Each of the accomplished writers included in this guide has established a broad audience and is recognized for work that is imaginative and innovative. The rising stars of 21st century mystery will also be included, as will authors who have won the Mystery Writers of America Grand Master Award.
The authors integrate a research-focused information behavior approach with a literature-focused resources approach, and bring together in one volume key issues related to research, theory, and practice in the provision of information services to young adults. Currently, no single book addresses both YA information behaviors and information resources in any detail; instead, books tend to focus on one and give only cursory attention to the other.
Key features of this revolutionary book include its success in:
Integrating theory, research, and practiceIntegrating implications for practice throughout the bookIntegrating knowledge of resources with professional practice as informed by researchIntegrating both print and electronic formats throughout—within the resource chapters (including websites and social media)
Latham and Gross accomplish all this while, paying particular attention to the socially constructed nature of young adulthood, diversity, YA development, and multiple literacies. Their coverage of information landscapes covers literature (with detailed coverage of both genres and subgrenres), movies, magazines, web sites, social media, and gaming. The final chapter cover navigating information landscapes, focusing on real and virtual YA spaces, readers’ advisory, programming, and collaboration. Special attention is paid to program planning and evaluation.
Information Now is an innovative approach to information literacy that will reinvent the way college students think about research. Instead of the typical textbook format, it uses illustrations, humor, and reflective exercises to teach students how to become savvy researchers. Students will learn how to evaluate information, to incorporate it into their existing knowledge base, to wield it effectively, and to understand the ethical issues surrounding its use. Written by two library professionals, it incorporates concepts and skills drawn from the Association of College and Research Libraries’ Information Literacy Competency Standards for Higher Education and their Framework for Information Literacy for Higher Education. Thoroughly researched and highly engaging, Information Now offers the tools that students need to become powerful consumers and creators of information.
Whether used by a high school student tackling a big paper, an undergrad facing the newness of a university library, or a writer wanting to go beyond Google, Information Now is a powerful tool for any researcher’s arsenal.
The first three chapters provide an overview of the Guided Inquiry design framework, identify the eight phases of the Guided Inquiry process, summarize the research that grounds Guided Inquiry, and describe the five tools of inquiry that are essential to implementation. The following chapters detail the eight phases in the Guided Inquiry design process, providing examples at all levels from pre-K through 12th grade and concluding with recommendations for building Guided Inquiry in your school.
The book is for pre-K–12 teachers, school librarians, and principals who are interested in and actively designing an inquiry approach to curricular learning that incorporates a wide range of resources from the library, the Internet, and the community. Staff of community resources, museum educators, and public librarians will also find the book useful for achieving student learning goals.
Archive Stories brings together ethnographies of the archival world, most of which are written by historians. Some contributors recount their own experiences. One offers a moving reflection on how the relative wealth and prestige of Western researchers can gain them entry to collections such as Uzbekistan’s newly formed Central State Archive, which severely limits the access of Uzbek researchers. Others explore the genealogies of specific archives, from one of the most influential archival institutions in the modern West, the Archives nationales in Paris, to the significant archives of the Bakunin family in Russia, which were saved largely through the efforts of one family member. Still others explore the impact of current events on the analysis of particular archives. A contributor tells of researching the 1976 Soweto riots in the politically charged atmosphere of the early 1990s, just as apartheid in South Africa was coming to an end. A number of the essays question what counts as an archive—and what counts as history—as they consider oral histories, cyberspace, fiction, and plans for streets and buildings that were never built, for histories that never materialized.
Contributors. Tony Ballantyne, Marilyn Booth, Antoinette Burton, Ann Curthoys, Peter Fritzsche, Durba Ghosh, Laura Mayhall, Jennifer S. Milligan, Kathryn J. Oberdeck, Adele Perry, Helena Pohlandt-McCormick, John Randolph, Craig Robertson, Horacio N. Roque Ramírez, Jeff Sahadeo, Reneé Sentilles
This is an authoritative and engaging introduction to writing young adult fiction for the complete beginner. It will help you understand how the genre works, the big do's and don't's - as well as giving you the inspiration and motivation you actually need to write. Written by a leading literary agent who knows what it takes to make it in this market, this book will give you the advice and tips you need to stand out. An essential book for anyone hoping to emulate the success and addictive qualities that characterize books like The Hunger Games, Twilight, Divergent and The Fault in Our Stars.
