Textbooks
CULTURAL ANTHROPOLOGY*
CULTURE CARE (P)
Outreach Magazine Resource of the Year
Christianity Today's Book of the Year Award of Merit
"Culture is not a territory to be won or lost but a resource we are called to steward with care. Culture is a garden to be cultivated."
Many bemoan the decay of culture. But we all have a responsibility to care for culture, to nurture it in ways that help people thrive. In Culture Care artist Makoto Fujimura issues a call to cultural stewardship, in which we become generative and feed our culture's soul with beauty, creativity, and generosity. We serve others as cultural custodians of the future.
This is a book for artists, but artists come in many forms. Anyone with a calling to create--from visual artists, musicians, writers, and actors to entrepreneurs, pastors, and business professionals--will resonate with its message. This book is for anyone with a desire or an artistic gift to reach across boundaries with understanding, reconciliation, and healing. It is a book for anyone with a passion for the arts, for supporters of the arts, and for "creative catalysts" who understand how much the culture we all share affects human thriving today and shapes the generations to come.
Culture Care includes a study guide for individual reflection or group discussion.
CULTURE SKETCHES (P)
CURIOUS INCIDENT OF THE DOG IN THE NIGHT-TIME (P)
"Disorienting and reorienting the reader to devastating effect.... Suspenseful and harrowing." --The New York Times Book Review
Christopher John Francis Boone knows all the countries of the world and their capitals and every prime number up to 7,057. He relates well to animals but has no understanding of human emotions. He cannot stand to be touched. And he detests the color yellow. This improbable story of Christopher's quest to investigate the suspicious death of a neighborhood dog makes for one of the most captivating, unusual, and widely heralded novels in recent years.
CURRICULUM DEVELOPMENT IN NURSING EDUCATION
CYBER THREAT! : HOW TO MANAGE THE GROWING RISK OF CYBER ATTACKS
Cyber Threat! How to Manage the Growing Risk of Cyber Attacks is an in-depth examination of the very real cyber security risks facing all facets of government and industry, and the various factors that must align to maintain information integrity. Written by one of the nation's most highly respected cyber risk analysts, the book describes how businesses and government agencies must protect their most valuable assets to avoid potentially catastrophic consequences. Much more than just cyber security, the necessary solutions require government and industry to work cooperatively and intelligently. This resource reveals the extent of the problem, and provides a plan to change course and better manage and protect critical information.
Recent news surrounding cyber hacking operations show how intellectual property theft is now a matter of national security, as well as economic and commercial security. Consequences are far-reaching, and can have enormous effects on national economies and international relations. Aggressive cyber forces in China, Russia, Eastern Europe and elsewhere, the rise of global organized criminal networks, and inattention to vulnerabilities throughout critical infrastructures converge to represent an abundantly clear threat. Managing the threat and keeping information safe is now a top priority for global businesses and government agencies. Cyber Threat! breaks the issue down into real terms, and proposes an approach to effective defense. Topics include:
The growing cyber threat is fundamentally changing the nation's economic, diplomatic, military, and intelligence operations, and will extend into future technological, scientific, and geopolitical influence. The only effective solution will be expansive and complex, encompassing every facet of government and industry. Cyber Threat! details the situation at hand, and provides the information that can help keep the nation safe.
CYBERSECURITY LAW
A definitive guide to cybersecurity law
Expanding on the author's experience as a cybersecurity lawyer and law professor, Cybersecurity Law is the definitive guide to cybersecurity law, with an in-depth analysis of U.S. and international laws that apply to data security, data breaches, sensitive information safeguarding, law enforcement surveillance, cybercriminal combat, privacy, and many other cybersecurity issues. Written in an accessible manner, the book provides real-world examples and case studies to help readers understand the practical applications of the presented material. The book begins by outlining the legal requirements for data security, which synthesizes the Federal Trade Commission's cybersecurity cases in order to provide the background of the FTC's views on data security. The book also examines data security requirements imposed by a growing number of state legislatures and private litigation arising from data breaches. Anti-hacking laws, such as the federal Computer Fraud and Abuse Act, Economic Espionage Act, and the Digital Millennium Copyright Act, and how companies are able to fight cybercriminals while ensuring compliance with the U.S. Constitution and statutes are discussed thoroughly. Featuring an overview of the laws that allow coordination between the public and private sectors as well as the tools that regulators have developed to allow a limited amount of collaboration, this book also:
- Addresses current U.S. and international laws, regulations, and court opinions that define the field of cybersecurity including the security of sensitive information, such as financial data and health information
- Discusses the cybersecurity requirements of the largest U.S. trading partners in Europe, Asia, and Latin America, and specifically addresses how these requirements are similar to (and differ from) those in the U.S.
