Results 31 to 40 of 51 | « previous | next »
- Time management for dummies / by Mayer, Jeffrey J.(CARDINAL)201992;
- Subjects: Time management.;
- Adaptive technologies for learning & work environments / by Lazzaro, Joseph J.(CARDINAL)206977;
- Subjects: Computerized self-help devices for people with disabilities; Computers and people with disabilities;
- Designing Web-based training : how to teach anyone anything anywhere anytime / by Horton, William K.(William Kendall)(CARDINAL)772476;
- Includes bibliographical references and index.
- Subjects: Employees; World Wide Web.;
- Devil may cry 5 [video game] / by Capcom USA,publisher.(CARDINAL)688054; RE Engine (Firm),software developer.; Simplygon Studios (Firm),software developer.;
- The Devil you know returns in this brand new entry in the over-the-top action series. Prepare to get downright demonic with this signature blend of high-octane stylized action and otherworldly & original characters the series is known for. Director Hideaki Itsuno and the core team have returned to create the most insane, technically advanced and utterly unmissable action experience of this generation! The threat of demonic power has returned to menace the world once again in Devil May Cry 5. The invasion begins when the seeds of a "demon tree" take root in Red Grave City. As this hellish incursion starts to take over the city, a young demon hunter Nero, arrives with his partner Nico in their "Devil May Cry" motorhome. Finding himself without the use of his right arm, Nero enlists Nico, a self-professed weapons artist, to design a variety of unique mechanical Devil Breaker arms to give him extra powers to take on evil demons such as the blood sucking flying Empusa and giant colossus enemy GoliathESRB content rating: M, Mature 17+ (content is generally suitable for ages 17 and up) for blood, partial nudity, strong language, violence.Supported features: Xbox One X Enhanced; high dynamic range (HDR); Xbox Live co-op multiplayer; in-game purchases; Dolby Audio.System requirements: Xbox One game system; game disc and up to 31 GB storage required (subject to change); additional storage, hardware, broadband (ISP fees apply) Microsoft Acount, and Xbox Live may be required for setup, some updates, and features, including retention of gameplay settings and information.
- Subjects: Demonology; Hand-to-hand fighting; Imaginary wars and battles; Weapons;
- Peterson's guide to graduate programs in engineering and applied sciences. by Peterson's Guides, Inc.(CARDINAL)138428;
- Subjects: Directories.; Universities and colleges; Universities and colleges; Engineering; Engineering; Technical education; Technical education;
- CompTIA A+ certification all-in-one exam guide (exams 220-901 & 220-902) / by Meyers, Mike,1961-(CARDINAL)650501;
- "This bestselling on-the-job reference and test preparation guide has been fully revised for the new 2015 CompTIA A+ exam objectives. Written by the leading authority on CompTIA A+ certification and training, this self-study book and CD has been thoroughly updated to cover 100% of the exam objectives on the 2015 CompTIA A+ exams. New topics include managing and maintaining cellular devices, including tablets; configuring operating systems, including Windows 8, Android, and iOS; and enhanced, mobile-centered security and troubleshooting procedures. CompTIA A+ Certification All-in-One Exam Guide, Ninth Edition (Exams 220-901 & 220-902) enables you to take the test with complete confidence. It also serves as a practical reference for IT support and technical personnel. The bonus CD-ROM includes practice exam for both exam 901 and 902 with hundreds of accurate practice exam questions, more than an hour of Mike Meyers training videos, performance based simulations, free PC tools, and a PDF copy of the book. Written with the "in the trenches" voice and clarity Mike Meyers is known for Features pre-assessment tests, exam tips, and "Try This!" sections to reinforce difficult topics Includes a coupon for 10% off of the exam fee, a $37 value "--Includes bibliographical references and index.The Path of the PC Tech -- Operational Procedures -- The Visible Computer -- Microprocessors -- RAM -- BIOS -- Motherboards -- Power Supplies -- Hard Drive Technologies -- Implementing Hard Drives -- Essential Peripherals -- Building a PC -- Windows Under the Hood -- Users, Groups, and Permissions -- Maintaining and Optimizing Operating Systems -- Working with the Command-Line Interface -- Troubleshooting Operating Systems -- Virtualization -- Display Technologies -- Essentials of Networking -- Local Area Networking -- Wireless Networking -- The Internet -- Portable Computing -- Understanding Mobile Devices -- Care and Feeding of Mobile Devices -- Printers and Multifunction Devices -- Securing Computers -- Appendix A: Mapping to the CompTIA A+ Objectives -- Appendix B: About the CD-ROM.