ABOUT THE SERIES
The Teach Yourself Creative Writing series helps aspiring authors tell their story. Covering a range of genres from science fiction and romantic novels, to illustrated children's books and comedy, this series is packed with advice, exercises and tips for unlocking creativity and improving your writing. And because we know how daunting the blank page can be, we set up the Just Write online community at tyjustwrite, for budding authors and successful writers to connect and share.
Through the ideas and software in this book, users will learn to design and employ a fully-featured rendering system for creating stunning imagery. This completely updated and revised edition includes new coverage on ray-tracing hair and curves primitives, numerical precision issues with ray tracing, LBVHs, realistic camera models, the measurement equation, and much more. It is a must-have, full color resource on physically-based rendering.Presents up-to-date revisions of the seminal reference on rendering, including new sections on bidirectional path tracing, numerical robustness issues in ray tracing, realistic camera models, and subsurface scatteringProvides the source code for a complete rendering system allowing readers to get up and running fastIncludes a unique indexing feature, literate programming, that lists the locations of each function, variable, and method on the page where they are first describedServes as an essential resource on physically-based rendering
Foundations of Library Services is both a text for professors who teach in library support staff programs and an introductory reference manual for support staff who work in libraries. This book will guide the LSS to be able to:
Understand the mission and role of the library in its communityBe familiar with the ethics and values of the profession, including those of the Library Bill of Rights, the ALA Code of Ethics, freedom of information, confidentiality of library records and privacy issuesKnow the responsibility and relationships among library departmentsPractice the basic principles of circulation, including interlibrary loan; current cataloging and classification systems; and acquisitions and collection development policies.Understand how libraries are governed and funded within their organizations or government structuresRealize the value of cooperation to enhance servicesPractice quality customer serviceCommunicate and promote the library’s values and servicesRecognize and respond to diversity in user needs
Using the Association of College and Research Libraries' Information Literacy Competency Standards for Higher Education as a framework, this much-needed sourcebook covers all the major facets of the information literacy process. For students, it is a ready-to-use guide that explains what information literacy is, why it is so important, and how to put it to use in both print and online research. For teachers, it is a helpful classroom resource that can serve as the basis for an information literacy course, a supplemental text, or a handy reference for research in any subject.
Each chapter of this text is organized around one of the National Council for the Social Studies' Ten Thematic Strands, covering diverse and engaging topics ranging from community and individuality to science and technology. This book serves as a vital resource for classroom teachers, methods professors, staff developers, and curriculum writers who prioritize keeping social studies a part of the elementary school curriculum.
With Building Parent Engagement in Schools, educators can start to develop a hybrid culture between home and school, so that school can serve as a cultural bridge for the students. Filled with the voices of real educators, students, and parents, the book documents a number of parent-involved efforts to improve low-income communities, gain greater resources for schools, and improve academic achievement. Coverage includes details of real initiatives in action, including programs for home visits, innovative uses of technology, joint enterprises like school/community gardens, and community organization efforts.
So powerful are Ragna's sorceries that even the Good Magician Humfrey dares not confront him directly. Instead he enlists Cyrus the Cyborg, a handsome half-human playwright with little knowledge of the world, in a stealthy subterfuge. Cyrus must assemble a troupe of traveling players to attract Ragna's interest. And hidden in disguise among the bevy of beautiful young actresses are the young princesses, Melody, Harmony, and Rhythm, whose magics might just be a match for the evil bird.
But Ragna has planted a spy in the midst of the troupe, one who knows their deepest secrets, including the true nature of Cyrus's forbidden love for one of the young princesses. Only a mysterious child called Kadence, and a cryptic clue — "Two to the Fifth" — may give the companions the edge they need to defeat Ragna's dictatorial dreams.
Brimming with passion and merriment, drama and deception, Piers Anthony's thirty-second Xanth fantasy, Two to the Fifth, is a pun-packed performance sure to provoke applause and ovations from the series' myriad fans.
At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.
Gem Codes and Ciphers touches on everything from the smoke signals used by Native American Indians to encryption devices used by government agencies and the military.
Not only does this handy, pocket-sized book cover the history of the development of codes and ciphers, it also has practical information and advice on how to make codes and, more importantly, how to break them!
• Native American smoke signals, Masonic signals, flags, and semaphore;
• Morse code, Braille, ASCII computer language;
• Letter substitution – mono- and poly-alphabetic;
• Computer algorithms;
• Codes and ciphers throughout history
• Development of code-breaking devices such as the Enigma machine.
With young adult book sales rising, and bestselling authors likeJ.K. Rowling and Stephenie Meyer exploding onto the scene, aspiringYA writers are more numerous than ever. Are you interested inwriting a young adult novel, but aren't sure how to fit the stylethat appeals to young readers?