- Provides a compilation of many of the most important cybersecurity statutes and regulations
- Emphasizes the compliance obligations of companies with in-depth analysis of crucial U.S. and international laws that apply to cybersecurity issues
- Examines government surveillance laws and privacy laws that affect cybersecurity as well as each of the data breach notification laws in 47 states and the District of Columbia
- Includes numerous case studies and examples throughout to aid in classroom use and to help readers better understand the presented material
- Supplemented with a companion website that features in-class discussion questions and timely and recent updates on recent legislative developments as well as information on interesting cases on relevant and significant topics
Cybersecurity Law is appropriate as a textbook for undergraduate and graduate-level courses in cybersecurity, cybersecurity law, cyber operations, management-oriented information technology (IT), and computer science. This book is also an ideal reference for lawyers, IT professionals, government personnel, business managers, IT management personnel, auditors, and cybersecurity insurance providers.
JEFF KOSSEFF is Assistant Professor of Cybersecurity Law at the United States Naval Academy in Annapolis, Maryland. He frequently speaks and writes about cybersecurity and was a journalist covering technology and politics at The Oregonian, a finalist for the Pulitzer Prize, and a recipient of the George Polk Award for national reporting.
DANGEROUS CALLING (P)
"A book every person in ministry should read." --Daniel L. Akin, President, Southeastern Baptist Theological Seminary
After traveling the globe and speaking to thousands of churches worldwide, Paul David Tripp has discovered a serious problem within pastoral culture.
Dangerous Calling reveals the truth that the culture surrounding our pastors is spiritually unhealthy--an environment that actively undermines the well-being and effectiveness of our church leaders and thus the entire church body.
Here is a book that both diagnoses and offers cures for issues that impact every member and church leader, and gives solid strategies for fighting the all-important war that rages in our churches today.
- Login to post comments
DANIEL IN THE CONTEXT OF THE HEBREW BIBLE
DATA JOURNALISM HANDBOOK (P)
When you combine the sheer scale and range of digital information now available with a journalist's nose for news and her ability to tell a compelling story, a new world of possibility opens up. With The Data Journalism Handbook, you'll explore the potential, limits, and applied uses of this new and fascinating field.
This valuable handbook has attracted scores of contributors since the European Journalism Centre and the Open Knowledge Foundation launched the project at MozFest 2011. Through a collection of tips and techniques from leading journalists, professors, software developers, and data analysts, you'll learn how data can be either the source of data journalism or a tool with which the story is told--or both.
DATA MINING FOR BUSINESS ANALYTICS: CONCEPTS TECHNIQUES & APPLICA
- Login to post comments
DATA SCIENCE FOR BUSINESS: WHAT YOU NEED TO KNOW ABOUT DATA MINING &
Written by renowned data science experts Foster Provost and Tom Fawcett, Data Science for Business introduces the fundamental principles of data science, and walks you through the "data-analytic thinking" necessary for extracting useful knowledge and business value from the data you collect. This guide also helps you understand the many data-mining techniques in use today.
Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You'll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company's data science projects. You'll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making.
DATA STRUCTURES & ALGORITHMS IN JAVA (P)
The design and analysis of efficient data structures has long been recognized as a key component of the Computer Science curriculum. Goodrich, Tomassia and Goldwasser's approach to this classic topic is based on the object-oriented paradigm as the framework of choice for the design of data structures. For each ADT presented in the text, the authors provide an associated Java interface. Concrete data structures realizing the ADTs are provided as Java classes implementing the interfaces. The Java code implementing fundamental data structures in this book is organized in a single Java package, net.datastructures. This package forms a coherent library of data structures and algorithms in Java specifically designed for educational purposes in a way that is complimentary with the Java Collections Framework.
DATA WAREHOUSE TOOLKIT (P)
Updated new edition of Ralph Kimball's groundbreaking book on dimensional modeling for data warehousing and business intelligence!
