Book picks similar to
Security Strategies in Windows Platforms and Applications by Michael G. Solomon
college
information-technology
infrastructure
textbooks
Investigating the Social World: The Process and Practice of Research
Russell K. Schutt - 1995
In this new Seventh Edition of his perennially successful social research text, author Russell K. Schutt continues to make research come alive through stories that illustrate the methods presented in each chapter, and hands-on exercises that help students learn by doing. Investigating the Social World helps readers understand research methods as an integrated whole, appreciate the value of both qualitative and quantitative methodologies, and understand the need to make ethical research decisions. New to this Edition: * upgraded coverage of research methods to include the spread of cell phones and the use of the Internet, including expanded coverage of Web surveys * larger page size in full color allows for better display of pedagogical features * new 'Research in the News' boxes included within chapters * more international examples * expanded statistics coverage now includes more coverage of inferenctial statistics and regression analysi
Business Communication Today
Courtland L. Bovée - 1989
The field's leading text for more than two decades, Business Communication Today continues to provide cutting-edge coverage students can count on to prepare them for real business practice. Thoroughly revised, updated, and streamlined, the succinct new ninth edition encompasses every medium that students will be expected to use on the job-from conventional printed documents and formal reports to e-mail and instant messages to blogs, podcasts, and wikis.
Powerscore LSAT Logical Reasoning Bible]
David M. Killoran - 2014
This book will provide you with an advanced system for attacking any Logical Reasoning question that you may encounter on the LSAT. The concepts presented in the Logical Reasoning Bible are representative of the techniques covered in PowerScore's live courses and have been consistently proven effective for thousands of our students. The book features and explains a detailed methodology for attacking all aspects of Logic Reasoning problems, including recognizing question types, identifying common reasoning elements and determining their validity, the methods for efficiently and accurately making inferences, and techniques for quickly eliminating answer choices as you solve the questions.
An Essential Guide to Public Speaking: Serving Your Audience with Faith, Skill, and Virtue
Quentin J. Schultze - 2006
As Christians, we are called to speak not only with effectiveness but also in a way that honors God and embodies Christian virtue. In An Essential Guide to Public Speaking, communications expert Quentin J. Schultze encourages readers to become servant speakers who faithfully serve their audiences as neighbors. Besides providing a biblical perspective on public speaking, this accessible book also covers such practical topics as overcoming common challenges, the importance of listening, and the art of preparing and delivering well-crafted speeches. Filled with helpful sidebars, checklists, and tips, this is a book for any person who wishes to improve his or her public speaking skills.
Manufacturing Processes for Engineering Materials
Serope Kalpakjian - 2007
The book carefully presents the fundamentals of materials processing along with their relevant applications, so that the reader can clearly assess the capabilities, limitations, and potentials of manufacturing processes and their competitive aspects. Using real-world examples and well-wrought graphics, this book covers a multitude of topics, including the mechanical behavior of materials; the structure and manufacturing properties of metals; surfaces, dimensional characteristics, inspection, and quality assurance; metal-casting processes including heat treatment; bulk deformation processes; sheet-metal forming processes; material removal processes; polymers, reinforced plastics, rapid prototyping and rapid tooling; metal powders, ceramics, glasses, composites, and superconductors; joining and fastening processes; microelectronic and micromechanical devices; automation; computer-integrated systems; and product design. For manufacturing engineers, metallurgists, industrial designers, material handlers, product designers, and quality assurance managers.
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache - 2007
Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.
Succeeding with Your Master's Dissertation: A Step-By-Step Handbook
John Biggam - 2008
Using case examples of both good and bad student practice, the handbook takes students through each step of the dissertation process, from their initial research proposal to the final submission. The author uses clear illustrations of what students need to do - or not do - to reach their potential, helping them to avoid the most common pitfalls. This essential handbook covers: Producing focused and relevant research objectives Writing your literature review Citing your sources correctly Clearly explaining your use of research methods Writing up your findings Summarizing your work by linking your conclusions to your initial proposal Understanding marking schemes Aimed primarily at Master's students or students on short postgraduate courses in business, humanities and the social sciences, this book is also key reading for supervisors and undergraduates considering postgraduate study.
