapter will cover a different technique in a spreadsheet so you can follow along: - Mathematical optimization, including non-linear programming and genetic algorithms- Clustering via k-means, spherical k-means, and graph modularity- Data mining in graphs, such as outlier detection- Supervised AI through logistic regression, ensemble models, and bag-of-words models- Forecasting, seasonal adjustments, and prediction intervals through monte carlo simulation- Moving from spreadsheets into the R programming languageYou get your hands dirty as you work alongside John through each technique. But never fear, the topics are readily applicable and the author laces humor throughout. You'll even learn what a dead squirrel has to do with optimization modeling, which you no doubt are dying to know.

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.