-
Advanced Research Methods for Applied Psychology Design, Analysis and Reporting
Edited by Paula Brough,Tilshunoslik, -
-
Oila tarbiyasi va pedagogikasi,
-
Kvant elektrotexnikasi,
-
Ilmiy axborot faoliyati. Informatika,
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Ilmiy axborot faoliyati. Informatika, -
Ilmiy axborot faoliyati. Informatika,
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Ilmiy axborot faoliyati. Informatika, -
-
Ilmiy axborot faoliyati. Informatika,
-
-
-
-
-
Tilshunoslik,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Ilmiy axborot faoliyati. Informatika,
-
Faoliyat ayrim turlarining psixologiyasi. Tarmoq (amaliy) psixologiyasi,
-
-
Advanced Research Methods for Applied Psychology Design, Analysis and Reporting
Edited by Paula Brough,The right of Paula Brough to be identified as the author of the editorial material, and of the authors for their individual chapters, has been asserted in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988. All rights reserved. No part of this book may be reprinted or reproduced or utilised in any form or by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying and recording, or in any information storage or retrieval system, without permission in writing from the publishers.
-
Psychology of Gender
Vicki S. Helgeson,The purpose of this text is to provide a review of the empirical research and conceptual discussions surrounding gender and to examine the implications of gender for relationships and health.The focus of this book goes beyond biological sex and gender identity to explore the roles that society has assigned to females and males and the other variables that co-occur with sex, such as status and gender-related traits. The implications of social roles, status, and gender-related traits for relationships and health are examined.This is why the book is entitled The Psychology of Gender rather than The Psychology of Sex. Gender is a term that represents the social and cultural forces that inflence members of our society.The book discusses the “psychology” of gender because the focus is on the individual in the social context. The primary focus is not on biology or anthropology, although their contributions to the study of gender are included.
-
Improving classroom reading instruction
Gerald G Duffy,“The single most important factor in dramatically improving students' reading performance in our school is making reading a priority throughout our curriculum. It is one of the main cornerstones of our curriculum. In Lower School we capitalize on small class sizes and early intervention with trained professionals to work with students who require support [and provide] a strong phonically based approach. In Middle School we continue by scheduling reading classes that are heterogeneously structured, providing students the opportunity to learn from one another and allowing teachers to assist all students as they develop fluency. Finally, in our Upper School reading continues as a priority that is embraced by the entire school including common readings for the community.”
-
Basic Electronics theory and practice
Jean Riescher Westcott,The publisher recognizes and respects all marks used by companies, manufacturers, and developers as a means to distinguish their products. All brand names and product names mentioned in this book are trademarks or service marks of their respective companies. Any omission or misuse (of any kind) of service marks or trademarks, etc. is not an attempt to infringe on the property of others.
-
Mastering Malware Analysis
Alexey Kleymenov, Amr Thabet,Ahmed Neil is a well-known thought leader in the cybersecurity domain whose work focuses on information security, threat hunting, threat intelligence, malware analysis, and digital forensics. He also has a passion for academic research in the field of cybersecurity. He holds an MSc in computer forensics and is currently working at IBM as a cybersecurity engineer (operations).
-
Unix and linux system administration handbook
Evi Nemeth, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin,Modern technologists are masters at the art of searching Google for answers. If another system administrator has already encountered (and possibly solved) a problem, chances are you can find their write-up on the Internet. We applaud and encourage this open sharing of ideas and solutions.
-
Cybersecurity-Attack and Defense Strategies
Yuri Diogenes, Erdal Ozkaya,All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews
-
Bitcoin and Cryptocurrency Technologies
Arvind Narayanan, Joseph Bonneau, Edward Felten, Andrew Miller,Bitcoin and Cryptocurrency Technologies provides a comprehensive introduction to the revolutionary yet often misunderstood new technologies of digital currency. Whether you are a student, software developer, tech entrepreneur, or researcher in computer science, this authoritative and self-contained book tells you everything you need to know about the new global money for the Internet age.
