Navigation bar
  Start Previous page
 66 of 106 
Next page End 61 62 63 64 65 66 67 68 69 70 71  

terrorist activity. In Safe Air Travel Companion , Dan McKinnon, an expert in
commercial travel and survival, calmly, clearly, and rationally spells them out.
In this one-of-a-kind resource, learn smart travel strategies for business and
personal travel for yourself as well as your family.
Password: www.AvaxHome.ru
Stephen H. Kaisler, "Software Paradigms"
Wiley-Interscience | ISBN 0471483478 | 2005 Year | PDF | 2,04 Mb | 440 Pages
“ Software Paradigms provides the first complete compilation of software
paradigms commonly used to develop large software applications, with coverage
ranging from discrete problems to full-scale applications. The book focuses on
providing a structure for understanding a hierarchy of software development
approaches, and showing the relationships between the different models. Coverage
includes paradigms in design patterns, software components, software
architectures, and frameworks. Chapters within each of these sections include
design issues related to building and using the paradigm as well as numerous
real world applications. A practical overview of the hierarchy of development
paradigms, Software Paradigms is an excellent teaching tool for undergraduates
and graduates, and a comprehensive and reliable reference for software
engineers.
Password: www.AvaxHome.ru
Eric Jensen, "Teaching With the Brain in Mind"
Association for Supervision & Curriculum Deve | ISBN 0871202999 | 1998 Year |
linked PNG-files | 14,27 Mb | 133 Pages
“ Every year, millions of parents trust that the professionals who teach their
children know something about the brain and processes of learning. But most
schools of education offer psychology, not neurology, courses. At best, these
psychology courses provide indirect information about the brain and how children
actually learn. Teaching with the Brain in Mind fills this gap with the latest
practical, easy-to-understand research on learning and the brain. Consider
important questions such as
* Biologically, can you truly expect to get and hold students' attention for
long periods of time?
* Is there really such a thing as an "unmotivated student"?
* How has research on rewards been misinterpreted?
* Do students actually "forget" what we teach them, or do we ask them to recall
information in the wrong way?
* What are the surprising benefits for learning across the board when students
participate in some sort of physical education or movement? Teaching with the
Brain in Mind balances the research and theory of the brain with successful tips
and techniques for using that information in classrooms. From its primer on
brain biology to in-depth discussions of emotion, memory, and recall, Teaching
with the Brain in Mind is an invaluable tool for any educator looking to better
reach students through truly brain-compatible teaching and learning.
Password: www.AvaxHome.ru
Rob Shein, David Litchfield, Marcus Sachs, "Zero-Day Exploit: Countdown to
Darkness: Countdown to Darkness"
Syngress | ISBN 1931836094 | 2004 Year | PDF | 2,58 Mb | 339 Pages
“ There exists a 0-day vulnerability in a particular line of SCADA Master
products that are widely used in petrochemical facilities. Furthermore, since
the telemetry between the Master and the RTUs (the units located at valves,
gauges, etc.) is particularly fragile under attack, the attackers are able to
take a two-tiered approach to the damage they cause. The vulnerability is
designed to simply replace a small bit of code in the SCADA Master so that upon
communication with the RTUs, it will unpredictably send invalid data; the way in
which the communications are invalid also varies somewhat. The symptoms of this
appear not at the Master level, but in the RTUs themselves, which have
unpredictable results. The first set of disasters occur as valves fail to close
or open, or particular RTUs cease providing data. It takes a bit of time for law
enforcement to have a solid handle on things, as they are currently battling
their own issues, but they notice the pattern. The SCADA systems are immediately
segmented from other networks, and work begins on replacing RTUs. This, however,
has no effect, and as time passes the ripples of the attack spread. Gas stations
run out of gas, followed shortly by freight carriers. Private individuals and
local police and fire departments are not far behind. Disaster can only be
prevented by Reuben, an elite cyber-security researcher who stumbles across the
plot while contracting for the federal government.
Password: www.AvaxHome.ru
J.Gibson-Cline, "Youth and Coping in Twelve Nations: Surveys of 18-20 Year Old
Young People"
Routledge | ISBN 0415217156 | 2001 Year | PDF | 1,14 Mb | 320 Pages
“ "This summary of research will be useful to scholars and practitioners in
counseling, cross-national research, and adolescence.."
–Choice, November 2001, Vol. 39 No. 03
Password: www.AvaxHome.ru
Ron Aitchison, "Pro DNS and BIND"
Apress | ISBN 1590594940 | 2005 Year | PDF | 2,83 Mb | 608 Pages
“ The Domain Name System (DNS) is the system created to map domain names to IP
addresses, and is largely responsible for the widespread popularity of the
Internet due to the convenience it offers in calling system resources by an
easily recognizable name rather than a cryptic number. Given the critical nature
of this technology for ensuring smooth operation of Internet-based resources
such as Web and mail servers, it’s imperative that users fully understand key
configuration, management and security principles.
Password: www.AvaxHome.ru
Jean Tabaka, "Collaboration Explained: Facilitation Skills for Software Project
Leaders"
Addison-Wesley Professional | ISBN 0321268776 | 2006 Year | CHM | 0,69 Mb | 456
Pages
“ To succeed, an agile project demands outstanding collaboration among all its
stakeholders. But great collaboration doesn’t happen by itself; it must be
carefully planned and facilitated throughout the entire project lifecycle.
Collaboration Explained is the first book to bring together proven, start-to-
finish techniques for ensuring effective collaboration in any agile software
project.
Since the early days of the agile movement, Jean Tabaka has been studying and
promoting collaboration in agile environments. Drawing on her unsurpassed
experience, she offers clear guidelines and easy-to-use collaboration templates
for every significant project event: from iteration and release planning,
through project chartering, all the way through post-project retrospectives.
Tabaka’s hands-on techniques are applicable to every leading agile methodology,
from Extreme Programming and Scrum to Crystal Clear. Above all, they are
practical: grounded in a powerful understanding of the technical, business, and
human challenges you face as a project manager or development team member.
· Build collaborative software development cultures, leaders, and teams
· Prepare yourself to collaborate–and prepare your team
· Define clear roles for each participant in promoting collaboration
· Set your collaborative agenda
· Master tools for organizing collaboration more efficiently
· Run effective collaborative meetings–including brainstorming sessions
· Promote better small-group and pair-programming collaboration
· Get better information, and use it to make better decisions
· Use non-abusive conflict to drive positive outcomes
· Collaborate to estimate projects and schedules more accurately
· Strengthen collaboration across distributed, virtual teams
· Extend collaboration from individual projects to the entire development
organization
Password: www.AvaxHome.ru
Weijia Jia, Wanlei Zhou, "Distributed Network Systems: From Concepts to
Implementations"
Springer | ISBN 0387238395 | 2004 Year | PDF | 10,69 Mb | 513 Pages
“ This volume covers both theoretical and practical aspects of distributed
computing. It describes the client-server model for developing distributed
network systems, the communication paradigms used in a distributed network
system, and the principles of reliability and security in the design of
distributed network systems. Based on theoretical introductions, the book
presents various implementation strategies and techniques for building
distributed network systems, including examples in TCP/IP communications, the
use of remote procedure call and remote method invocation techniques, and the
development of web-based applications, distributed databases, and mobile
computing systems.
Password: www.AvaxHome.ru
Steve Tockey, "Return on Software: Maximizing the Return on Your Software
Investment"
Previous page Top Next page