Search Results - Wanssum~

  1. 41

    Managing power and people by Seperich, George J., 1944-

    Published 2006
    Table of Contents: “…Managing power -- Introduction -- Fear -- Sources of organizational power -- Overview of the power sources -- The power structure of an organization -- The power of group membership -- Usurping and assuming power -- Power and authority -- Entitled power -- Authority of resource providers: introduction -- Who are the resource providers? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  2. 42

    Managing power and people by Seperich, George J., 1944-

    Published 2006
    Table of Contents: “…Managing power -- Introduction -- Fear -- Sources of organizational power -- Overview of the power sources -- The power structure of an organization -- The power of group membership -- Usurping and assuming power -- Power and authority -- Entitled power -- Authority of resource providers: introduction -- Who are the resource providers? …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  3. 43

    The value of victory in Pindar's odes gnomai, cosmology and the role of the poet / by Boeke, Hanna

    Published 2007
    Table of Contents: “…Gnomai as a source of cosmological reflection -- The nature of gnomai according to modern scholarship -- Ancient thinking on gnomai -- The "true point" of gnomai -- The gnomic expression of cosmology in Pindar -- Definitions and assumptions -- The elemental forces : fate, God, nature and man -- The human condition -- Man in society -- Cosmology in action : an analysis of selected odes -- Olympian 12 : an immigrant and his adopted city -- Isthmian 4 : creating for an ill-favoured victor -- Olympian 13 : praising an ambitious family -- The poet as mediator of cosmology -- Isthmian 4 : the poet modifies a cosmological premise -- Olympian 13 : the poet demonstrates cosmological principles -- Cosmology and the poet in short odes -- Olympian 9 and Nemean 3 : the poet assumes different attitudes to a central cosmological tenet.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  4. 44

    The value of victory in Pindar's odes gnomai, cosmology and the role of the poet / by Boeke, Hanna

    Published 2007
    Table of Contents: “…Gnomai as a source of cosmological reflection -- The nature of gnomai according to modern scholarship -- Ancient thinking on gnomai -- The "true point" of gnomai -- The gnomic expression of cosmology in Pindar -- Definitions and assumptions -- The elemental forces : fate, God, nature and man -- The human condition -- Man in society -- Cosmology in action : an analysis of selected odes -- Olympian 12 : an immigrant and his adopted city -- Isthmian 4 : creating for an ill-favoured victor -- Olympian 13 : praising an ambitious family -- The poet as mediator of cosmology -- Isthmian 4 : the poet modifies a cosmological premise -- Olympian 13 : the poet demonstrates cosmological principles -- Cosmology and the poet in short odes -- Olympian 9 and Nemean 3 : the poet assumes different attitudes to a central cosmological tenet.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  5. 45

    Champion of civil rights Judge John Minor Wisdom / by Friedman, Joel Wm. (Joel William), 1951-

    Published 2009
    Table of Contents: “…A privileged son of the South -- From birth to Bonnie to the branch, 1905-1946 -- At the bar, 1948-1953 -- Battling the bosses : creating a two-party system in Louisiana -- The 1952 convention : victories for Eisenhower and a two-party system in Louisiana -- Assuming the bench : nomination and confirmation -- The Fifth Circuit's emerging intellectual leader, 1957-1966 -- Showdown in Mississippi : standing up for James Meredith and to Ross Barnett -- The first step in desegregating the South : enforcing Brown's mandate in Louisiana -- Implementing Brown throughout the nation -- Internal discord threatens the court -- Honoring the promise of the Fifteenth Amendment : the voting rights cases -- A vigilant steward of fairness -- The civil rights struggles of the 1970s and 1980s : equal opportunity in employment -- The unsuccessful campaign to save the Fifth Circuit -- Honoring the legacy.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  6. 46

    Building community resilience to disasters a way forward to enhance national health security /

    Published 2011
    Table of Contents: “…Introduction -- Definition and application of community resilience -- Wellness : promote population health before and after an incident, including behavioral health -- Access : ensure access to high-quality health, behavioral health, and social resources and services -- Education : ensure ongoing information to the public about preparedness, risks, and resources before, during, and after a disaster -- Engagement : promote participatory decisionmaking in planning, response, and recovery activities -- Self-sufficiency : enable and support individuals and communities to assume responsibility for their preparedness -- Partnership : develop strong partnerships within and between government and other organizations -- Quality : collect, analyze, and utilize data to monitor and evaluate progress on building community resilience -- Efficiency : leverage existing community resources for maximum use and effectiveness -- Future directions : implementation, measurement, and next steps.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  7. 47

    Application administrators handbook : installing, updating and troubleshooting software / by Bourne, Kelly C.