Writing Young Adult Fiction For Dummies gives you tricksof the trade and proven tips on all the steps to write a YA book,from developing an idea to publication.Unique writing exercises to help you find your own authenticteen voiceTips to avoid when submitting manuscriptsHow to break into the flourishing young adult market
With the help of this step-by-step guide, you'll have all theskills to write an inspiring and marketable young adult novel.
The second edition features two new chapters on digital curation and cooperative collection development. Additional updates include helpful information on infographics, more budgeting formulas, and a section on core collections, as well as content covering eBooks, electronic storage, and digital rights management. Chapters discuss subjects such as marketing the collection to patrons, book repair, and handling censorship issues when collections are challenged.
The original letters Anthony wrote between February 1989 and 1990, reproduced here along with Anthony’s comments, reveal the author’s wit, humanism, and social conscience.
Jenny has come out of her coma, but is still confined to a wheelchair. Anthony also named a character in his next Xanth novel after Jenny, whose limited but definite physical responses to his letters indicated how important they were to her.
Being grown up is a drag . . . or so thinks Lacuna, one of the michievous Castle Zombie twins. So she makes the Good Magician Grey an an offer he can't refuse. Thirsty for a taste of the Elixir of Youth, she'll help him outwit the evil Com-Pewter if he'll send her to Hell (in a handbasket, no less) to find Humphrey, the missing sorcerer. And while there, she'll learn the True History of Xanth (simplified) and help rescue a blushing Rose from the demon X(A/N) . . . with the help of a gorgon or two.
This invaluable book addresses such questions as "How should a librarian select and share books in each genre?" and "How do I generate interest in reading with today's students?" as well as "What are the best promotion and collaboration activities associated with each genre?" Although the work is specifically written to help new librarians get up to speed in the field of children's literature, it will benefit everyone from experienced, practicing librarians and children's services paraprofessionals to elementary level educators and parents who homeschool their children.
Go is becoming more and more popular as a language for security experts. Its wide use in server and cloud environments, its speed and ease of use, and its evident capabilities for data analysis, have made it a prime choice for developers who need to think about security.
Security with Go is the first Golang security book, and it is useful for both blue team and red team applications. With this book, you will learn how to write secure software, monitor your systems, secure your data, attack systems, and extract information.
Defensive topics include cryptography, forensics, packet capturing, and building secure web applications.
Offensive topics include brute force, port scanning, packet injection, web scraping, social engineering, and post exploitation techniques.What you will learn Learn the basic concepts and principles of secure programming Write secure Golang programs and applications Understand classic patterns of attack Write Golang scripts to defend against network-level attacks Learn how to use Golang security packages Apply and explore cryptographic methods and packages Learn the art of defending against brute force attacks Secure web and cloud applicationsWho this book is for
Security with Go is aimed at developers with basics in Go to the level that they can write their own scripts and small programs without difficulty. Readers should be familiar with security concepts, and familiarity with Python security applications and libraries is an advantage, but not a necessity.
Loveworn Love Lost
Perplexed Prince Dolph, Xanth's precocious shapeshifter, should be in love but isn't. Nonetheless, he must chose between two fiancées -- Nada the uninterested and Electra the uninteresting -- or all three of them will suffer the most dire consequences. Luckily a convenient catastrophe has popped up to distract Dolph form his dilemma -- the foal-napping of young Che Centaur by goblins. And the only one who knows where Che is is a nice but remarkably naive elflike gir named Jenny from the World of Two Moons. If anyone can save the missing centaur...she sure can't.
At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.
Start with the user and the user's needs. Identify the instructional problem(s). Develop outcomes that address these problem(s). Use outcomes to drive both the learning activities included and the assessments used to measure the attainment of the success of the instructional endeavor.
This book will help instruction librarians create instruction for all types of environments and in all modes of delivery. It includes exercises and worksheets to help the reader work through the instructional design process. Based on Kaplowitz’s innovative Teaching Tripod model, it will help instructional librarians clearly define the crucial links between outcomes, activities and assessment.
shows how to set up new instruction librarians for success, with advice on completing an environmental scan, strategies for recruiting efficiently, and a training checklist; walks readers step by step through training a new hire or someone new to instruction, complete with hands-on activities and examples;explores the different roles an instruction librarian is usually expected to play, such as educator, project manager, instructional designer, and teaching partner;demonstrates the importance of performance evaluation and management, including assessment and continuing education, both formal and informal; andprovides guided reading lists for further in-depth study of a topic. A starter kit for librarians new to instruction, this resource will be useful for training coordinators as well as for self-training.
science, environmental, and energy resources from agencies like the Environmental Protection Agency and the Department of Energy.Exercises throughout the text support instruction, while the approachable and well-organized style make it ideal for day-to-day reference use.