The first edition of Ralph Kimball's The Data Warehouse Toolkit introduced the industry to dimensional modeling, and now his books are considered the most authoritative guides in this space. This new third edition is a complete library of updated dimensional modeling techniques, the most comprehensive collection ever. It covers new and enhanced star schema dimensional modeling patterns, adds two new chapters on ETL techniques, includes new and expanded business matrices for 12 case studies, and more.
Design dimensional databases that are easy to understand and provide fast query response with The Data Warehouse Toolkit: The Definitive Guide to Dimensional Modeling, 3rd Edition.
DATA-DRIVEN HEALTHCARE
Data is taking over in a powerful way, and it's revolutionizing the healthcare industry. You have more data available than ever before, and applying the right analytics can spur growth. Benefits extend to patients, providers, and board members, and the technology can make centralized patient management a reality. Despite the potential for growth, many in the industry and government are questioning the value of data in health care, wondering if it's worth the investment.
Data-Driven Healthcare: How Analytics and BI are Transforming the Industry tackles the issue and proves why BI is not only worth it, but necessary for industry advancement. Healthcare BI guru Laura Madsen challenges the notion that data have little value in healthcare, and shows how BI can ease regulatory reporting pressures and streamline the entire system as it evolves. Madsen illustrates how a data-driven organization is created, and how it can transform the industry.
Data-Driven Healthcare: How Analytics and BI are Transforming the Industry provides tables, checklists, and forms that allow you to take immediate action in implementing BI in your organization. You can't afford to be behind the curve. The industry is moving on, with or without you. Data-Driven Healthcare: How Analytics and BI are Transforming the Industry is your guide to utilizing data to advance your operation in an industry where data-fueled growth will be the new norm.
DATABASE PROCESSING: FUNDAMENTALS, DESIGN & IMPLEMENTAT
Get Readers Straight to the Point of Database Processing Database Processing: Fundamentals, Design, and Implementation reflects a new teaching and professional workplace environment and method that gets readers straight to the point with its thorough and modern presentation of database processing fundamentals.
The Fourteenth Edition has been thoroughly updated to reflect the latest software.
DATABASE SYSTEM CONCEPTS
The text is designed for a first course in databases at the junior/senior undergraduate level or the first year graduate level. It also contains additional material that can be used as supplements or as introductory material for an advanced course. Because the authors present concepts as intuitive descriptions, a familiarity with basic data structures, computer organization, and a high-level programming language are the only prerequisites. Important theoretical results are covered, but formal proofs are omitted. In place of proofs, figures and examples are used to suggest why a result is true.
DE ORATORE (BOOKS 1-II) (TRANS SUTTON)
Cicero (Marcus Tullius, 106-43 BCE), Roman lawyer, orator, politician and philosopher, of whom we know more than of any other Roman, lived through the stirring era which saw the rise, dictatorship, and death of Julius Caesar in a tottering republic. In his political speeches especially and in his correspondence we see the excitement, tension and intrigue of politics and the part he played in the turmoil of the time. Of about 106 speeches, delivered before the Roman people or the Senate if they were political, before jurors if judicial, 58 survive (a few of them incompletely). In the fourteenth century Petrarch and other Italian humanists discovered manuscripts containing more than 900 letters of which more than 800 were written by Cicero and nearly 100 by others to him. These afford a revelation of the man all the more striking because most were not written for publication. Six rhetorical works survive and another in fragments. Philosophical works include seven extant major compositions and a number of others; and some lost. There is also poetry, some original, some as translations from the Greek.
The Loeb Classical Library edition of Cicero is in twenty-nine volumes.DEATH OF A PRESIDENT (P)*
DEATH OF IVAN ILYICH & OTHER STORIES
DEEP DISCIPLESHIP : HOW THE CHURCH CAN MAKE WHOLE DISCIPLES OF JESUS
Deep Discipleship equips churches to reclaim the responsibility of discipling people at any point on their journey.
DEFENDING LIFE : A MORAL AND LEGAL CASE AGAINST ABORTION CHOICE
DEFENSE OF THE WEST : NATO THE EUROPEAN UNION & THE TRANSATLANTIC
DEFINITIVE GUIDE TO DISC GOLF
DELIGHTING IN THE TRINITY (P)
Over 100,000 Copies Sold Worldwide!
