uid
stringlengths
10
10
text
stringlengths
4
93.3k
target
stringlengths
4
947
num_keyphrases
int64
1
57
0262140888
Action in Perception (Representation and Mind) [a] balanced, well-considered account of this hot topic. NatureBold and lucid, this book brings out the best in the philosophy of mind. No shows that it is not enough to know the puzzling phenomena; you have to resist the tempting misinterpretations of them that have bedeviled cognitive scientists and philosophers alike. Here is a philosopher who can actually help cognitive scientists untangle the knotty problems of the mind. Daniel Dennett, author of Brainchildren, Consciousness Explained and Freedom EvolvesAction packed and brimming with new ideas, provocative illustrations and clearly laid-out arguments, Action in Perception is a landmark contribution to the emerging science and philosophy of the embodied mind. Pursuing the idea that perceiving is a way of acting rooted in a certain kind of implicit understanding, No tackles everything from phenomenology to the philosophy of content and consciousness. Empirically sensitive while remaining genuinely philosophical in scope and execution, this book is essential reading for philosophers of mind, cognitive scientists of all stripes and persuasions, and anyone interested in the nature of perception, thought and action. Andy Clark, School of Philosophy, Psychology and Language Sciences, University of EdinburghThe approach to perception No lays out brings the study of perception back into its valid ecological context. I recommend this book to psychophysicists, neuroscientists, computational theorists, and anyone else interested in the rich experience and adaptive functions of perception. It is a pleasure to follow the colorful examples and the careful and cogent argumentation on issues that are essential to everyone. Shinsuke Shimojo, California Institute of Technology "The approach to perception No lays out brings the study of perception back into its valid ecological context. I recommend this book to psychophysicists, neuroscientists, computational theorists, and anyone else interested in the rich experience and adaptive functions of perception. It is a pleasure to follow the colorful examples and the careful and cogent argumentation on issues that are essential to everyone." --Shinsuke Shimojo, California Institute of Technology "Action packed and brimming with new ideas, provocative illustrations and clearly laid-out arguments, Action in Perception is a landmark contribution to the emerging science and philosophy of the embodied mind. Pursuing the idea that perceiving is a way of acting rooted in a certain kind of implicit understanding, No tackles everything from phenomenology to the philosophy of content and consciousness. Empirically sensitive while remaining genuinely philosophical in scope and execution, this book is essential reading for philosophers of mind, cognitive scientists of all stripes and persuasions, and anyone interested in the nature of perception, thought and action." --Andy Clark, School of Philosophy, Psychology and Language Sciences, University of Edinburgh "Bold and lucid, this book brings out the best in the philosophy of mind. No shows that it is not enough to know the puzzling phenomena; you have to resist the tempting misinterpretations of them that have bedeviled cognitive scientists and philosophers alike. Here is a philosopher who can actually help cognitive scientists untangle the knotty problems of the mind." --Daniel Dennett, author of Brainchildren, Consciousness Explained and Freedom Evolves Alva No is Associate Professor of Philosophy at University of California, Berkeley. He is the editor of Vision and Mind (MIT Press, 2002).
basic sciences;behavioral sciences;books;clinical;cognitive psychology;fitness & dieting;health;internal medicine;medical books;medicine;medicine & health sciences;mental health;neurology;neuroscience;new;physiological aspects;psychology;psychology & counseling;science & math;social sciences;used & rental textbooks
21
0415180503
Brain Mystery Light and Dark: The Rhythm and Harmony of Consciousness Brain Mystery Light and Dark is an exciting tour with tentative answers of these ultimate questions that thinking human beings have been asking since the beginning of time.George Adelman, MITWhat is reality and what is illusion? In this very interesting book, Don Keyes draws on the one side from current research into the brain and on the other from traditional philosophies, to construct a unifie view of the world which will fully satisfy the claims of the material and the spiritual.Professor Emeritus John Macquarrie, University of Oxford.This is a well-timed book in view of the plethora of works covering a clearly popular subject that draws from mathematics, through to pyschology and philosophy. A strength of Keyes' book is that it ranges from more theoretical, philosophical approaches through to an heroic attempt at presenting the neuroscience to the lay reader as well.Susan Greenfield, author of Journey to the Centers of the Mind and The Human Brain: A Guided TourThe author brings together neurobiology and philosophy to examine consciousness.Hastings Center Report Charles Don Keyes is Professor of Philosophy at Duquesne University. He is the author of Foundations for an Ethic of Dignity (1989), Four Types of Value Destruction (1978), and God or Ichabod? (1973)).
behavioral sciences;biological sciences;biology;biology & life sciences;books;consciousness & thought;fitness & dieting;health;humanities;medical books;neuropsychology;new;philosophy;politics & social sciences;psychology;psychology & counseling;science & math;science & mathematics;social sciences;used & rental textbooks
20
0205309097
Phonics Poetry: Teaching Word Families This book shows elementary teachers how and why to use phonogram poems to teach phonics. It includes many sample poems for the most common rimes in children's reading. An intro chapter shows why the onset/rime (phonogram) approach is important to teaching phonics. Chapters with original poems and other texts for the 40 or so most common rimes in children's reading are also included. Approximately 100 poems are included in this book, and there is also information on extending the use of the poems into other activities and texts. Practicing elementary teachers in grades K-3, and parents who are creating reading programs for their children at home.
books;education;education & reference;education theory;elementary education;history & criticism;humanities;instruction methods;language & grammar;language experience approach;literature;literature & fiction;movements & periods;new;pedagogy;phonetics & phonics;professional development;schools & teaching;used & rental textbooks;words
20
1877727512
Twilight of the Idols: Recollections of a Lost Yugoslavia Text: English (translation) Ales Debeljak
20th century;americas;anthologies;books;eastern;europe;european;greece;history;international & world politics;literature & fiction;poetry;politics & government;politics & social sciences;slovenia;sociology;united states;world literature;yugoslavia
19
0520245288
Doctor Mom Chung of the Fair-Haired Bastards: The Life of a Wartime Celebrity Judy Tzu-Chun Wu is Associate Professor in the Department of History at Ohio State University.
20th century;americas;biographies & memoirs;books;chinese;ethnic & national;history;humanities;medical;new;politics & social sciences;professionals & academics;social sciences;specific demographics;specific groups;state & local;united states;used & rental textbooks;women
19
1584503998
Secrets of the Game Business, 2nd Ed. Fran?ois Dominic Laramee (Verdun, QC) has designed, programmed, and/or produced over 20 games for consoles, personal computers, interactive television, and online networks over the last decade. He is a prolific writer and the holder of graduate degrees in computer science and business administration. He is also the editor of Game Design Perspectives and Secrets of the Game Business, second edition, as well as a contributor to the Game Programming Gems and AI Game Programming Wisdom series.
arts & photography;books;business & finance;business & investing;computer science;computers & technology;game programming;games & strategy guides;graphic design;graphics & visualization;guides;humor & entertainment;job hunting & careers;new;programming;puzzles & games;software;techniques;used & rental textbooks;video & electronic games
20
0071345310
Accelerated Netware 5 Cne Study Guide (Accelerated Cne Study Guide) Becoming a Novell Certified NetWare Engineer just got easier. The Accelerated NetWare 5 CNE Study Guide is written by an expert--the author is a Novell CNE, CNA, MCNE, and CNI--expressly for computer professionals who want to pass the first time around. It's all here: everything you need to approach the exam with confidence, in a handy, study-anywhere format. The Accelerated NetWare 5 CNE Study Guide provides exactly the kind of guidance necessary to get you ready for the Novell CNE exam--the vital test that provides the right credentials for supporting 70% of the world's networks. Pick any topic--from planning a Novell network, integrating legacy systems, to the fine points of customizing, partitioning, and hands-on NetWare 5 repair and optimization--and the information is all there, right where you want it. A complete, one-stop reference on how to study for and pass the Novell NetWare 5 CNE exam. Must-know, insider details on creating a NetWare network and maximizing NetWare 5 resources (perfect for those recertifying on this latest version). Full coverage of network resources, utilities, and Open System Architecture data that you need to pass the exam.
apis & operating environments;books;certification;computer science;computers & technology;education & reference;graduate & professional;networking;networks;new;novell netware;operating systems;professional;programming;protocols & apis;study guides;studying & workbooks;test prep & study guides;test preparation;used & rental textbooks
20
0140297952
England's Thousand Best Churches 'Masterly, perhaps a masterpiece' Independent Books of the Year Simon Jenkins, author of Englands Thousand Best Churches, is an award-winning journalist, a member of the Millennium Commission, and chair of the Buildings Books Trust.
architecture;arts & photography;books;buildings;christian books & bibles;christianity;church history;criticism;europe;general;great britain;history;history & criticism;professional & technical;religious;specialty travel;tourist destinations & museums;travel;world
19
0853236933
Bede: The Reckoning of Time (Liverpool University Press - Translated Texts for Historians) Faith Wallis is associate professor in the department of history at McGill University.
astronomy;astronomy & space science;books;catholicism;christian books & bibles;christianity;europe;historical study & educational resources;historiography;history;humanities;medieval;new;physics;religious;religious studies;science & math;science & mathematics;time;used & rental textbooks;world
21
0198162391
Blues and Gospel Records: 1890-1943 Praise for the third edition: "Indispensable: every music library should have it, and it will be a high priority item on any blues collector's list."--Ethnomusicology"The definitive discography of the genre; it is comprehensive and accurate to the extreme, and is essential for all those who are interested in pre-war blues and gospel recordings."--Goldmine"Absolutely indispensible to anyone with an interest in pre-war Blues and Gospel music."--Blues Unlimited The compilers of this volume come from a mixture of backgrounds. Robert M. W. Dixon is Director of the Research Centre for Linguistic Typology at the Australian National University. He has done original field research on the indigenous languages of Australia, Fiji, and Amazonia, besides writing A New Approach to English Grammar: On Semantic Principles (Clarendon Press, 1991). The late John Godrich was in the Merchant Navy and then worked as a clerk at Swansea Docks. Howard Rye, who like Dixon is an Oxford graduate, is an independent scholar of jazz and blues. He is principal researcher for the New Grove Dictionary of Jazz and is a regular contributor to jazz and blues publications. From 1980 to 1995, he was editor of Collectors Items.
antiques & collectibles;art & photography;arts & photography;bibliographies & indexes;blues;books;crafts;education & reference;ethnic & international;gospel;hobbies & home;humanities;music;musical genres;new;performing arts;publishing & books;records;reference;religious & sacred music;research & publishing guides;used & rental textbooks;writing
23
0130316814
Musician's Business and Legal Guide, The (3rd Edition) (Musician's Business & Legal Guide) Demystifies the music business and the indecipherable body of law which shapes it! * Provides vital information about how the Internet is changing the way music is marketed and sold. * Expanded/updated information on the impact of the Internet on legal and business issues. * Appendix includes names; URL and mailing addresses of major industry associations and organizations, as well as a list of the important industry publications. Definitive in scope and written specifically for musicians and songwriters by top professionals currently working in the industry, this book provides substantive information on actual practiceswith clause-by-clause commentaries on all major contracts in the industry, featuring extensive analyses, not just forms and casual commentary. Clarifies the language, shows actual practices, and offers advice on what to watch for. Requires no background in law or business; is written in plain English, not "legalese." Chapters are written by lawyers, managers, agents and business people working in the music industry in New York and Los Angeles. Welcome to the third edition of this book. (There were also three prior editions published under the title The Musician's Manual, the first in 1979.) As the music business changes, we strive to keep each new edition current. We have updated all the chapters and have added five new ones: Digital Downloads and Streaming: Copyright and Distribution Issues; International Copyright, Getting Started as an Internet Artist, Royalty Statements: Audits and Lawsuits; and The Internet and Music. However, the basic messages from the first edition remain constant. At some point in your professional music career, you will learn that there are legal questions implicit in almost everything you do. Whether you write, perform or sell a song, your actions give rise to rights and obligations that you should consider. The time to learn is now. The purpose of this book is to demystify the music business and the seemingly indecipherable body of law that shapes it. And to help you "make it" by explaining the industry and the laws that govern it. This book is a collection of chapters written by people that work in the music industry. Many are lawyers; some are musicians. We have tried to make our information comprehensible to everyone, and have avoided presupposing a lot of knowledge on your part. At this point, we must present a few warnings. First, there is no substitute for obtaining competent help as you build your career. Talent agents, personal managers, lawyers and business managers are trained to guide you. Their expertise costs money, but you must think of these expenses as an investment in your career. Also, the chapters written by lawyers are designed to identify problems, not to give specific solutions. If you have a legal problem, do not rely on the information contained in this book; see an attorney. The chapters in this book are not the law, but merely describe legal applications, in general terms, for the music industry. Additionally, before you photocopy our forms for submittal, check with the organizations to which you are submittingthey may require you to fill out their original forms. In many cases, these forms may be downloaded and submitted via the Internet. There has been a radical change in the way musicians can access information since our last editionthe Internet. The U.S. Copyright Office and virtually all other major organizations involved in the music business now have Web sites that make their information instantly available and up-to-date. The Internet is also a new source of distribution of both songs and sound recordings, and as acts as an advertising and promotional tool for musicians. There has been a flurry of lawsuits against those that have given away the music you create. Thankfully, the music copyright owners have either prevailed in court or have negotiated settlements-but regulating the Internet in a way to protect your works and have their use paid for, remains the greatest challenge. One final note-although this book is a useful tool, musicians should write music, not contracts. Unless you devote your time and energy to developing and exploiting your talent, this book doesn't matter. Make it matter. Mark Halloran, Esq. Coauthor and Editor Welcome to the third edition of this book. (There were also three prior editions published under the title The Musician's Manual, the first in 1979.) As the music business changes, we strive to keep each new edition current. We have updated all the chapters and have added five new ones: Digital Downloads and Streaming: Copyright and Distribution Issues; International Copyright, Getting Started as an Internet Artist, Royalty Statements: Audits and Lawsuits; and The Internet and Music. However, the basic messages from the first edition remain constant. At some point in your professional music career, you will learn that there are legal questions implicit in almost everything you do. Whether you write, perform or sell a song, your actions give rise to rights and obligations that you should consider. The time to learn is now. The purpose of this book is to demystify the music business and the seemingly indecipherable body of law that shapes it. And to help you "make it" by explaining the industry and the laws that govern it. This book is a collection of chapters written by people that work in the music industry. Many are lawyers; some are musicians. We have tried to make our information comprehensible to everyone, and have avoided presupposing a lot of knowledge on your part. At this point, we must present a few warnings. First, there is no substitute for obtaining competent help as you build your career. Talent agents, personal managers, lawyers and business managers are trained to guide you. Their expertise costs money, but you must think of these expenses as an investment in your career. Also, the chapters written by lawyers are designed to identify problems, not to give specific solutions. If you have a legal problem, do not rely on the information contained in this book; see an attorney. The chapters in this book are not the law, but merely describe legal applications, in general terms, for the music industry. Additionally, before you photocopy our forms for submittal, check with the organizations to which you are submittingthey may require you to fill out their original forms. In many cases, these forms may be downloaded and submitted via the Internet. There has been a radical change in the way musicians can access information since our last editionthe Internet. The U.S. Copyright Office and virtually all other major organizations involved in the music business now have Web sites that make their information instantly available and up-to-date. The Internet is also a new source of distribution of both songs and sound recordings, and as acts as an advertising and promotional tool for musicians. There has been a flurry of lawsuits against those that have given away the music you create. Thankfully, the music copyright owners have either prevailed in court or have negotiated settlements-but regulating the Internet in a way to protect your works and have their use paid for, remains the greatest challenge. One final note-although this book is a useful tool, musicians should write music, not contracts. Unless you devote your time and energy to developing and exploiting your talent, this book doesn't matter. Make it matter. Mark Halloran, Esq. Coauthor and Editor
arts & photography;books;business;business & investing;business law;education & reference;franchising;humanities;law;law practice;management;management & leadership;music;new;performing arts;politics & social sciences;reference;social sciences;used & rental textbooks
19
B000OT7Y4C
More Latin for the Illiterati Stone follows up his Latin for the Illiterati (LJ 12/96) with this new dictionary, structured around the subtitle's three areas: medicine, law, and religion. Translations are brief and literal. The dictionary concludes with some of the same information given in Latin for the Illiterati as well as newer miscellaneous information, including Latin selections (with English translations) from the Roman Catholic liturgy. The dictionary ends with an English-Latin index. The major drawback is the arrangement by topicAthe three different topic areas must be checked if the user doesn't know whether the word or phrase is medical, legal, or religious (there is no Latin index). On the positive side, this dictionary contains many terms not found in other recent Latin-English dictionaries, such as James Morwood's A Dictionary of Latin Words and Phrases (Oxford Univ., 1998). Adeleye's World Dictionary of Foreign Expressions provides translations from over 20 languages, making it an excellent resource for general users. Each definition indicates part of speech, language of origin, plural forms, and literal translation (including the literal translation of each word in a phrase). Also included are lengthier, connotative definitions, examples of use in sentences, and, when appropriate, cross references to other terms. Adeleye's dictionary is recommended for all public and academic libraries; Stone's is for libraries needing a more specialized resource.ACynthia A. Johnson, Barnard Coll. Lib., New York Copyright 1999 Reed Business Information, Inc. Stone had done a masterful job of rendering Latin phrases into palatable English. His Latin reference work is beautifully laid out and easy to accesss. The choice of entries introduces professional terms in style: neatly, succintly, and gracefully.ARBA 2000It provides more specialized vocabularies that other handbooks of Latin phrases...and is the only one to provide a separate English to Latin index and a list of abbreviations...it will be helpful to public and undergraduate libraries.Choice, March 2000This dictionary contains many terms not found in other recent Latin-English dictionaries.Library Journal Text: English, Latin Jon R. Stone is a Post-Doctoral Research Fellow at the Center for the Study of Religion and Lecturer in the English Writing Program at the University of California at Santa Barbara. He is the author of Latin for the Illiterati (1996) and Guide to the End of the World: Popular Eschatology in America (1993).
ancient;books;dictionaries & terminology;education & reference;encyclopedias;fitness & dieting;foreign language dictionaries & thesauruses;foreign language study & reference;health;history;kindle ebooks;kindle store;language instruction;latin;medical;medical books;medical ebooks;medicine;professional & technical;reference;science & math
21
0471156477
The Child and Adolescent Psychotherapy Treatment Planner Following in the footsteps of the bestselling Complete Psychotherapy Treatment Planner, the child and adolescent planner provides treatment planning guidelines and an array of prewritten treatment plan components (behavioral definitions, long-term goals, short objectives, therapeutic interventions, and DSM-IV diagnosis) for all major child and adolescent behavioral problems and psychological disorders. "From the authors of the bestseller The Complete Psychotherapy Treatment Planner comes this exciting new resource focusing specifically on the problems encountered in treating younger patients. The Child and Adolescent Psychotherapy Treatment Planner enables mental health professionals to write polished, effective treatment plans that satisfy the demands of HMOs, managed care companies, third-party payers, and state and federal review agencies. Specifically designed to save clinicians hours of valuable time, provide optimum latitude in developing individualized treatment plans, and increase the measurability of objectives, this unique guidebook features: Complete coverage of 29 DSM-IVTM and behaviorally based child and adolescent presenting problems A step-by-step guide to treatment planning 1,000s of prewritten treatment goals and objectives Up to 45 specific therapeutic interventions for each disorder.1,000s of well-crafted statements describing behavioral manifestations, long-term treatment goals, short-term objectives, and therapeutic interventionsAn extensive list of suggested interventions from a broad range of therapeutic approachesincluding cognitive, behavioral, family-oriented, dynamic, pharmacological, educational, didactic, and bibliotherapeutic A simple but comprehensive treatment plan format that can be copied and emulatedThis popular treatment planning system will enhance the quality of clinical documentation, bring heightened focus to the treatment process, and help eliminate the rejection of treatment plans by insurers and health management organizations. Arthur E. Jongsma, Jr., PhD, is the founder and Director of Psychological Consultants, a group private practice in Grand Rapids, Michigan. He has more than twenty years' experience with mental health treatment and, for more than a decade, has been a consultant to adolescent residential and adult chemical dependence treatment agencies.L. MARK PETERSON, MSW, is the Clinical Supervisor for Bethany Christian Services, the Salvation Army of Grand Rapids. He has counseling experience in both inpatient and outpatient settings, working with children, couples, and families. WILLIAM P. McINNIS, PsyD, is in private practice with Psychological Consultants. He specializes in the treatment of children, adolescents, and families.
