Search Results - Aaron Fogel~

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2
  3. 3

    Heroes saving Charlie : the novel by Wallington

    Published 2008
    Book
  4. 4

    Handbook of systems engineering and management

    Published 1999
    Table of Contents: “…Systems Engineering Management: The Multidisciplinary Discipline / Aaron J. Shenhar -- 3. Risk Management / Yacov Y. …”
    Book
  5. 5

    Law enforcement ethics classic and contemporary issues by Fitch, Brian D.

    Published 2014
    Table of Contents: “…Jones -- Ethics, Enforcement, and the Prospect of Professionalism / Aaron D. Conley and Bryon G. Gustafson -- The Psychology of Marginality / Paul T. …”
    Book
  6. 6

    Eye, retina, and visual system of the mouse

    Published 2008
    Table of Contents: “…Howell, Jeffrey K. Marchant and Simon W.M. John -- Cataract genetics / Jochen Graw -- Mouse models of infectious eye diseases / Linda D. …”
    NetLibrary
    ebrary
    Electronic eBook
  7. 7

    TEACHING AND LEARNING SOURCE-BASED WRITING : Current Perspectives and Future Directions /

    Published 2024
    Table of Contents: “…Understanding novice L2 writers' reasoning and decision-making strategies for sourcebased writing / Qian Du and Ying Liu -- Tracing changes in the citing practices of a master's student : a longitudinal case study / Bojana Petric and Nigel Harwood -- Teachers' perspectives on source-based writing challenges and skill development strategies / Rosemary Wette -- Culturally and linguistically responsive source-based argumentative writing pedagogy for multilingual writers in the secondary school context / Zuzana Tomaš, Kelsey DeCamillis, and Sarah Lorenz -- Patchwriting : co-opting a transgressive practice for pedagogical purposes / Sarah Leu and Heike Neumann -- Using a flipped learning approach to teach source-based writing in academic English language courses / Ilka Kostka -- Showing, telling, and sharing : supporting students in their use of source texts via technology / Dawn Bikowski, Kyle Butler and Aaron Schwartz -- Scaffolding instruction for post-secondary L2 synthesis writing / Stephen Doolan and Shannon Fitzsimmons-Doolan -- Evaluation of two interventions to teach source use for rhetorical purposes to postgraduate novice academic writers / Qingyang Sun and Bill Soden -- Developing academic biliteracies through plurilingual integrated writing tasks : students' perceptions and reported practices / Caroline Payant and Philippa Bell -- Learning potential in integrated writing assessment / Lia Plakans and GoMee Park -- The role of source information use in business communication instructors' evaluation of student essay exams / Kim McDonough, Heike Neumann, and Carol Johnson -- A framework for cognitive and metacognitive processing skills in argumentative integrated writing assessments / Choo Mui Cheong, Run Mu and Xiaomeng Zhang -- Talking to the literature : stance taking in citing others' work / Ken Hyland and Feng (Kevin) Jiang -- Direct quotation : rhetorical function and applications for teaching / Peter Docherty and Tomáš Mach -- Ethical issues in research on source-based writing / Debra A. …”
    Book
  8. 8

    Encyclopedia of social work with groups

    Published 2009
    Table of Contents: “…Kirsch -- Group Work Journals -- Groupwork / Mark Doel -- Small group research / Aaron M. Brower, Charels D. …”
    NetLibrary
    Click here to view book
    MyiLibrary
    ebrary
    Electronic eBook
  9. 9

    Routledge handbook of military ethics

    Published 2015
    Table of Contents: “…Carter, Jr. -- Effective democratization and the development of moral competencies in the Armed Forces of African states / Alain Fogue Tedom -- Expeditionary ethics education / David Whetham -- Military ethics in variant cultural traditions: warrior codes revisited / Shannon E. …”
    Book
  10. 10

    Preventing war and promoting peace a guide for health professionals

    Published 2017
    Table of Contents: “…Use of complex systems modelling to strengthen public health's role in preventing war William H. …”
    Book
  11. 11

    Information security and IT risk management by Agrawal, Manish

    Published 2014
    Table of Contents: “…Maxx -- Chapter review questions -- Example case questions -- Hands-on Activity -- Linux system installation -- Critical thinking exercise -- Google executives sentenced to prison over video -- Design case -- ch. 3 System Administration (Part 2) -- Overview -- Operating system structure -- The command-line interface -- Files and directories -- Moving around the filesystem -- pwd, cd -- Listing files and directories -- Shell expansions -- File management -- Viewing files -- Searching for files -- Access control and user management -- Access control lists -- File ownership -- Editing files -- Software installation and updates -- Account management -- Command-line user administration -- Example case -- Northwest Florida State College -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- basic Linux system administration -- Critical thinking exercise -- offensive cyber effects operations (OCEO) -- Design Case -- ch. 4 The Basic Information Security Model -- Overview -- Introduction -- Components of the basic information security model -- Common vulnerabilities, threats, and controls -- Example case -- ILOVEYOU virus -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- web server security -- Critical thinking exercise -- the internet, "American values," and security -- Design case -- ch. 5 Asset Identification and Characterization -- Overview -- Assets overview -- Determining assets that are important to the organization -- Asset types -- Asset characterization -- IT asset life cycle and asset identification -- System profiling -- Asset ownership and operational responsibilities -- Example case -- Stuxnet -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- course asset identification -- Critical thinking exercise -- uses of a hacked PC -- Design case -- ch. 6 Threats and Vulnerabilities -- Overview -- Introduction -- Threat models -- Threat agent -- Threat action -- Vulnerabilities -- Example case -- Gozi -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- Vulnerability scanning -- Critical thinking exercise -- Iraq cyberwar plans in 2003 -- Design case -- ch. 7 Encryption Controls -- Overview -- Introduction -- Encryption basics -- Encryption types overview -- Encryption types details -- Encryption in use -- Example case -- Nation technologies -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- encryption -- Critical thinking exercise -- encryption keys embed business models -- Design case -- ch. 8 Identity and Access Management -- Overview -- Identity management -- Access management -- Authentication -- Single sign-on -- Federation -- Example case -- Markus Hess -- Summary -- Chapter review questions -- Example case questions -- Hands-on activity -- identity match and merge -- Critical thinking exercise -- feudalism the security solution for the internet? …”
    Book
  12. 12

    Remediation of hazardous waste contaminated soils

    Published 1994
    Table of Contents: “…Robinson -- The Use of Surfactants to Enhance Pump-and-Treat Processes for In Situ Soil Remediation / Sarah L. Kimball -- Modeling Soil Bioremediation / Aaron A. Jennings, Ajay Manocha -- Using Microbial Kinetics in the Bioremediation of Contaminated Soils / Jeremiah D. …”
    Book
  13. 13

    Translational regenerative medicine

    Published 2015
    Table of Contents: “…Durfor, Richard McFarland and Celia Witten -- Newborn stem cell banking business models / Thomas Moore, Matthew P. Brown, John R. Chapman, Jesse Kramer, Robert P. …”
    Book
  14. 14

    Organizational reality reports from the firing line

    Published 1997
    Table of Contents: “…Mamis -- This Woman Has Changed Business Forever / Bo Burlingham -- Can The Body Shop Shape Up? …”
    Book