Information Now is an innovative approach to information literacy that will reinvent the way college students think about research. Instead of the typical textbook format, it uses illustrations, humor, and reflective exercises to teach students how to become savvy researchers. Students will learn how to evaluate information, to incorporate it into their existing knowledge base, to wield it effectively, and to understand the ethical issues surrounding its use. Written by two library professionals, it incorporates concepts and skills drawn from the Association of College and Research Libraries’ Information Literacy Competency Standards for Higher Education and their Framework for Information Literacy for Higher Education. Thoroughly researched and highly engaging, Information Now offers the tools that students need to become powerful consumers and creators of information.
Whether used by a high school student tackling a big paper, an undergrad facing the newness of a university library, or a writer wanting to go beyond Google, Information Now is a powerful tool for any researcher’s arsenal.
Archive Stories brings together ethnographies of the archival world, most of which are written by historians. Some contributors recount their own experiences. One offers a moving reflection on how the relative wealth and prestige of Western researchers can gain them entry to collections such as Uzbekistan’s newly formed Central State Archive, which severely limits the access of Uzbek researchers. Others explore the genealogies of specific archives, from one of the most influential archival institutions in the modern West, the Archives nationales in Paris, to the significant archives of the Bakunin family in Russia, which were saved largely through the efforts of one family member. Still others explore the impact of current events on the analysis of particular archives. A contributor tells of researching the 1976 Soweto riots in the politically charged atmosphere of the early 1990s, just as apartheid in South Africa was coming to an end. A number of the essays question what counts as an archive—and what counts as history—as they consider oral histories, cyberspace, fiction, and plans for streets and buildings that were never built, for histories that never materialized.
Contributors. Tony Ballantyne, Marilyn Booth, Antoinette Burton, Ann Curthoys, Peter Fritzsche, Durba Ghosh, Laura Mayhall, Jennifer S. Milligan, Kathryn J. Oberdeck, Adele Perry, Helena Pohlandt-McCormick, John Randolph, Craig Robertson, Horacio N. Roque Ramírez, Jeff Sahadeo, Reneé Sentilles
Through the ideas and software in this book, users will learn to design and employ a fully-featured rendering system for creating stunning imagery. This completely updated and revised edition includes new coverage on ray-tracing hair and curves primitives, numerical precision issues with ray tracing, LBVHs, realistic camera models, the measurement equation, and much more. It is a must-have, full color resource on physically-based rendering.Presents up-to-date revisions of the seminal reference on rendering, including new sections on bidirectional path tracing, numerical robustness issues in ray tracing, realistic camera models, and subsurface scatteringProvides the source code for a complete rendering system allowing readers to get up and running fastIncludes a unique indexing feature, literate programming, that lists the locations of each function, variable, and method on the page where they are first describedServes as an essential resource on physically-based rendering
Using the Association of College and Research Libraries' Information Literacy Competency Standards for Higher Education as a framework, this much-needed sourcebook covers all the major facets of the information literacy process. For students, it is a ready-to-use guide that explains what information literacy is, why it is so important, and how to put it to use in both print and online research. For teachers, it is a helpful classroom resource that can serve as the basis for an information literacy course, a supplemental text, or a handy reference for research in any subject.
The first three chapters provide an overview of the Guided Inquiry design framework, identify the eight phases of the Guided Inquiry process, summarize the research that grounds Guided Inquiry, and describe the five tools of inquiry that are essential to implementation. The following chapters detail the eight phases in the Guided Inquiry design process, providing examples at all levels from pre-K through 12th grade and concluding with recommendations for building Guided Inquiry in your school.
The book is for pre-K–12 teachers, school librarians, and principals who are interested in and actively designing an inquiry approach to curricular learning that incorporates a wide range of resources from the library, the Internet, and the community. Staff of community resources, museum educators, and public librarians will also find the book useful for achieving student learning goals.
Each chapter of this text is organized around one of the National Council for the Social Studies' Ten Thematic Strands, covering diverse and engaging topics ranging from community and individuality to science and technology. This book serves as a vital resource for classroom teachers, methods professors, staff developers, and curriculum writers who prioritize keeping social studies a part of the elementary school curriculum.