    Published 2014
    Table of Contents: “…Overview -- Design -- Architecture -- Features common to many applications -- Specifics about your application -- Taking (assuming?) responsibility for an application -- Change control -- Installing software -- Support software -- Updates and patches -- Supporting your application -- Disaster recover -- Handling problems with the application -- Repetitive activities -- Security -- The server -- Tuning -- The network -- Your organization -- The user's viewpoint -- The vendor -- The government gets involved -- System tools - common -- System tools - microsoft -- System tools - unix -- Tools you can or should develop -- Third party tools -- Troubleshooting tips -- Things to do in advance that pay off -- Things that will happen that you don't want to think about -- The end of days - decommissioning an application -- What every application administrator should know -- Education -- Parting advice, perhaps unsolicited.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  8. 48

    Building community resilience to disasters a way forward to enhance national health security /

    Published 2011
    Table of Contents: “…Introduction -- Definition and application of community resilience -- Wellness : promote population health before and after an incident, including behavioral health -- Access : ensure access to high-quality health, behavioral health, and social resources and services -- Education : ensure ongoing information to the public about preparedness, risks, and resources before, during, and after a disaster -- Engagement : promote participatory decisionmaking in planning, response, and recovery activities -- Self-sufficiency : enable and support individuals and communities to assume responsibility for their preparedness -- Partnership : develop strong partnerships within and between government and other organizations -- Quality : collect, analyze, and utilize data to monitor and evaluate progress on building community resilience -- Efficiency : leverage existing community resources for maximum use and effectiveness -- Future directions : implementation, measurement, and next steps.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  9. 49

    Application administrators handbook : installing, updating and troubleshooting software / by Bourne, Kelly C.

    Published 2014
    Table of Contents: “…Overview -- Design -- Architecture -- Features common to many applications -- Specifics about your application -- Taking (assuming?) responsibility for an application -- Change control -- Installing software -- Support software -- Updates and patches -- Supporting your application -- Disaster recover -- Handling problems with the application -- Repetitive activities -- Security -- The server -- Tuning -- The network -- Your organization -- The user's viewpoint -- The vendor -- The government gets involved -- System tools - common -- System tools - microsoft -- System tools - unix -- Tools you can or should develop -- Third party tools -- Troubleshooting tips -- Things to do in advance that pay off -- Things that will happen that you don't want to think about -- The end of days - decommissioning an application -- What every application administrator should know -- Education -- Parting advice, perhaps unsolicited.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  10. 50

    Champion of civil rights Judge John Minor Wisdom / by Friedman, Joel Wm. (Joel William), 1951-

    Published 2009
    Table of Contents: “…A privileged son of the South -- From birth to Bonnie to the branch, 1905-1946 -- At the bar, 1948-1953 -- Battling the bosses : creating a two-party system in Louisiana -- The 1952 convention : victories for Eisenhower and a two-party system in Louisiana -- Assuming the bench : nomination and confirmation -- The Fifth Circuit's emerging intellectual leader, 1957-1966 -- Showdown in Mississippi : standing up for James Meredith and to Ross Barnett -- The first step in desegregating the South : enforcing Brown's mandate in Louisiana -- Implementing Brown throughout the nation -- Internal discord threatens the court -- Honoring the promise of the Fifteenth Amendment : the voting rights cases -- A vigilant steward of fairness -- The civil rights struggles of the 1970s and 1980s : equal opportunity in employment -- The unsuccessful campaign to save the Fifth Circuit -- Honoring the legacy.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  11. 51

    Introduction to the explicit finite element method for nonlinear transient dynamics by Wu, Shen R., 1945-