- Subjects: Study guides.; Microcomputers; Computer technicians;
- Guidebook on best practices for airport cybersecurity / by Murphy, Randy J.,author.(CARDINAL)310785; Sukkarieh, Michael,author.; Haass, Jon,author.; Hriljac, Paul M.,author.(CARDINAL)336664; United States.Federal Aviation Administration,sponsor.(CARDINAL)139906; Airport Cooperative Research Program,sponsor.(CARDINAL)307624; National Research Council (U.S.).Transportation Research Board,issuing body.(CARDINAL)141287;
- Includes bibliographical references (pages 76-79).Summary -- chapter 1. Introduction -- chapter 2. What is cybersecurity? -- chapter 3. An approach to cybersecurity at airports -- chapter 4. Implementing countermeasures -- chapter 5. Developing a cybersecurity program -- chapter 6. Detecting, responding to, and recovering from attacks -- chapter 7. Conclusions and suggested research -- Glossary, abbreviations, acronyms, and symbols -- References -- appendix A. Categorized list of cybersecurity threats -- appendix B. Airport systems -- appendix C. Countermeasures -- appendix D. Using the multimedia material."ACRP Report 140: Guidebook on Best Practices for Airport Cybersecurity provides resources for airport managers and information technology (IT) staff to reduce or mitigate inherent risks of cyberattacks on technology-based systems. Traditional IT infrastructure such as servers, desktops, and network devices are covered along with increasingly sophisticated and interconnected industrial control systems, such as baggage handling, temperature control, and airfield lighting systems. Accompanying this guidebook is a CD-ROM of multimedia material that can be used to educate all staff at airports about the need, and how, to be diligent against cybersecurity threats."--Foreword.Research sponsored by the Federal Aviation Administration
- Subjects: Technical reports.; Airports; Computer crimes;
- Winning presentation in a day get it done right, get it done fast / by Abrams, Rhonda,1950-(CARDINAL)370754; Vallone, Julie.(CARDINAL)549094;
- Subjects: Microsoft PowerPoint (Computer file); Business presentations.;
- Technical documentation with imagery and digital data [electronic resource] : NOAA polar orbiter data user's guide (August 1997) and NOAA global vegetation index user's guide (July 1997) / by National Climatic Data Center (U.S.)(CARDINAL)169937; Polar Orbiting Environmental Satellite Program (U.S.)(CARDINAL)308430;
- Contains description of instruments on NOAA POES series from TIROS-N through NOAA-14, level 1b data format that NOAA uses to distribute raw data to users, and derived data products including TOVS soundings, sea surface temperature (SST), mapped GAC, and radiation budget; it also describes the various products derived from NOAA POES data to monitor global vegetation growth and distribution.System requirements: Windows 3.1 or Windows 95; CD-ROM drive; World Wide Web browser capable of supporting embedded graphics and the HTML v3.2 draft specification (browser software included on CD-ROM).