-
IT Governance
Alan Calder, Steve Watkins,Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licences issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned addresses:
-
The Cyber Security Body of Knowledge
Awais Rashid,We are pleased to share CyBOK Version 1.1.0 with you. This version has added two new Knowledge Areas to CyBOK: Applied Cryptography and Formal Methods for Security. It also includes a major revision to Network Security, a minor revision to Risk Management & Governance and a host of small typographical xes. We have also added an extensive index of terms as a lookup mechanism.
-
Cybersecurity handbook
As information and communication technologies create a world of everincreasing complexity in interconnected systems and devices, the public debate on cybersecurity and privacy issues is constantly at the forefront, highlighting the need to strengthen the protection and resilience of these systems from the constantly evolving threats of modern cyberspace.
-
PROFESSIONAL ENGLISH IN IT B2 – C1
O.M.Krasnenko, L.V.Kucheriava,The Professional English in IT textbook has been designed for the students completing their 4th year of undergraduate study in Intellectual and Information Systems, Cyber Security and Information Protection, Software Systems and Technologies, Applied Information Systems, Networking and Internet Technologies, Technology Management.
-
ENGLISH FOR ICT STUDENTS
Darija Pešut,The author acknowledges the following sources of copyright materials and is very grateful for the permissions granted: ComputerLanguage.com, Deutsche Welle, DZone, Encyclopedia Britannica, IBM Corporation, IGI Global Dictionary, Interaction Design Foundation, National Academies Press, Queensland Government, Totaljobs, Typesy, University Health Services at Princeton University, and Wiley – dummies.com. The author sincerely thanks Gjurgjica Mimica Bezjak for her reviewing and proofreading contributions, and Lamia Kulenović for her reviewing contribution, which improved the quality and clarity of this work.
-
English for IT Students
В. Г. Беседина,Пособие предназначено для расширенного изучения английского языка в сфере информационных технологий для студентов 2-го курса, владеющих грамматикой и имеющих базовый запас английских лексических единиц. Пособие состоит из 6 уроков. Каждый урок включает аутентичный текст по направлению, словарь с транскрипцией, вопросы для проверки понимания прочитанного и цикл упражнений на закрепление материала. Разработанные задания способствуют усвоению и запоминанию специальных терминов. Упражнения помогают развитию умений и навыков устной речи.
-
English for Informatics, Informatics Systems, and Informatics Engineering Students
Tira Nur Fitria,This book contains both orally and in writing in the fields of Information and Communication Technology (ICT). This textbook includes 20 chapters, each unit is equipped with four English skills (reading and writing, also speaking and listening) then followed by tasks at the end of each chapter.
-
CYBERSECURITY
Charles J . Brooks, Christopher Grow, Philip Craig, Donald Short,As always, I want to thank the staff at ETG/Marcraft for making it easy to turn out a good product. In particular, thanks to Cathy Boulay and Luke Johns from the Product Development department for their excellent work in getting the text and graphics ready to go and looking good. Many thanks as well to Jeff Riley, whom I’ve known and worked with in the book production business for many years. Thanks for putting together another great project.
-
Cuber security essentials
James Graham, Richard Howard, Ryan Olson,This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use.
-
Computer security
William Stallings, Lawrie Brown,In the four and a half years since the first edition of this book was published, the field has seen continued innovations and improvements. In this new edition, we try to capture these changes while maintaining a broad and comprehensive coverage of the entire field.
-
Sport and Exercise Psychology
Ellis Cashmore,This book is like a supermarket cart after a twenty-minute journey around the aisles: brimming with all manner of assorted products, some essential, others minor extravagancies, but all of which will get used at some point. Like the consumables from the supermarket, the contents of this book will not be enough to get the shopper through the whole week, and visits to other, more specialist stores will be needed. But there will be enough staples to get started, and many of the goods will be kept in the fridge and used at a later stage.
-
Thr Potter's bible
Marylin Scott,Clay objects have been made for as long as the human race has existed, with functional vessels for storage making their appearance at the same time as the development of agriculture. Many of these pots were decorated in various ways, and in most early societies the potters were held in high regard. In China, Japan, and Classical Greece, pottery became a true art form, clays became ever more refined, and new glazes, decorative techniques, and firing methods were discovered, many of which are still used today.