The second edition features two new chapters on digital curation and cooperative collection development. Additional updates include helpful information on infographics, more budgeting formulas, and a section on core collections, as well as content covering eBooks, electronic storage, and digital rights management. Chapters discuss subjects such as marketing the collection to patrons, book repair, and handling censorship issues when collections are challenged.
This invaluable book addresses such questions as "How should a librarian select and share books in each genre?" and "How do I generate interest in reading with today's students?" as well as "What are the best promotion and collaboration activities associated with each genre?" Although the work is specifically written to help new librarians get up to speed in the field of children's literature, it will benefit everyone from experienced, practicing librarians and children's services paraprofessionals to elementary level educators and parents who homeschool their children.
Gem Codes and Ciphers touches on everything from the smoke signals used by Native American Indians to encryption devices used by government agencies and the military.
Not only does this handy, pocket-sized book cover the history of the development of codes and ciphers, it also has practical information and advice on how to make codes and, more importantly, how to break them!
• Native American smoke signals, Masonic signals, flags, and semaphore;
• Morse code, Braille, ASCII computer language;
• Letter substitution – mono- and poly-alphabetic;
• Computer algorithms;
• Codes and ciphers throughout history
• Development of code-breaking devices such as the Enigma machine.
Written specifically for K–12 librarians and teachers, the authors present helpful tools and easily applied strategies for every major area in reference, from the reference interview to encyclopedias and dictionaries. This textbook teaches basic reference processes, sources, services, and skills; and provides authentic, real-world school library media reference scenarios as well as exercises for reflection and guided application in today's reference world.
The book first provides an overview of the Semantic Web and aspects of the Web. It then discusses semantic modeling and how it can support the development from chaotic information gathering to one characterized by information sharing, cooperation, and collaboration. It also explains the use of RDF to implement the Semantic Web by allowing information to be distributed over the Web, along with the use of SPARQL to access RDF data. Moreover, the reader is introduced to components that make up a Semantic Web deployment and how they fit together, the concept of inferencing in the Semantic Web, and how RDFS differs from other schema languages. Finally, the book considers the use of SKOS (Simple Knowledge Organization System) to manage vocabularies by taking advantage of the inferencing structure of RDFS-Plus.
This book is intended for the working ontologist who is trying to create a domain model on the Semantic Web.Updated with the latest developments and advances in Semantic Web technologies for organizing, querying, and processing information, including SPARQL, RDF and RDFS, OWL 2.0, and SKOS Detailed information on the ontologies used in today's key web applications, including ecommerce, social networking, data mining, using government data, and more Even more illustrative examples and case studies that demonstrate what semantic technologies are and how they work together to solve real-world problems
With Building Parent Engagement in Schools, educators can start to develop a hybrid culture between home and school, so that school can serve as a cultural bridge for the students. Filled with the voices of real educators, students, and parents, the book documents a number of parent-involved efforts to improve low-income communities, gain greater resources for schools, and improve academic achievement. Coverage includes details of real initiatives in action, including programs for home visits, innovative uses of technology, joint enterprises like school/community gardens, and community organization efforts.
What is Big Data, and why should you care?
Big data knows where you've been and who your friends are. It knows what you like and what makes you angry. It can predict what you'll buy, where you'll be the victim of crime and when you'll have a heart attack. Big data knows you better than you know yourself, or so it claims.
But how well do you know big data?
You've probably seen the phrase in newspaper headlines, at work in a marketing meeting, or on a fitness-tracking gadget. But can you understand it without being a Silicon Valley nerd who writes computer programs for fun?
Yes. Yes, you can.
Timandra Harkness writes comedy, not computer code. The only programmes she makes are on the radio. If you can read a newspaper you can read this book.
Starting with the basics – what IS data? And what makes it big? – Timandra takes you on a whirlwind tour of how people are using big data today: from science to smart cities, business to politics, self-quantification to the Internet of Things.
