A historical overview of the field
Theories that apply to CFL/CSL learning
Policies and initiatives for CFL/CSL by the Chinese and U.S. governments
Medium of instruction
Curriculum and instruction for CFL/CSL learners at K-12 and college levels
Technology for CFL/CSL education
Chinese language learning for heritage learners
CFL in study abroad contexts
CFL teacher education and training
This work is essential reading for scholars and students interested in gaining a greater understanding of Chinese language education in the two countries and around the world.
The field of bioanalysis has advanced rapidly, propelled by new approaches for developing bioanalytical methods, new liquid chromatographic (LC) techniques, and new mass spectrometric (MS) instruments. Moreover, there are a host of guidelines and regulations designed to ensure the quality of bioanalytical results.
Presenting the best practices, experimental protocols, and the latest understanding of regulations, this book offers a comprehensive review of LC-MS bioanalysis of small molecules and macromolecules. It not only addresses the needs of bioanalytical scientists working on routine projects, but also explores advanced and emerging technologies such as high-resolution mass spectrometry and dried blood spot microsampling.
Handbook of LC-MS Bioanalysis features contributions from an international team of leading bioanalytical scientists. Their contributions reflect a review of the latest findings, practices, and regulations as well as their own firsthand analytical laboratory experience. The book thoroughly examines:Fundamentals of LC-MS bioanalysis in drug discovery, drug development, and therapeutic drug monitoring The current understanding of regulations governing LC-MS bioanalysis Best practices and detailed technical instructions for LC-MS bioanalysis method development, validation, and stability assessment of analyte(s) of interest Experimental guidelines and protocols for quantitative LC-MS bioanalysis of challenging molecules, including pro-drugs, acyl glucuronides, N-oxides, reactive compounds, and photosensitive and autooxidative compounds
With its focus on current bioanalytical practice, Handbook of LC-MS Bioanalysis enables bioanalytical scientists to develop and validate robust LC-MS assay methods, all in compliance with current regulations and standards.
This IBM Redbooks® publication guides you through the Content Navigator platform, its architecture, and the available programming interfaces. It describes how you can configure and customize the user interface with the administration tools provided, and how you can customize and extend Content Navigator using available development options with sample code. Specifically, the book shows how to set up a development environment, and develop plug-ins that add an action, service, and feature to the user interface. Customization topics include implementing request and response filters, external data services (EDS), creating custom step processors, and using Content Navigator widgets in other applications. This book also covers mobile development, viewer customization, component deployment, and debugging and troubleshooting.
This book is intended for IT architects, application designers and developers working with IBM Content Navigator and IBM ECM products. It offers a high-level description of how to extend and customize IBM Content Navigator and also more technical details of how to do implementations with sample code.
The 18 revised full papers and 4 short papers were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on database security; security policies; privacy; intrusion detection and protocols; and trusted computing.
In this book, the authors provide a comprehensive and organized explanation of the femtocell concepts, architecture, air interface technologies, and challenging issues arising from the deployment of femtocells, such as interference, mobility management and self-organization. The book details a system level simulation based methodology addressing the key concerns of femtocell deployment such as interference between femto and macrocells, and the performance of both femto and macrocell layers. In addition, key research topics in interference modeling and mitigation, mobility management and Self-Organizing Network (SON) are highlighted. The authors also introduce HNB/HeNB standardization in 3GPP.. Furthermore, access methods (closed, open and hybrid), applications, timing synchronization, health issues, business models and security are discussed. The authors also provide a comparison between femtocells and other indoor coverage techniques such as picocells, repeaters, distributed antenna systems and radio over fiber. Lastly, both CDMA and OFDMA based femtocells are covered.
Key Features:Provides a comprehensive reference on femtocells and related topics Offers the latest research results on femtocells based on simulation and measurements Gives an overview of indoor coverage techniques such as picocells, repeaters, distributed antenna systems, radio over fiber and femtocells Includes chapters on femtocell access network architecture, air interface technologies (GSM, UMTS, HSPA, WiMAX and LTE), femtocell simulation, interference analysis and mitigation in femto/macrocell networks, mobility management in femto/macrocell networks, femtocell self-organization and other key challenges such as timing synchronization and security faced by femtocell deployment Points to over 240 references from 3GPP, The Femto Forum, journals and conference proceedings
This book will be an invaluable guide for RF engineers from operators, R&D engineers from femtocells hardware manufacturers, employees from regulatory bodies, radio network planners, academics and researchers from universities and research organizations. Students undertaking wireless communications courses will also find this book insightful.
This volume provides state of the art in non-repudiation protocols and gives insight of its applicability to e-commerce applications. This professional book organizes the existing scant literature regarding non-repudiation protocols with multiple entities participation. It provides the reader with sufficient grounds to understand the non-repudiation property and its applicability to real applications.
Secure Multi-Party Non-Repudiation Protocols and Applications is essential for professional audiences with in-depth knowledge of information security and a basic knowledge of applied cryptography. This book is also suitable as an advanced-level text or reference book for students in computer science.
This volume is a collection of research articles on the subject of the solar corona, and particularly, coronal magnetism. The book was motivated by the Workshop on Coronal Magnetism: Connecting Models to Data and the Corona to the Earth, which was held 21 - 23 May 2012 in Boulder, Colorado, USA. This workshop was attended by approximately 60 researchers. Articles from this meeting are contained in this topical issue, but the topical issue also contains contributions from researchers not present at the workshop.
