طبق روال سال‌های گذشته، اطلاعات دانشجویان ورودی جدید حدودا بیست مهر ماه (پس از تکمیل اطلاعات در سامانه گلستان) در کتابیار پند قابل دسترسی است. شروع استفاده از سرویس‌های امانت و مطالعه کتابیار پند برای این دانشجویان، به بعد از این تاریخ موکول می‌گردد.

کتاب‌های لاتین

صفحه‌ها

(Mis)recognition, social inequality and social justice
(Mis)recognition, social inequality and social justice
Introduction / Terry Lovell -- Re-faming justice in a globalizing world / Nancy Fraser -- Justice and the public sphere : the dynamics of Nancy Fraser's critical theory / Mar�ia P�ia Lara and Robert Fine -- Sexuality, subjectivity, and economics / Mandy Merck -- Nancy Fraser's integrated theory of justice : a 'sociologically rich' model for a global capitalist era? / Terry Lovell -- Class, moral worth, and recognition / Andrew Sayer -- Feminist appropriations of Bourdieu : the case of social capital / Christina Hughes and Loraine Blaxter -- "NQOC" : social identity and representation in British politics / Joanna Liddle and Elisabeth Michielsens -- (Mis)-recognition, social inequality and social justice : a critical social policy perspective / Ruth Lister -- Needs, rights and transformations : the adjudication of social rights in South Africa / Sandra Liebenberg, edited by Terry Lovell.
(Re)articulating writing assessment for teaching and learning
(Re)articulating writing assessment for teaching and learning
(Re) articulating writing assessment -- Writing assessment as a field of study -- Assessing, grading, testing and teaching writing -- Toward a new theory for writing assessment -- Reading like a teacher -- Writing assessment as technology and research -- Writing assessment practice, Brian Huot.
.NET 2.0 interoperability recipes
.NET 2.0 interoperability recipes
Using C-style APIs -- C-style APIs : structures, classes, and arrays -- Win32 API -- Using C++ interop -- Using COM -- Exposing managed code to COM -- Marshaling to COM clients -- COM+ enterprise services -- COM+ enterprise services transactions, Bruce Bukovics., Available to OhioLINK libraries, Electronic reproduction, Columbus, OH : ; OhioLINK, ; 2008, s2008 ohun s, Mode of access: World Wide Web, Bukovics, Bruce, .NET 2.0 interoperability recipes : a problem-solution approach ; (OCoLC)68964574
.NET Framework solutions
.NET Framework solutions
John Paul Mueller.
.NET Windows forms in a nutshell
.NET Windows forms in a nutshell
Ian Griffiths and Matthew Adams., One CD-ROM in pocket attached to inside back cover
.NET framework essentials
.NET framework essentials
Thuan Thai and Hoang Q. Lam.
.NET framework essentials
.NET framework essentials
Thuan Thai and Hoang Q. Lam.
.NET framework essentials
.NET framework essentials
Thuan Thai and Hoang Q. Lam.
.NET game programming with DirectX 9.0
.NET game programming with DirectX 9.0
Alexandre Santos Lob?ao and Ellen Hatton ; [foreword by William (Bill) Vaughn].
.NET security
.NET security
Jason Bock ... [et al.].
.Net e-commerce programming
.Net e-commerce programming
Mike Gunderloy, Noel Jerke.
.Net mobile Web developers guide
.Net mobile Web developers guide
Steve Milroy ... [et al.].
1, 2, 3 John
1, 2, 3 John
1 John 1:1-4 -- 1 John 1:5-2:2 -- 1 John 2:3-6 -- 1 John 2:7-11 -- 1 John 2:12-17 -- 1 John 2:18-29 -- 1 John 3:1-6 -- 1 John 3:7-12 -- 1 John 3:13-18 -- 1 John 3:19-24 -- 1 John 4:1-6 -- 1 John 4:7-10 -- 1 John 4:11-21 -- 1 John 5:1-12 -- 1 John 5:13-21 -- 2 John 1-3 -- 2 John 4-7 -- 2 John 8-11 -- 2 John 12-13 -- 3 John 1-4 -- 3 John 5-8 -- 3 John 9-12 -- 3 John 13-15, Martin M. Culy.
1,001 facts about dinosaurs
1,001 facts about dinosaurs
written by Neil Clark and William Lindsay, with additional material from Dougal Dixon.
1,001 ways to get promoted
1,001 ways to get promoted
by David E. Rye., Also available online via the ITKnowledge web site
10 cool Lego mindstorms
10 cool Lego mindstorms
David Astolfo ...[et al.].
10 don'ts on your digital devices
10 don'ts on your digital devices
"In nontechnical language and engaging style, [this] explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don'ts ... can save the unwary and the ignorant a world of trouble ... employs personal anecdotes and major news stories to illustrate what can - and all too often does - happen when users are careless with their devices and data. Each chapter describes a common type of blunder ..., reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don't. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don'ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy ... The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops"--Publisher's description., Don't get phished -- Don't give up your passwords -- Don't get lost in"The Cloud" -- Don't look for a free lunch -- Don't do secure things from insecure places -- Don't let the snoops in -- Don't be careless with your phone -- Don't use dinosaurs -- Don't trust anyone over... anything -- Don't forget the physical., "In nontechnical language and engaging style...explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include such chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps."-- Back cover., Includes bibliographical references and index.
10 don'ts on your digital devices
Daniel G. Bachrach, Eric J. Rzeszut, Includes bibliographical references and index

صفحه‌ها