Finally, she asks the big questions about where it's taking us; is it too big for its boots, or does it think too small? Are you a data point or a human being? Will this book be full of rhetorical questions?
No. It also contains puns, asides, unlikely stories and engaging people, inspiring feats and thought-provoking dilemmas. Leaving you armed and ready to decide what you think about one of the decade's big ideas: big data.
shows how to set up new instruction librarians for success, with advice on completing an environmental scan, strategies for recruiting efficiently, and a training checklist; walks readers step by step through training a new hire or someone new to instruction, complete with hands-on activities and examples;explores the different roles an instruction librarian is usually expected to play, such as educator, project manager, instructional designer, and teaching partner;demonstrates the importance of performance evaluation and management, including assessment and continuing education, both formal and informal; andprovides guided reading lists for further in-depth study of a topic. A starter kit for librarians new to instruction, this resource will be useful for training coordinators as well as for self-training.
Examining new conceptualizations and emerging frameworks through the lenses of core archival practice and theory, the book covers core foundational topics, such as the nature of archives, the ruling concept of provenance, and the principal functions of archivists, discussing each in the context of current and future environments and priorities. Several new essays on topics of central importance not treated in the first edition are included, such as digital preservation and the influence of new technologies on institutional programs that facilitate archival access, advocacy, and outreach; the changing legal context of archives and archival work; and the archival collections of private persons and organizations. Readers will also learn how communities of various kinds intersect with the archival mission and how other disciplines' perspectives on archives can open new avenues.
Based on their direct experience and many presentations to teachers and librarians, the authors have provided template lesson plans with curriculum and standards links for using the best pop-up books currently available in the instructional program of the school. The book also includes profiles of the most notable authors, a history of the format, definitions of terms such as "flap book" and "paper engineer," and information on how to create movable books. Librarians will find the section regarding collection development with the format—how and where to acquire them, proper storage methods—and the annotated listing of the authors' 50 favorite pop-ups extremely helpful.
This book examines the impact of new technologies on children's experiences of books and libraries, and demonstrates how librarians can adapt to new technologies and integrate library services into the lives of today's children. From Boardbook to Facebook: Children's Services in an Interactive Age draws on current research to illuminate how children's use of media has changed in recent years and suggests ways in which new technologies can be integrated into library services now and in the future.
We live in an information society, or so we are often told. But what does that mean? This volume in the MIT Press Essential Knowledge series offers a concise, informal account of the ways in which information and society are related and of our ever-increasing dependence on a complex multiplicity of messages, records, documents, and data. Using information in its everyday, nonspecialized sense, Michael Buckland explores the influence of information on what we know, the role of communication and recorded information in our daily lives, and the difficulty (or ease) of finding information. He shows that all this involves human perception, social behavior, changing technologies, and issues of trust.
Buckland argues that every society is an “information society”; a “non-information society” would be a contradiction in terms. But the shift from oral and gestural communication to documents, and the wider use of documents facilitated by new technologies, have made our society particularly information intensive. Buckland describes the rising flood of data, documents, and records, outlines the dramatic long-term growth of documents, and traces the rise of techniques to cope with them. He examines the physical manifestation of information as documents, the emergence of data sets, and how documents and data are discovered and used. He explores what individuals and societies do with information; offers a basic summary of how collected documents are arranged and described; considers the nature of naming; explains the uses of metadata; and evaluates selection methods, considering relevance, recall, and precision.
Section one considers research questions most often asked in information and library science and explains how they arise from practice or theory. Section two covers a variety of research designs and the sampling issues associated with them, while sections three and four look at methods for collecting and analyzing data. Each chapter introduces a particular research method, points out its relative strengths and weaknesses, and provides a critique of two or more exemplary studies.
For this second edition, three new chapters have been added, covering mixed methods, visual data collection methods, and social network analysis. The chapters on research diaries and transaction log analysis have been updated, and updated examples are provided in more than a dozen other chapters as well.