books;child psychology;clinical;compulsive behavior;fitness & dieting;general;health;internal medicine;medical books;medicine;medicine & health sciences;mental health;new;pediatrics;psychiatry;psychology;psychopathology;psychotherapy;social sciences;used & rental textbooks
20
0312321899
My FBI: Bringing Down the Mafia, Investigating Bill Clinton, and Fighting the War on Terror Freeh defends his performance as FBI director (1993-2001) and retaliates against Richard A. Clarke's Against All Enemies and Bill Clinton's My Life in this smooth memoir, written with the help of Means. "I spent most of the almost eight years as director investigating the man who had appointed me," Freeh declares on the book's first page, but readers expecting juicy revelations about those investigations are going to be disappointed. Freeh goes into fascinating detail when describing the FBI's work on the 1996 Khobar Towers bombing in Saudi Arabia-the most damning thing he has to say about Clinton is that Clinton didn't push for the prosecution of the bombers. Freeh's recounting of his work as an FBI agent in 1970s, when his team helped eviscerate the power of the Italian mafia in New York, is similarly generous with details. And his accounts of his childhood in New Jersey and his years working his way through Rutgers are also engaging. Freeh argues convincingly against the establishment of a separate Domestic Intelligence Service, for the FBI's use of international agents and for a major investment into the Bureau's technological capacity-it's horrifying to realize that the agency has less computer power than any of America's major enemies. In a few pages of near end of the book, Freeh lambastes Clarke, calling him a "self-appointed Paul Revere" and a "second-tier player." He also accuses Clarke of deception, alleging that Clarke lied or distorted information in five places, including Clarke's assertion that Freeh is a member of Opus Dei. If corroborated, these accusations may deal a serious blow Clarke's reputation. When it comes to the Clinton investigations, however, Freeh doesn't really deliver anything new. And his explanations for the rift between them come off as disingenuous. "Maybe I was, in Clinton's eyes, too much the altar boy," Freeh muses on page 17. More than two hundred pages later, he reveals that he snubbed the President's first two collegial gestures, and elsewhere Freeh drops references to his close friendship with H.W. Bush, who worked as director of the CIA before he was president and after whom Freeh names the FBI's new command center in 1999. "We had differences of temperament," Freeh acknowledges about Clinton. His book would have been stronger if he acknowledged more directly that he and Clinton had differences of politics, too. After all, it's to Clinton's credit that he appointed Freeh despite those differences, and to Freeh's credit that he didn't allow them to hamper his excellent performance on the Oklahoma bombing and Robert Hanssen cases, among others.Copyright Reed Business Information, a division of Reed Elsevier Inc. All rights reserved. LOUIS J. FREEH served as director of the Federal Bureau of Investigation from 1993 to 2001. He now is senior vice chairman of MBNA. For nearly a dozen years, Louis J. Freeh has been pointedly silent about the man who appointed him director of the FBI. That moratorium ends officially and loudly with the publication of Freeh's My FBI, a scorching account of his relationship with Bill Clinton and of leading the bureau at a time when, as Freeh writes, the president's "scandals . . . never ended." To understand the depth of Freeh's antipathy, consider this one anecdote: Sometime after he resigned in 2001, Freeh ran into the former White House counsel who had recommended Freeh for the job. The lawyer reported that Clinton had just complained to him that the worst advice the lawyer ever gave him was to appoint Freeh. "I wear it as a badge of honor," Freeh writes. And that's just the second chapter.How did it come to this? A president's relationship with an FBI director should be a mixture of hands-off and hands-on. Unlike cabinet members, who serve at the pleasure of a president, directors are now given 10-year terms -- in part to avoid another 48-year reign like that of J. Edgar Hoover, and in part to provide insulation from political pressure. A potentially secret police force constitutes a great opportunity for abuse by presidents and a threat to be used against them. But even if an FBI director cannot expect to be best friends with the president, he should, as Freeh writes, "be able to go directly to the president, sit down with him and say You should know about this." In Freeh and Clinton's case, there were vital issues to discuss and collaborate on. But the problem for Freeh was that he never could get to those hands-on moments. "There was always some new investigation brewing, some new calamity bubbling just below the headlines ." By the time Freeh resigned, he had met with Clinton at most three times.My FBI is no ordinary Washington memoir. To be sure, Freeh tells a number of engaging stories about his rise from FBI street agent -- one undercover assignment entailed parading around nude in the locker room of a local health club frequented by a prominent mobster -- to his mob-busting days as a federal prosecutor in the famed Southern District of New York. There are a few too many gratuitous bromides bestowed on colleagues and even neighbors. But these accolades serve the purpose, intended or not, of contrasting starkly with Freeh's portrait of Clinton as a man whose only moral compass is political expediency. When a judge cited Clinton in 1999 for contempt for lying in the Paula Jones case, Freeh describes it as a disgrace equal only to Richard M. Nixon's. If it had been him, Freeh writes, "I would be so devastated that I might never show my face in public again. The ex-president, however, seems to suffer no such pangs of conscience." In retrospect, it should have been clear to both men that this was a doomed relationship. Could there be two more different people? Freeh, a former altar boy and a moralist at his core, always carried a worn prayer book in his suit jacket. But Freeh was impressed with the breadth of Clinton's questions in their first meeting, and by the time Clinton assures Freeh there will be no political interference if he takes the job, Freeh has joined the legions of the charmed. When Clinton sits down, without prompting, to write a birthday greeting to Freeh's 7-year-old son, the deal is sealed.Freeh acknowledges making mistakes in the relationship. He lacked tact in trying to distance himself. He turned down an early dinner invitation to the White House with the Clintons and Tom Hanks; he even sent back his White House pass with a terse note, indicating he would sign in every time he came calling. "It was seemingly a declaration of open hostility on my part," he writes. But, he argues, "I was the nation's top cop," and just a few months into his tenure, Clinton was already the subject of a criminal investigation in what became known as Whitewater. "Until the matter was sorted out," Freeh writes, "I had to be accountable for every trip I made to the building where the president worked and lived." The final stake through the relationship's heart, however, was the president's response to the June 1996 bombing of Khobar Towers, an American military facility in Saudi Arabia, in which 19 Americans were killed. It is fitting that Freeh opens My FBI with Khobar Towers; there was no case he cared more deeply about or pursued more relentlessly. It became his Moby-Dick. Only hours after the bombing, Clinton dispatched the FBI to track down the perpetrators, promising the nation they would not go unpunished. Freeh personally oversaw the case, and when it soon began to appear that top Iranian government officials might be behind the attack, Freeh says the investigation stalled: "Where I found myself most stymied [was] not halfway around the world on the Arabian Peninsula but at home, a half dozen blocks up Pennsylvania Avenue." The problem, in Freeh's view, was that in May 1997 an Iranian moderate, Mohammad Khatami, had been elected president and seemed to be the United States' best hope of normalizing relationships. "The Khobar Towers investigation was not going to get in the way of that," Freeh writes. The tale of duplicity Freeh tells is complicated, but the basic outlines are these: The Saudis, who had suspects in custody, had communicated in a limited way their findings of Iranian involvement to the FBI and the White House. To put a legal case together, however, the bureau needed access to the suspects, and Freeh was told by Prince Bandar bin Sultan, the Saudi ambassador in Washington, that this would happen only if the president and his top aides exerted pressure on Crown Prince Abdullah, the kingdom's de facto leader. The Saudis, however, said they were receiving U.S. signals to back off, not to bull ahead with the investigation. Clinton and his aides denied this to Freeh, but in the end, Freeh came to believe the Saudis' version.Among the most telling incidents for Freeh was a meeting that occurred in September 1998 between the crown prince and the president at the Hay Adams hotel in Washington. Freeh was assured by Clinton's national security adviser, Samuel R. "Sandy" Berger, that Clinton had pressed Abdullah for U.S. access to the Saudi-held suspects, but others present told Freeh that Clinton barely raised the subject and sympathized with the Saudis' reluctance to cooperate. Clinton, Freeh writes, then promptly asked Abdullah for a contribution to his presidential library. (I learned through my own reporting at the time that Freeh later secretly referred Clinton's library request for grand jury investigation, but he does not reveal this here, presumably because of grand jury secrecy rules.) Frustrated, Freeh then made an extraordinary out-of-chain of command pitch to former president George H.W. Bush, who also was scheduled to visit with Abdullah. Freeh called Bush, much favored in Saudi Arabia due to the 1991 Gulf War, and asked him to make the request that Clinton wasn't making. The former president agreed, and two days later, Abdullah told Freeh that the suspects would be made available. "I have no doubt that, but for President Bush's personal intervention, we would never have gotten access," Freeh writes. Six weeks later, the information from the interviews and other evidence turned over by the Saudis showed incontrovertibly that the attack had been funded, Freeh writes, by senior Iranian officials. He adds that, after he reported these findings, Berger convened a meeting in the West Wing's Situation Room to discuss them. But instead of dealing with the evidence of Iranian complicity, Freeh writes, the meeting focused on how to deal with the press and Congress should the news leak. (A "Script A" and a "Script B" had been prepared.) No other moment in his eight years matched the disappointment of that meeting: "We had the goods on them, cold, yet the Clinton administration miserably failed to seek any redress," Freeh writes. The case limped along until the new President Bush took office. Six months later, a grand jury indicted 14 defendants, mostly the active participants in the plot, and accused the Iranian government of directing the attack -- though no Iranian officials were indicted, a fact that Freeh curiously fails to explain. Freeh devotes a scant two chapters to the Sept. 11, 2001, attacks and their aftermath, explaining that enough newsprint and news hours already have been dedicated to what went wrong without his rehashing the details. This will be too little for many; critics have blasted Freeh for pursuing his Khobar Towers obsession while his FBI missed the gathering al Qaeda plot at home. Though Freeh resigned three months before Sept. 11, the plot was assembled on his watch, as was the FBI counterterrorism apparatus that failed to thwart it. But he has a few points about Sept. 11 that he is determined to make. While acknowledging "many shortcomings" of his own, Freeh blames Congress for the much-reported antiquated state of the FBI's computer system, pointing out that the bureau begged Congress for funds that were not forthcoming. He complains that from 2000-02, the bureau asked for 1,900 new employees for its counterterrorism program and got only 76. But the heart of Freeh's complaint is that until Sept. 11, terrorism was viewed by both the Clinton and Bush administrations as a law enforcement issue -- sifting through bomb sites looking for evidence, as the FBI did with Khobar Towers -- and not as an act of war, as he now argues that it should have been. "I don't know an agent who thought that was sufficient to the cause, or anyone who believed that a criminal investigation was a reasonable alternative to military or diplomatic action," he writes. The United States had gone after Osama bin Laden with a few Tomahawk cruise missiles in 1998 in retaliation for the bombings of the U.S. embassies in Kenya and Tanzania; the CIA had made covert attempts to get bin Laden; and the State Department had harangued his Taliban patrons. But these attempts were all lame, Freeh argues, because the United States lacked the political spine to put its full force behind the efforts. Freeh points out that the FBI had helped secure indictments against bin Laden in 1998 and 1999 and, along with the CIA, missed nabbing Khalid Sheik Mohammed, the Sept. 11 plot's mastermind, in Qatar in 1996 when he was apparently tipped off by a Qatari official. In 2000, Freeh flew to Pakistan and personally appealed to President Pervez Musharraf to pressure his Taliban allies to arrest bin Laden. "If [the U.S.] government had a different mind-set, the secretaries of state and defense would have been in Lahore with me, or instead of me," Freeh writes. This negligence, he argues, emboldened the terrorists. "The image of a lumbering giant stumbling around with a sign on its back reading 'Kick Me' was not lost on our enemies," he notes. My FBI is ultimately a sad tale, and it's clear Freeh saw it this way, too. He had planned to resign before the end of Clinton's term but held off until the president left office because he worried that Clinton might replace him with someone who would damage the FBI. "Not only was he actively hostile toward me, he was hostile to the FBI generally," Freeh writes. "My departure might be one last opportunity for retaliation." Reviewed by Elsa Walsh Copyright 2005, The Washington Post. All Rights Reserved. My FBICHAPTER 1Khobar TowersShortly before 10:00 P.M. local time on June 25, 1996, a Datsun driven by Hani al-Sayegh, a prominent member of the Saudi branch of Hezbollah, or "Party of God," pulled into the far corner of a parking lot adjacent to Building 131 at the King Abdul Aziz Airbase in Dhahran, along the oil-rich Persian Gulf coast of Saudi Arabia. The eight-story apartment structure was part of a housing complex known collectively as Khobar Towers, then home to more than two thousand American, British, French, and Saudi troops. Building 131 was occupied almost exclusively by members of the U.S. Air Force, enforcing the no-fly zone that had been in effect over southern Iraq ever since the end of the first Gulf War. With al-Sayegh in the Datsun was Abdallah al-Jarash, who had been recruited into Hezbollah at the Sayyeda Zeinab shrine in Damascus.A few minutes later, a white, four-door Chevrolet Caprice entered the parking lot and waited for the Datsun to blink its lights--the all-clear signal. When it did, a tanker truck followed the Chevy into the lot. The truck had been purchased earlier that month from a Saudi dealership for approximately 75,000 Saudi riyals and takento a farm outside Qatif, twenty minutes or so from Dhahran. There it had been outfitted with some five thousand pounds of explosives and turned into a massive bomb.After the truck backed up to a fence just in front of the north side of Building 131, the driver, Ahmed al-Mughassil, commander of the military wing of the Saudi Hezbollah, and his passenger, Ali al-Houri, a main Hezbollah recruiter, leaped from the cab, raced to the Chevy, and drove off, followed by the Datsun.Sgt. Alfredo Guerrero was pulling sentry duty on the rooftop at Building 131 when he saw the driver and passenger abandon the truck and the two cars speed away. Almost certain that they were staring at a bomb in the lot below them, Guerrero and two other sentries sounded an alarm. Then Guerrero, who had been stationed in Dhahran for only a month, began to race through the top floors of Building 131, warning people to leave. The sergeant had cleared the better part of two floors when the tank truck exploded, ripping a crater thirty-five feet deep and eighty-five feet wide and shearing off the north face of the apartment building.Despite the heroism of Alfredo Guerrero, who escaped without serious injury, nineteen Americans were murdered at Khobar Towers and more than five dozen others were hospitalized. In all, 372 U.S. military personnel suffered wounds in the explosion. Khobar was the most deadly attack on American citizens abroad in thirteen years, since the October, 1983 explosion at a U.S. Marine barracks in Beirut, Lebanon, killed 241 marines. And the totals might have been far higher. In his haste, the driver of the truck had parked perpendicular to Building 131. Had he parked parallel and delivered the impact of the explosion along a broader front, he might have succeeded in toppling the entire structure, with a catastrophically greater loss of life.My wife, Marilyn, and I and our children were visiting my parents at their home in North Bergen, New Jersey, when the Khobar terrorists struck. June 25, 1996, was a Tuesday, not a Saturday or aSunday, but the day afforded a rare chance to get everyone together. I'd kept my schedule light. Just as important, schools had let out only a few days earlier, and summer camps and other activities would soon kick in. Marilyn and I grabbed a small window of opportunity, and as so often seems to happen in hyperbusy lives, the window closed before we were ever quite through it. My mother was preparing dinner for the family when the FBI command center called to tell me that the attack had taken place a half hour earlier. (Saudi Arabia is seven hours ahead of East Coast time.) I'd never heard of Khobar Towers, but that was irrelevant. Marilyn and I immediately began to refill the car with the kids and their gear.My predecessor as director of the Federal Bureau of Investigation, William Sessions, had traveled with a large security detail, including a driver. He might have been wise to do so: the world is full of nuts. But I had been an FBI agent myself, one of the grunts, and I didn't choose to live in the grand style now that I ran the place. Nor did Marilyn and I want our children to grow up thinking they were in protective custody or that they had to travel in a convoy to see their own grandparents.I was at the wheel of my own car, heading unaccompanied down the New Jersey Turnpike, when I first discussed the attack with Attorney General Janet Reno, my direct boss and first line of communication with the Clinton administration. I also talked with then Deputy National Security Adviser Samuel R. "Sandy" Berger in those early hours after the attack. Sandy, who would take over as the principal adviser the next year with the resignation of Anthony Lake, was helping coordinate the national-security response, and the FBI was a vital part of that. I was on an unsecure car-phone line, though, and if Janet and Sandy did have more information than I had already picked up, they were unable to share it with me. In those early hours and for months to come, we all had far more questions than answers.Six and a half hours after Khobar Towers was hit and Building131 destroyed--about 10:00 P.M. East Coast time--Marilyn and I were pulling into our driveway in Great Falls, Virginia, just as Bill Clinton first announced the attack to the public, in a brief address from the Oval Office."The explosion appears to be the work of terrorists," the president explained. "If that's the case, like all Americans I am outraged by it. The cowards who committed this murderous act must not go unpunished. Within a few hours, an FBI team will be on its way to Saudi Arabia to assist in the investigation ... ."The president closed by echoing a point he had made earlier: "Let me say it again: We will pursue this," he said with a stern voice. "America takes care of our own. Those who did it must not go unpunished."Those were words--and a promise--I would not forget.For the FBI, the Khobar Towers attack was indeed a call to action. The Bureau's primary responsibilities were and remain domestic, but during my first three years as director, we had been expanding our global presence. Crime and terrorism had gone multinational, and we had to do so ourselves if we were to combat it effectively within our own borders. The Bureau also had specific extraterritorial responsibility for bombings where Americans were killed. That gave us jurisdiction, and we needed to exercise it as quickly as possible.Crime scenes can grow stale in a hurry. Evidence is lost, or it decays beyond any useful capacity. Well-meaning efforts to clear up the site of a human disaster can destroy vital information about angles of impact, the size of an explosion, and the nature of the explosive materials themselves. Often, too, the smallest and most easily lost remnants can be the most telling. A piece of circuit board no bigger than a fingernail found in the fields around Lockerbie, Scotland,ultimately led us to the Libyans who had blown Pan Am flight 103 out of the sky. We didn't want to miss something similar in this instance.All that is standard operating procedure for any crime scene, but from the very beginning it was clear that the attack on Khobar Towers was no ordinary criminal event. For one thing, it had occurred in an extraordinary place. Although it has long been one of America's most vital allies in the Middle East, Saudi Arabia ranks among the world's most closed societies. The usual problems of gaining access to a crime scene on foreign soil and establishing liaison with local authorities--never easy when you fly agents in to work an investigation--were compounded in this case not just by the secrecy that surrounds everything on the Arabian Peninsula but also by the special evidentiary needs of a legal system based on Islamic religious law, the Sharia. Just as Saudi overzealousness at the crime site could destroy evidence for us, so insensitivity on our part could destroy the admissibility of evidence for the Saudis.The real possibility existed, too, that wherever the attack had been planned and whoever had carried it out, local fundamentalists might well be involved. Saudi Arabia's able ambassador to the United States, Prince Bandar bin Sultan, had been quick to announce a reward of 10 million riyals (then about $3 million in U.S. dollars) for information leading to the arrest of the bombers. But the kingdom exists in a delicate balance between its vast ruling monarchy and the Wahhabis, the more conservative Muslims who control the streets and mosques. Were the attackers foreign or homegrown terrorists? Either way, we were walking into the middle of an incendiary arrangement, to the discomfort of both sides.The previous fall, following a similar bombing attack on a Riyadh compound where U.S. civilian contractors were training members of the Saudi National Guard, authorities had rounded up several suspects and questioned them over a period of many months.Just about a month before the Khobar attack, Saudi authorities had broadcast the subjects' confessions on state-controlled television, then beheaded the penitents before we had a chance to interview them, or even sit in on interviews the Saudis conducted. Again, the haste of the executions raised questions in the Clinton administration over what was being served: justice or expediency?We had more jurisdiction in the crime this time than we'd had in that earlier bombing--nineteen dead U.S. servicemen, as opposed to five murdered Department of Defense contractors--but there was no guarantee the Saudi royal family would see it that way or cooperate to any greater degree even if they did. Without that cooperation, we would end up once again spinning our wheels in the sand.... The memoir of the former director of the FBI covers not only the political scandals of the '90s, but also the Waco tragedy, the Oklahoma bombing, and efforts to eliminate the American Mafia. Adam Grupper narrates Freeh's take on crime-busting and political hanky-panky with crisp intelligence. Freeh's anecdotes, however, are strongly slanted against the decisions made by President Clinton, particularly regarding the bombing of the Khobar Towers in 1996. Freeh praises the actions of the first President Bush, who used his friendship with Saudi Prince Abdullah to gain Freeh access to bombing suspects, but paints Clinton as a savvy politician whose moral compass points only to expediency. Grupper reads even the most biased claims with appropriate journalistic objectivity. S.J.H. AudioFile 2006, Portland, Maine-- Copyright AudioFile, Portland, Maine --This text refers to an out of print or unavailable edition of this title.
