طبق روال سالهای گذشته، اطلاعات دانشجویان ورودی جدید حدودا بیست مهر ماه (پس از تکمیل اطلاعات در سامانه گلستان) در کتابیار پند قابل دسترسی است. شروع استفاده از سرویسهای امانت و مطالعه کتابیار پند برای این دانشجویان، به بعد از این تاریخ موکول میگردد.
Introduction / Terry Lovell -- Re-faming justice in a globalizing world / Nancy Fraser -- Justice and the public sphere : the dynamics of Nancy Fraser's critical theory / Mar�ia P�ia Lara and Robert Fine -- Sexuality, subjectivity, and economics / Mandy Merck -- Nancy Fraser's integrated theory of justice : a 'sociologically rich' model for a global capitalist era? / Terry Lovell -- Class, moral worth, and recognition / Andrew Sayer -- Feminist appropriations of Bourdieu : the case of social capital / Christina Hughes and Loraine Blaxter -- "NQOC" : social identity and representation in British politics / Joanna Liddle and Elisabeth Michielsens -- (Mis)-recognition, social inequality and social justice : a critical social policy perspective / Ruth Lister -- Needs, rights and transformations : the adjudication of social rights in South Africa / Sandra Liebenberg, edited by Terry Lovell.
(Re) articulating writing assessment -- Writing assessment as a field of study -- Assessing, grading, testing and teaching writing -- Toward a new theory for writing assessment -- Reading like a teacher -- Writing assessment as technology and research -- Writing assessment practice, Brian Huot.
Using C-style APIs -- C-style APIs : structures, classes, and arrays -- Win32 API -- Using C++ interop -- Using COM -- Exposing managed code to COM -- Marshaling to COM clients -- COM+ enterprise services -- COM+ enterprise services transactions, Bruce Bukovics., Available to OhioLINK libraries, Electronic reproduction, Columbus, OH : ; OhioLINK, ; 2008, s2008 ohun s, Mode of access: World Wide Web, Bukovics, Bruce, .NET 2.0 interoperability recipes : a problem-solution approach ; (OCoLC)68964574
1 John 1:1-4 -- 1 John 1:5-2:2 -- 1 John 2:3-6 -- 1 John 2:7-11 -- 1 John 2:12-17 -- 1 John 2:18-29 -- 1 John 3:1-6 -- 1 John 3:7-12 -- 1 John 3:13-18 -- 1 John 3:19-24 -- 1 John 4:1-6 -- 1 John 4:7-10 -- 1 John 4:11-21 -- 1 John 5:1-12 -- 1 John 5:13-21 -- 2 John 1-3 -- 2 John 4-7 -- 2 John 8-11 -- 2 John 12-13 -- 3 John 1-4 -- 3 John 5-8 -- 3 John 9-12 -- 3 John 13-15, Martin M. Culy.
"In nontechnical language and engaging style, [this] explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps. It's a wonderful thing to be able to use any of your cloud-synced assortment of desktop, portable, mobile, and wearable computing devices to work from home, shop at work, pay in a store, do your banking from a coffee shop, submit your tax returns from the airport, or post your selfies from the Oscars. But with this new world of connectivity and convenience comes a host of new perils for the lazy, the greedy, the unwary, and the ignorant. The 10 Don'ts ... can save the unwary and the ignorant a world of trouble ... employs personal anecdotes and major news stories to illustrate what can - and all too often does - happen when users are careless with their devices and data. Each chapter describes a common type of blunder ..., reveals how it opens a particular port of entry to predatory incursions and privacy invasions, and details all the unpleasant consequences that may come from doing a Don't. The chapter then shows you how to diagnose and fix the resulting problems, how to undo or mitigate their costs, and how to protect against repetitions with specific software defenses and behavioral changes. Through ten vignettes told in accessible language and illustrated with helpful screenshots, 10 Don'ts teaches non-technical readers ten key lessons for protecting your digital security and privacy with the same care you reflexively give to your physical security and privacy ... The authors lift the veil on these shadowy realms, show how the little guy is affected, and what individuals can do to shield themselves from big predators and snoops"--Publisher's description., Don't get phished -- Don't give up your passwords -- Don't get lost in"The Cloud" -- Don't look for a free lunch -- Don't do secure things from insecure places -- Don't let the snoops in -- Don't be careless with your phone -- Don't use dinosaurs -- Don't trust anyone over... anything -- Don't forget the physical., "In nontechnical language and engaging style...explains to non-techie users of PCs and handheld devices exactly what to do and what not to do to protect their digital data from security and privacy threats at home, at work, and on the road. These include such chronic threats such as malware and phishing attacks and emerging threats that exploit cloud-based storage and mobile apps."-- Back cover., Includes bibliographical references and index.