This college mathematics textbook has bee edited to cover the law of …
This college mathematics textbook has bee edited to cover the law of sines and cosines, polynomials, factoring, quadratic equations, rational expressions, and systems of equations.
The Institute for Humane Studies has partnered with the authors of the …
The Institute for Humane Studies has partnered with the authors of the textbook Common Sense Economics: What Everyone Should Know about Wealth Creation and Prosperity to help teach students why economic understanding is essential for life in today's society. With videos and quiz question corresponding to each element, this collection can be used as a study guide for "Part 1: Twelve Key Elements of Economics".
Communication in the Real World: An Introduction to Communication Studies is adapted …
Communication in the Real World: An Introduction to Communication Studies is adapted from a work produced and distributed by a publisher who has requested that they and the original author not receive attribution. This adapted edition includes information about communication, perception, verbal and nonverbal communication, listening, interpersonal communication processes, culture and communication, preparing and delivering a speech, small group communication, and leadership, roles, and problem solving in groups.
This reader is an Open Educational Resource, meant to accompany a graduate …
This reader is an Open Educational Resource, meant to accompany a graduate or higher-level undergraduate university course in climate change resilience, adaptation, and/or planning. While the material is geared toward students in urban and regional planning, it may also be of interest to students of urban studies, public health, geography, political science, sociology, risk management, and others.
The introductions in this anthology are meant to be just that: a …
The introductions in this anthology are meant to be just that: a basic overview of what students need to know before they begin reading, with topics that students can research further. An open access literature textbook cannot be a history book at the same time, but history is the great companion of literature: The more history students know, the easier it is for them to interpret literature.
This course introduces the compilation process, presenting foundational topics on formal languages …
This course introduces the compilation process, presenting foundational topics on formal languages and outline each of the essential compiler steps: scanning, parsing, translation and semantic analysis, code generation, and optimization. Upon successful completion of this course, the student will be able to: describe the compilation process and explain the function of the components that comprise the structure of a compiler; apply concepts of formal languages and finite-state machines to the translation of computer languages; identify the compiler techniques, methods, and tools that are applicable to other software applications; describe the challenges and state-of-the-practice of compiler theory and practice. This free course may be completed online at any time. (Computer Science 304)
This Composition Reader is an edited, curated collection of OER material for …
This Composition Reader is an edited, curated collection of OER material for you to use as you see fit in your course. It consists of personal essays, literature, video and audio files, web writing, and long-form journalism.
This online textbook addresses the population of individuals with disabilities that experience …
This online textbook addresses the population of individuals with disabilities that experience complex lifelong needs across multiple areas in their lives. Drs. Sennott and Loman drafted this book (along with the help from some friends) with the hope of providing pertinent, practical, and current resources to future special educators who plan to serve individuals with complex disabilities.
Computer Networking: Principles, Protocols, and Practice was written and submitted to the …
Computer Networking: Principles, Protocols, and Practice was written and submitted to the Open Textbook Challenge by Dr. Olivier Bonaventure of the UniversitĄ_ĺŕ catholique de Louvain (UCL) in Louvain-la-Neuve, Belgium. He also serves as the Education Director of ACM SIGCOMM. Computer Networking has already been used by several universities around the world, including UCL.
"Concept Development Studies in Chemistry" is an on-line textbook for an Introductory …
"Concept Development Studies in Chemistry" is an on-line textbook for an Introductory General Chemistry course. Each module develops a central concept in Chemistry from experimental observations and inductive reasoning. This approach complements an interactive or active learning teaching approach.
For a semester-length course, all seven chapters can be covered. For a …
For a semester-length course, all seven chapters can be covered. For a shorter course, the book is designed so that chapters 1, 2, and 5 are the only ones that are required for continuity; any of the others can be included or omitted at the instructors discretion, with the only constraint being that chapter 6 requires chapter 4.
A Concise Introduction to Logic is an introduction to formal logic suitable …
A Concise Introduction to Logic is an introduction to formal logic suitable for undergraduates taking a general education course in logic or critical thinking, and is accessible and useful to any interested in gaining a basic understanding of logic. This text takes the unique approach of teaching logic through intellectual history; the author uses examples from important and celebrated arguments in philosophy to illustrate logical principles. The text also includes a basic introduction to findings of advanced logic. As indicators of where the student could go next with logic, the book closes with an overview of advanced topics, such as the axiomatic method, set theory, Peano arithmetic, and modal logic. Throughout, the text uses brief, concise chapters that readers will find easy to read and to review.