Preaching Survey of the Year's Best Books for Preachers
Why is God love? Because God is a Trinity.
Why can we be saved? Because God is a Trinity.
How are we able to live the Christian life? Through the Trinity.
In this lively book, we find an introduction to Christianity and the Christian life that is from start to finish rooted in our triune God--Father, Son and Spirit. Not only do we understand the person and work of Christ through the Trinity, but also prayer, the church and every aspect of our faith.
With wit and clarity, Reeves draws from church history down to the present referencing a wide range of notable teachers and preachers. Here is a rich and enjoyable portrayal of the basic beliefs of Christianity that opens up the profound and life-changing truths of our faith.
DEMOCRACY (INTRO HARBERT) (P)
DEMON IN FREEZER (P)
DEMON IN THE FREEZER *
the drama of the front lines.""
-Richard Danzig, former secretary of the navy
The first major bioterror event in the United States-the anthrax attacks in October 2001-was a clarion call for scientists who work with "hot" agents to find ways of protecting civilian populations against biological weapons. In The Demon in the Freezer, his first nonfiction book since The Hot Zone, a #1 "New York Times "bestseller, Richard Preston takes us into the heart of Usamriid, the United States Army Medical Research Institute of Infectious Diseases at Fort Detrick, Maryland, once the headquarters of the U.S. biological weapons program and now the epicenter of national biodefense.
Peter Jahrling, the top scientist at Usamriid, a wry virologist who cut his teeth on Ebola, one of the world's most lethal emerging viruses, has ORCON security clearance that gives him access to top secret information on bioweapons. His most urgent priority is to develop a drug that will take on smallpox-and win. Eradicated from the planet in 1979 in one of the great triumphs of modern science, the smallpox virus now resides, officially, in only two high-security freezers-at the Centers for Disease Control in Atlanta and in Siberia, at a Russian virology institute called Vector. But the demon in the freezer has been set loose. It is almost certain that illegal stocks are in the possession of hostile states, including Iraq and North Korea. Jahrling is haunted by the thought that biologists in secret labs are using genetic engineering to create a new superpox virus, a smallpox resistant to all vaccines.
Usamriid went into a state of Delta Alert on September 11 andactivated its emergency response teams when the first anthrax letters were opened in New York and Washington, D.C. Preston reports, in unprecedented detail, on the government's response to the attacks and takes us into the ongoing FBI investigation. His story is based on interviews with top-level FBI agents and with Dr. Steven Hatfill.
Jahrling is leading a team of scientists doing controversial experiments with live smallpox virus at CDC. Preston takes us into the lab where Jahrling is reawakening smallpox and explains, with cool and devastating precision, what may be at stake if his last bold experiment fails.
Descriptions and Prescriptions : A Biblical Perspective on Psychiatric Diagnoses and Medications
OCD, ADHD, PTSD, Bipolar Disorder . . . these are no longer just technical terms and medical diagnoses, they are part of our common vocabulary and culture. As Christians, we shouldn't isolate ourselves from this discussion or dismiss these important issues. But we also should be careful not to accept the entire secular psychiatric diagnostic and treatment enterprise without question. What we need is a balanced, biblically (and scientifically) informed approach that neither blindly accepts nor harshly dismisses psychiatric labels, diagnoses, and medicines that are prescribed to help those who are suffering.
As both a Biblical counselor and medical doctor, Michael R. Emlet, MD, gives readers a Christ-centered approach to psychiatry and guides both lay and professional helpers through the thicket of mental health labels and treatments with a biblical lens. In a clear and thoughtful way that puts the person experiencing mental health issues at the forefront, Emlet uses Scripture to show how the Bible engages in the discussion of psychiatric labels and the medications that are often recommended based on those labels. The first book in the Helping the Helper series, Descriptions and Prescriptions will give readers a biblical, gospel-formed perspective to help them understand and minister to those struggling with mental health issues.
DESCRIPTIVE INORGANIC CHEMISTRY
DESIGN FOR ELECTRICAL & COMPUTER ENGINEERS (P)
DESIGN FOR MOTION
Combining art and design principles with creative storytelling and professional savvy, this book covers everything a serious motion designer needs to make their artistic visions a reality and confidently produce compositions for clients.