( c );a-z;bill;biographies & memoirs;books;clinton;criminal law;intelligence & espionage;law;law enforcement;lawyers & judges;leaders & notable people;memoirs;people;political;politics & government;politics & social sciences;professionals & academics;public affairs & policy;social services & welfare;specific topics
21
1402074557
Transport Pricing of Electricity Networks Franois Lvque is professor of Law and Economics at the Ecole des mines de Paris. His academic, teaching and consulting interests are in the areas of environmental policy, antitrust and regulation. His research focuses on the assessment of policy instruments (e.g., access charges for railways, transmission tariffs, eco-taxes, co-venants) and policy reforms (e.g., gas and electricity French and European laws, EU deregulation in railways and airlines industries).
books;business & investing;economics;electrical & electronics;energy;engineering;exports & imports;finance;industries & professions;information management;international;management;management & leadership;marketing & sales;oil & energy;popular economics;pricing;professional & technical;sales & selling;telecommunications
20
0226057089
Black New Orleans, 1860-1880 John W. Blassingame (19402000) was a scholar of the history of American slavery and a former chairman of the African American Studies program at Yale University.
19th century;african-american studies;americas;books;business & finance;business & investing;civil war;economic history;economics;ethnic studies;historical study & educational resources;history;humanities;modern (16th-21st centuries);new;politics & social sciences;social history;social sciences;specific demographics;state & local;united states;used & rental textbooks
22
0814731198
The Games Black Girls Play: Learning the Ropes from Double-Dutch to Hip-Hop The Games Black Girls Play is beautifully and passionately written. This book presents an engaging reflexive narrative that ranges from childhood memories to involvement with ethnomusicological scholarship. Gaunt makes a convincing argument that the playsongs of African American girls is the foundation of African diasporic popular music-making. In a radical counter-history, she shows how African American girls-interlocutors who are triply minoritized through race, gender, and age-are producing music culture that has profound influences on popular music and the popular imagination. She calls for an engaged ethnomusicology and moves gracefully through an array of anti-essentialist perspectives on race and gender. She argues that kinetic orality is key to African American musicking and that the body is always a locus of memory and communality. From somatic historiography to serious cross-talk with girls, Gaunt offers new methodologies for ethnomusicological work. The reader is pulled into a world in which Black girls are masters of musical knowledge, and in emerging from the book, we can't see the world of American popular music in the same way. When we chant Miss Mary Mack, Mack, Mack is dressed in black, black, black, with silver buttons, buttons, buttons, all down her back, back, back, we suddenly see how musical play and embodied knowledge generates a world of raced and gendered sociality. Oo-lay oo-lay! Congratulations, Kyra!-President Elect Professor Deborah Wong,Society for EthnomusicologyGaunt provides a layered and rich analysis of a cultural form that has been all but ignored by scholars far and wide.-Gender and Society,The Games Black Girls Play is an insightful inquiry into a frequently overlooked and influential site of cultural production.-Popular Music,-;Fusing academic prose with vividly rendered memories, Gaunts journey is refreshing. . . . Gaunt successfully lifts ignored girls from obscurity to center stage. . . . With The Games Black Girls Play, Gaunt has created a necessary space for translating black girls joy in a society that typically overlooks it. Hopefully, others will take their turn and jump in to keep the games going.-Bitch ,In thoughtful and affectionate prose, Gaunt makes plain how the schoolyard syncopations of body and voice are both oral-kinetic play and improvised lessons in socializing girls into the unique social practices of black urban life. . . . The Games Black Girls Play is a smart, delightful and witty polemic of attributions; a cultural benchmark of the complex web of history, race and gender to suggest a gendered musical blackness and an ethnographic truth linking the intergenerational cultures of black musical expression as embodied in the infectious playfulness of black girls.-Black Issues Book Review, Kyra D. Gaunt is associate professor of ethnomusicology at Baruch College-CUNY. She lectures nationally and internationally on African Americans and Africans in the U.S. She is also a jazz vocalist, songwriter and recording artist.
african-american studies;arts & photography;books;discrimination & racism;ethnic & international;ethnomusicology;europe;history;humor & entertainment;music;musical genres;netherlands;politics & social sciences;popular culture;puzzles & games;race relations;rap;social sciences;sociology;specific demographics
20
0521780195
An Introduction to Support Vector Machines and Other Kernel-based Learning Methods "This book is an excellent introduction to this area... it is nicely organized, self-contained, and well written. The book is most suitable for the beginning graduate student in computer science." Richard A Chechile, Journal of Mathematical Psychology This is the first comprehensive introduction to Support Vector Machines (SVMs), a new generation learning system based on recent advances in statistical learning theory. SVMs deliver state-of-the-art performance in real-world applications such as text categorisation, hand-written character recognition, image classification, biosequences analysis, etc., and are now established as one of the standard tools for machine learning and data mining. Students will find the book both stimulating and accessible, while practitioners will be guided smoothly through the material required for a good grasp of the theory and its applications.
algorithms;artificial intelligence;bioinformatics;biological sciences;books;computer science;computers & technology;human vision & language systems;information theory;machine learning;mathematics;modeling & simulation;new;programming;programming languages;science & math;science & mathematics;software;used & rental textbooks
19
0070170479
Schaum's Outline of Feedback and Control Systems Master feedback and control systems with Schaum'sthe high-performance study guide. It will help you cut study time, hone problem-solving skills, and achieve your personal best on exams! Students love Schaum's Outlines because they produce results. Each year, hundreds of thousands of students improve their test scores and final grades with these indispensable study guides. Get the edge on your classmates. Use Schaum's! If you don't have a lot of time but want to excel in class, this book helps you: Brush up before tests Find answers fast Study quickly and more effectively Get the big picture without spending hours poring over lengthy textbooks Schaum's Outlines give you the information your teachers expect you to know in a handy and succinct formatwithout overwhelming you with unnecessary details. You get a complete overview of the subject. Plus, you get plenty of practice exercises to test your skill. Compatible with any classroom text, Schaum's let you study at your own pace and remind you of all the important facts you need to rememberfast! And Schaum's are so complete, they're perfect for preparing for graduate or professional exams. Inside, you will find: 700 fully solved problems Hundreds of additional practice problems, with answers supplied Clear explanations of both continuous (analog) and discrete (digital) systems Concise help with the math you need throughout the course, including examples More about control systems than most textbooks If you want top grades and thorough understanding of feedback and control systems, this powerful study tool is the best tutor you can have! --This text refers to an out of print or unavailable edition of this title. Joseph J. DiStefano, III is a professor of computer science and medicine. He is also the director of the Biocybernetics Research Laboratory and chair of the Cybernetics Interdepartmental program at UCLA. DiStefano is on the editorial boards of "Annals of Biomedical Engineering" and "Optimal Control Applications and Methods," as well as the editor and founder of the Modeling Methodology Forum in the "American Journals of Physiology." Allen R. Stubberud is a professor of electrical and computer engineering at the University of California, Irvine. He is the author of more than 100 articles and books, and belongs to a number of professional and technical organizations, including the American Institute of Aeronautics and Astronautics. He is a fellow of the Institute of Electrical and Electronics Engineers and the American Association for the Advancement of Science. Ivan J. Williams is a project manager at the Space and Technology Group of TRW. He has instructed courses in control systems engineering at the UCLA.
artificial intelligence;books;computer science;computer technology;computers & technology;control systems;education & reference;electrical & electronic engineering;electrical & electronics;engineering;hardware;microprocessors & system design;new;professional & technical;robotics;study guides;studying & workbooks;test prep & study guides;used & rental textbooks
19
1861000111
Beginning Atl Com Programming The Active Template Library (ATL) is the part of the Microsoft Foundation Classes (MFC) used to build reusable and very efficient components in C++. Achieving this efficiency can be difficult, as it requires you to delve into the details of Microsoft's Component Object Model (COM) and ATL itself. With Beginning ATL COM Programming, however, it should be possible for any C++/MFC programmer to become productive with this exciting component technology. The book begins with the basics of COM programming, featuring good details on the actual Win32 APIs used throughout COM programming. (This section also discusses the basics of the component definition, including Interface Definition Language [IDL] and related conventions.) While higher-level classes in MFC make it easier to build COM components, you'll have to do most of the work yourself if you're building lightweight ATL controls. The authors cover such ATL topics as event handling (with connection points), automation and error handling, and properties and persistence for ATL-based components. They use plenty of short, effective code examples throughout this tutorial to illustrate key concepts. The book closes with an example of Internet Explorer ATL controls (which are leaner) and "full" controls (which can be reused in such applications as Visual Basic). The world of ATL development is rough terrain, but the team of authors here succeeds in explaining a difficult subject clearly. --Rich Dragan The book is primarily for Visual C++ developers (although ATL is freely available from Microsoft's web site at present and can be used with some Borland compilers). The reader will be fairly experienced in using MFC, and may well have used the Wizards to produce simple MFC controls in the past. The book is ideal for people who need to get to grips with the principles of COM and the ways in which ATL handles much of the complexity for the programmer George has spent 10 years in C++ and developed in Windows since C7 and the SDK. He is an ActiveX expert and a member of Microsoft's IIS team - founder member of all the IIS / ISAPI discussion forums Dr. Richard Grimes is a former distributed computing architect with Parallax Systems in the U.K. and now is a full time Author, Consultant and Speaker specializing in COM and DCOM programming Julian Templeman is a lecturer in C/C++/Java . He specializes in COM and MFC based development. He is an established Author and speaker Alex Stockton is a Physicist and computer book Technical Editor. Alex is an expert in COM /DCOm/C++ and ATL development Chapter Four Automation and Error Handling During this chapter, you'll see a number of different terms to describe the interfaces supported by an Automation object. This is largely for historical reasons. The term 'Automation' was first coined in the phrase 'OLE Automation' when COM was first developed. The philosophy then was that a programmer could write several Automation objects - some with user interfaces and others without - and then 'glue' them together to create an application with a scripting language like VB3. Visual Basic would 'automate' these objects, that is, it would create them and then tell them what to do. Over time, Automation (the 'OLE' has been dropped) has become a wider-ranging technology. Visual Basic is still important, of course, but now there is VBA (present as a macro language in many applications), Microsoft Java and VBScript. All of these languages will talk to Automation objects. Automation objects use an interface called IDispatch, so you can tell if an object can be 'automated' by querying for this interface. However, unlike those early OLE Automation objects that typically only exposed IDispatch, these days the interface is often just one way to get access to an object. Server objects implement Automation by allowing clients to use a method on the IDispatch interface to call other methods. The collection of methods it makes available in this way is called a dispinterface (short for 'dispatch interface'). IDispatch allows an object to indicate what dispinterface methods it supports in two different ways. It can be done at runtime, through other IDispatch methods; or else the object can be a little more expressive and maintain information about its dispinterfaces that a client can use at compile time. The client can still ask the object for information about its dispinterfaces, and can call those interface methods dynamically. As you can imagine, the information that object provides must include details of all the dispinterfaces it supports, all the methods on those dispinterfaces, and all the parameters of those methods. This information is called type information. For an object to be an Automation object, it means that a client should be able to get access to its type information. The object can supply this directly, or more typically it can be supplied by the type library files that we have seen generated by our projects in earlier chapters. A type library is effectively a tokenized version of the IDL file, and so it describes all the interfaces supported by the object, all the methods, and the parameters of those methods. Since a type library describes exactly what an interface can do, it can be used to marshal data between processes. All Automation methods must use the Automation-compatible data types we mentioned in the last chapter. This means that the Universal Marshaler can be used to marshal Automation method calls, although to do so it must read the type library whenever it wants to marshal a method request. This is slower than the case with a proxy-stub DLL where the proxy object 'knows' about the data that needs to be marshaled. Furthermore, when you access a method in a dispinterface, the call always has to go through IDispatch, even if the object is inproc. There is obviously a performance issue here. To get round this, you can describe an interface as being both a dispinterface and a custom interface. This way, you have the convenience of being able to call the interface methods using IDispatch or the custom part of the interface. Such an interface is called a dual interface, and the Object Wizard allows you to write Automation interfaces through its Dual interface option.
apis & operating environments;books;c;c & c++ windows programming;com;com & dcom;computers & technology;dcom & atl;development;education & reference;introductory & beginning;languages & tools;mathematics;microsoft;networking;networks;object-oriented design;programming;protocols & apis;science & math;software;software design;testing & engineering;visual c++
24
0810836491
Actors on Red Alert ...the five actorsPhil Brown, Rose Hobart, Marsha Hunt, Marc Lawrence, and Doris Nolanform interesting case studies helped along through Slide's gentle prompting, utilising the blacklisting and graylisting as the bond holding each of the lives together...both vivid and invaluable...a valuable resource to students and enthusiasts alike...What is clear from Slide's patient and intelligent questioning is the vibrancy of the memories of five unequivocally different actors... (Historical Journal Of Film, Radio And Television )Although the subject's been covered before, here is the personal record on how the blacklist, a result of the inquiry of The House On UnAmerican Activities Committee, personally hurt the careers and psyche of these people. (Rapport ) Anthony Slide has published many books and articles on the performing arts. He is a highly respected scholar of film history, and has authored such books as The New Historical Dictionary of the American Film Industry (1998), On Actors and Acting (1998), and Ravished Armenia and the Story of Aurora Mardiganian (1997).
20th century;acting & auditioning;arts & literature;arts & photography;biographies;biographies & memoirs;books;business & investing;communism & socialism;entertainers;film & television;historical;history;humanities;humor & entertainment;ideologies & doctrines;industries & professions;modern (16th-21st centuries);movies;new;performing arts;political ideologies;political science;politics & government;politics & social sciences;social sciences;sports & entertainment;theater;used & rental textbooks
29
0702026042
Veterinary Medicine: A Textbook of the Diseases of Cattle, Sheep, Pigs, Goats and Horses 9th Edition Professor O. Radostits, DVM, MSc, Professor and Head, University of Saskatchewan Western College of Veterinary Medicine, Department of Veterinary Internal Medicine, Saskatoon, Canada. Professor Clive Gay, DVM, MVSc, FACVS, Washington State University, Division of Veterinary Clinical Sciences, Pullman, Washington. Professor D. Blood, OBE, BVSc, FACVS, HonLD(Sask), HonARCVS, HonDVSc, HonLLD(Guelph), Emeritus Professor, Werribee, Australia. Dr. Ken Hinchcliff , BVSc (Hons), MS, PhD, Department of Veterinary Clinical Sciences, College of Veterinary Medicine, Ohio State University, Columbus, USA.