Prince2 for Dummies
Nick Graham - 2008
Fully updated with the 2009 practice guidelines, this book will take you through every step of a project - from planning and establishing roles to closing and reviewing - offering practical and easy-to-understand advice on using PRINCE2. It also shows how to use the method when approaching the key concerns of project management, including setting up effective controls, managing project risk, managing quality and controlling change. PRINCE2 allows you to divide your project into manageable chunks, so you can make realistic plans and know when resources will be needed. PRINCE2 For Dummies, 2009 Edition provides you with a comprehensive guide to its systems, procedures and language so you can run efficient and successful projects.PRINCE2 For Dummies, 2009 Edition includes: Part I: How PRINCE Can Help You - Chapter 1: So What's a Project Method and Why Do I Need to Use One? - Chapter 2: Outlining the Structure of PRINCE2 - Chapter 3: Getting Real Power from PRINCE2Part II: Working Through Your Project - Chapter 4: Checking the Idea Before You Start - Chapter 5: Planning the Whole Project: Initiation - Chapter 6: Preparing for a Stage in the Project - Chapter 7: Controlling a Stage - Chapter 8: Building the Deliverables - the Work of the Teams - Chapter 9: Finishing the Project - Chapter 10: Running Effective Project BoardsPart III: Help with PRINCE Project Management - Chapter 11: Producing and Updating the Business Case - Chapter 12: Deciding Roles and Responsibilities - Chapter 13: Managing Project Quality - Chapter 14: Planning the Project, Stages, and Work Packages - Chapter 15: Managing Project Risk - Chapter 16: Controlling Change and Controlling Versions - Chapter 17: Monitoring Progress and Setting Up Effective ControlsPart IV: The Part of Tens - Chapter 18: Ten Ways to Make PRINCE Work Well - Chapter 19: Ten Tips for a Good Business Case - Chapter 20: Ten Things for Successful Project Assurance Part V: Appendices - Appendix A: Looking into PRINCE Qualifications - Appendix B: Glossary of the Main PRINCE2 Terms
Research Methods for the Behavioral Sciences
Frederick J. Gravetter - 2002
Gravetter, and co-author Lori-Ann B. Forzano have written a text for research methods that helps you see how interesting and exciting experimental and non-experimental research can be. Inviting and conversational, RESEARCH METHODS FOR THE BEHAVIORAL SCIENCES, Third Edition, leads you through the research process from start to finish. The text opens with tips and strategies for generating research ideas, moves to selecting measures and participants, and then offers an examination of research strategy and design. This step-by-step approach emphasizes the decisions researchers must make at each stage of the process. The authors avoid a "cookbook" approach to the facts by linking terminology with applied concepts; their "lecture in a book" style emphasizes discussion and explanation of topics. Each chapter ends with a set of exercises and activities.
Test-Driven JavaScript Development
Christian Johansen - 2010
Test-Driven JavaScript Development
is a complete, best-practice guide to agile JavaScript testing and quality assurance with the test-driven development (TDD) methodology. Leading agile JavaScript developer Christian Johansen covers all aspects of applying state-of-the-art automated testing in JavaScript environments, walking readers through the entire development lifecycle, from project launch to application deployment, and beyond.Using real-life examples driven by unit tests, Johansen shows how to use TDD to gain greater confidence in your code base, so you can fearlessly refactor and build more robust, maintainable, and reliable JavaScript code at lower cost. Throughout, he addresses crucial issues ranging from code design to performance optimization, offering realistic solutions for developers, QA specialists, and testers.Coverage includes - Understanding automated testing and TDD - Building effective automated testing workflows - Testing code for both browsers and servers (using Node.js) - Using TDD to build cleaner APIs, better modularized code, and more robust software - Writing testable code - Using test stubs and mocks to test units in isolation - Continuously improving code through refactoring - Walking through the construction and automated testing of fully functional softwareThe accompanying Web site, tddjs.com, contains all of the book's code listings and additional resources.
