Boeken --> Andere schaaktechnische adviesboeken
Combinative Motifs
Boek
Titel: Combinative Motifs
Auteur: Blokh M.
Uitgever: Hannaco Enterprises
Jaartal: 2006
Taal: Engels
Aantal pagina's:   304
Verkoopprijs:   € 19.95
Bestel hier online: Voeg toe in de winkelwagen
Commentaar:
017 1. Geometrical motifs (1-112)

1.1 Knightforks (1-63)

1.1.1 Removal of protection (1-6)

018 1.1.2 Decoy (7-48)

025 1.1.3 Square clearance (49-56)

026 1.1.4 Conjunction of methods (57-63)

027 1.2 Files (ranks) (64-71)

028 1.3 Diagonals (72-92)

1.3.1 Removal of obstacles (72-77)

029 1.3.2 Opening of a diagonal (78-80)

030 1.3.3 Decoy (81-83)

031 1.3.4 Two diagonals (84-92)

032 1.4 Pawn forks (93-97)

033 1.5 Conjunction of geometrical motifs (98-112)

035 2. Weakness of files or diagonals (113-255)

2.1 The back rank (113-175)

2.1.1 Elimination of defence (113-123)

037 2.1.2 Distraction (124-143)

040 2.1.3 X-rayattack (144-146)

041 2.1.4 Interception (147-154)

042 2.1.5 Conjunction of methods (155-175)

046 2.2 The seventh rank (176-183)

047 2.3 The h-file (184-222)

2.3.1 Mate to a «cramped» king (184-201)

050 2.3.2 The g6-pawn (202-205)

051 2.3.3 Attack on a fianchetto (206-210)

052 2.3.4 Opening of a file (211-217)

053 2.3.5 Decoy (218-222)

054 2.4 The g-file (223-230)

055 2.5 Central files (231-234)

056 2.6 Diagonals (235-247)

058 2.7 Conjunction of files, ranks and diagonals (248-255)

059 3. Opposing (256-405)

3.1 Open attack (256-337)

3.1.1 Execution of an open attack (256-270)

062 3.1.2 Opening ofa file (271-278)

063 3.1.3 Unblocking a pawn (279-283)

064 3.1.4 Removal of defence (284-291)

065 3.1.5 Decoy to the opposing file (292-308)

068 3.1.6 Decoy to the blow dealt by the piece moved away (309-325)

071 3.1.7 Placement of the attacking piece to the opposing file (326-335)

072 3.1.8 «Mill» (336-337)

073 3.2 Exploiting a pin (338-361)

3.2.1 Attack on a pinned piece (338-348)

075 3.2.2 Distraction of a pinned pawn (349-354)

076 3.2.3 Other ways of exploiting a pin (355-361)

077 3.3 Decoy into a pin (362-377)

3.3.1 Attack on a pinned piece (362-371)

078 3.3.2 Attack on a piece which lost its defence (372-377)

079 3.4 Counterblow by a «pinned» piece (378-401)

083 3.5 Conjunction of methods (402-405)

084 4. Weakness of a Square (Squares) (406-447)

4.1 «The hole» of the fianchettoed bishop (406-432)

4.1.1 The h-file (406-412)

085 4.1.2 The back rank (413-416)

086 4.1.3 The pawns on f6,h6,a6 and c6 (417-424)

087 4.1.4 The others (425-432)

089 4.2 Invasion of a file (433-437)

4.3 Other cases (438-447)

091 5. A piece is overloaded (448-467)

5.1 A bishop is overloaded (448-452)

092 5.2 A knight is overloaded (453)

5.3 A rook is overloaded (454-460)

093 5.4 A queen is overloaded (461-467)

094 6. Poorly protected pieces (468-504)

6.1 Elimination of defence (468-477)

096 6.2 Distraction (478-487)

098 6.3 Decoy (488-492)

099 6.4 Distraction with decoy (493-497)

6.5 Other cases (498-504)

101 7. Misplaced pieces (505-521)

103 8. Passed pawn (522-587)

8.1 Pawn breakthrough (522-527)

104 8.2 Distraction (528-536)

106 8.3 Interception or blocking (537-543)

107 8.4 A pawn is promoted to a knight (544-550)

108 8.5 Forcing necessary exchanges (551-560)

110 8.6 Both opponents have dangerous passed pawns (561-564)

111 8.7 Passed pawn supports the piece invasion into the back rank (565-570)

112 8.8 Passed pawn takes part in the attack on a king (571-579)

113 8.9 Conjunction of methods (580-587)

114 9. Limited material (588-609)

9.1 Play for a stalemate (588-602)

117 9.2 Further restricting of material and building a fortress (603-609)

118 10. Cramped king position (610-653)

10.1 Removal of defence (610-615)

119 10.2 Square clearance for the attacking knight (616-619)

120 10.3 Blocking (620-643)

124 10.4 Creating of a mating net (644-653)

125 11. Poorly protected king (654-1086)

11.1 A king is defended by fianchetto (654-753)

11.1.1 The bishop is absent (654-694)

132 11.1.2 The f7-g6-h5 pawn chain without a bishop (695-703)

134 11.1.3 A king on h6 (704-708) 135 11.1.4 The fianchettoed bishop defends a king (709-735)

139 11.1.5 Enlarged fianchetto (736-742)

140 11.1.6 «Sieve» structure: Pawns e6,f7,g6,h7, the bishop is outside «the fianchetto» (743-753)

142 11.2 One pawn protects the king (754-767)

144 11.3 Two pawns protect the king (768-838)

11.3.1 The pawns are on g7 and h6 (768-788)

148 11.3.2 The pawns are on g7 and h7 (789-813)

152 11.3.3 The pawns are on f6 and g7 (814)

11.3.4 The pawns are on f7 and g7 (815-824)

154 11.3.5 The f- and h- pawns (825-838)

156 11.4 Three pawns protect the king (839-932)

11.4.1 The pawns are on f7, g7 and h6 (839-873)

162 11.4.2 The pawns are on f6, g7 and h7 (874-880)

163 11.4.3 The pawns are on f6, g7 and h6 (881-885)

164 11.4.4 The pawns are on f7, g7 and h7 (886-932)

11.5 A king is protected by the pawns placed on the sixth and fifth ranks (933-956)

11.5.1 «Dragging a king out» (933-939)

173 11.5.2 Breaking the shelter (940-956)

176 11.6 Typical methods of attack in a Q-side castling position (957-976)

179 11.7 Piece attack on a king (977-992)

182 11.8 Attack on a king undefended by pawns (993-1020)

187 11.9 Attack on an uncastled king (1021-1064)

11.9.1 A king is on e8 (1021-1043)

190 11.9.2 A king is on f8 (1044-1050)

192 11.9.3 A king is on e7 (1051 -1059)

193 11.9.4 A king is on another Square (1060-1064)

194 11.10 Attack on a king in an endgame (1065-1086)

198 12. Conjunction of combinational motifs (1087-1206)

12.1 Combinations which are not connected with mate threats (1087-1123)

204 12.2 Mate threats combined with other threats (1124-1206)

12.2.1 Mate threats combined with threats to attack a queen (1124-1160)

210 12.2.2 Mate threats combined with activity of a passed pawn (1161 -1168)

211 12.2.3 Threats along the back rank (1169-1172)

212 12.2.4 Exposed king (1173-1177)

213 12.2.5 Uncastled king (1178-1185)

214 12.2.6 The others (1186-1206)





webdesign by ICT4YOU.be © - Alle rechten voorbehouden
De Denksportkampioen.be