agricultural sciences;animal husbandry;books;clinical;diseases;education & reference;equine;equine medicine;food animal;food animals;general;internal medicine;medical books;medicine;medicine & health sciences;new;pathology;reference;science & math;used & rental textbooks;veterinary medicine
21
0130895725
C How to Program (3rd Edition) Preface Welcome to ANSI/ISO Standard C, and to C++ and Java, too! This book is by an old guy and a young guy. The old guy (HMD; Massachusetts Institute of Technology 1967) has been programming and/or teaching programming for 39 years. The young guy (PJD; MIT 1991) has been programming for 18 years and has .caught the teaching and writing "bug." The old guy programs and teaches from experience; the young guy does so from an inexhaustible reserve of energy. The old guy wants clarity; the young guy wants performance. The old guy appreciates elegance and beauty; the young guy wants results. We got together to produce a book we hope you will find informative, interesting and entertaining. Why We Wrote C How to Program: In most educational environments, C is taught to people who know how to program. Many educators believe that the complexity of C, and a number of other difficulties, make C unworthy for a first programming courseprecisely the target course for this book. So why did we write this text? Dr. Harvey M. Deitel taught introductory programming courses in college environments for two decades with an emphasis on developing clearly written, well-structured programs. Much of what is taught in these courses is the basic principles of structured programming, with an emphasis on the effective use of control structures and functionalization. We have presented this material exactly the way HMD has done in his college courses. Students are highly motivated by the fact that they are learning a language that will be immediately useful to them as they leave the university environment. Our goal was clear: Produce a C programming textbook for introductory university-level courses in computer programming for students with little or no programming experience, yet offer the deep and rigorous treatment of theory and practice demanded by traditional C courses. To meet these goals, we produced a book larger than other C textsthis because our text also patiently teaches structured programming principles. Hundreds of thousands of students worldwide learned C from the earlier editions of this book. The book contains a rich collection of examples, exercises and projects drawn from many fields to provide the student with a chance to solve interesting real-world problems. The book also concentrates on the principles of good software engineering and stresses program clarity through use of the structured programming methodology. We teach by example. C How to Program: Third Edition The material from C How to Program: Third Edition has been meticulously reviewed by many industry and academic experts, including the head of the ANSI C committee. We have considerably polished the material from the second edition, especially the chapter on pointers. In the second edition of C How to Program, we included a seven-chapter introduction to C++ and Object-Oriented Programming. In the interim, many universities have decided to incorporate an introduction to C++ and Object-Oriented Programming into their C courses. So in this edition, we have expanded our C++ treatment to nine chapterssufficient text, exercises and laboratories for a one-semester course. We have also added seven chapters on object-oriented programming with Java, including discussions of graphics programming, graphical user interface (GUI) with Java Swing components and multimedia programming. In 1999, the International Standards Organization approved anew version of C, known as C99; but as of this writing, no C99 compilers were available. Therefore, we were not able to make our code examples compatible with C99. When C99 compilers become available, we will test every program in the textbook and list any discrepancies on our Web site (deitel). We will also post code examples with explanations of the new C99 features on that Web site. Appendix B contains a comprehensive list of C99 resources on the Internet and World Wide Web. For more information on C99and to purchase a copy of the standards document (ISO/IEC 9899:1999)visit the Web site of the American National Standards Institute (ANSI), (ansi). C How to Program: Third Edition Ancillary Package We have worked hard to produce a textbook and ancillaries that we hope you and your students will find valuable. We would like to thank Borland for providing the products included on the CD-ROM in the back of this textbook; these products enable the reader to compile and run programs in C, C++ and Java. The following ancillary resources are available:C How to Program: Third Edition's 270 program examples are included on the CD-ROM in the back of the textbook and are also available for download at deitel. This helps instructors prepare lectures faster and helps students master C. When extracting the source code from the ZIP file, you must use a ZIP-file reader such as WinZip (winzip) or PKZIP (pkware) that understands directories. The file should be extracted into a separate directory (e.g., chtp3e_examples). Students should compile and execute each program they study in the text. A full version of Borland C++ Compiler 5.5 is provided on the textbook's CDROM. This software allows students to edit, compile and debug C and C++ programs from the command line. A 60-day trial version of Borland C++Builder 5 is also included; this product provides a complete integrated C/C++ development environment. A trial version of JBuiLder 3.5 is provided on the textbook's CD-ROM. This software enables students to edit, compile and debug Java programs in an integrated development environment. The Instructor's Manual CD contains answers to most of the exercises in the textbook. The programs are separated into directories by chapter and exercise number. NOTE: Please do not write to us requesting the instructor's CD. Distribution of this CD is limited strictly to college professors teaching from the book. Instructors may obtain the solutions manual only from their Prentice Hall representatives. Companion Web Site (prenhall/deitel) provides instructor and student resources. Instructor resources include textbook appendices (e.g., Appendix A, "Internet and World Wide Web Resources") and a syllabus manager for lesson planning. Student resources include chapter objectives, true/false review questions with answers, chapter highlights, reference materials and a message board. Customizable PowerPoint Instructor Lecture Notes, including source code and key discussion points for each program and major illustration. These lecture notes are available for instructors and students at no charge at our deitel Web site. Although instructors may modify these notes and use them in class presentations, please be aware that these notes are copyrighted by Prentice Hall and may not be used without the express written permission of Prentice Hall. About this Book C How to Program contains a rich collection of examples, exercises and projects drawn from many fields to provide the student with a chance to solve interesting real-world problems. The book concentrates on the principles of good software engineering and stresses program clarity. We teach by example. This book is written by educators who spend most of their time teaching and writing about edge-of-the-practice programming languages. The text places a strong emphasis on pedagogy. For example, virtually every new concept of either C, C++ or Java is presented in the context of a complete, working program immediately followed by a window showing the program's inputs and outputs. Reading these programs is much like entering and running them on a computer. We call this our "live-code approach." Among the other pedagogical devices in the text are a set of Objectives and an Outline at the beginning of every chapter; Common Programming Errors, Good Programming Practices, Performance Tips, Portability Tips, Software Engineering Observations and Testing and Debugging Tips enumerated in, and summarized at, the end of each chapter; comprehensive bullet-list-style Summary and alphabetized Terminology sections in each chapter; Self-Review Exercises and Answers in each chapter; and the richest collection of Exercises in any C book. The exercises range from simple recall questions to lengthy programming problems to major projects. Instructors requiring substantial term projects will find many appropriate problems listed in the exercises, especially in the later chapters. We have put a great deal of effort into the exercises to enhance the value of this course for the student. In writing this book, we have used a variety of C compilers. For the most part, the programs in the text will work on all ANSI/ISO C compiler, including the Borland C++ compiler included with this book. The C material (Chapters 2-14) follows the ANSI C standard published in 1990. Many features of ANSI C will not work with pre-ANSI C versions and may not work with ISO C99 compilers, when they become available. See the reference manuals for your particular system for more details about the language, or obtain a copy of ANSI/ISO 9899: 1990, "American National Standard for Information SystemsProgramming Language C," from the American National Standards Institute, 11 West 42nd Street, New York, New York 10036. The C++ material is based on the C++ programming language as developed by Accredited Standards Committee X3, Information Technology and its Technical Committee X3J16, Programming Language C++, respectively. The C and C++ languages were approved by the International Standards Organization (ISO). For further details, contact: X3 Secretariat 1250 Eye Street NW Washington DC 20005 The serious programmer should read these documents carefully and reference them regularly. These documents are not tutorials. Rather they define their respective languages with the extraordinary level of precision that compiler implementors and "heavy-duty" developers demand. The Java chapters are based on Sun Microsystems most recent Java release-the Java 2 Platform. Sun provides an implementation of the Java 2 Platform called the Java 2 Software Development Kit (J2SDK), version 1.3 that includes the minimum set of tools you need to write software in Java. For further details on the latest implementation of Java, visit (java.sun). We have carefully audited our presentation against these documents and documentation. Our book is intended to be used at the introductory and intermediate levels. We have not attempted to cover every feature discussed in these comprehensive documents. Objectives Each chapter begins with a statement of objectives. This tells the student what to expect and gives the student an opportunity, after reading the chapter, to determine if he or she has met these objectives. It is a confidence builder and a source of positive reinforcement. Quotations The learning objectives are followed by a series of quotations. Some are humorous, some are philosophical and some offer interesting insights. Our students enjoy relating the quotations to the chapter material. You may appreciate some of the quotations more after reading the chapters. Outline The chapter outline helps the student approach the material in top-down fashion. This, too, helps students anticipate what is to come and set a comfortable and effective learning pace. Sections Each chapter is organized into small sections that address key C, C++ or Java topics. 12,187 Lines of Syntax-Highlighted Code in 270 Example Programs (with Program Outputs) We present C, C++ and Java features in the context of complete, working programs; each program is immediately followed by a window containing the outputs produced when the program is runwe call this our "live-code approach." This enables the student to confirm that the programs run as expected. Relating outputs back to the program statements that produce those outputs is an excellent way to learn and to reinforce concepts. Our programs exercise the diverse features of C, C++ and Java. Reading the book carefully is much like entering and running these programs on a computer. The code is "syntax highlighted" with keywords appearing in the second color of the book, comments appearing in a lighter shade of that color and the rest of each program appearing in black. This makes it much easier to read the code-students will especially appreciate the syntax highlighting when they read the many more substantial programs we present. 473 Illustrations/Figures An abundance of colorized charts and line drawings is included. The discussions of control structures in Chapters 3 and 4 feature carefully drawn flowcharts. (Note: We do not teach the use of flowcharting as a program development tool, but we do use a brief flowchart-oriented presentation to specify the precise operation of C's control structures.) Chapter 12, "Data Structures," uses colorized line drawings to illustrate the creation and maintenance of linked lists, queues, stacks and binary trees. The remainder of the book is abundantly illustrated. 784 Programming Tips We have included six design elements to help students focus on important aspects of program development, testing and debugging, performance and portability. We highlight hundreds of these tips in the form of Good Programming Practices, Common Programming Errors, Performance Tips, Portability Tips, Software Engineering Observations and Testing and Debugging Tips. These tips and practices represent the best we have been able to glean from almost six decades (combined) of programming and teaching experience. One of our studentsa mathematics majortold us recently that she feels this approach is somewhat like the highlighting of axioms, theorems and corollaries in mathematics books; it provides a basis on which to build good software.163 Good Programming PracticesGood Programming Practices are highlighted in the text. They call the student's attention to techniques that help produce better programs. When we teach introductory courses to nonprogrammers, we state that the "buzzword" of each course is "clarity," and we tell the students that we will highlight (in these Good Programming Practices) techniques for writing programs that are clearer, more understandable and more maintainable. 262 Common Programming ErrorsStudents learning a languageespecially in their first programming coursetend to make certain kinds of errors frequently. Focusing on these Common Programming Errors helps students avoid making the same errors. It also helps reduce long lines outside instructors' offices during office hours! 76 Performance TipsIn our experience, teaching students to write clear and understandable programs is by far the most important goal for a first programming course. But students want to write the programs that run the fastest, use the least memory, require the smallest number of keystrokes, or dazzle in other nifty ways. Students really care about performance. They want to know what they can do to "turbo charge" their programs. So we have include Performance Tips to highlight opportunities for improving program performance. 41 Portability TipsSoftware development is a complex and expensive activity. Organizations that develop software must often produce versions customized to a variety of computers and operating systems. So there is a strong emphasis today on portability, i.e., on producing software that will run on a variety of computer systems with few, if any, changes. Many people tout C/C++ as appropriate languages for developing portable software, especially because ANSI/ISO C and C++ are the global standards for those languages. Some people assume that if they implement an application in C++, the application will automatically be portable. This is simply not the case. Achieving portability requires careful and cautious design. There are many pitfalls. We include numerous Portability Tips to help students write portable code. Java was designed to maximize portability, but Java programs can also require modifications to "port" them. 187 Software Engineering ObservationsThe Software Engineering Observations highlight techniques, architectural issues and design ' issues, etc. that affect the architecture and construction of software systems, especially large-scale systems. Much of what the student learns here will be useful in upper-level courses and in industry as the student begins to work with large, complex real-world systems. C, C++ and Java are especially effective languages for performing good software engineering. 23 Testing and Debugging TipsThis "tip type" may be misnamed. When we decided to incorporate Testing and Debugging Tips into this new edition, we thought these tips would be suggestions for testing programs to expose bugs and suggestions for removing those bugs. In fact, most of these tips tend to be observations about capabilities and features of C, C++ and Java that prevent bugs from getting into programs in the first place. 32 Look-and-Feel ObservationsIn the Java portion of this book, we provide Look-and-Feel Observations to highlight graphical user interface conventions. These observations help students design their own graphical user interfaces to conform with industry norms. Summary Each chapter ends with additional pedagogical devices. We present an extensive, bulletlist-style Summary in every chapter. This helps the student review and reinforce key concepts. There is an average of 37 summary bullets per chapter. Terminology We include a Terminology section with an alphabetized list of the important terms defined in the chapteragain, further reinforcement. There is an average of 73 terms per chapter. Summary of Tips, Practices and Errors We collect and list from the chapter the Good Programming Practices, Common Programming Errors, Look-and-Feel Observations, Performance Tips, Portability Tips. Software Engineering Observations and Testing and Debugging Tips. 728 Self-Review Exercises and Answers (Count Includes Separate Parts) Extensive Self-Review Exercises and Answers to Self-Review Exercises are included for self study. This gives the student a chance to build confidence with the material and prepare to attempt the regular exercises. 994 Exercises (Count Includes Separate Parts; 1722 Total Exercises) Each chapter concludes with a substantial set of exercises including simple recall of important terminology and concepts; writing individual program statements; writing small portions of functions and C++/Java classes; writing complete functions, C++/Java classes and programs; and writing major term projects. The large number of exercises enables instructors to tailor their courses to the unique needs of their audiences and to vary course assignments each semester. Instructors can use these exercises to form homework assignments, short quizzes and major examinations. 550 page Instructor's Manual with Solutions to the Exercises The solutions for the exercises are included on the Instructor's CD and on the disks available only to instructors through their Prentice Hall representatives. NOTE: Please do not write to us requesting the instructor's CD. Distribution of this CD is limited strictly to college professors teaching from the book. Instructors may obtain the solutions manual only from their Prentice Hall representatives. 5058 Index Entries (Total of 8268 Counting Multiple References) We have included an extensive Index at the back of the book. This helps the student find any term or concept by keyword. The Index is useful to people reading the book for the first time and is especially useful to practicing programmers who use the book as a reference. Most of the terms in the Terminology sections appear in the Index (along with many more index items from each chapter). Thus, the student can use the Index in conjunction with the Terminology sections to be sure he or she has covered the key material of each chapter. A Tour of the Book The book is divided into four major parts. The first part, Chapters 1 through 14,.presents a thorough treatment of the C programming language including a formal introduction to structured programming. The second part (Chapters 15 through 23)unique among C textbookspresents a substantial treatment of C++ and object-oriented programming sufficient for an upper-level undergraduate college course. The third partChapters 24 through 30 (and also unique among C books) presents a thorough introduction to Java 2, including graphics programming, graphical user interface (GUI) programming using Java Swing, multimedia programming and event-driven programming. The fourth part, Appendices A through E, presents a variety of reference materials that support the main text. Chapter 1Introduction to Computers, the Internet and the World Wide Web discusses what computers are, how they work and how they are programmed. It introduces the notion of structured programming and explains why this set of techniques has fostered a revolution in the way programs are written. The chapter gives a brief history of the development of programming languages from machine languages, to assembly languages, to high-level languages. The origins of the C, C++ and Java programming languages are discussed. The chapter includes an introduction to a typical C programming environment. We discuss the explosion in interest in the Internet that has occurred with the advent of the World Wide Web and the Java programming language. Chapter 2Introduction to C Programminggives a concise introduction to writing C programs. A detailed treatment of decision making and arithmetic operations in C is presented. After studying this chapter, the student will understand how to write simple, but complete, C programs. Chapter 3Structured Program Developmentis probably the most important chapter in the text, especially for the serious student of computer science. It introduces the notion of algorithms (procedures) for solving problems. It explains the importance of structured programming in producing programs that are understandable, debuggable, maintainable and more likely to work properly on the first try. It introduces the fundamental control structures of structured programming, namely the sequence, selection (if and if /else) and repetition (while) structures. It explains the technique of top-down, stepwise refinement that is critical to the production of properly structured programs. It presents the popular program design aid, structured pseudocode. The methods and approaches used in Chapter 3 are applicable to structured programming in any programming language, not just C. This chapter helps the student develop good programming habits in preparation for dealing with the more substantial programming tasks in the remainder of the text. Chapter 4C Program Controlrefines the notions of structured programming and introduces additional control structures. It examines repetition in detail and compares the alternatives of counter-controlled loops and sentinel-controlled loops. The for structure is introduced as a convenient means for implementing counter-controlled loops. The switch selection structure and the do/while repetition structure are presented. The chapter concludes with a discussion of logical operators. Chapter 5C Functionsdiscusses the design and construction of program modules. C's function-related capabilities includes standard library functions, programmer-defined functions, recursion and call-by-value capabilities. The techniques presented in Chapter 5 are essential to the production and appreciation of properly structured programs, especially the kinds of larger programs and software that system programmers and application programmers are likely to develop in real-world applications. The "divide and conquer" strategy is presented as an effective means for solving complex problems by dividing them into simpler interacting components. Students enjoy the treatment of random numbers and simulation, and they appreciate the discussion of the dice game of craps which makes elegant use of control structures. The chapter offers a solid introduction to recursion and includes a table summarizing the dozens of recursion examples and exercises distributed throughout the remainder of the book. Some books leave recursion for a chapter late in the book; we feel this topic is best covered gradually throughout the text. The extensive collection of exercises at the end of the Chapter 5 includes several classical recursion problems such as the Towers of Hanoi. Chapter 6C Arraysdiscusses the structuring of data into arrays, or groups, of related data items of the same type. The chapter presents numerous examples of both single- sub scripted arrays and double- subscripted arrays. It is widely recognized that structuring data properly is just as important as using control structures effectively in the development of properly structured programs. Examples in the chapter investigate various common array manipulations, printing histograms, sorting data, passing arrays to functions and an introduction to the field of survey data analysis (with sample statistics). A feature of this chapter is the careful presentation of elementary sorting and searching techniques and the presentation of binary searching as a dramatic improvement over linear searching. The end-of-chapter exercises include a variety of interesting and challenging problems, such as improved sorting techniques, the design of an airline reservations system, an introduction to the concept of turtle graphics (made famous in the LOGO language) and the Knight's Tour and Eight Queens problems that introduce the notions of heuristic programming so widely employed in the field of artificial intelligence. Chapter 7C Pointerspresents one of the most powerful and difficult to master features of the C language, namely pointers. The chapter provides detailed explanations of pointer operators, call by reference, pointer expressions, pointer arithmetic, the relationship between pointers and arrays, arrays of pointers and pointers to functions. The chapter exercises include a simulation of the classic race between the tortoise and the hare, card shuffling and dealing algorithms and recursive maze traversals. A special section entitled "Building Your Own Computer" is also included. This section explains machine language programming and proceeds with a project involving the design and implementation of a computer simulator that allows the reader to write and run machine language programs. This unique feature of the text will be especially useful to the reader who wants to understand how computers really work. Our students enjoy this project and often implement substantial enhancements, many if which are suggested in the exercises. In Chapter 12, another special section guides the reader through building a compiler; the machine language produced by the compiler is then executed on the machine language simulator produced in Chapter 7. Chapter 8C Characters and Stringsdeals with the fundamentals of processing nonnumeric data. The chapter includes a complete walkthrough of the character and string processing functions available in C's libraries. The techniques discussed here are widely used in building word processors, page layout and typesetting software and text-processing applications. The chapter includes