In fact, Gwenny Goblin, Che Centaur and Jenny Elf are just about the only creatures on Xanth who have been spared the sight of Mela Merwoman's undergarment -- preoccupied as they are with helping Gwenny beat out her awful half-brother Gobble for chiefship of the goblin horde. But first they must master space and thyme . . . and find the fabulous egg that sits between the Roc and the hard place. While Mela -- who would gladly relinquish her oft-viewed undies for a new husband -- joins the Adult Conspiracy . . . and quickly discovers the power of a perfect pair of panties!
Written specifically for K–12 librarians and teachers, the authors present helpful tools and easily applied strategies for every major area in reference, from the reference interview to encyclopedias and dictionaries. This textbook teaches basic reference processes, sources, services, and skills; and provides authentic, real-world school library media reference scenarios as well as exercises for reflection and guided application in today's reference world.
Jordan was a ghost in Castle Roogna now, spending his time with little five-year-old Ivy and watching his own past unfold on the magic tapestry. But once he had been a valorous knight, riding his ghost horse Pook on a fabulous and dangerous mission.
He had been betrayed with a cruel lie by two wily magicians and the woman he loved. He had been killed at the end, and his bones had been scattered. Now he could not even remember where they had been buried.
That was important, because Jordan's talent had been to recover from almost any injury, provided enough of his body could be assembled to grow together again. But all that had been four hundred years before. Nobody who was alive today knew or cared where his bones might be.
It was hardly the proper ending for a gallant adventure!
Ethereum is a public, blockchain-based distributed computing platform featuring smart contract functionality. This book is your one-stop guide to blockchain and Ethereum smart contract development.
We start by introducing you to the basics of blockchain. You'll learn about hash functions, Merkle trees, forking, mining, and much more. Then you'll learn about Ethereum and smart contracts, and we'll cover Ethereum virtual machine (EVM) in detail. Next, you'll get acquainted with DApps and DAOs and see how they work. We'll also delve into the mechanisms of advanced smart contracts, taking a practical approach.
You'll also learn how to develop your own cryptocurrency from scratch in order to understand the business behind ICO. Further on, you'll get to know the key concepts of the Solidity programming language, enabling you to build decentralized blockchain-based applications. We'll also look at enterprise use cases, where you'll build a decentralized microblogging site.
At the end of this book, we discuss blockchain-as-a-service, the dark web marketplace, and various advanced topics so you can get well versed with the blockchain principles and ecosystem.What you will learnKnow how to build your own smart contracts and cryptocurrenciesUnderstand the Solidity language Find out about data types, control structure, functions, inheritance, mathematical operations, and much moreSee the various types of forks and discover how they are related to EthereumGet to know the various concepts of web3.js and its APIs so you can build client-side appsBuild a DAO from scratch and acquire basic knowledge of DApps on EthercastBe guided through the project so you can optimize EVM for smart contractsBuild your own decentralized applications (DApps) by taking a practical approachWho this book is for
If you want to know the ins and outs of the Ethereum network and build your own decentralized applications, then this book is what you need! This book is for anyone who is interested in blockchain and wants to become an Ethereum developer. It’s ideal for existing Ethereum developers who want to develop Ethereum using smart contracts. Basic knowledge of cryptography is expected but is not mandatory.
The Gap Dragon had escaped from the Gap and was ravaging across the land. The forget-spell that had covered the Gap was breaking up into small forget-whorls that wandered about, giving amnesia to all they touched. Good Magician Humfrey might have had the Answer, but he had overdosed on water from the Fountain of Youth and was only a helpless baby.
And Ivy, three-year-old daughter of King Dor and Queen Irene, as lost in the jungles south of the Gap. While Irene sought her without much hope, Ivy was wandering further into danger, her memories erased by a passing forget-whorl. Her path was leading her directly to where the Gap Dragon was seeking dinner.
Scholars in all fields now have access to an unprecedented wealth of online information, tools, and services. The Internet lies at the core of an information infrastructure for distributed, data-intensive, and collaborative research. Although much attention has been paid to the new technologies making this possible, from digitized books to sensor networks, it is the underlying social and policy changes that will have the most lasting effect on the scholarly enterprise. In Scholarship in the Digital Age, Christine Borgman explores the technical, social, legal, and economic aspects of the kind of infrastructure that we should be building for scholarly research in the twenty-first century.