Control Systems is an inter-disciplinary engineering text that analyzes the effects and …
Control Systems is an inter-disciplinary engineering text that analyzes the effects and interactions of mathematical systems. This book is for third and fourth year undergraduates in an engineering program.
This peer reviewed e-book is a must-read for nurses and other health …
This peer reviewed e-book is a must-read for nurses and other health professionals who strive to teach with creativity and excellence in clinical settings. Each chapter presents current evidence informed educational practice knowledge. Each topic is also presented with text boxes describing ‘Creative Strategies’ that clinical teachers from across Canada have successfully implemented. For those who are interested in background knowledge, the authors provided a comprehensive literature base. And, for those interested mainly in 'what to do,' the text box summaries offer step-by-step directions for creative, challenging activities that both new and experienced instructors can begin using immediately.
Nationally recognized experts in the field of educational leadership and administration contribute …
Nationally recognized experts in the field of educational leadership and administration contribute to this book, with chapters focused on the past, present, and future of the preparation of our nation's school leaders. Every field of professional practice must periodically reflect on its past, assess current conditions, and chart a course for the future. This book is designed to stimulate thinking and action for the field of educational leadership. The authors portray historical achievements and short comings, describe what is transpiring now, and explore implications of current developments.
It is our hope that the successful student who completes a class …
It is our hope that the successful student who completes a class using all or some of this text will have improved skills with application inside the discipline of philosophy, but also with application to work in other disciplines within academia. Our ultimate goal, however, is to help people develop techniques which support curiosity, open-mindedness, and an ability to collaborate successfully with others, across differences of experiences and background. Our dream is to help people “put their heads together.”
Critical Thinking in Academic Research introduces students to the techniques and principles …
Critical Thinking in Academic Research introduces students to the techniques and principles of critical thinking in combination with academic research and information literacy.
This course introduces cryptography by addressing topics such as ciphers that were …
This course introduces cryptography by addressing topics such as ciphers that were used before World War II, block cipher algorithms, the advanced encryption standard for a symmetric-key encryption adopted by the U.S. government, MD5 and SHA-1 hash functions, and the message authentication code. The course will focus on public key cryptography (as exemplified by the RSA algorithm), elliptic curves, the Diffie-Hellman key exchange, and the elliptic curve discrete logarithm problem. The course concludes with key exchange methods, study signature schemes, and discussion of public key infrastructure. Note: It is strongly recommended that you complete an abstract algebra course (such as the Saylor FoundationĺÎĺ_ĺĚĺ_s MA231) before taking this course. Upon successful completion of this course, students will be able to: explain how symmetric and asymmetric key ciphers work; list and define cryptographyĺÎĺ_ĺĚĺ_s goals; list and define the most common classical ciphers; explain the workings of mechanical ciphers Enigma and Lorenz; describe the principles of substitution-permutation networks; describe the algorithms for data encryption and the advanced encryption standard; describe and use the MD5 and SHA-1 hash functions; explain the idea behind public key cryptography; use the RSA cryptography system by applying it to practical problems; test whether the large integer is prime with the mathematical tools presented in this course; define the elliptic curve and use it in cryptography; explain the Diffie-Hellman key exchange; describe the most common signature and autokey identity schemes; describe the conceptual workings of public key infrastructure. This free course may be completed online at any time. (Computer Science 409)
This course examines computers anthropologically, as artifacts revealing the social orders and …
This course examines computers anthropologically, as artifacts revealing the social orders and cultural practices that create them. Students read classic texts in computer science along with cultural analyses of computing history and contemporary configurations. It explores the history of automata, automation and capitalist manufacturing; cybernetics and WWII operations research; artificial intelligence and gendered subjectivity; robots, cyborgs, and artificial life; creation and commoditization of the personal computer; the growth of the Internet as a military, academic, and commercial project; hackers and gamers; technobodies and virtual sociality. Emphasis is placed on how ideas about gender and other social differences shape labor practices, models of cognition, hacking culture, and social media.
Database Design - 2nd Edition covers database systems and database design concepts. …
Database Design - 2nd Edition covers database systems and database design concepts. New to this edition are SQL info, additional examples, key terms and review exercises at the end of each chapter.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.