an interesting collection of exercises that explore text-processing applications. The student will enjoy the exercises on writing limericks, writing random poetry, converting English to pig Latin, generating seven-letter words that are equivalent to a given telephone number, text justification, check protection, writing a check amount in words, generating Morse Code, metric conversions and dunning letters. The last exercise challenges the student to use a computerized dictionary to create a crossword puzzle generator. Chapter 9C Formatted Input/Outputpresents all the powerful formatting capabilities of printf and scanf. We discuss printf's output formatting capabilities such as rounding floating point values to a given number of decimal places, aligning columns of numbers, right justification and left justification, insertion of literal information, forcing a plus sign, printing leading zeros, using exponential notation, using octal and hexadecimal numbers and controlling field widths and precisions. We discuss all of printf's escape sequences for cursor movement, printing special characters and causing an audible alert. We examine all of scanf's input formatting capabilities including inputting specific types of data and skipping specific characters in an input stream. We discuss all of scanf's conversion specifiers for reading decimal, octal, hexadecimal, floating point, character and string values. We discuss scanning inputs to match (or not match) the characters in a scan set. The chapter exercises test virtually all of C's formatted input/output capabilities. Chapter 10C Structures, Unions, Bit Manipulations and Enumerationspresents a variety of important features. Structures are like records in Pascal and other programming languages-they group data items of various types. Structures are used in Chapter 11 to form files consisting of records of information. Structures are used in conjunction with pointers and dynamic memory allocation in Chapter 12 to form dynamic data structures such as linked lists, queues, stacks and trees. Unions enable an area of memory to be used for different types of data at different times; such sharing can reduce a program's memory requirements or secondary-storage requirements. Enumerations provide a convenient means of defining useful symbolic constants; this helps make programs more self-documenting. C's powerful bit manipulation capabilities enable programmers to write programs that exercise lower-level hardware capabilities. This helps programs process bit strings, set individual bits on or off and store information more compactly. Such capabilities, often found only in low-level assembly languages, are valued by programmers writing system' software such as operating systems and networking software. A feature of the chapter is its revised, high-performance card shuffling and dealing simulation. This is an excellent opportunity for the instructor to emphasize the quality of algorithms. Chapter 11C File Processingdiscusses the techniques used to process text files with sequential access and random access. The chapter begins with an introduction to the data hierarchy from bits, to bytes, to fields, to records, to files. Next, C's simple view of files and streams is presented. Sequential-access files are discussed using programs that show how to open and close files, how to store data sequentially in a file and how to read data sequentially from a file. Random-access files are discussed using programs that show how to create a file sequentially for random access, how to read and write data to a file with random access and how to read data sequentially from a randomly accessed file. The fourth random-access program combines many of the techniques of accessing files both sequentially and randomly into a complete transaction-processing program. Students in our industry seminars have told us that after studying the material on file processing, they were able to produce substantial fileprocessing programs that were immediately useful in their organizations. Chapter 12C Data Structuresdiscusses the techniques used to create and manipulate dynamic data structures. The chapter begins with discussions of self-referential structures and dynamic memory allocation and proceeds with a discussion of how to create and maintain various dynamic data structures including linked lists, queues (or waiting lines), stacks and trees. For each type of data structure, we present complete, working programs and show sample outputs. The chapter helps the student master pointers. The chapter includes abundant examples using indirection and double indirection-a particularly difficult concept. One problem when working with pointers is that students have trouble visualizing the data structures and how their nodes are linked together. So we have included illustrations that show the links, and the sequence in which they are created. The binary tree example is a superb capstone for the study of pointers and dynamic data structures. This example creates a binary tree; enforces duplicate elimination; and introduces recursive preorder, inorder and postorder tree traversals. Students have a genuine sense of accomplishment when they study and implement this example. They particularly appreciate seeing that the inorder traversal prints the node values in sorted order. The chapter includes a substantial collection of exercises. A highlight of the exercises is the special section "Building Your Own Compiler." The exercises walk the student through the development of an infix-to-postfix-conversion program and a postfix-expression-evaluation program. We then modify the postfix evaluation algorithm to generate machine-language code. The compiler places this code in a file (using the techniques of Chapter 11). Students then run the machine language produced by their compilers on the software simulators they built in the exercises of Chapter 7! Chapter 13The C Preprocessorprovides detailed discussions of the preprocessor directives. The chapter includes detailed information on the #include directive that causes a copy of a specified file to be included in place of the directive before the file is compiled and the #define directive that creates symbolic constants and macros. The chapter explains conditional compilation for enabling the programmer to control the execution of preprocessor directives and the compilation of program code. The # operator that converts its operand to a string and the ## operator that concatenates two tokens are discussed. Predefined symbolic constants _LINE_, _FILE_, _DATE_, and _TIME_ are presented. Finally, macro assert of the assert.h header is discussed. Macro assert is valuable in program testing, debugging, verification and validation. Chapter 14C Advanced Topicspresents additional topics including several advanced topics not ordinarily covered in introductory courses. We show how to redirect program input to come from a file, redirect program output to be placed in a file, redirect the output of one program to be the input of another-this called "piping", append the output of a program to an existing file, develop functions that use variable-length argument lists, pass command-line arguments to function main and use them in a program, compile programs whose components are spread across multiple files, register functions with atexit to be executed at program termination, terminate program execution with function exit, use the const and volatile type qualifiers, specify the type of a numeric constant using the integer and floating-point suffixes, use the signal-handling library to trap unexpected events, create and use dynamic arrays with calloc and realloc, and use unions as a space-saving technique. Chapter 15C++ as a "Better C"introduces the non-object-oriented features of C++. These features improve the process of writing procedural programs. The chapter discusses single-line comments, stream input/output, declarations, creating new data types, function prototypes and type checking, inline functions (as a replacement for macros), reference parameters, the const qualifier, dynamic memory allocation, default arguments, the unary scope resolution operator, function overloading, linkage specifications and function templates. Chapter 16C++ Classes and Data Abstractionbegins our discussion of object-based programming. The chapter represents a wonderful opportunity for teaching data abstraction the "right way"-through a language (C++) expressly devoted to implementing abstract data types (ADTs). In recent years, data abstraction has become a major topic in introductory computing courses. Chapters 16 through 18 include a solid treatment of data abstraction. Chapter 16 discusses implementing ADTs as C++-style classes and why this approach is superior to using structs, accessing class members, separating interface from implementation, using access functions and utility functions, initializing objects with constructors, destroying objects with destructors, assignment by default memberwise copy and software reusability. One of the chapter exercises challenges the reader to develop a class for complex numbers. Chapter 17C++ Classes Part IIcontinues the study of classes and data abstraction. The chapter discusses declaring and using constant objects, constant member functions, composition-the process of building classes that have objects of other classes as members, friend functions and friend classes that have special access rights to the private and protected members of classes, the this pointer that enables an object to know its own address, dynamic memory allocation, static class members for containing and manipulating class-wide data, examples of popular abstract data types (arrays, strings and queues), container classes and iterators. The chapter exercises ask the student to develop a savings account class and a class for holding sets of integers. We discuss dynamic memory allocation with new and delete. When new fails, it returns a 0 pointer in pre-standard C++. We use this pre-standard style in Chapters 17 through 22. We defer to Chapter 23 the discussion of the new style of new failure in which new now "throws an exception." We motivate the discussion of static class members with a video-game-based example. We emphasize throughout the book and in our professional seminars how important it is to hide implementation details from clients of a class. Chapter 18C++ Operator Overloadingis one of the most popular topics in our C++ courses. Students really enjoy this material. They find it a perfect match with the discussion of abstract data types in Chapters 16 and 17. Operator overloading enables the programmer to tell the compiler how to use existing operators with objects of new class types. C++ already knows how to use these operators with objects of built-in types such as integers, floating point numbers and characters. But suppose we create a new string classwhat would the plus sign mean when used between string objects? Many programmers use plus with strings to mean concatenation. The chapter discusses the fundamentals of operator overloading, restrictions in operator overloading, overloading with class member functions vs. with nonmember functions, overloading unary and binary operators and converting between types. A feature of the chapter is the substantial case study of an array class, a huge-integer class and a complex numbers class (the last two appear with full source code in the exercises). This material is different from what you do in most programming languages and courses. Operator overloading is a complex topic, but an enriching one. Using operator overloading wisely helps you add that extra "polish" to your classes. With the techniques of Chapters 16, 17 and 18, it is possible to craft a Date class that, if we had been using it for the last two decades, could easily have eliminated a major portion of the so-called "Year 2000 (or Y2K) Problem." One of the exercises encourages the reader to add operator overloading to class Complex to enable convenient manipulation of objects of this class with operator symbols-as in mathematics-rather than with function calls as the student did in the Chapter 17 exercises. Chapter 19C++ Inheritancedeals with one of the most fundamental capabilities of objectoriented programming languages. Inheritance is a form of software reusability in which new classes are developed quickly and easily by absorbing the capabilities of existing classes and adding appropriate new capabilities. The chapter discusses the notions of base classes and derived classes, protected members, public inheritance, protected inheritance, private inheritance, direct base classes, indirect base classes, constructors; and destructors in base classes and derived classes and software engineering with inheritance. The chapter compares inheritance ("is a" relationships) with composition ("has a" relationships) and introduces "uses a" and "knows a" relationships. A feature of the chapter is its several substantial case studies. In particular, a lengthy case study implements a point, circle, cylinder class hierarchy. The exercises ask the student to compare the creation of new classes by inheritance vs. composition; to extend the various inheritance hierarchies discussed in the chapter; to write an inheritance hierarchy for quadrilaterals, trapezoids, parallelograms, rectangles and squares; and to create a more general shape hierarchy with two-dimensional shapes and three-dimensional shapes. Chapter 20C++ Virtual Functions and Polymorphismdeals with another of the fundamental capabilities of object-oriented programming, namely polymorphic behavior. When many classes are related through inheritance to a common base class, each derived-class object may be treated as a base-class object. This enables programs to be written in a general manner independent of the specific types of the derived-class objects. New kinds of objects can be handled by the same program, thus making systems more extensible. Polymorphism enables programs to eliminate complex switch logic in favor of simpler "straight-line" logic. A screen manager of a video game, for example, can simply send a draw message to every object in a linked list of objects to be drawn. Each object knows how to draw itself. A new object can be added to the program without modifying that program as long as that new object also knows how to draw itself. This style of programming is typically used to implement today's popular graphical user interfaces (GUIs). The chapter discusses the mechanics of achieving polymorphic behavior through the use of virtual functions. It distinguishes between abstract classes (from which objects cannot be instantiated) and concrete classes (from which objects can be instantiated). Abstract classes are useful for providing an inheritable interface to classes throughout the hierarchy. A feature of the chapter is its polymorphism case study of the point, circle, cylinder shape hierarchy discussed in Chapter 19. The chapter exercises ask the student to discuss a number of conceptual issues and approaches, add abstract classes to the shape hierarchy, develop a basic graphics packageand pursue all these projects with virtual functions and polymorphic programming. Our professional audiences insisted that we provide a deeper explanation that showed precisely how polymorphism is implemented in C++, and hence, precisely what execution time and memory "costs" one must pay when programming with this powerful capability. We responded by developing an illustration in the section entitled "Polymorphism, virtual Functions and Dynamic Binding "Under the Hood" that shows the vtables (virtual function tables) that the C++ compiler automatically builds to support the polymorphic programming style. We drew these tables in our classes in which we discussed the point, circle, cylinder shape hierarchy. Our audiences indicated that this indeed gave them the information to decide whether polymorphism was an appropriate programming style for each new project they would tackle. We have included this presentation in Section 20.9 and the vtable illustration in Fig. 20.2. Please study this presentation carefully. It will give you a much deeper understanding of what is really occurring in the computer when you program with inheritance and polymorphism. Chapter 21C++ Stream Input/Outputcontains a comprehensive treatment of C++ objectoriented input/output. The chapter discusses the various I/O capabilities of C++ including output with the stream insertion operator, input with the stream extraction operator, type-safe I/O (a nice improvement over C), formatted I/O, unformatted I/O (for performance), stream manipulators for controlling the stream base (decimal, octal, or hexadecimal), floating-point numbers, controlling field widths, user-defined manipulators, stream format states, stream error states, 1/O of objects of user-defined types and tying output streams to input streams (to ensure that prompts actually appear before the user is expected to enter responses). The extensive exercise set asks the student to write various programs that test most of the 1/O capabilities discussed in the text. Chapter 22C++ Templatesdiscusses one of the more recent additions to C++. Function templates were introduced in Chapter 15. Class templates enable the programmer to capture the essence of an abstract data type (such as a stack, an array, or a queue) and then create-with minimal additional code-versions of that ADT for particular types (such as a queue of int, a queue of float, a queue of strings, etc.). For this reason, template classes are often called parameterized types. The chapter discusses using type parameters and nontype parameters and considers the interaction among templates and other C++ concepts, such as inheritance, friends and static members. The exercises challenge the student to write a variety of function templates and class templates, and to employ these in complete programs. Chapter 23C++ Exception Handlingdiscusses one of the more recent enhancements to the C++ language. Exception handling enables the programmer to write programs that are more robust, more fault tolerant and more appropriate for business-critical and mission-critical environments. The chapter discusses when exception handling is appropriate; introduces the basics of exception handling with try blocks, throw statements and catch blocks; indicates how and when to rethrow an exception; explains how to write an exception specification and process unexpected exceptions; and discusses the important ties between exceptions and constructors, destructors and inheritance. We discuss rethrowing an exception and we illustrate both ways new can fail when memory is exhausted. Prior to the C++ draft standard new failed by returning 0, much as malloc fails in C by returning a NULL pointer value. We show the new style of new failing by throwing a bad_alloc (bad allocation) exception. We illustrate how to use set-new-handler to specify a custom function to be called to deal with memory exhaustion situations. We discuss the auto_ptr class template to guarantee that dynamically allocated memory will be properly deleted to avoid memory leaks. Chapter 24Introduction to Java Applications and Appletsintroduces a typical Java programming environment and provides a lightweight introduction to programming applications and applets in the Java programming language. Some of the input and output is performed using a new graphical user interface (GUI) element called JOptionPane that provides predefined windows (called dialogs) for input and output. JOptionPane handles ouputting data to windows and inputting data from windows. The chapter introduces applets using several of the sample demonstration applets supplied with the Java 2 Software Development Kit (J2SDK). We use appletviewer (a utility supplied with the J2SDK) to execute several sample applets. We then write Java applets that perform tasks similar to the applications written earlier in the chapter, and we explain the similarities and differences between applets and applications. After studying this chapter, the student will understand how to write simple, but complete, Java applications and applets. The next several chapters use both applets and applications to demonstrate additional key programming concepts. Chapter 25Beyond C & C++: Operators, Methods & Arraysfocuses on both the similarities and differences among Java, C and C++. The chapter discusses the primitive types in Java and how they differ from C/C++, as well as some differences in terminology. For example, what we call a function in C/C++ is called a method in Java. The chapter also contains a discussion of logical operators-&& (logical AND), & (boolean logical AND), (logical OR), (boolean logical inclusive OR), ^ (boolean logical exclusive OR) and ! (NOT). applications. The topic of method overloading (as compared to function overloading in C++) is motivated and explained. In this chapter, we also introduce events and event handlingelements required for programming graphical user interfaces. Events are notifications of state change such as button clicks, mouse clicks, pressing a keyboard key, etc. Java allows programmers to respond to various events with by coding methods called event handlers. We also introduce arrays in Java, which are processed as full-fledged objects. This is further evidence of Java's commitment to almost 100% object-orientation. We discuss the structuring of data into arrays, or groups, of related data items of the same type. The chapter presents numerous examples of both single-subscripted arrays and double-subscripted arrays. Chapter 26Java Object-Based Programmingbegins our deeper discussion of classes. The chapter focuses on the essence and terminology of classes and objects. What is an object? What is a class of objects? What does the inside of an object look like? How are objects created? How are they destroyed? How do objects communicate with one another? Why are classes such a natural mechanism for packaging software as reusable componentry? The chapter discusses implementing abstract data types as Java-style classes, accessing class members, enforcing information hiding with private instance variables, separating interface from implementation, using access methods and utility methods, initializing objects with constructors and using overloaded constructors. The chapter discusses declaring and using constant references, compositionthe process of building classes that have as members references to objects, the this reference that enables an object to "know itself," dynamic memory allocation, static class members for containing and manipulating class-wide data and examples of popular abstract data types such as stacks and queues. The chapter also introduces the package statement and discusses how to create reusable packages. The chapter exercises challenge the student to develop classes for complex numbers, rational numbers, times, dates, rectangles, huge integers, a class for playing Tic-Tac-Toe, a savings account class and a class for holding sets of integers. Chapter 27Java Object-Oriented Programmingdiscusses the relationships among classes of objects, and programming with related classes. How can we exploit commonality between classes of objects to minimize the amount of work it takes to build large software systems? What is polymorphism? What does it mean to "program in the general" rather than "programming in the specific?" How does programming in the general make it easy to modify systems and add new features with minimal effort? How can we program for a whole category of objects rather than programming individually for each. type of object? The chapter deals with one of the most fundamental capabilities of object-oriented programming languages, inheritance, which is a form of software reusability in which new classes are developed quickly and easily by absorbing the capabilities of existing classes and adding appropriate new capabilities. The chapter discusses the notions of superclasses and subclasses, protected members, direct superclasses, indirect superclasses, use of constructors in superclasses and subclasses and software engineering with inheritance. We introduce inner classes that help hide implementation details. Inner classes are most frequently used to create GUI event handlers. Named inner classes can be declared inside other classes and are useful in defining common event handlers for several GUI components. Anonymous inner classes are declared inside methods and are used to create one objecttypically an event handler for a specific GUI component. The chapter compares inheritance ("is a" relationships) with composition ("has a" relationships). A feature of the chapter is its case study implementation of a point, circle and cylinder class hierarchy. The exercises ask the student to compare the creation of new classes by inheritance vs. composition; to extend the inheritance hierarchies discussed in the chapter; to write an inheritance hierarchy for quadrilaterals, trapezoids, parallelograms, rectangles and squares; and to create a more general shape hierarchy with two-dimensional shapes and three-dimensional shapes. The chapter explains polymorphic behavior. When many classes are related through inheritance to a common superclass, each subclass object may be treated as a superclass object. This enables programs to be written in a general manner independent of the specific types of the subclass objects. New kinds of objects can be handled by the same program, thus making systems more extensible. Polymorphism enables programs to eliminate complex switch logic in favor of simpler "straight-line" logic. A video game screen manager, for example, can send a "draw" message to every object in a linked list of objects to be drawn. Each object knows how to draw itself. A new type of object can be added to the program without modifying that program as long as that new object also knows how to draw itself. This style of programming is typically used to implement today's popular graphical user interfaces. The chapter distinguishes between abstract classes (from which objects cannot be instantiated) and concrete classes (from which objects can be instantiated). The chapter also introduces interfaces-sets of methods that must be defined by any class that implements the interface. Interfaces are Java's replacement for the dangerous (albeit powerful) feature of C++ called multiple inheritance. Chapters 28 and 29 were co-authored with our colleague, Mr. Tem Nieto of Deitel & Associates, Inc. Tern's infinite patience, attention to detail, illustration skills and creativity are apparent throughout these chapters. Chapter 28Java Graphics and Java2Dbegins a run of chapters that present the multimedia "sizzle" of Java. Traditional C and C++ programming are pretty much confined to character-mode input/output. Some versions of C++ are supported by platform-dependent class libraries that can do graphics, but using these libraries makes your applications nonportable. Java's graphics capabilities are platform independent and hence, portableand we mean portable in a worldwide sense. You can develop graphics-intensive Java applets and distribute them over the World Wide Web to colleagues everywhere and they will run nicely on the local Java platforms. We discuss graphics contexts and graphics objects; drawing strings, characters and