- Subjects: Databases.; Artificial satellites in earth sciences.; Global radiation; Meteorology; Oceanography; Vegetation dynamics;
- A history of ambition in 50 hoaxes / by Eaton, Gale,1947-author.(CARDINAL)478707; Hoose, Phillip M.,1947-author of introduction.(CARDINAL)157325;
- Includes bibliographical references (pages 243-265) and index.1. The original Trojan horse -- What really happened at Troy? -- 2. The forgery underlying the power of medieval popes -- Constantine, Christian emperor of the Greek East and the Latin West -- 3. A letter from the mythical Prester John -- Imagining the world -- 4. Did Marco Polo really go to China? -- Mandeville's travels -- 5. The world's most mysterious book -- A question of motives -- Invented languages -- 6. Was Lambert Simnel a lost prince? -- Henry Tudor's claim to the throne -- The history of Crowland Abbey: a forged source? -- 7. Michelangelo fakes an antiquity -- A patriotic monk glorifies his hometown -- 8. A mythical island appears on maps of the North Atlantic -- Missing and misidentified islands -- 9. Secrets of an imaginary alchemist -- Paracelsus, scientific rebel -- 10. The stagecraft of Athanasius Kircher -- Kircher's museum: a scientific distraction? -- 11. Dr. Beringer reads lying fossils -- Interpreting fossils in 1725 -- 12. An ancient bard awes the literary world -- England and Scotland -- 13. Benjamin Franklin pretends to be the King of Prussia -- Benjamin Franklin's witch hoax -- 14. The Potemkin village: more than just a pretty façade -- 15. Newly discovered Shakespeare play jeered by theater-goers -- Literary forgery as an eighteenth-century epidemic -- 16. An astronomer discovers intelligent life on the Moon -- Voyages to the Moon deemed more plausible than microorganisms in a drop of water -- April fools -- 17. The Walam Olum: 90 generations of oral history of a hoax? -- Slanting history -- 18. Was the Fejee mermaid a genuine fake? -- How do you make a mermaid? -- 19. The Fox sisters invent spiritual telegraphy -- Was there really a murdered peddler? -- Spiritual telegraphy and Benjamin Franklin -- 20. Faking a trip to gold rush territory -- Getting to San Francisco -- 21. When giants roamed the earth -- Mark Twain's petrified man -- 22. The Keely Motor Company promises efficient world travel -- Scientific progress and perpetual motion -- 23. The case of the lying encyclopedia -- Wikipedia -- 24. Extracting gold from seawater -- 25. Viking runes in Minnesota -- Scythian gold at the Louvre --26. A conspiracy to justify murder -- Conspiracy theories and the damage done -- 27. A future great novelist helps hoax the Royal Navy -- HMS Dreadnought and the lead-up to World War I -- 28. Missing link found at Piltdown -- The Piltdown chicken -- How do scientists decide which bones to trust? -- 29. Naked man conquers Maine woods -- Naked publicity gimmicks and hoaxes -- Isolated living in Biosphere 2 -- 30. the spectric poets unmasked -- Two spectric poems -- 31. the original Ponzi scheme -- Pyramid schemes -- 32. Fairies are caught on camera -- Why Arthur Conan Doyle believed in fairies -- 33. Did Grand Duchess Anastasia survive the Revolution? -- Princess Caraboo -- 34. Houdini debunks a medium -- Other ways of knowing: science and new religions -- 35. If you believe that, I have a tower to sell you -- Unloading the Eiffel Tower -- 36. The Loch Ness Monster -- Standards of evidence and scientific names -- 37. Martians attack -- The BBC panics Britain -- 38. Operation Mincemeat deludes Hitler -- the classic Haversack Operation: 1917 -- 39. Dutch artist arrested for selling a Vermeer to Hermann Göring -- Detecting art forgeries -- 40. The cursed tomb of the last Aztec emperor -- Tombs of heroes -- 41. Donald Crowhurst vanishes at sea -- Yachting technology -- 42. The Tasaday: a stone-age tribe or a hoax? -- Survivals from the dawn of humanity -- 43. A faked autobiography of Howard Hughes -- A memoir of live with wolves -- 44. Moon landing conspiracy theory -- Scientific literacy -- 45. Genuine fake Hitler diaries -- Why 1983? -- 46. More lying stones: Moroccan fossils in the Himalayas -- Why the scientific record needs setting straight -- 47. Crop circle artists confess -- The will to believe -- 48. Physicist Alan Sokal spoofs postmodern scholarship -- Legislating pi -- Scholarly journals and the peer review process -- 49. Joining the campaign to ban DHMO -- Getting both sides of the story -- 50. Microsoft technical support -- Curses and crashing computers: frightening the marks.What do the Trojan Horse, Piltdown Man, Keely Motor Company, and Ponzi Scheme have in common? They were all famous hoaxes, carefully designed and bolstered with false evidence.
- Subjects: Young adult literature.; Trivia and miscellanea.; Young adult literature.; History; Hoaxes; Ambition;
Results 31 to 40 of 51 | « previous | next »