In this updated second edition of Design for Motion, author Austin Shaw explores the principles of motion design, teaching readers how to creatively harness the essential techniques of this diverse and innovative medium to create compelling style frames, design boards, and motion design products. Lessons are augmented by illustrious full-color imagery and practical exercises, allowing you to put the techniques covered into immediate practical context. Industry leaders, pioneers, and rising stars contribute their professional perspectives, share personal stories, and provide visual examples of their work.
This second edition also includes updates on the following:
Plumb the depths of core motion design fundamentals and harness the essential techniques of this diverse and innovative medium. An accompanying Companion Website (www.routledge.com/cw/shaw) features video tutorials, a student showcase, and more.
DESIGN OF MACHINERY (W/DVD)
Accompanying each copy of the book is an updated DVD that includes the LINKAGES software package, updated DYNACAM, as well as ENGINE and MATRIX programs. A six-month license for the Working Model program is available for a nominal charge from the website. Additionally, the DVD contains many videos and classroom resources to help instructors and students.
DESIGN OF WOOD STRUCTURES ASD/LRFD
Fully updated to cover the latest techniques and standards, the eighth edition of this comprehensive resource leads you through the complete design of a wood structure following the same sequence used in the actual design/construction process. Detailed equations, clear illustrations, and practical design examples are featured throughout the text. This up-to-date edition conforms to both the 2018 International Building Code (IBC) and the 2018 National Design Specification for Wood Construction (NDS).
Design of Wood Structures-ASD/LRFD, Eighth Edition, covers:
- Wood buildings and design criteria
- Design loads
- Behavior of structures under loads and forces
- Properties of wood and lumber grades
- Structural glued laminated timber
- Beam design and wood structural panels
- Axial forces and combined loading
- Diaphragms and shearwalls
- Wood and nailed connections
- Bolts, lag bolts, and other connectors
- Connection details and hardware
- Diaphragm-to-shearwall anchorage
- Requirements for seismically irregular structures
- Residential buildings with wood light frames
DESIGN THINKING PROCESS & METHODS
DESIGNER'S RESEARCH MANUAL
Good information gives designers a competitive advantage. Understanding the wishes of a client and the needs and preferences of their audience drives innovation. The ability to gather research, analyze findings, and apply them to project goals is as important to successful design teams as their conceptual and aesthetic skills. This essential handbook will help readers understand what design research is and why it is necessary, outline proven techniques and methods, and explain how to incorporate them into any creative process.
A Designer's Research Manual was one of the first books to apply research practices to the benefit of visual communication designers. This long awaited second edition follows more than a decade of active use by practitioners, design educators, and students around the world. Comprehensively updated, A Designer's Research Manual second edition includes:DESIGNING SECURE SOFTWARE : A GUIDE FOR DEVELOPERS
- Evaluate the effectiveness of various threat mitigation candidates
- Work with well-known secure coding patterns and libraries
- Understand and prevent vulnerabilities like XSS and CSRF, memory flaws, and more
- Use security testing to proactively identify vulnerabilities introduced into code
- Review a software design for security flaws effectively and without judgment Kohnfelder's career, spanning decades at Microsoft and Google, introduced numerous software security initiatives, including the co-creation of the STRIDE threat modeling framework used widely today. This book is a modern, pragmatic consolidation of his best practices, insights, and ideas about the future of software.
DESIGNING VISUAL LANGUAGE (P)
DESK REF TO DIAG CRITERIA FROM DSM-V (P)
The Desk Reference to the Diagnostic Criteria From DSM-5(R) is a concise, affordable companion to the DSM-5(R). It includes the fully revised diagnostic classification and all of the diagnostic criteria from DSM-5(R). This convenient guide will assist all mental health professionals as they integrate the DSM-5(R) diagnostic criteria into their d
DESK REFERENCE TO THE DIAGNOSTIC CRITERIA FROM DSM-5-TR(TM)
DESTINY OF THE REPUBLIC (P)
DESTRUCTIVE GENERATION; SECOND THOUGHTS ABOUT THE SIXTIES
DEUTSCHE LITERATUR IM KONTEXT 1750-2000
In tandem with Gudrun Clay's 1000 Jahre deustche Literature, these two volumes provide a modern approach to German literature in its cultural, historical and linguistic context.