bytes; color and font control; screen manipulation and paint modes; and drawing lines, rectangles, rounded rectangles, 3dimensional rectangles, ovals, arcs and polygons. We introduce the Java2D API, new in Java 2, which provides powerful graphical manipulation tools. The chapter has many figures that painstakingly illustrate each of these graphics capabilities with live-code examples, appealing screen outputs, detailed features tables and detailed line art. Chapter 29Java Graphical User Interface Componentsintroduces the creation of applets and applications with user-friendly graphical user interfaces (GUIs). This chapter focuses on Java's new Swing GUI components. These platform-independent GUI components are written entirely in Java. This provides Swing GUI components with great flexibilitythey can be customized to look like the computer platform on which the program executes, or they can use the standard Java look-and-feel that provides an identical user interface across all computer platforms. We discuss the new javax.swing package, which provides much more powerful GUI components than the Java 1.1 java.awt components. Through its many programs, tables and line drawings, the chapter illustrates GUI design principles, the javax.swing hierarchy, labels, push buttons, text fields, text areas, combo boxes, check boxes, panels, scrolling panels, custom panels, handling mouse events, windows, menus and using three of Java's simpler GUI layout managers, namely FlowLayout, BorderLayout and GridLayout. The chapter concentrates on Java's delegation event model for GUI processing. The exercises challenge the student to create specific GUIs, exercise various GUI features, develop drawing programs that let the user draw with the mouse and control fonts. Chapter 30Java Multimedia: Images, Animation, Audio and Videodeals with Java's capabilities for making computer applications "come alive." It is remarkable that students in first programming courses will be writing applications with all these capabilities. The possibilities are intriguing. Students now access (over the Internet and through CDROM technology) vast libraries of graphics images, audios and videos and can weave their own together with those in the libraries to form creative applications. Already most new computers come "multimedia equipped." Dazzling term papers and classroom presentations are being prepared by students with access to vast public domain libraries of images, drawings, voices, pictures, videos, animations and the like. A "paper" when most of us were in the earlier grades was a collection of characters, possibly handwritten, possibly typewritten. A "paper" can be a multimedia "extravaganza." It can hold your interest, pique your curiosity, make you feel what the subjects of the paper felt when they were making history. Multimedia can make your science labs much more exciting. Textbooks can come alive. Instead of looking at a static picture of some phenomenon, you can watch that phenomenon occur in a colorful, animated, presentation with sounds, videos and various other effects. People can learn more, learn it in more depth and experience more viewpoints. A feature of the chapter is the image maps discussion that enable a program to sense the presence of the mouse pointer over a region of an image, without clicking the mouse. We present a live-code image map application with the icons Prentice Hall artists created for our Java Multimedia Cyber Classroom programming tips. As the user moves the mouse pointer across the six icon images, the type of tip is displayed, either "Good Programming Practice" for the thumbs-up icon, "Portability Tip" for the bug with the suitcase icon, and so on. Several Appendices provide valuable reference material. We present Internet and World Wide Web resources for C, C++ and Java in Appendix A; a list of C99 Internet and World Wide Web resources in Appendix B; complete operator precedence and associativity charts for C, C++ and Java in Appendix C; the set of ASCII character codes in Appendix D; Appendix E is a complete tutorial on number systems including many self-review exercises with answers. The complete, authoritative guide to C, with concise introduction to C++ and Java This Third Edition of the world's most widely used C textbook carefully explains C (535 pages) and presents substantial introductions to C++ (298 pp.) and Java (346 pp.). Dr. Harvey M. Deitel and Paul J. Deitel are the principals of Deitel Associates, Inc.. the internationally-recognized corporate training and content-creation organization specializing in C++, Java, C, Visual Basic, Internet, World Wide Web, XML, Python, Perl and object technologies. The Deitels are also the authors of the world's #1 C++ and Java textbooks, C++ How to Program, 3/e and Java How to Program, 3/e. In C How to Program: Third Edition, the Deitels introduce five of today's most popular programming paradigms. Key topics include: Procedural programming (in C) Classes and objects (C++ and Java) Inheritance/polymorphism (C++/Java) Generic programming (C++ templates) Event-driven programming (in Java) C How to Program helps students build C, C++ and Java applications. It includes: Hundreds of "live-code" programs with screen captures that show exact outputs Extensive self-review exercises (many with answers) accompanying each chapter Hundreds of tips, recommended practices and cautionsall marked with icons C How to Program is the centerpiece of a complete family of resources for teaching and learning C, C++ and Java, including Web sites (www.deitel.com and www.prenhall.com/deitel) with the book's source-code examples and other information for faculty, students and professionals; optional interactive CD-ROMs (C++ Multimedia Cyber Classroom and Java 2 Multimedia Cyber Classroom) containing thousands of hyperlinks and audio walkthroughs of the hundreds of code examples in C++ How to Program and Java How to Programand e-mail access to the authors at [email protected] For information on worldwide corporate on-site seminars and Web-based training offered by Deitel Associates, Inc., visit: www.deitel.com For information on all Deitel publications including How to Program Series books, Multimedia Cyber Classrooms, Multimedia Cyber Classrooms, Complete Training Courses (that include Deitel books and Cyber Classrooms)and Web-Based Training Courses please see the last few pages of this book. DR. HARVEY M. DEITEL CEO of Deitel Associates, Inc., has 39 years experience in the computing field including extensive industry and academic experience. He is one of the world's leading computer science instructors and seminar presenters. Dr. Deitel earned B.S. and M.S. degrees from the Massachusetts Institute of Technology and a Ph.D. from Boston University. He worked on the pioneering virtual memory operating systems projects at IBM and MIT that developed techniques widely implemented today in systems like UNIX, Windows NT, OS/2 and Linux. He has 20 years of college teaching experience including earning tenure and serving as the Chairman of the Computer Science Department at Boston College before founding Deitel Associates, Inc. with Paul J. Deitel. He is author or co-author of dozens of books and multimedia packages and is currently writing many more. With translations published in Japanese, Russian, Spanish, Elementary Chinese, Advanced Chinese, Korean, French, Portuguese, Polish and Italian the Deitels' texts have earned international recognition. PAUL J. DEITEL, Executive Vice President of Deitel Associates, Inc., is a graduate of the Massachusetts Institute of Technology's Sloan School of Management where he studied Information Technology. Through Deitel Associates, Inc. he has delivered Java, C, C++, Internet and World Wide Web courses for industry clients including Compaq, Sun Microsystems, White Sands Missile Range, Rogue Wave Software, Computervision, Stratus, Fidelity, Cambridge Technology Partners, Open Environment Corporation, Once Wave, Hyperion Software, Lucent Technologies, Adra Systems, Entergy, CableData Systems, NASA at the Kennedy Space Center, the National Severe Storm Laboratory, IBM and many other organizations. He has lectured on C++ and Java for the Boston Chapter of the Association for Computing Machinery, and has taught satellite-based Java courses through a cooperative venture of Deitel Associates, Inc., Prentice Hall and the Technology Education Network. He and his father, Dr. Harvey M. Deitel, are two of the world's best-selling Computer Science authors. The Deitels are co-authors of the best-selling introductory college computer-science programming language textbooks, C++ How to Program: Third Edition, Java How to Program: Third Edition, Visual Basic 6 How to Program (co-authored with Tem R. Nieto) and Internet and World Wide Web How to Program (co-authored with Tem R. Nieto). The Deitels are also co-authors of the C++ Multimedia Cyber Classroom: Third Edition (the first edition of this was Prentice Hall's first multimedia-based textbook), the Java 2 Multimedia Cyber Classroom: Third Edition, the Visual Basic 6 Multimedia Cyber Classroom and the Internet and World Wide Web programming Multimedia Cyber Classroom. The Deitels are also co-authors of The Complete C++ Training Course: Third Edition, The Complete Visual Basic 6 Training Course, The Complete Java 2 Training Course: Third Edition and The Complete Internet and World Wide Web Programming Training Coursethese products each contain the corresponding How to Program Series textbook and the corresponding Multimedia Cyber Classroom. Preface Welcome to ANSI/ISO Standard C, and to C++ and Java, too! This book is by an old guy and a young guy. The old guy (HMD; Massachusetts Institute of Technology 1967) has been programming and/or teaching programming for 39 years. The young guy (PJD; MIT 1991) has been programming for 18 years and has .caught the teaching and writing "bug." The old guy programs and teaches from experience; the young guy does so from an inexhaustible reserve of energy. The old guy wants clarity; the young guy wants performance. The old guy appreciates elegance and beauty; the young guy wants results. We got together to produce a book we hope you will find informative, interesting and entertaining. Why We Wrote C How to Program: In most educational environments, C is taught to people who know how to program. Many educators believe that the complexity of C, and a number of other difficulties, make C unworthy for a first programming courseprecisely the target course for this book. So why did we write this text? Dr. Harvey M. Deitel taught introductory programming courses in college environments for two decades with an emphasis on developing clearly written, well-structured programs. Much of what is taught in these courses is the basic principles of structured programming, with an emphasis on the effective use of control structures and functionalization. We have presented this material exactly the way HMD has done in his college courses. Students are highly motivated by the fact that they are learning a language that will be immediately useful to them as they leave the university environment. Our goal was clear: Produce a C programming textbook for introductory university-level courses in computer programming for students with little or no programming experience, yet offer the deep and rigorous treatment of theory and practice demanded by traditional C courses. To meet these goals, we produced a book larger than other C textsthis because our text also patiently teaches structured programming principles. Hundreds of thousands of students worldwide learned C from the earlier editions of this book. The book contains a rich collection of examples, exercises and projects drawn from many fields to provide the student with a chance to solve interesting real-world problems. The book also concentrates on the principles of good software engineering and stresses program clarity through use of the structured programming methodology. We teach by example. C How to Program: Third Edition The material from C How to Program: Third Edition has been meticulously reviewed by many industry and academic experts, including the head of the ANSI C committee. We have considerably polished the material from the second edition, especially the chapter on pointers. In the second edition of C How to Program, we included a seven-chapter introduction to C++ and Object-Oriented Programming. In the interim, many universities have decided to incorporate an introduction to C++ and Object-Oriented Programming into their C courses. So in this edition, we have expanded our C++ treatment to nine chapterssufficient text, exercises and laboratories for a one-semester course. We have also added seven chapters on object-oriented programming with Java, including discussions of graphics programming, graphical user interface (GUI) with Java Swing components and multimedia programming. In 1999, the International Standards Organization approved anew version of C, known as C99; but as of this writing, no C99 compilers were available. Therefore, we were not able to make our code examples compatible with C99. When C99 compilers become available, we will test every program in the textbook and list any discrepancies on our Web site (www.deitel.com). We will also post code examples with explanations of the new C99 features on that Web site. Appendix B contains a comprehensive list of C99 resources on the Internet and World Wide Web. For more information on C99and to purchase a copy of the standards document (ISO/IEC 9899:1999)visit the Web site of the American National Standards Institute (ANSI), (www.ansi.org). C How to Program: Third Edition Ancillary Package We have worked hard to produce a textbook and ancillaries that we hope you and your students will find valuable. We would like to thank Borland for providing the products included on the CD-ROM in the back of this textbook; these products enable the reader to compile and run programs in C, C++ and Java. The following ancillary resources are available: C How to Program: Third Edition's 270 program examples are included on the CD-ROM in the back of the textbook and are also available for download at www.deitel.com. This helps instructors prepare lectures faster and helps students master C. When extracting the source code from the ZIP file, you must use a ZIP-file reader such as WinZip (www.winzip.com) or PKZIP (www.pkware.com) that understands directories. The file should be extracted into a separate directory (e.g., chtp3e_examples). Students should compile and execute each program they study in the text. A full version of Borland C++ Compiler 5.5 is provided on the textbook's CDROM. This software allows students to edit, compile and debug C and C++ programs from the command line. A 60-day trial version of Borland C++Builder 5 is also included; this product provides a complete integrated C/C++ development environment. A trial version of JBuiLder 3.5 is provided on the textbook's CD-ROM. This software enables students to edit, compile and debug Java programs in an integrated development environment. The Instructor's Manual CD contains answers to most of the exercises in the textbook. The programs are separated into directories by chapter and exercise number. NOTE: Please do not write to us requesting the instructor's CD. Distribution of this CD is limited strictly to college professors teaching from the book. Instructors may obtain the solutions manual only from their Prentice Hall representatives. Companion Web Site (www.prenhall.com/deitel) provides instructor and student resources. Instructor resources include textbook appendices (e.g., Appendix A, "Internet and World Wide Web Resources") and a syllabus manager for lesson planning. Student resources include chapter objectives, true/false review questions with answers, chapter highlights, reference materials and a message board. Customizable PowerPoint Instructor Lecture Notes, including source code and key discussion points for each program and major illustration. These lecture notes are available for instructors and students at no charge at our www.deitel.com Web site. Although instructors may modify these notes and use them in class presentations, please be aware that these notes are copyrighted by Prentice Hall and may not be used without the express written permission of Prentice Hall. About this Book C How to Program contains a rich collection of examples, exercises and projects drawn from many fields to provide the student with a chance to solve interesting real-world problems. The book concentrates on the principles of good software engineering and stresses program clarity. We teach by example. This book is written by educators who spend most of their time teaching and writing about edge-of-the-practice programming languages. The text places a strong emphasis on pedagogy. For example, virtually every new concept of either C, C++ or Java is presented in the context of a complete, working program immediately followed by a window showing the program's inputs and outputs. Reading these programs is much like entering and running them on a computer. We call this our "live-code approach." Among the other pedagogical devices in the text are a set of Objectives and an Outline at the beginning of every chapter; Common Programming Errors, Good Programming Practices, Performance Tips, Portability Tips, Software Engineering Observations and Testing and Debugging Tips enumerated in, and summarized at, the end of each chapter; comprehensive bullet-list-style Summary and alphabetized Terminology sections in each chapter; Self-Review Exercises and Answers in each chapter; and the richest collection of Exercises in any C book. The exercises range from simple recall questions to lengthy programming problems to major projects. Instructors requiring substantial term projects will find many appropriate problems listed in the exercises, especially in the later chapters. We have put a great deal of effort into the exercises to enhance the value of this course for the student. In writing this book, we have used a variety of C compilers. For the most part, the programs in the text will work on all ANSI/ISO C compiler, including the Borland C++ compiler included with this book. The C material (Chapters 2-14) follows the ANSI C standard published in 1990. Many features of ANSI C will not work with pre-ANSI C versions and may not work with ISO C99 compilers, when they become available. See the reference manuals for your particular system for more details about the language, or obtain a copy of ANSI/ISO 9899: 1990, "American National Standard for Information SystemsProgramming Language C," from the American National Standards Institute, 11 West 42nd Street, New York, New York 10036. The C++ material is based on the C++ programming language as developed by Accredited Standards Committee X3, Information Technology and its Technical Committee X3J16, Programming Language C++, respectively. The C and C++ languages were approved by the International Standards Organization (ISO). For further details, contact: X3 Secretariat 1250 Eye Street NW Washington DC ...
books;c;c & c++ windows programming;computer science;computers & technology;development;education & reference;java;languages & tools;mathematics;microsoft;new;object-oriented design;object-oriented software design;programming;programming languages;science & math;software;software design;testing & engineering;used & rental textbooks
21
080584032X
Communication and Emotion: Essays in Honor of Dolf Zillmann (Routledge Communication Series) The range of subjects investigated mirrors the impressive breadth of Zillmann's research in media use and gratification. --Communication Research Trends --This text refers to the Paperback edition.
books;communication;communication & journalism;communications;education & reference;emotions;fitness & dieting;health;language & grammar;medical books;mental health;new;politics & social sciences;psychology;psychology & counseling;research;social psychology & interactions;social sciences;used & rental textbooks;words
20
1568811934
C# and Game Programming: A Beginner's Guide (Book & CD-ROM) "C# and Game Programming is a useful all-around resource for anyone looking to get off the ground and start learning what C# can really do." -Wisconsin Bookwatch, June 2005 --This text refers to an alternate Paperback edition.
books;c & c++ windows programming;c#;computer science;computers & technology;development;education & reference;game programming;games & strategy guides;graphic design;graphics & visualization;introductory & beginning;languages & tools;mathematics;microsoft;new;programming;programming languages;science & math;used & rental textbooks
20
039590384X
Major Problems in the History of American Sexuality: Documents and Essays (Major Problems in American History Series) Kathy Peiss received her Ph.D. from Brown University in 1982. Her research specialties include the history of American women, gender, sexuality, leisure, consumption, and popular culture. She is the author of Hope in a Jar: The Making of America's Beauty Culture (1998) and Cheap Amusements: Working Women and Leisure in Turn-of-the-Century New York (1986), co-author of Men and Women: A History of Costume, Gender, and Power (1989), and co-editor of Passion and Power: Sexuality in History (1989). Her articles, essays, and reviews have appeared in numerous journals, including Genders, Social Problems, Business History Review, The Nation, Journal of American History, and Women's Review of Books. She has held fellowships from the National Endowment for the Humanities, the Rutgers Center for Historical Analysis, the American Council of Learned Societies, the Smithsonian Institution, and the Woodrow Wilson Foundation.
americas;books;customs & traditions;education;education & reference;fitness & dieting;health;history;humanities;instruction methods;new;pedagogy;politics & social sciences;psychology;psychology & counseling;schools & teaching;self-help;sex;sexuality;social sciences;united states;used & rental textbooks
22
0822330709
Diploma of Whiteness: Race and Social Policy in Brazil, 1917–1945 A superbly researched analysis of the application of the whitening ideal, with all its contradictions, in the Rio de Janeiro schools during the interwar years.Thomas Skidmore, author of Black into White: Race and Nationality in Brazilian ThoughtBy taking an innovative approach to the study of race and social policy, Jerry Dvila has written a rare book that shows how racial attitudes move from elite discourse into the real lives of real people. This approach combines with fascinating research and a narrative style that is compelling and often dramatic to make a first-rate contribution to the fields of Latin American and Brazilian history.Jeffrey Lesser, author of Negotiating National Identity: Immigrants, Minorities, and the Struggle for Ethnicity in Brazil Jerry Dvila is Assistant Professor of History at the University of North Carolina, Charlotte.
20th century;americas;books;brazil;college & university;discrimination & racism;education;education & reference;education theory;educational philosophy;history;modern (16th-21st centuries);new;philosophy & social aspects;politics & social sciences;race relations;schools & teaching;social sciences;sociology;south america;used & rental textbooks
21
0782143245
PMP Final Exam Review From the author of the best-selling PMP: ProjectManagement Professional Study Guide comes this challenging collectionof practice tests designed to help reinforce your understanding of key examtopics. The complex scenario-based questions will test your ability to synthesize the wide array of information covered within thesix PMP performance domains. Use in conjunction with the Sybex Study Guide, or asa supplement to any PMP study program, and approach the exam withconfidence.Covers all six performance domains: Kim Heldman, PMP, MBA, has over ten years of project management experience, and is also the author of the best-selling book Project Management JumpStart. She is the Applications Development Manager for the Department of Revenue, State of Colorado, and is a PMI Colorado state chapter delegate.
books;business & finance;business & investing;business & management;computer science;computers & technology;education & reference;graduate & professional;hardware;management & leadership;manager's guides to computing;new;pcs;pmp exam;production & operations;professional;project management;test prep & study guides;test preparation;used & rental textbooks
20
0809224976
Writing and the Spiritual Life : Finding Your Voice by Looking Within Writing and the Spiritual Life is an enormously friendly book. Gentle but never saccharine, instructive but never pedantic. -- Coast Weekly Each person's life is a web of stories that call out to be told. But according to poet and teacher Patrice Vecchione, it's only when we tap into our inner spirituality that we are able to find our true voice--the voice that allows the soul to speak. In this inspirational and wise book, Vecchione reflects on the presence of the spiritual in our everyday lives, interweaves the remarks of prominent writers such as Joy Harjo, Maxine Hong Kingston, and William Stafford, and presents clear, easy-to-follow processes and writing exercises to help readers discover the strength and resonance of their inner voices. By helping readers home in on their true spirituality, Vecchione shows: How to find depth in your writing How to develop trust and faith in your story Where to find sources of spirit and creativity How spiritual practice can be a form of introspective prayer and crafting of language all at once How to quiet the mind of doubt and criticism How to capture that which is sacred and pull it into your writing Through this book readers will gain a deeper understanding of their spiritual selves, confidence and ease in their writing, and the ability to fill their writing with the voice of their soul. Patrice Vecchione is the author of a poetry collection, Territory of the Wind, and the editor of several anthologies, including Catholic Girls: Stories, Memoirs, Poems and Storming Heaven's Gate: An Anthology of Spiritual Writings by Women. A teacher of poetry writing and creative writing for over twenty years, she is a frequent speaker on the writing process and on writing as spiritual practice. She lives in Monterey, California.
authorship;books;communication;communication & journalism;communication & media studies;communications;creative writing & composition;education & reference;humanities;language & grammar;linguistics;literature;literature & fiction;media studies;new;performing arts;politics & social sciences;publishing & books;religion & spirituality;research & publishing guides;social sciences;spirituality;used & rental textbooks;words;writing
25
0132681528
An Introduction to Computing Using C++ and Object Technology Successful authors William Ford and William Topp have written the first introductory programming book using C++ that concentrates on teaching object design. The authors recognize that program design is one of the most difficult concepts for an introductory programmer. They introduce program design through detailed examples, case studies, and object design methodology and tools such as Unified Modelling Language (UML). The authors carefully walk the reader through the principles of top-down design to produce complete real-world applications.
