The Annenbergs
Title | The Annenbergs PDF eBook |
Author | John E. Cooney |
Publisher | Simon & Schuster |
Pages | 456 |
Release | 1982 |
Genre | Biography & Autobiography |
ISBN |
"This is the colorful and dramatic biography of two of America's most controversial entrepreneurs: Moses Louis Annenberg, 'the racing wire king, ' who built his fortune in racketeering, invested it in publishing, and lost much of it in the biggest tax evasion case in United States history; and his son, Walter, launcher of TV Guide and Seventeen magazines and former ambassador to Great Britain."--Jacket.
The Archaeology of Late Antique 'Paganism'
Title | The Archaeology of Late Antique 'Paganism' PDF eBook |
Author | |
Publisher | BRILL |
Pages | 709 |
Release | 2011-06-22 |
Genre | Religion |
ISBN | 9004210393 |
There is no agreement over how to name the 'pagan' cults of late antiquity. Clearly they were more diverse than this Christian label suggests, but also exhibited tendencies towards monotheism and internal changes which makes it difficult to describe them as 'traditional cults'. This volume, which includes two extensive bibliographic essays, considers the decline of urban temples alongside the varying evolution of other focii of cult practice and identity. The papers reveal great regional diversity in the development of late antique paganism, and suggest that the time has come to abandon a single compelling narrative of 'the end of the temples' based on legal sources and literary accounts. Although temple destructions are attested, in some regions the end of paganism was both gradual and untraumatic, with more co-existence with Christianity than one might have expected. Contributors are Javier Arce, Béatrice Caseau, Georgios Deligiannakis, Koen Demarsin, Jitse H.F. Dijkstra, Demetrios Eliopoulos, James Gerrard, Penelope J. Goodman, David Gwynn, Luke Lavan, Michael Mulryan, Helen G. Saradi, Eberhard W. Sauer, Gareth Sears, Peter Talloen, Peter Van Nuffelen and Lies Vercauteren.
The Development of the Social Self
Title | The Development of the Social Self PDF eBook |
Author | Mark Bennett |
Publisher | Psychology Press |
Pages | 406 |
Release | 2004-07-31 |
Genre | Psychology |
ISBN | 1135426171 |
Drawing upon the perspective of social identity theory, The Development of the Social Self is concerned with the acquisition and development of children's social identities. In contrast to previous work on self-development, which has focused primarily on the development of the personal self, this volume makes a case for the importance of the study of the social self - that is, the self as defined through group memberships, such as gender, ethnicity, and nationality. A broad range of identity-related issues are addressed, such as ingroup identification, conceptions of social identities, prejudice, and the central role of social context. Based on contributions from leading researchers in Europe, Australia and the US, the book summarises the major research programmes conducted to date. Furthermore, the closing chapters provide commentary on this research, as well as mapping out key directions for future research. With a unique focus encompassing both social and developmental psychology, The Development of the Social Self will appeal to a broad spectrum of students and researchers in both disciplines, as well as those working in related areas such as sociology and child development.
UAT Defined
Title | UAT Defined PDF eBook |
Author | Rob Cimperman |
Publisher | Pearson Education |
Pages | 298 |
Release | 2006-11-28 |
Genre | Computers |
ISBN | 0132702622 |
This is the eBook version of the printed book. This digtial Short Cut provides a concise and supremely useful guide to the emerging trend of User Acceptance Testing (UAT). The ultimate goal of UAT is to validate that a system of products is of sufficient quality to be accepted by the users and, ultimately, the sponsors. This Short Cut is unique in that it views UAT through the concept that the user should be represented in every step of the software delivery lifecycle--including requirements, designs, testing, and maintenance--so that the user community is prepared, and even eager, to accept the software once it is completed. Rob Cimperman offers an informal explanation of testing, software development, and project management to equip business testers with both theory and practical examples, without the overwhelming details often associated with books written for "professional" testers. Rather than simply explaining what to do, this resource is the only one that explains why and how to do it by addressing this market segment in simple, actionable language. Throughout the author’s considerable experience coordinating UAT and guiding business testers, he has learned precisely what testers do and do not intuitively understand about the software development process. UAT Defined informs the reader about the unfamiliar political landscape they will encounter. Giving the UAT team the tools they need to comprehend the process on their own saves the IT staff from having to explain test management from the beginning. The result is a practice that increases productivity and eliminates the costs associated with unnecessary mistakes, tedious rework, and avoidable delays. Chapter 1 Introduction Chapter 2 Defining UAT–What It Is...and What It Is Not Chapter 3 Test Planning–Setting the Stage for UAT Success Chapter 4 Building the Team–Transforming Users into Testers Chapter 5 Executing UAT–Tracking and Reporting Chapter 6 Mitigating Risk–Your Primary Responsibility
Information Security Policies Made Easy Version 10
Title | Information Security Policies Made Easy Version 10 PDF eBook |
Author | Charles Cresson Wood |
Publisher | |
Pages | 740 |
Release | 2005-04-01 |
Genre | Computers |
ISBN | 9781881585138 |
Know Your Enemy
Title | Know Your Enemy PDF eBook |
Author | Honeynet Project |
Publisher | Addison-Wesley Professional |
Pages | 768 |
Release | 2004 |
Genre | Computers |
ISBN | 9780321166463 |
A guide to computer security discusses how the "blackhat community" uses the Internet for destructive purposes and provides information on how to learn from a "blackhat" attack to protect computer networks.