Web Hacking 101
Peter Yaworski
With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.
Pharmacology and the Nursing Process
Linda Lane Lilley - 1996
With an eye-catching design, full-color illustrations, and helpful, practical boxed features that highlight need-to-know information, the new edition of this bestseller continues its tradition of making pharmacology easy to learn and understand.A focus on prioritization identifies key nursing information and helps in preparation for the NCLEX(R) Examination.Presents drugs and their classes as they relate to different parts of the body, facilitating integration of the text with your other nursing courses.Features numerous full-color photos and illustrations pertaining to drug mechanisms of action and step-by-step illustrations depicting key steps in drug administration for various routes, so you can clearly see how drugs work in the body and how to administer medications safely and effectively.Drug Profiles highlight the pharmacokinetics and unique variations of individual drugs.Includes Patient Teaching Tips in each chapter to foster patient compliance and effective drug therapy.Helpful summary boxes are integrated throughout, covering Evidence-Based Practice, Preventing Medication Errors, Laboratory Values Related to Drug Therapy, Cultural Implications, Herbal Therapies, Life Span Considerations, Points to Remember, and Legal and Ethical Principles.Illustrated Study Skills Tips in each unit cover study tips, time management, and test taking strategies related specifically to nursing pharmacology.Includes a convenient tear-out IV Compatibilities Chart that alerts you to drugs that are incompatible when given intravenously.Evolve Student Resources include online access to additional chapter-specific NCLEX(R) review questions, animations, medication errors checklists, IV therapy checklists, printable handouts with need-to-know information about key drug classes, calculators, an audio glossary, answers to case studies and critical thinking activities in the text, frequently asked questions, content updates, nursing care plans covering key drug classes, and online appendices. Critical Thinking Activities and Best Action Questions focus on prioritization, challenging you to determine the best action to take.NCLEX(R) Examination Review Questions now include Alternate-Item Format questions, preparing you for these new types of questions found on the NCLEX(R) exam.New case studies have been added, and all cases now include patient photos along with accompanying questions to provoke critical thinking.Pharmacokinetic Bridges to the Nursing Process sections now cover ACE inhibitors, iron, and women's health issues applying key pharmacokinetics information to nursing practice.
Prince2 Study Guide
David Hinde - 2012
Everything you need to be fully prepared to take the PRINCE2Foundation and Practitioner examAs an internationally recognized certification which focuses onthe Foundation and Practitioner levels along with being recommendedby the Project Management Institute, the PRINCE2 accreditationgives a bolster to any resume.The author, David Hinde, has trained hundreds of individualsfrom many different backgrounds to prepare for the PRINCE2 exams.The book provides explanations of all parts of the PRINCE2approach, lots of practical examples, and a whole range of mockexamination questions to test your knowledge.Explains all the PRINCE2 themes, processes, principles, rolesand management products for the very latest version of PRINCE2(PRINCE2 2009 Edition)Features full coverage of all Foundation and Practitioner levelexam objectivesPresents real-world scenarios, showing how the method isused in business and the public sectorIncludes challenging review questions and electronic flashcardsto sharpen your knowledgeCovers tips and techniques for tackling the PRINCE2accreditation examinations and shows you how and where to take theexamsIncorporates over 300 sample Foundation-level and over 100sample Practitioner-level questions, with answers and fullexplanationsContains a glossary of all PRINCE2 terminology and a quickreference to all the PRINCE2 management productsGives a web link to a set of on-line tools with more bonusexamsPRINCE2 Study Guide covers all the necessary topics youneed to know in order to confidently take the PRINCE2 Foundationand Practitioner exams.
Schaum's Outline of Calculus
Frank Ayres Jr. - 1990
They'll also find the related analytic geometry much easier. The clear review of algebra and geometry in this edition will make calculus easier for students who wish to strengthen their knowledge in these areas. Updated to meet the emphasis in current courses, this new edition of a popular guide--more than 104,000 copies were bought of the prior edition--includes problems and examples using graphing calculators..
Network Security: Private Communication in a Public World
Charlie Kaufman - 1995
In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.