books;c;c & c++ windows programming;computer science;computers & technology;development;education & reference;languages & tools;mathematics;microsoft;new;object-oriented design;objects;programming;programming languages;science & math;software;software design;testing & engineering;tutorials;used & rental textbooks
21
1590593154
New Masters of Photoshop, Vol. 2 Per Gustafsonis a graphic designer and digital artist from Sweden, the land of the northern lights and the midnight sun. In addition to being the founder of the digital art site and freelance brand MODERNSTYLE.NU, he is also the founder of the Swedish-based Internet media company geidemark gustafson, where he holds the position of creative director. Per's digital art has been used by clients such as Ericsson, Graphicscene, Digital Vision, Adidas, UEFA, and several record labels. Currently, Per is also the creative director of Sonic Nerve Clothing, a brand he co-founded.Mauro Gattiis creative director at theBrainbox, a collective of four Italian designers with a wide range of skills in print, motion graphics, interactivity, application development, and video production. In addition to his personal projects, Mauro has worked as art director for fashion house Idea Italia and as creative director on the Blogwork project. As a freelance concept artist and graphic designer, Mauro's clients include Peugeot, Tim, MTV, and Biennale di Venezia.Asterik Studio was founded in 2000 by Don Clark, Demetre Arges, and Ryan Clark, who joined forces to create a company where quality, creativity, and fun came first. Originally from Sacramento, California, the trio relocated to the Northwest. Asterik is a full-time, fully functional design firm specializing in CD packaging, poster art, web design, merchandise design, and everything in between. Asterik's client list includes numerous record labels such as Atlantic, Capitol, DreamWorks, Elektra, EMI, Warner Brothers, Geffen, Island, and Ferret. Artists Asterik has worked with include The Strokes, Liz Phair, Good Charlotte, Jimmy Eat World, The White Stripes, and Puddle of Mudd. Asterik Studio has appeared in numerous publications such as Communication Arts, Print, HOW, and Computer Arts. Their work has appeared in more than six books, and the studio has been nominated for four Dove awards. Asterik Studio continues to keep it simple: they just do what they love and love what they do.Teodoru Badiu was born and grew up in the beautiful town of Sibiu, Romania. In the 1989 revolution, at the age of 23, Teodoru was wounded and brought to a hospital in Vienna,where he had to stay for four months until he was able to walk again and go back home. After a short time, he came back to Vienna, where he has lived ever since with his son and his wife. Teodoru had some hard times as a foreigner, and it was not easy to learn a new language and start building a new life from scratch, but he did manage it at last. He was also able to follow his dreams and study art and design in addition to his day job, working in an iron foundry. Even when it wasn't easy, Teodoru learned that nothing is impossible. Today, he is studying for his creative media diploma at SAE Technology Institute in Vienna, and seeing his artistic aspirations fulfilled.Located in south Metro Atlanta, Jason Morrisonworks as creative director for a web development and consulting firm. He is largely responsible for the "grunge" digital art trend, and supports this with his own large collection of free Photoshop brushes, textures, and tutorials via Dubtastic Design Labs. "I have always been involved with art, as long as I can remember. I pursued anything artistic in high school, was nominated for Governor's Honors twice, and was voted as a senior superlative ('Most Artistic'). I continued my training in college, receiving an associate's degree in art. However, then the fear of being a starving artist set in, so I pursued my associate's degree in general business, and bachelor's degree in business with an emphasis on marketing."Alicia Buelow is a San Francisco-based illustrator and designer who specializes in Photoshop collage-based illustration. Her clients include publications and agencies such as National Geographic, PlayStation Magazine, U.S. News World Report, Saatchi Saatchi, Lucas Books, and Adobe Systems. Alicia received a bachelor's degree in graphic design from San Jose State University and attended themaster ofart design program. As a student, she worked at various design agencies until 1987, when she was hired by Adobe Systems to help test and demonstrate a new version of Adobe Illustrator. Alicia was part of the in-house communications department, where she designed support materials and software packaging for Adobe Illustrator, PageMaker, Photoshop, and other products. She also teaches Photoshop at the University of California, Berkeley.Jorge Restrepois a graphic designer, illustrator, and teacher from Bogot, Colombia, who graduated from the Universidad Nacional de Colombia in 2002. He is an Adobe Photoshop Certified Expert and specializes in combining type, vector illustrations, and everyday materials to create his own unique brand of digital art. Jorge has worked as art director for companies such as Firmenich and General Motors Columbia, and as a freelancer, he has worked for clients including Nestle and Cinema Europa. Jorge's experimental work has been featured in many online and print magazines worldwide including Form Form (U.S.), Spatium magazine (Germany), and Agite (Columbia).Oliver Ottner was born in 1974 and lives in Vienna, Austria. In 1999, he founded the advertising agency iService, which works for clients such as Este Lauder and the famous Vienna Zoo. His private works, such as his naturemorphosis and dualism series, as well as original Photoshop tutorials, can be found on his personal site www.effectlab.com. Oliver has been a National Association of Photoshop Professionals (NAPP) member since 2001, and his work has been recognized in various photography and digital art publications, including Computer Arts.Seung Ho Henrik was born in 1980 in Seoul, South Korea, and was adopted by Swedish parents when he was 13 months old. He grew up in Mnsters, a very small and quiet town in southern Sweden. Because the town is small and close to nature, living near beautiful landscapes has always been a great source of inspiration for him. Drawing has been an important part of his life for as long as he can remember. Today, Henrik works as a conceptual designer and digital painter for games, TV, and feature films. He has worked as matte painter, concept designer, storyboarder, and character animator for companies such as PDI/DreamWorks, The Mill, The Moving Picture Company, Outlaw Studios, and Amuze Electronic Media.As a painting graduate of the University of North Carolina at Greensboro, Karen Ingram started her design career as a pattern designer for a textile company in the southern United States. Leaving the world of ditsies, neats, jaquards, and foulards behind, she became involved in creating motion illustrations for the Web. Her experiments and collaborations are displayed at Krening.com. Karen has been profiled, featured, and reviewed in a number of online and printed publications such as This is a Magazine, Neomu, and Half Empty's first printed edition. Clients include Absolut Vodka, friends of ED, Spike TV, Monkeyclan, and Virgin Atlantic for Carlos Magazine. Karen has participated in many festivals and shows including FlashintheCan, in Toronto, Canada; BD4D, in London and New York; South By Southwest (SXSW) in Austin, Texas; and Curvy, Design is Kinky, and Yen magazine's ladies designer showcase, in Sydney, Australia. Karen is a crew member of the Australian-based site DesignIsKinky.net, and is a happy news contributor at K10k.net.Marin Musa is a digital artist and illustrator born in Mostar, Bosnia and Herzegovina. He studied at the Faculty of Graphic Arts in the University of Zagreb, Republic of Croatia, and graduated in 2002 as a graduate engineer of printing technology and graphic arts. Now living and working in Mostar, Marin's main creative outlet is running the noncommercial global design magazine Tartart, which has featured digital artwork, photography, and illustrations by designers from over 50 countries. Commercially, Marin works as a freelance graphic designer and also as a part-time graphic designer for a Mostar marketing agency. He was the chief designer for the political party that won the Bosnia and Herzegovina 2002 elections, designed all the graphic material for Pope John Paul II's visit to Bosnia and Herzegovina in July 2003, and was the chief designer for the International Investment Conference held in Bosnia and Herzegovina in February 2004.Colin Smith is an award-winning graphic designer who has caused a stir in the design community with his stunning photorealistic illustrations that he composes entirely in Photoshop. He is also founder of the popular PhotoshopCAFE web resource. He has won several design contests and awards including: first place, illustration, Photoshop World Guru Awards 2001, Los Angeles; finalist, Macworld Design Contest 2002, New York; and first Place, illustration, Photoshop World Guru Awards 2002, San Diego. Colin has coauthored six books for friends of ED, including From Photoshop to Dreamweaver, Photoshop Most Wanted 2, and Photoshop 7 Trade Secrets. His latest book is How to Do Everything with Photoshop CS (McGraw-Hill Osborne, 2003). Colin writes weekly columns for Planet Photoshop and the National Association of Photoshop Professionals member site, and is a contributing writer for the Photoshop User and Mac Design magazines.Corn van Doorenwas born in autumn 1979 in Hooge Mierde, a village in the south of the Netherlands. He grew up being an avid cartoonist, until he discovered the infinite world of multimedia at the age of 17. He has since become a time-served interactive multimedia developer. His journey of discovery hasn't stopped since. Corn spends most of his time working with the Adobe and Macromedia packages for both online and offline use. In addition to these, he uses many other visualization packages and follows his mantra, "The only limit to multimedia is the imagination." Over the past four years, Corn has found success after success. He has worked for many international clients, has been featured in multimedia magazines, and has edited a number of books on Photoshop and digital video.A bio is not available for this author.Jim Hsieh is a graphic designer, illustrator, and animator based in Alhambra, California. He launched jimbotron.com in 2001 to showcase his commercial portfolio. Based on a combination of groovy sounds and Flash animation, jimbotron.com helped Jim establish his signature DJ and turntable graphic style. While working and gaining experience in various top media companies, Jim contributed to a large number of projects, including the movie sites of "Tomb Raider: The Cradle of Life," "Tupac: Resurrection," and Richard Donner's "Timeline." On Jim's personal site, FistsOfCurry.com, he mixes his interests in art, hip-hop music, and far Eastern culture into a dynamic whole, exploring new aesthetic ground. Jim looks forward to the many more projects to come in his life.
adobe photoshop;arts & photography;books;computer science;computers & technology;desktop publishing;digital media management;game programming;graphic design;graphics & multimedia;graphics & visualization;new;photo editing;programming;software;software design;software design & engineering;software development;testing & engineering;used & rental textbooks
20
0521224624
Reading Greek: A World of Heroes: Selections from Homer, Herodotus and Sophocles (English and Greek Edition) Text: English, Greek The first part of the JACT Greek course is Reading Greek, first published in 1979. It consists of two volumes, one of text and one of grammar, vocabulary and exercises and gives the student a thorough introduction to Attic Greek as well as to Herodotus and Homer.
ancient & classical literature;books;contemporary;education & reference;foreign language study & reference;foreign languages;greek;history & criticism;humanities;instruction;language & grammar;literature;literature & fiction;medieval;movements & periods;new;schools & teaching;used & rental textbooks;words
19
1405122714
A Concise Companion to Milton (Concise Companions to Literature and Culture) "The collection is remarkable for its collegiality. It not only respects the newcomer but allows the various contributors to follow up questions of interest to them, thus providing new insights even for long-time Miltonists." (Milton Quarterly, April 2009)"Above all, among the current crop of books, an essay that makes A Concise Companion to Milton worth buying all on its own, is Karen Edwards on "Gender, Sex and Marriage in Paradise Lost". (Times Literary Supplement, December 2008)"These 14 essays (plus introduction) largely succeed in their aim to 'provide readers with key guides to understanding the great influence and endurance' of the works of John Milton...The sections devoted to surveys and reference points will be especially useful for those struggling to understand Milton in his historical and cultural context." (Choice) A Concise Companion to Milton provides readers with essential guides to appreciating the works of John Milton, and to understanding the great influence they have had on literature. The book consists of twelve short, newly-commissioned chapters written by internationally respected scholars from Australia, Canada, Japan, the United Kingdom, and the United States. Combining brevity, depth and accessibility, it is an ideal first critical work on Milton.The companion opens with a series of essays explaining how and why Miltons works established their central place in the English literary canon. The ensuing chapters follow Miltons major works in chronological order, clarifying complex issues that are particularly relevant to our contemporary society. Also included in the volume are a chronology and select bibliography detailing the events of Miltons life and works alongside relevant world events. Angelica Duran is Associate Professor of English and Comparative Literature at Purdue University. A Milton specialist, she is on the editorial board of Milton Quarterly and is currently working on two book-length projects entitled Milton among Spaniards and Milton in Hispanoamerica. Her book on The Age of Milton and The Scientific Revolution is forthcoming in 2007.
books;british;criticism & theory;education & reference;english literature;europe;history;history & criticism;humanities;language & grammar;linguistics;literature;literature & fiction;movements & periods;new;poetry;research & publishing guides;used & rental textbooks;wales;words;writing
21
1568985568
Real Photo Postcards: Unbelievable Images from the Collection of Harvey Tulcensky Sometimes the detritus of human history, that which was meant to be disposed of and forgotten, carries a greater and more lasting impact than those artifacts saved specifically for their purported historical value. In 1907 the U.S. Postal Service made an abrupt reversal of a law forbidding messages from being written on the backs of postcards. This change, coinciding with Kodak's introduction of an affordable, easy-to-use portable camera that printed out photographs onto heavy card stock, inspired a flurry of homespun postcards akin to the current digital photography craze. Because the photos were one-of-a-kind snapshots, produced predominantly by ordinary folks whose goal was to send a frozen moment, a fond wish or just a giggle to a friend or loved one, they tend toward an authenticity and an idiosyncrasy often lacking in more professional photographs of the day. These "real photo postcards" come from the extensive collection of artist Tulcensky; editor Wolff captions the photos with observations or notes from their backs, but mostly just lets these remarkable images speak for themselves. Organized into categories like "Parading," "Romance," "Disasters" and "Uncanny," this volume offers a unique glimpse of the early 20th century through the eyes of the everyman. (Jan.) Copyright Reed Business Information, a division of Reed Elsevier Inc. All rights reserved. ...a collection of the most outlandish and idiosyncratic, beautiful and even occasionally bizarre images of this early postcard period. -- New England Antiques Journal, December 2005...this volume offers a unique glimpse of the early 20th century through the eyes of the everyman. -- Publisher's WeeklySometimes beautiful, at times outlandish or bizarre, these postcards portray the optimism, sincerity, and stark reality of their time -- Step Inside Design, Jan/Feb 2006 Laetitia Wolff is the design editor of Surface magazine, the former editor of Graphis, and an international consultant on design trends and culture. She is the founder of the creative consultancy futureflair.
antiques & collectibles;arts & photography;books;catalogues & exhibitions;collections;crafts;decorative arts & design;design;equipment;history;hobbies & home;humanities;new;paper ephemera & cards;photo essays;photography;postcards;techniques & reference;used & rental textbooks;visual arts
20
0393323196
A Mind So Rare: The Evolution of Human Consciousness Many scientists have denied any evolutionary significance to human consciousness, dismissing it as illusory smoke dancing above the fire of real neurochemistry. But Donald sees in consciousness the very key to understanding how humankind developed. After assaulting (with great panache) the arguments commonly deployed to remove it from the research agenda, Donald presents a natural history for consciousness, focusing particularly on its astonishing and clearly unique complexity among human beings-- Why does the human brain so closely resemble those of other primates yet so dramatically outstrip them in capacity? How does the mind endow the ego center with autonomy and a narrative autobiography? In his sophisticated conception of a multilayered consciousness drawing much of its power from its cultural matrix, Donald bids fair to reset the terms for evolutionary psychology. Bryce ChristensenCopyright American Library Association. All rights reserved --This text refers to an out of print or unavailable edition of this title. Donald transcends the simplistic claims of Evolutionary Psychology,...offering a true Darwinian perspective on the evolution of consciousness. -- Philip LiebermanThe most significant contribution yet to the rapidly growing literature of minds, brains, and consciousness. -- Steven Rose Merlin Donald is a professor in the Department of Psychology, Queen's University, Ontario, Canada.
aging;behavioral sciences;biological sciences;biology;books;cognitive psychology;developmental biology;emotions;evolution;fitness & dieting;health;internal medicine;medical books;medicine;mental health;neurology;neuroscience;psychology & counseling;science & math
19
0226872378
The Weak Body of a Useless Woman: Matsuo Taseko and the Meiji Restoration (Women in Culture and Society) Matsuo Taseko's (1811-1894) actual deeds are the stuff of remarkable insignificance. With her children grown, she undertook a trip to Kyoto in 1862 for a number of reasons, including a tour of sights described in classical poetry. She was also a devout disciple of a nativist movement that revered the emperor, so she keenly desired to visit the imperial city. Once there, she befriended several of this movement's members, but some of the most fervent patriots among them committed an act of vandalism that put all of them in danger. After several months in hiding she returned to her home in the Ina Valley in central Japan. Later, after the Meiji restoration, Taseko's Kyoto connections made her a woman of influence in political circles. When she died, biographers transformed her into a national hero and "good wife and wise mother." Walthall's meticulously researched biography, the first in English, relies on a wealth of materials, including family diaries and Taseko's journals and poetry, to illustrate the social and cultural moment of her life. Readers need an understanding of this convoluted period of Japanese history to appreciate some references. The inherent confusion is not aided by some truly convoluted writing and by unfortunate irregularities (the shogun's bride is described variously as the emperor's sister or daughter). Copyright 1998 Reed Business Information, Inc.
19th century;asia;biographies & memoirs;books;ethnic & national;gender studies;history;humanities;japan;japanese;middle east;military;modern (16th-21st centuries);new;politics & social sciences;social sciences;used & rental textbooks;women in history;women's studies;world
20
0691116830
On Hollywood: The Place, The Industry "On Hollywood offers a lively and highly informative history of the origins and early growth of the Hollywood motion picture industry. Scott shows us the rich tapestry of personalities who created the Hollywood system. At the same time, he forcefully and effectively argues that it was self-interested intransigence and the lack of entrepreneurial vision within the New York based film industry that caused Hollywood to squander its early dominant position. The rest, as they say, is history." - Robert DeFillippi, Suffolk University" "On Hollywood offers a lively and highly informative history of the origins and early growth of the Hollywood motion picture industry. Scott shows us the rich tapestry of personalities who created the Hollywood system. At the same time, he forcefully and effectively argues that it was self-interested intransigence and the lack of entrepreneurial vision within the New York based film industry that caused New York to squander its early dominant position. The rest, as they say, is history."--Robert DeFillippi, Suffolk University Allen J. Scott is Professor of Policy Studies and Geography at the University of California, Los Angeles. He is a former Guggenheim Fellow and a corresponding fellow of the British Academy. In 2003, he was awarded the Prix Vautrin Lud.
americas;books;business & investing;economic history;economics;engineering;history;history & criticism;humor & entertainment;industries & professions;industry;movies;politics & social sciences;professional & technical;science & math;social sciences;sports & entertainment;state & local;technology;telecommunications;theory;united states
22
0195117891
The Conscious Mind: In Search of a Fundamental Theory (Philosophy of Mind Series) Chalmers (philosophy, Univ. of California at Santa Cruz) analyzes the mind-body problem in terms of that elusive relationship between the physical brain and conscious events. Focusing on subjective experience as such, he rejects all reductive (materialist) explanations for conscious experience in favor of a metaphysical framework supporting a strong form of property dualism. His theory is grounded in natural supervenience, the distinction between psychological and phenomenological properties of mind, and a novel view of the ontological status of consciousness itself. Chalmers uses thought experiments (e.g., zombie worlds, silicon chips, a global brain, and inverted spectra) and discusses such issues as causation, intentionality, and epiphenomenalism. Even so, the critical reader is left asking, How can physical facts be relevant to the emergence of consciousness beyond an evolutionary naturalist worldview. Ongoing neuroscience research may provide a sufficient explanation of consciousness within a materialistic framework. Nevertheless, as a scholarly contribution to modern philosophy, this is suitable for all academic and large public libraries.?H. James Birx, Canisius Coll., Buffalo, N.Y.Copyright 1996 Reed Business Information, Inc. --This text refers to an out of print or unavailable edition of this title. "Certainly one of the best discussions of consciousness in existence."--The Times Higher Education Supplement"A startling first book....Offers an outstandingly competent survey of the field."--The Economist"Chalmers shakes up the reductionist world of neurological research by asserting that scientists need to approach the conscious experience as a basic, nonphysical component of the world, similar to time, space, and matter."--Science News"David Chalmers is widely credited for posing the so-called hard problem of consciousness:...What is the nature of subjective experience? Why do we have vividly felt experiences of the world? Why is there someone home inside our heads?"--The New York Times David J. Chalmers is a professor of philosophy at the University of California, Santa Cruz. His article "The Puzzle of Conscious Experience" appeared in the December 1995 issue of Scientific American.