Let’s face it, teens are sometimes overlooked by libraries when it comes to services and programs. However, there are over 42 million teens in the US, which makes them a sizeable and important demographic to serve. Many of today’s teens are struggling. More are living in poverty than before and nearly 7,000 teens drop out of high school per day. By setting aside some time to increase your library’s focus on teens, you will be providing a vital service and positioning your library as an indispensable part of the community. The resources and information in this book can help you achieve that.
In The New Science of Cities, Michael Batty suggests that to understand cities we must view them not simply as places in space but as systems of networks and flows. To understand space, he argues, we must understand flows, and to understand flows, we must understand networks—the relations between objects that comprise the system of the city. Drawing on the complexity sciences, social physics, urban economics, transportation theory, regional science, and urban geography, and building on his own previous work, Batty introduces theories and methods that reveal the deep structure of how cities function.
Batty presents the foundations of a new science of cities, defining flows and their networks and introducing tools that can be applied to understanding different aspects of city structure. He examines the size of cities, their internal order, the transport routes that define them, and the locations that fix these networks. He introduces methods of simulation that range from simple stochastic models to bottom-up evolutionary models to aggregate land-use transportation models. Then, using largely the same tools, he presents design and decision-making models that predict interactions and flows in future cities. These networks emphasize a notion with relevance for future research and planning: that design of cities is collective action.
Author Scott Lanning emphasizes service and instruction while addressing topics such as inquiry, critical thinking, building core reference skills, electronic and Web resources, leadership skills, and virtual reference services. The book begins with chapters that discuss information and the information-seeking process. The following sections cover the provision of reference services, methods for teaching information literacy, the use of electronic resources in general, and the creation of library resources that support reference and instruction. The text concludes with an assessment of the value of reference and instruction services to the school and beyond.
The book is designed to introduce LIS students to the profession, preparing them to enter an exciting and evolving world. It clarifies the changing roles and responsibilities of library professionals, new paradigms for evaluating information, and characteristics and functions of today's library personnel. Among other subjects, chapters cover preparing materials for use, circulation, reference services, ethics in the information age, Internet trends, and job search basics. References, websites, and publications at the end of every chapter point to further resources, and appendices supply information such as policies, the library bill of rights, and the Freedom to Read statement.
Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security.
Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.
Defensive topics include cryptography, forensics, packet capturing, and building secure web applications.
Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.What you will learn Learn the basic concepts and principles of secure programming Write secure Golang programs and applications Understand classic patterns of attack Write Golang scripts to defend against network-level attacks Learn how to use Golang security packages Apply and explore cryptographic methods and packages Learn the art of defending against brute force attacks Secure web and cloud applicationsWho this book is for
Security with Go is aimed at developers with basics in Go to the level that they can write their own scripts and small programs without difficulty. Readers should be familiar with security concepts, and familiarity with Python security applications and libraries is an advantage, but not a necessity.
Abbott tells what every senior researcher knows: that research is not a mechanical, linear process, but a thoughtful and adventurous journey through a nonlinear world. He breaks library research down into seven basic and simultaneous tasks: design, search, scanning/browsing, reading, analyzing, filing, and writing. He moves the reader through the phases of research, from confusion to organization, from vague idea to polished result. He teaches how to evaluate data and prior research; how to follow a trail to elusive treasures; how to organize a project; when to start over; when to ask for help. He shows how an understanding of scholarly values, a commitment to hard work, and the flexibility to change direction combine to enable the researcher to turn a daunting mass of found material into an effective paper or thesis.
More than a mere how-to manual, Abbott’s guidebook helps teach good habits for acquiring knowledge, the foundation of knowledge worth knowing. Those looking for ten easy steps to a perfect paper may want to look elsewhere. But serious scholars, who want their work to stand the test of time, will appreciate Abbott’s unique, forthright approach and relish every page of Digital Paper.