    Published 2012
    Table of Contents: “…Machine generated contents note: PART 1 Fundamentals1 Introduction1.1 Era of Simulation and Computer Aided Engineering1.2 Preliminaries2 Framework of Explicit Finite Element Method for Nonlinear Transient Dynamics2.1 Transient Structural Dynamics2.2 Variational Principles for Transient Dynamics2.3 Finite Element Equations and the Explicit Procedures2.4 Main Features of the Explicit Finite Element Method2.5 Assessment of Explicit Finite Element MethodPART 2 Element Technology3 Four-Node Shell Element (Reissner-Mindlin Plate Theory)3.1 Fundamentals of Plates and Shells3.2 Linear Theory of R-M Plate3.3 Interpolation for Four-Node R-M Plate Element3.4 Reduced Integration and Selective Reduced Integration3.5 Perturbation Hourglass Control - Belytschko-Tsay (B-T) Element3.6 Physical Hourglass Control - Belytschko-Leviathan (B-L) (QPH) Element3.7 Shear Projection Method - Bathe-Dvorkin (B-D) Element3.8 Assessment of Four-Node R-M Plate Element4 Three-Node Shell Element (Reissner-Mindlin Plate Theory)4.1 Fundamentals of a Three-Node C0 Element4.2 Decomposition Method for C0 Triangular Element with One Point Integration4.3 Discrete Kirchhoff Triangular (DKT) Element4.4 Assessment of Three-Node R-M Plate Element5 Eight-Node Solid Element5.1 Trilinear Interpolation for the Eight-Node Hexahedron Element5.2 Locking Issues of the Eight-Node Solid Element5.3 One- Point Reduced Integration and the Perturbed Hourglass Control5.4 Assumed Strain Method and Selective / Reduced Integration5.5 Assumed Deviatoric Strain5.6 An Enhanced Assumed Strain Method5.7 Taylor Expansion of Assumed Strain about the Element Center5.8 Evaluation of Eight-Node Solid Element6 Two-Node Element6.1 Truss and Rod Element6.2 Timoshenko Beam Element6.3 Spring Element6.4 Spot Weld ElementPART 3 Material Models7 Material Model of Plasticity7.1 Fundamentals of Plasticity7.2 Constitutive Equations7.3 Software Implementation7.4 Evaluation of Shell Elements with Plastic Deformation8 Continuum Mechanics Model of Ductile Damage8.1 Concept of Damage Mechanics8.2 Gurson's Model8.3 Chow's Isotropic Model of Continuum Damage Mechanics8.4 Chow's Anisotropic Model of Continuum Damage Mechanics9 Models of Nonlinear Materials9.1 Vicoelasticity9.2 Polymer and Engineering Plastics9.3 Rubber9.4 Foam9.5 Honeycomb9.6 Laminated GlazingPART 4 Contact and Constraint Conditions10 Three-Dimensional Surface Contact10.1 Examples of Contact Problems10.2 Description of Contact Conditions10.3 Variational Principle for the Dynamic Contact Problem10.4 Penalty Method and the Regularization of Variational Inequality11 Numerical Procedures for Three-Dimensional Surface Contact11.1 A Contact Algorithm with Slave Node Searching Master Segment11.2 A Contact Algorithm with Master Segment Searching Slave Node11.3 Method of Contact Territory and Defense Node11.4 Pin- Ball Contact Algorithm11.5 Edge (Line Segment) Contact11.6 Evaluation of Contact Algorithm with Penalty Method12 Kinematic Constraint Conditions12.1 Rigid Wall12.2 Rigid Body12.3 Explicit Finite Element Procedure with Constraint Conditions12.4 Application Examples with Constraint Conditions.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  12. 52

    Introduction to the explicit finite element method for nonlinear transient dynamics by Wu, Shen R., 1945-

    Published 2012
    Table of Contents: “…Machine generated contents note: PART 1 Fundamentals1 Introduction1.1 Era of Simulation and Computer Aided Engineering1.2 Preliminaries2 Framework of Explicit Finite Element Method for Nonlinear Transient Dynamics2.1 Transient Structural Dynamics2.2 Variational Principles for Transient Dynamics2.3 Finite Element Equations and the Explicit Procedures2.4 Main Features of the Explicit Finite Element Method2.5 Assessment of Explicit Finite Element MethodPART 2 Element Technology3 Four-Node Shell Element (Reissner-Mindlin Plate Theory)3.1 Fundamentals of Plates and Shells3.2 Linear Theory of R-M Plate3.3 Interpolation for Four-Node R-M Plate Element3.4 Reduced Integration and Selective Reduced Integration3.5 Perturbation Hourglass Control - Belytschko-Tsay (B-T) Element3.6 Physical Hourglass Control - Belytschko-Leviathan (B-L) (QPH) Element3.7 Shear Projection Method - Bathe-Dvorkin (B-D) Element3.8 Assessment of Four-Node R-M Plate Element4 Three-Node Shell Element (Reissner-Mindlin Plate Theory)4.1 Fundamentals of a Three-Node C0 Element4.2 Decomposition Method for C0 Triangular Element with One Point Integration4.3 Discrete Kirchhoff Triangular (DKT) Element4.4 Assessment of Three-Node R-M Plate Element5 Eight-Node Solid Element5.1 Trilinear Interpolation for the Eight-Node Hexahedron Element5.2 Locking Issues of the Eight-Node Solid Element5.3 One- Point Reduced Integration and the Perturbed Hourglass Control5.4 Assumed Strain Method and Selective / Reduced Integration5.5 Assumed Deviatoric Strain5.6 An Enhanced Assumed Strain Method5.7 Taylor Expansion of Assumed Strain about the Element Center5.8 Evaluation of Eight-Node Solid Element6 Two-Node Element6.1 Truss and Rod Element6.2 Timoshenko Beam Element6.3 Spring Element6.4 Spot Weld ElementPART 3 Material Models7 Material Model of Plasticity7.1 Fundamentals of Plasticity7.2 Constitutive Equations7.3 Software Implementation7.4 Evaluation of Shell Elements with Plastic Deformation8 Continuum Mechanics Model of Ductile Damage8.1 Concept of Damage Mechanics8.2 Gurson's Model8.3 Chow's Isotropic Model of Continuum Damage Mechanics8.4 Chow's Anisotropic Model of Continuum Damage Mechanics9 Models of Nonlinear Materials9.1 Vicoelasticity9.2 Polymer and Engineering Plastics9.3 Rubber9.4 Foam9.5 Honeycomb9.6 Laminated GlazingPART 4 Contact and Constraint Conditions10 Three-Dimensional Surface Contact10.1 Examples of Contact Problems10.2 Description of Contact Conditions10.3 Variational Principle for the Dynamic Contact Problem10.4 Penalty Method and the Regularization of Variational Inequality11 Numerical Procedures for Three-Dimensional Surface Contact11.1 A Contact Algorithm with Slave Node Searching Master Segment11.2 A Contact Algorithm with Master Segment Searching Slave Node11.3 Method of Contact Territory and Defense Node11.4 Pin- Ball Contact Algorithm11.5 Edge (Line Segment) Contact11.6 Evaluation of Contact Algorithm with Penalty Method12 Kinematic Constraint Conditions12.1 Rigid Wall12.2 Rigid Body12.3 Explicit Finite Element Procedure with Constraint Conditions12.4 Application Examples with Constraint Conditions.…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  13. 53