behavioral sciences;books;clinical;cognitive;cognitive psychology;consciousness & thought;humanism;humanities;internal medicine;medical books;medicine;medicine & health sciences;metaphysics;movements;neurology;new;philosophy;politics & social sciences;psychology;science & math;social sciences;used & rental textbooks
22
0691015902
Lustmord Tatar's book is particularly relevant today, amid the heated debates over violence, even as the images become more brutal and sensational, and the camera more voyeuristic and merciless. A profound and provocative contribution to our understanding of sexual combat and the aestheticization of violence in modern culture. "A compelling chronicle of Weimar Germany's disturbing and pervasive fascination with the sexually motivated murder of women, Lustmord breaks new ground in our understanding of German art and culture during this turbulent period between the two world wars.... Tatar has written a brilliant book of art and cultural criticism, a book that scholars and theorists of the Weimar period will have to contend with for some years to come."--Patrice Petro, Art in America"Tatar's book is particularly relevant today, amid the heated debates over violence, even as the images become more brutal and sensational, and the camera more voyeuristic and merciless."--Barbara Kosta, The Women's Review of Books"A profound and provocative contribution to our understanding of sexual combat and the aestheticization of violence in modern culture."--Leslie Kitchen, The Bloomsbury Review"Lustmord is an unsettling study, rich both in documentation and speculation, that will change the way we look at Weimar as well as contemporary art. . . . All this in prose that is all the more enviable for its precision, lucidity, and pithiness."--William Collins Donahue, German Politics and Society"Not for the first time--though seldom so brilliantly as in Tatar's slender book--fascism and modernism are conjoined; they correspond; they are letters from the same camp. . . ."--John Leonard, The Nation"Tatar investigates the chilling motives behind representations that aestheticize violence, and that turn the mutilated female body into an object of fascination. . . . Above all, she explores the complex relationship between gender roles, sexuality, violence and representation. . . . Tatar's book is particularly relevant today, amid the heated debates over violence, even as the images become more brutal and sensational, and the camera more voyeuristic and merciless. The story of sexual murder is all too common--and not just during the brief period of the Weimar Republic. It's precisely the commonplace nature of such brutal and misogynistic crimes that Maria Tatar seeks to expose."--Barbara Kosta, The Women's Review of Books"This volume is intriguing, puzzling, illuminating, and depressing."--Andrew Lees, The Historian"A remarkable book. [It] is both a study of German avant-garde and modernist art and a sustained reflection on the relationships between gender, crime, violence and representation. . . . Lustmord breaks new ground in our understanding of German art and culture during this turbulent period between the two world wars. . . . A brilliant book of art and cultural criticism. . . . "--Patrice Petro, Art in America"A brilliant and energetic exploration of a subject that has gone for too long ignored, a profound and provocative contribution to our understanding of sexual combat and the aestheticization of violence in modern culture."--Leslie Kitchen, The Bloomsbury Review "Taking the representation of sexually motivated murder (Lustmord) as a site where questions of gender, social order, and culture converge, Maria Tatar demonstrates the symptomatic social and cultural importance of sex crimes in pre-Hitler Germany. She successfully weaves historical facts (the murders that happened) and their artistic representations into a fascinating new story that emphasizes the dark and suppressed side of Weimar culture. This story has amazingly far-reaching consequences not only for legal and sociological discussions, but also for considerations of gender relations, social control, modernity, and urban pathology in general."--Anton Kaes, University of California, Berkeley"Maria Tatar's book on the culture of serial murder in Weimar Germany breaks new ground in interdisciplinary studies. An important book for all who are interested in the nightside of Weimar. A must book for art historians and literary and cultural historians."--Sander Gilman, University of Chicago"Maria Tatar has written a compelling book about Weimar's obsessions: sexual psychopaths, serial murder, homosocial desire, and violence toward women. We have come to understand the crisis of male identities after the lost war as a breeding ground for German fascism, but Lustmord raises fascinating new questions about the relationship between the trauma of warfare and a sexualized imaginary of violence and mutilation that haunted Weimar art, literature, and film. A major contribution to cultural studies."--Andreas Huyssen, Columbia University"Maria Tatar offers a compelling illumination of Weimar culture's fascination with sexual murder, as this produced visual and narrative representations that turn the criminal perpetrator into a cultural hero while the victim--usually feminine--is eclipsed. With an unflinching eye she astutely negotiates the duplicity of aversion and attraction that representations of violence elicit. Her stunning analysis keeps returning to the fluid boundaries between real-life murderers and their cultural renditions, forcing the reader continually to address his or her own complicity with fantasies of violence."--Elisabeth Bronfen, University of Zurich --This text refers to an out of print or unavailable edition of this title. "Taking the representation of sexually motivated murder (Lustmord) as a site where questions of gender, social order, and culture converge, Maria Tatar demonstrates the symptomatic social and cultural importance of sex crimes in pre-Hitler Germany. She successfully weaves historical facts (the murders that happened) and their artistic representations into a fascinating new story that emphasizes the dark and suppressed side of Weimar culture. This story has amazingly far-reaching consequences not only for legal and sociological discussions, but also for considerations of gender relations, social control, modernity, and urban pathology in general."--Anton Kaes, University of California, Berkeley"Maria Tatar's book on the culture of serial murder in Weimar Germany breaks new ground in interdisciplinary studies. An important book for all who are interested in the nightside of Weimar. A must book for art historians and literary and cultural historians."--Sander Gilman, University of Chicago"Maria Tatar has written a compelling book about Weimar's obsessions: sexual psychopaths, serial murder, homosocial desire, and violence toward women. We have come to understand the crisis of male identities after the lost war as a breeding ground for German fascism, but Lustmord raises fascinating new questions about the relationship between the trauma of warfare and a sexualized imaginary of violence and mutilation that haunted Weimar art, literature, and film. A major contribution to cultural studies."--Andreas Huyssen, Columbia University"Maria Tatar offers a compelling illumination of Weimar culture's fascination with sexual murder, as this produced visual and narrative representations that turn the criminal perpetrator into a cultural hero while the victim--usually feminine--is eclipsed. With an unflinching eye she astutely negotiates the duplicity of aversion and attraction that representations of violence elicit. Her stunning analysis keeps returning to the fluid boundaries between real-life murderers and their cultural renditions, forcing the reader continually to address his or her own complicity with fantasies of violence."--Elisabeth Bronfen, University of Zurich
biographies & memoirs;books;criminology;criticism & theory;education & reference;europe;european;gay & lesbian;gender studies;germany;history;history & criticism;humanities;literature;literature & fiction;new;politics & social sciences;research & publishing guides;social sciences;true accounts;true crime;used & rental textbooks;world literature;writing
24
0805819398
Understanding Violence What makes ordinary people become violent? Elizabeth Englander presents an enormous body of theory and research data in a well organized, smoothly fl owing, and folksy style that makes for surprisingly easy and enjoyable reading. Her third edition is a major contribution to the fi eld, pulling together disparate theories while presenting current data on such timely topics as youth violence and school shootings. Karen Franklin, Ph.D. Forensic Psychologist Elizabeth Englander has assembled and integrated a remarkable array of stateof-the-art research and theory on what is perhaps the most important problem facing the world today. Understanding Violence is an important sourcebook for theorists, researchers, activists, and practitioners. Christopher Kilmartin, Ph.D University of Mary Washington Professor Englander has produced an outstanding overview of the factors implicated in a broad range of violent acts from child abuse to gang warfare, from school shootings to spousal homicide. The new edition will appeal not only to college students but to intelligent lay people as well; it brings us up to date in an insightful and accessible review of an incredibly important topic. Jack Levin, Ph.D. The Brudnick Professor of Sociology & Criminology at Northeastern University
biographies & memoirs;books;clinical psychology;compulsive behavior;counseling;fitness & dieting;health;medical books;mental health;new;politics & social sciences;psychology;psychology & counseling;psychopathology;psychotherapy;social sciences;ta & nlp;true accounts;true crime;used & rental textbooks
20
0262523159
Nationalism and Ethnic Conflict - revised edition (International Security Readers) Michael E. Brown is Dean of the Elliott School of International Affairs at George Washington University.Steven E. Miller is Editor-in-chief of International Security and Director of the International Security Program at the Belfer Center.
african;books;elections & political process;europe;general;history;history & theory;international & world politics;international relations;national & international security;new;political history;political science;politics & government;politics & social sciences;russian & former soviet union;social sciences;specific topics;used & rental textbooks;war & peace;yugoslavia
21
0764525395
Smart Homes for Dummies, Second Edition ...Smart Homes is more than simply accurate, it is truly useful, with an abundance of call-out tips ("The National Burglar & Fire Alarm Association...offers advice on how to shop for a security system and the names of contractors who have qualified for their 'Installation Quality' certificate."); warnings ("If your modem connects to your computer with an Ethernet interface...you actually need to install two separate Ethernet Network Interface Cards in your proxy server..."); and sound opinions ("You can build a very similar video distribution network that forgoes the second RG6 cable to each outlet....[but] at the risk of being repetitive, we think that this kind of abbreviated network is probably a false economy..."). The best thing about Smart Homes for Dummies--it's a wonderful guide for smart people, too. -- Home Network News, Sept/Oct. 1999, Vol. 13 No. 8Who needs this book? Anyone considering installing their own home security system, whole-house audio or video system, household LAN, or even those that want a professional to do it. It gives you a good idea about what's going on, as well as meaning to those funny buzzwords that home contractors use. It's also useful for those who are interested in getting the most out of their home office or existing automation equipment. Finally, professionals who have most of their expertise in one discipline may find this helpful to learn the basics of the rest of what's out there. Highlights: Easy to understand; broad overview of home automation; gives good descriptions of what's currently available and what to expect in the future; great idea source. -- Edward B. Driscoll, Jr., Popular Home Automation, 2/18/2000 --This text refers to an out of print or unavailable edition of this title. Boost your home's comfort value now, and resale value laterNetwork your computers, phones, and home entertainment gear, and make your home saferEver wonder what would happen if your PC and your stereo could talk to each other? Want to know how you can watch DVDs from any TV in the house? Let this book show you! From security cameras you can view from work to a house that lets you access the Internet from any room, this easy-to-follow guide will help you create the smart home of your dreams.The Dummies Way* Explanations in plain English* "Get in, get out" information* Icons and other navigational aids* Tear-out cheat sheet* Top ten lists* A dash of humor and fun Danny Briere is a regular on-air commentator and telecommunications consultant.Pat Hurley is a noted expert on home networking and high-speed Internet access.
books;computer science;computers & technology;contemporary;crafts;do-it-yourself;electrical;engineering;hardware;hobbies & home;home improvement & design;home repair;how-to & home improvements;humor & entertainment;literature & fiction;networking;professional & technical;software;telecommunications
19
0195150465
Soil Mechanics Laboratory Manual (Engineering Press at Oup) Braja M. Das is at California State University, Sacramento.
aerospace;agricultural sciences;biological sciences;biology & life sciences;books;botany;civil;civil engineering;education & reference;engineering;mechanical;mechanical engineering;mechanics;new;physics;professional & technical;reference;science & math;science & mathematics;used & rental textbooks
20
078900108X
Human Services Technology: Understanding, Designing, and Implementing Computer and Internet Applications in the Social Services (Haworth Social Administration) "AN INDISPENSABLE REFERENCE. . . . Explains in nontechnical language the social forces, ethical dilemmas, applications, impact on staff and clients, and future potential of information technology using vocabulary, concepts, and examples familiar to human service workers. . . . A comprehensive, clearly written text for students and human service professionals who need to understand the impact and use of information technology in human service practice. . . . Provides links to further information and real-world examples to supplement material in the text. . . . Dr. Schoech had made a major contribution to social work and human services education." -- Jerry Finn, PhD, Associate Professor, Department of Social Work, University of New Hampshire
administration & medicine economics;books;business & finance;business & investing;computer science;computers & technology;economics;education & reference;engineering;fitness & dieting;general;health;hospital administration;medical books;network administration;networking;networks;new;politics & social sciences;popular economics;professional & technical;protocols & apis;psychology;psychology & counseling;reference;social sciences;social work;used & rental textbooks
28
1583226168
Memoirs of a Breton Peasant Born in 1834 near Quimper, in Brittany, to landless farmers, the young JEAN-MARIE DGUIGNET was sent out several times a week to beg for the family's food. After spending some of his adolescent years as a cowherd and a domestic speaking only Breton, he left the province as a soldier, avid for knowledge of the vast world. He taught himself Latin, then French, then Italian and Spanish; he read history and philosophy and politics and literature. He was sent to fight in the Crimean war, to attend at Emperor Napoleon III's coronation ceremonies, to support Italy's liberation struggle, and to defend the hapless French puppet emperor Maximilian in Mexico; he came home to live as a model farmer, a tobacconist, falling back into dire poverty.
19th century;arts & literature;authors;biographies & memoirs;books;england;europe;european;france;historical;history;international & world politics;leaders & notable people;memoirs;military;modern (16th-21st centuries);politics & government;politics & social sciences;world
19
0471789526
CWNA: Certified Wireless Network Administrator Study Guide (Exam PW0-100) One of the fastest-growing certifications on the market, CWNA is rapidly becoming the premier professional wireless certification for network administrators. It is also the foundation-level exam for the complete Certified Wireless Network Professional program. Now you can join the move to Wi-Fi and prepare for your certification with this comprehensive and targeted study guide. This value-packed book includes:Practical information on designing, installing, and managing wireless networks, including the new 802.11 standardsChallenging practice questions and hands-on exercisesA test engine with bonus exams and over 150 electronic flashcardsA pre-assessment testA detailed glossaryInside, find authoritative coverage of all exam PW0-100 objectives, including:Radio TechnologiesAntenna ConceptsWireless LAN Hardware and SoftwareNetwork Design, Installation, and ManagementWireless Standards and Organizations802.11 Network ArchitectureWireless LAN SecurityTroubleshootingPerforming Site SurveysFeatured on the CDSYBEX TEXT ENGINE:Test your knowledge with advanced testing software. Includes all chapter review questions and bonus exams.ELECTRONIC FLASHCARDS:Reinforce your understanding with flashcards that can run on your PC, Pocket PC, or Palm handheld.Also on CD, you'll find the entire book in searchable and printable PDF, as well as valuable tools, demo software, and white papers that will supplement your certification preparation.Visit www.sybex.com David D. Coleman, CWNA, is an independent consultant and technical trainer with over 15 years of IT experience, including consulting with Planet3 Wireless on the CWNA courseware. He is a certified wireless network trainer, administrator, security professional, and analyst, and he also holds Microsoft and Cisco certifications.David A. Westcott is a certified wireless network trainer, administrator, security professional, and analyst. He has over 20 years of experience providing technical training to government agencies, corporations, and universities.
books;computer science;computers & technology;education & reference;electrical & electronics;engineering;lan;network administration;networking;networks;new;professional & technical;protocols & apis;study guides;studying & workbooks;test prep & study guides;test preparation;testing;used & rental textbooks;wireless networks
20
0735609985
Inside Microsoft SQL Server 2000 To help you design Microsoft database servers that must achieve the best possible performance, Inside Microsoft SQL Server 2000 has the details you need. For one thing, author Kalen Delaney (who used Ron Soukup's fantastic first edition as a starting point) explains how SQL Server 2000 works at a level that will interest all database administrators. She packs in the sort of minutiae that can make a real difference in the performance of especially large or complex data-storage structures, explaining what goes on inside the database management system (DBMS) when it's presented with various commands, and using that information to back up her abundant advice on the right way to design, build, and operate databases under SQL Server 2000. Delaney makes extensive use of DBCC PAGE dumps to show what's going on in the databases that demonstrate concepts (incidentally, that utility is documented, as well as the others in the DBCC toolbox). In a typical section, DBCC PAGE is used to show how index pages work. There's careful attention to database structure at the byte level too, with conceptual diagrams that explain how pointers work and how strings of strings of bytes combine to represent stored data. It's the sort of detail you need if you'll be writing software for SQL Server 2000, or need to extract maximum performance from the DBMS itself. --David Wall Topics covered: Microsoft SQL Server 2000 internals, especially data structures and the behavior of queries. Table design is emphasized, especially indexing decisions. Transact-SQL programming, including the use of cursors, gets lots of attention. Over 60 SQL Server MVPs contributed to this book, which was assembled and edited by Kalen Delaney and SQL Server legends Louis Davidson (Database Design and Architecture), Greg Low (Business Intelligence.), Brad McGhee (Performance Tuning and Optimization), Paul Nielson (Database Development), and Paul Randal and Kimberly Tripp (Database Administration.)
books;computer science;computers & technology;data mining;data warehousing;database management systems;database storage & design;databases;development;education & reference;languages & tools;microsoft;new;programming;programming languages;relational databases;software;sql;sql server;used & rental textbooks
20
0937191310
Silence: A Thirteenth-Century French Romance (Medieval Texts and Studies) Text: English (translation) Sarah Roche-Mahdi lives in Cambridge, Massachusetts, and is an editor/translator, long-time rights activist, scholar, and writer. --This text refers to the Paperback edition.
arthurian romance;books;criticism & theory;essays;essays & correspondence;european;feminist theory;french;gothic & romantic;history & criticism;humanities;literature;literature & fiction;medieval;movements & periods;new;poetry;politics & social sciences;social sciences;used & rental textbooks;women's studies;world literature
22
0619159847
Information Technology Project Management Ray Guidone, "I feel the author has done a good job of keeping the text simple and well directed." --This text refers to an out of print or unavailable edition of this title. As a professor in the Department of Business Administration at Augsburg College in Minneapolis, Dr. Kathy Schwalbe teaches courses in project management, problem solving for business, systems analysis and design, information systems projects, and strategic technology. She has also served as an adjunct faculty member at the University of Minnesota, where she taught a graduate-level course in project management in the engineering department. A frequently requested speaker and consultant, Dr. Schwalbe provides training and consulting services to numerous organizations and addresses professionals at several conferences each year. She worked for ten years in industry before entering academia in 1991. She has served as an Air Force officer, systems analyst, project manager, senior engineer, and information technology consultant. Dr. Schwalbe is an active member of PMI, having served as the Director of Communications and Editor for the Information Systems Specific Interest Group (ISSIG), VP of Education and Student Chapter Liaison for the Minnesota chapter of PMI, and member of PMI's test-writing team. Kathy was named Educator of the Year in 2011 by the Association of IT Professionals. She earned her Ph.D. in Higher Education at the University of Minnesota, her M.B.A. at Northeastern University's High Technology MBA program, and her B.S. in mathematics at the University of Notre Dame. --This text refers to an out of print or unavailable edition of this title.
books;business & finance;business & investing;business & management;business mathematics;computer science;computers & technology;economics;entrepreneurship;home computing & how-to;industries & professions;information management;information systems;management & leadership;manager's guides to computing;microsoft;microsoft project;new;pmp exam;project;project management;reference;skills;small business & entrepreneurship;software engineering;used & rental textbooks
26
1888952342
May I Quote You, General Lee: Volume I The southern generals of the Civil War spoke of honor, duty, and the courage to fight for one's beliefs. While their cause was trampled on the battlefields of Dixie, their names live on in glory. Robert E. Lee (long regarded as preeminent among the southern generals) has been described as a "wholly human gentleman". His sentiments and those of his fellow generals vividly reveal the gallantry and noble character that made them heroes. This collection of brief quotes from General Lee and comments about him from leaders who knew him well illuminates the convictions of these fighting men. Faced with a war of tragic proportions, they were steadfast in their loyalty to the states they called home. May I Quote You, General Lee? reveals the spirit that elevated General Lee and those who followed him to greatness. Other forthcoming titles in this unique series will showcase General Longstreet, General Forrest, and Stonewall Jackson. -- Midwest Book Review
( l );19th century;a-z;americas;biographies & memoirs;books;civil war;education & reference;historical;history;leaders & notable people;lee;life & institutions;military;people;quotations;robert e.;united states;united states civil war
19
0766837831
3ds max 4 Ground Rules 3ds max 4 Ground Rules is not, despite its name and the picture of a green-lawned golf course on the cover, about creating terrain and landscapes with 3ds max 4, Discreet's 3-D CG animation package. It's a new series from Autodesk Press, and its charter is to lay the groundwork for new users so they can build their own projects. Michael Todd Peterson is an experienced writer and 3ds max user, and the breadth and depth of his experience shows in this book. More than 600 pages and 17 chapters cover everything from the absolute basics to advanced and complex features. Sections cover installing and navigating the interface of 3ds max 4, and there is a bird's-eye view of the workflow in a Max project--using basic shapes to build a model; using models to build a scene; adding detail with textures, lights, and particles; adding and animating a camera; and rendering the finished animation to a movie. Later parts of the book are about modeling. Techniques are discussed for surface modeling, patch modeling, using splines and compound objects, creating editable meshes, and using modifiers and how they work with the stack paradigm. The last third of the book is all about animation: an introduction to animation, using Track View, character animation, and special-effects animation using particles, space warps, and more. For anyone climbing 3ds max 4's learning curve, this is probably one of the better books available. The author's easy style, the use of screenshots, and the rich material on the CD make this book a valuable asset to any Max user. --Mike Caputo The strength is Peterson's extreme depth of knowledge of the program, and ability to convey this in a straightforward manner. -- Wen M. Andrews, 'Triple 'T'' Trainer for Autodesk; J. Sargeant Reynolds Community College, Virginia - Book Review Completed for Publisher Michael Todd Peterson owns MTP Grafx, an animation company specializing in Architectural Renderings, Special FX, Character Modeling and Animation, and interactive training materials. He has authored or co-authored over a dozen books on AutoCAD and 3D Studio MAX/3ds max.
3d graphics;books;computer science;computers & technology;engineering;film & television;graphic design;graphics & multimedia;graphics & visualization;humanities;humor & entertainment;industrial;industrial engineering;manufacturing & operational systems;mechanical;movies;new;performing arts;professional & technical;programming;used & rental textbooks;web design;web development & design
23
1566395984
One-Eyed Science: Occupational Health and Women Workers (Labor And Social Change) A provocative look at why researchers are blind to the health problems of women workers --This text refers to the Hardcover edition. Karen Messing is Professor, Department of Biological Sciences, University of Quebec at Montreal, and former Director of the Center for CINBIOSE. --This text refers to the Hardcover edition.
allied health professions;allied health services;books;business & finance;business & investing;clinical;fitness & dieting;general;health;internal medicine;medical books;medicine;medicine & health sciences;new;occupational;occupational & industrial medicine;occupational therapy;politics & government;politics & social sciences;popular economics;public affairs & policy;sexual health;social services & welfare;used & rental textbooks;women's health
25