Each site is accompanied by a site summary that describes the site contents and usefulness to geography teachers and school library media specialists. Site subjects include: Urban Landscapes, Volcanoes and Earthquakes, Weather, The U.S. Census, and the World Wildlife Fund Global Network. The questions and activities that follow are designed to develop critical thinking skills for both oral and written presentations. An appendix of additional geography resources includes Internet addresses for approximately 25 sites relating to maps, primary sources, and critical thinking. This will provide teachers and librarians with even more resources for developing lessons to help each student meet all 18 of the National Geography Standards.
More than 2 million adults are serving time in correctional facilities, and hundreds of thousands of youth are in juvenile detention centers. There are more than 1,300 prisons and jails in the United States, and about a third as many juvenile detention centers. Inmates, as much or more than the general population, need information and library services. They represent one of the most challenging and most grateful populations you, as a librarian, can work with. This book is intended to aid librarians whose responsibilities include serving the incarcerated, either as full-time jail or prison librarians, or as public librarians who provide outreach services to correctional facilities. It is also of interest to library school students considering careers in prison librarianship. The authors, a jail librarian and an outreach librarian, show how you can apply the public library model to inmate populations, and provide exemplary library service. They offer a wealth of ideas, answering questions about facilities and equipment, collection development, services and programming; computers and the Internet; managing human resources, including volunteers and inmate workers; budgeting and funding; and advocacy within the facility and in the community. The approach is practical and down-to-earth, with numerous examples and anecdotes to illustrate ideas.
Ethereum is a public, blockchain-based distributed computing platform featuring smart contract functionality. This book is your one-stop guide to blockchain and Ethereum smart contract development.
We start by introducing you to the basics of blockchain. You'll learn about hash functions, Merkle trees, forking, mining, and much more. Then you'll learn about Ethereum and smart contracts, and we'll cover Ethereum virtual machine (EVM) in detail. Next, you'll get acquainted with DApps and DAOs and see how they work. We'll also delve into the mechanisms of advanced smart contracts, taking a practical approach.
You'll also learn how to develop your own cryptocurrency from scratch in order to understand the business behind ICO. Further on, you'll get to know the key concepts of the Solidity programming language, enabling you to build decentralized blockchain-based applications. We'll also look at enterprise use cases, where you'll build a decentralized microblogging site.
At the end of this book, we discuss blockchain-as-a-service, the dark web marketplace, and various advanced topics so you can get well versed with the blockchain principles and ecosystem.What you will learnKnow how to build your own smart contracts and cryptocurrenciesUnderstand the Solidity language Find out about data types, control structure, functions, inheritance, mathematical operations, and much moreSee the various types of forks and discover how they are related to EthereumGet to know the various concepts of web3.js and its APIs so you can build client-side appsBuild a DAO from scratch and acquire basic knowledge of DApps on EthercastBe guided through the project so you can optimize EVM for smart contractsBuild your own decentralized applications (DApps) by taking a practical approachWho this book is for
If you want to know the ins and outs of the Ethereum network and build your own decentralized applications, then this book is what you need! This book is for anyone who is interested in blockchain and wants to become an Ethereum developer. It’s ideal for existing Ethereum developers who want to develop Ethereum using smart contracts. Basic knowledge of cryptography is expected but is not mandatory.
science, environmental, and energy resources from agencies like the Environmental Protection Agency and the Department of Energy.Exercises throughout the text support instruction, while the approachable and well-organized style make it ideal for day-to-day reference use.
This book will bring all the credible theories into one place where they will be summarized, brought up to date, and footnoted. Moreover, the book will be international in its scope, and will discuss ideas coming from such important sources as Australia, Canada, and Western Europe.
Until about five years ago, there were very few implementation projects in this area. This book brings together information on implementation projects that answer these questions:
What is a trustworthy repository for digital records?Who is building these repositories, and what have been the results?How are institutions building or creating these repositories?How are institutions addressing the essential requirement related to the ingest or capture of records?How are institutions automatically and manually capturing essential metadata and audit trails?How are institutions implementing retention and disposal decisions within these systems?How are institutions implementing preservation strategies to ensure that digital objects are accessible over long periods of time?What is the current status of trustworthy repositories, and what will these systems look like in the future?