Borgman describes the roles that information technology plays at every stage in the life cycle of a research project and contrasts these new capabilities with the relatively stable system of scholarly communication, which remains based on publishing in journals, books, and conference proceedings. No framework for the impending “data deluge” exists comparable to that for publishing. Analyzing scholarly practices in the sciences, social sciences, and humanities, Borgman compares each discipline's approach to infrastructure issues. In the process, she challenges the many stakeholders in the scholarly infrastructure—scholars, publishers, libraries, funding agencies, and others—to look beyond their own domains to address the interaction of technical, legal, economic, social, political, and disciplinary concerns. Scholarship in the Digital Age will provoke a stimulating conversation among all who depend on a rich and robust scholarly environment.
the history and mission of libraries, from past to present;digital devices, social networking, and other technology;the impact of digital publishing on the publishing industry and the effects of eBooks on librariesvalues and ethics of the profession;how library services have evolved in the areas of virtual reference, embedded librarianship, digital access and repositories, digital preservation, and civic engagement;new and ongoing efforts to organize knowledge, such as FRBR, RDA: Resource Description and Access, BIBFRAME, the Semantic Web, and the Next Generation Catalog (Catalog 2.0);the significance of the digital divide and policy issues related to broadband access and network neutrality;the concept of intellectual freedom, and how it plays out in the real world;legal developments like new interpretations of copyright related to mass digitization of books (Google Books) and scholarly articles;the continuing tensions in LIS education between information science and library science; and
initiatives to integrate libraries, archives, and museums (LAMs);
Spanning all types of libraries, from public to academic, school, and special, this book illuminates the major facets of library and information science for aspiring professionals as well as those already practicing in the field.
To accomplish this, it ushers you through online searching as a seven-step process:
(1) determining what the user really wants in the reference interview,
(2) identifying sources that are likely to produce relevant information for the user’s query,
(3) dividing the query into big ideas and combining them logically,
(4) hypothesizing whether a known item or a subject will satisfy the query,
(5) representing the query as input to the search system,
(6) conducting the search and responding strategically, and
(7) displaying retrievals, assessing them, and responding tactically.
For key concepts, Online Searching enlists multimedia, representing visually what is difficult to convey via words alone. When you analyze Online Searching’s real search topics, search online, and compare your results with its suggested answers, you’ll experience the seven-step online searching process first-hand. Included are specific recommendations about what you should teach end users about online searching and a method for quickly and efficiently familiarizing yourself with a new database and search system.
Including short video demonstrations, Online Searching is your go-to guidebook for ramping yourself up from novice to expert searcher.
Grundy Golem was the size of an inconsequence, and nobody had any respect for him—including Grundy! To prove himself, he volunteered to ride the Monster Under the Bed to the Ivory Tower to find little Ivy’s long-lost dragon, Stanley Steamer.
After many adventures, he reached the Tower, to learn that the evil Sea Hag kept lovely Rapunzel imprisoned there, her body destined to be used to maintain the witch’s immortality. Grundy managed to free the damsel, and they fled together.
As the descendant of Jordan the Barbarian and Bluebell Elf, Rapunzel could become any size, even that of any Golem’s dreamgirl. But Grundy knew she was surely fated for someone better than he. Besides, the Sea Hag still pursued them to destroy him and get her back.
And he still hadn’t found Stanley Steamer.
As in the previous edition, this book takes a "real world approach," covering everything from basic and advanced search tools to online subject databases. Each chapter includes a thorough discussion, recap, concrete examples, exercises, and points to consider, making this an ideal text for courses in database searching as well as a trustworthy professional resource.
Informed by a large-scale survey of librarians across the spectrum of institution types, this guide will be a true technology companion to novices and seasoned LIS professionals alike.
The Nextwave of barbarian warriors was invading Xanth from the north, ravaging and destroying as they advanced. But Mare Imbrium had her own problems. Ever since she had gained the half soul, the night mare had begun to mishandle her job of delivering bad dreams. Now the night Stallion dismissed her, exiling her to the day world with a message for King Trent: Beware the Horseman!
She had no idea what that meant. But that was the way with prophetic warnings—nobody could understand them until it was too late.
Then she met the Horseman. And she discovered that one who would right a night mare was a master of a bit and spur, and not a man to surrender her.
For the night mare, it all began to be a horrible nightmare!