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  14. 54

    Computer forensics an essential guide for accountants, lawyers, and managers / by Sheetz, Michael

    Published 2007
    Table of Contents: “…-- Output -- Conclusion -- Preservation and collection of digital evidence -- Introduction -- Rules of evidence -- Preservation -- Collection -- Conclusion -- Analysis of digital evidence -- Introduction -- Forensic analysis -- Conclusion -- Reporting and rendering the opinion -- Introduction -- Preparing the report -- Presentation -- The trial process -- Conclusion -- Computer attacks -- Hackers and phreakz oh my -- The hacker: unauthorized use and trespassing -- Wireless hacking -- Malware -- Attacks from the inside -- Conclusion -- Computers as tools for evil -- Introduction -- Computers and crime -- Identity theft -- Concealment -- Auction fraud and retail cons -- Counterfeiting and forgery -- Prostitution -- Securities fraud -- Conclusion -- Computer tools and the forensic examination -- Introduction -- Assuming control of the case -- Understand the case -- Evaluate the evidence -- Examining the ?…”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  15. 55
  16. 56
  17. 57

    Letter to Beaumont, letters written from the mountain, and related writings by Rousseau, Jean-Jacques, 1712-1778

    Published 2001
    Table of Contents: “…. -- Fourth Letter 188 -- TheAuthor assumes himself to beguilty; he compares the proceedings to the Law. -- Fifth Letter 200 -- Continuation of the same Subject. urprudence drawn from roceedings done in similar cases. -- Goal of theAuthor in publishing the profession offaith. -- Sixth Letter 229 -- Whether it is true that the Author attacks Governments. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  18. 58

    Letter to Beaumont, letters written from the mountain, and related writings by Rousseau, Jean-Jacques, 1712-1778

    Published 2001
    Table of Contents: “…. -- Fourth Letter 188 -- TheAuthor assumes himself to beguilty; he compares the proceedings to the Law. -- Fifth Letter 200 -- Continuation of the same Subject. urprudence drawn from roceedings done in similar cases. -- Goal of theAuthor in publishing the profession offaith. -- Sixth Letter 229 -- Whether it is true that the Author attacks Governments. …”
    An electronic book accessible through the World Wide Web; click to view
    Electronic eBook
  19. 59

    Man and woman, one in Christ : an exegetical and theological study of Paul's Letters / by Payne, Philip Barton

    Published 2009
    Table of Contents: “…-- 1 Timothy 2:12, part III : does ... mean "assume authority"? -- 1 Timothy 2:13-14 : the need for respect, the danger of deception -- 1 Timothy 2:15 : salvation through "the childbirth" -- 1 Timothy 3:1-13 and Titus 1:5-9 : may women be overseers and deacons? …”
    Book
  20. 60

    Man and woman, one in Christ : an exegetical and theological study of Paul's Letters / by Payne, Philip Barton

    Published 2009
    Table of Contents: “…-- 1 Timothy 2:12, part III : does ... mean "assume authority"? -- 1 Timothy 2:13-14 : the need for respect, the danger of deception -- 1 Timothy 2:15 : salvation through "the childbirth" -- 1 Timothy 3:1-13 and Titus 1:5-9 : may women be overseers and deacons? …”
    Book