Boeken --> Andere schaaktechnische adviesboeken Combinative Motifs | Titel: | Combinative Motifs | Auteur: | Blokh M. | Uitgever: | Hannaco Enterprises | Jaartal: | 2006 | Taal: | Engels | Aantal pagina's: | 304 | Verkoopprijs: | € 19.95 |
| Bestel hier online: | Commentaar: | 017 1. Geometrical motifs (1-112)
1.1 Knightforks (1-63)
1.1.1 Removal of protection (1-6)
018 1.1.2 Decoy (7-48)
025 1.1.3 Square clearance (49-56)
026 1.1.4 Conjunction of methods (57-63)
027 1.2 Files (ranks) (64-71)
028 1.3 Diagonals (72-92)
1.3.1 Removal of obstacles (72-77)
029 1.3.2 Opening of a diagonal (78-80)
030 1.3.3 Decoy (81-83)
031 1.3.4 Two diagonals (84-92)
032 1.4 Pawn forks (93-97)
033 1.5 Conjunction of geometrical motifs (98-112)
035 2. Weakness of files or diagonals (113-255)
2.1 The back rank (113-175)
2.1.1 Elimination of defence (113-123)
037 2.1.2 Distraction (124-143)
040 2.1.3 X-rayattack (144-146)
041 2.1.4 Interception (147-154)
042 2.1.5 Conjunction of methods (155-175)
046 2.2 The seventh rank (176-183)
047 2.3 The h-file (184-222)
2.3.1 Mate to a «cramped» king (184-201)
050 2.3.2 The g6-pawn (202-205)
051 2.3.3 Attack on a fianchetto (206-210)
052 2.3.4 Opening of a file (211-217)
053 2.3.5 Decoy (218-222)
054 2.4 The g-file (223-230)
055 2.5 Central files (231-234)
056 2.6 Diagonals (235-247)
058 2.7 Conjunction of files, ranks and diagonals (248-255)
059 3. Opposing (256-405)
3.1 Open attack (256-337)
3.1.1 Execution of an open attack (256-270)
062 3.1.2 Opening ofa file (271-278)
063 3.1.3 Unblocking a pawn (279-283)
064 3.1.4 Removal of defence (284-291)
065 3.1.5 Decoy to the opposing file (292-308)
068 3.1.6 Decoy to the blow dealt by the piece moved away (309-325)
071 3.1.7 Placement of the attacking piece to the opposing file (326-335)
072 3.1.8 «Mill» (336-337)
073 3.2 Exploiting a pin (338-361)
3.2.1 Attack on a pinned piece (338-348)
075 3.2.2 Distraction of a pinned pawn (349-354)
076 3.2.3 Other ways of exploiting a pin (355-361)
077 3.3 Decoy into a pin (362-377)
3.3.1 Attack on a pinned piece (362-371)
078 3.3.2 Attack on a piece which lost its defence (372-377)
079 3.4 Counterblow by a «pinned» piece (378-401)
083 3.5 Conjunction of methods (402-405)
084 4. Weakness of a Square (Squares) (406-447)
4.1 «The hole» of the fianchettoed bishop (406-432)
4.1.1 The h-file (406-412)
085 4.1.2 The back rank (413-416)
086 4.1.3 The pawns on f6,h6,a6 and c6 (417-424)
087 4.1.4 The others (425-432)
089 4.2 Invasion of a file (433-437)
4.3 Other cases (438-447)
091 5. A piece is overloaded (448-467)
5.1 A bishop is overloaded (448-452)
092 5.2 A knight is overloaded (453)
5.3 A rook is overloaded (454-460)
093 5.4 A queen is overloaded (461-467)
094 6. Poorly protected pieces (468-504)
6.1 Elimination of defence (468-477)
096 6.2 Distraction (478-487)
098 6.3 Decoy (488-492)
099 6.4 Distraction with decoy (493-497)
6.5 Other cases (498-504)
101 7. Misplaced pieces (505-521)
103 8. Passed pawn (522-587)
8.1 Pawn breakthrough (522-527)
104 8.2 Distraction (528-536)
106 8.3 Interception or blocking (537-543)
107 8.4 A pawn is promoted to a knight (544-550)
108 8.5 Forcing necessary exchanges (551-560)
110 8.6 Both opponents have dangerous passed pawns (561-564)
111 8.7 Passed pawn supports the piece invasion into the back rank (565-570)
112 8.8 Passed pawn takes part in the attack on a king (571-579)
113 8.9 Conjunction of methods (580-587)
114 9. Limited material (588-609)
9.1 Play for a stalemate (588-602)
117 9.2 Further restricting of material and building a fortress (603-609)
118 10. Cramped king position (610-653)
10.1 Removal of defence (610-615)
119 10.2 Square clearance for the attacking knight (616-619)
120 10.3 Blocking (620-643)
124 10.4 Creating of a mating net (644-653)
125 11. Poorly protected king (654-1086)
11.1 A king is defended by fianchetto (654-753)
11.1.1 The bishop is absent (654-694)
132 11.1.2 The f7-g6-h5 pawn chain without a bishop (695-703)
134 11.1.3 A king on h6 (704-708) 135 11.1.4 The fianchettoed bishop defends a king (709-735)
139 11.1.5 Enlarged fianchetto (736-742)
140 11.1.6 «Sieve» structure: Pawns e6,f7,g6,h7, the bishop is outside «the fianchetto» (743-753)
142 11.2 One pawn protects the king (754-767)
144 11.3 Two pawns protect the king (768-838)
11.3.1 The pawns are on g7 and h6 (768-788)
148 11.3.2 The pawns are on g7 and h7 (789-813)
152 11.3.3 The pawns are on f6 and g7 (814)
11.3.4 The pawns are on f7 and g7 (815-824)
154 11.3.5 The f- and h- pawns (825-838)
156 11.4 Three pawns protect the king (839-932)
11.4.1 The pawns are on f7, g7 and h6 (839-873)
162 11.4.2 The pawns are on f6, g7 and h7 (874-880)
163 11.4.3 The pawns are on f6, g7 and h6 (881-885)
164 11.4.4 The pawns are on f7, g7 and h7 (886-932)
11.5 A king is protected by the pawns placed on the sixth and fifth ranks (933-956)
11.5.1 «Dragging a king out» (933-939)
173 11.5.2 Breaking the shelter (940-956)
176 11.6 Typical methods of attack in a Q-side castling position (957-976)
179 11.7 Piece attack on a king (977-992)
182 11.8 Attack on a king undefended by pawns (993-1020)
187 11.9 Attack on an uncastled king (1021-1064)
11.9.1 A king is on e8 (1021-1043)
190 11.9.2 A king is on f8 (1044-1050)
192 11.9.3 A king is on e7 (1051 -1059)
193 11.9.4 A king is on another Square (1060-1064)
194 11.10 Attack on a king in an endgame (1065-1086)
198 12. Conjunction of combinational motifs (1087-1206)
12.1 Combinations which are not connected with mate threats (1087-1123)
204 12.2 Mate threats combined with other threats (1124-1206)
12.2.1 Mate threats combined with threats to attack a queen (1124-1160)
210 12.2.2 Mate threats combined with activity of a passed pawn (1161 -1168)
211 12.2.3 Threats along the back rank (1169-1172)
212 12.2.4 Exposed king (1173-1177)
213 12.2.5 Uncastled king (1178-1185)
214 12.2.6 The others (1186-1206) |
schaken boeken chess book books boek schaaktechnische boeken advies adviesboeken belgië Gent |