Stephanie Culp's 12 Month Organizer and Project Planner


Book Description

Readers with projects they're burning to start or yearning to finish will zoom toward accomplishment with this get-it-done planner. Through "To-Do" lists, checklists and calendars, Culp helps readers break any project into manageable segments, set deadlines, establish plans and follow them step by attainable step, starting any month of the year.




Reaching Back


Book Description

With this easy-to-use keepsake, readers can discover and record their family's history to share with future generations. Included is an extensive list of questions to ask relatives or oneself, ranging from the factual to the philosophical.




Library Journal


Book Description

Includes, beginning Sept. 15, 1954 (and on the 15th of each month, Sept.-May) a special section: School library journal, ISSN 0000-0035, (called Junior libraries, 1954-May 1961). Also issued separately.







Forthcoming Books


Book Description




How to Get Organized When You Don't Have the Time


Book Description

Combines time-management principles with ideas for easy organinzing.




Family History Log Book


Book Description

This unique logbook lets genealogists record personal histories within the richer context of the nation's collective past. Spanning the years 1900 to 2000, "Family History Logbook" provides a two-page spread for each year and divides the space into three sections: Historical Context; Personal Milestones; and the Catalog of Sources.




Whitaker's Books in Print


Book Description




The Security Development Lifecycle


Book Description

Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs--the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL--from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization. Discover how to: Use a streamlined risk-analysis process to find security design issues before code is committed Apply secure-coding best practices and a proven testing process Conduct a final security review before a product ships Arm customers with prescriptive guidance to configure and deploy your product more securely Establish a plan to respond to new security vulnerabilities Integrate security discipline into agile methods and processes, such as Extreme Programming and Scrum Includes a CD featuring: A six-part security class video conducted by the authors and other Microsoft security experts Sample SDL documents and fuzz testing tool PLUS--Get book updates on the Web. For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.




Plugged in


Book Description

Cover -- Half-title -- Title -- Copyright -- Dedication -- Contents -- Preface -- 1 Youth and Media -- 2 Then and Now -- 3 Themes and Theoretical Perspectives -- 4 Infants, Toddlers, and Preschoolers -- 5 Children -- 6 Adolescents -- 7 Media and Violence -- 8 Media and Emotions -- 9 Advertising and Commercialism -- 10 Media and Sex -- 11 Media and Education -- 12 Digital Games -- 13 Social Media -- 14 Media and Parenting -- 15 The End -- Notes -- Acknowledgments -- Index -- A -- B -- C -- D -- E -- F -- G -- H -- I -- J -- K -- L -- M -- N -- O -- P -- Q -- R -- S -- T -- U -- V -- W -- X -- Y -- Z