This volume is aimed at researchers and graduate students active in solar physics.
Originally published in Solar Physics, Vol. 288, Issue 2, 2013 and Vol. 289, Issue 8, 2014.
Research Directions in Data and Applications Security describes original research results and innovative practical developments, all focused on maintaining security and privacy in database systems and applications that pervade cyberspace. The areas of coverage include:
-Role-Based Access Control;
-Data Mining and Inference;
-Multimedia System Security;
-Public Key Infrastructure;
-Formal Methods and Protocols;
-Security and Privacy.
Research Directions in Data and Applications Security is an invaluable resource for information assurance researchers, faculty members and graduate students, as well as for individuals engaged in research and development in the information technology sector.
The enhancements of organic semiconductor materials seen during the late 1990s and early 2000s have resulted in the fabrication of organic electronics in laboratory environments with impressive performance. Since the early 2000s, scientists have succeeded in applying printing-related technologies to create organic field effect transistors (OFETs) with micron-sized features. This has led to a widespread vision of developing printed electronic products, especially displays, sensors, and simple wireless products (such as RFID tags). The development of high-volume manufacturing platforms based on traditional graphic arts printing platforms naturally addresses demands on product cost and throughput. Moreover, graphics art printing technologies allow one to fabricate organic circuits directly onto low-cost sheet or roll substrates, including plastics and paper.
Printed Organic And Molecular Electronics was compiled to create a reference that included existing knowledge from the most renowned industry, academic, and government experts in the fields of organic semiconductor technology, graphic arts printing, micro-contact printing, and molecular electronics. It is divided into sections that consist of the most critical topics required for one to develop a strong understanding of the states of these technologies and the paths for taking them from R&D to the hands of consumers on a massive scale. As such, the book provides both theory as well as technology development results and trends.
Rainfall Induced Soil Slope Failure: Stability Analysis and Probabilistic Assessment integrates probabilistic approaches with the geotechnical modeling of slope failures under rainfall conditions with unsaturated soil. It covers theoretical models of rainfall infiltration and stability analysis, reliability analysis based on coupled hydro-mechanical modelling, stability of slopes with cracks, gravels and spatial heterogenous soils, and probabilistic model calibration based on measurement. It focuses on the uncertainties involved with rainfall-induced landslides and presents state-of-the art techniques and methods which characterize the uncertainties and quantify the probabilities and risk of rainfall-induced landslide hazards.
Additionally, the authors cover:
The failure mechanisms of rainfall-induced slope failure Commonly used infiltration and stability methods The infiltration and stability of natural soil slopes with cracks and colluvium materials Stability evaluation methods based on probabilistic approaches The effect of spatial variability on unsaturated soil slopes and more
The 33 revised full papers included in this volume were carefully reviewed and selected from 192 submissions. They are organized in topical sessions on authentication, key management, block ciphers, identity-based cryptography, cryptographic primitives, cryptanalysis, side channel attacks, network security, Web security, security and privacy in social networks, security and privacy in RFID systems, security and privacy in cloud systems, and security and privacy in smart grids.
Exposing the absurdities in urban geopolitics and persistent spatial logics of exclusivity is as important as proposing to hack into them. Critical of the innocence of so-called public space and the underlying architectural impasse, the book offers an investigative commentary on the state of urban enclaves, while speculating on alternative strategies by designing an embassy, a bounded pseudo-extraterritory and the epitome of an enclave.
Through absurd couplings and blatant image-making, a seemingly open US embassy is proposed for Beijing as an imploded fragment of a boundary, its incompleteness buttressed by other territories of privilege and its disparate barriers articulated as a mechanism of filtration. Away from popular strategies of conceptual and spatial blurring, the book defines an architectural porosity to orchestrate spaces of varying openness, as a nuanced response to both the embassy’s double identities and schizophrenic agendas of city-building.
With an architecture that is diplomatic by function and diplomatic by disposition, one experiments with an agency beyond the single pursuit of public-ness and an escape from the ideological enclave of positivism. Ultimately, the goal is to suggest and develop a methodology of designing with oppositions, irony and latency.
The 14 revised full papers and 8 short papers presented together with the abstracts of 4 keynote talks were carefully reviewed and selected from 42 submissions. The papers feature both theoretical research and real-world case studies from academia, business and government focusing on areas such as: trust models, social and behavioral aspects of trust, trust in networks, mobile systems and cloud computation, privacy, reputation systems, and identity management.
Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.
Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?
WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
especially their own. Along the way, we encounter black holes, turtles, snakes, dragons, axe-sharpening, and yak-shaving—and take a guided tour through the theories and methods, both brilliant and misguided, that litter the history of software development, from the famous “mythical man-month” to Extreme Programming. Not just for technophiles but for anyone captivated by the drama of invention, Dreaming in Code offers a window into both the information age and the workings of the human mind.
From the Hardcover edition.
Designed for horizontal scalability, OpenStack lets you build a cloud by integrating several technologies. This approach provides flexibility, but knowing which options to use can be bewildering. Once you complete this book, you’ll know the right questions to ask while you organize compute, storage, and networking resources. If you already know how to manage multiple Ubuntu machines and maintain MySQL, you’re ready to:Set up automated deployment and configurationDesign a single-node cloud controllerUse metrics to improve scalabilityExplore compute nodes, network design, and storageInstall OpenStack packagesUse an example architecture to help simplify decision-makingBuild a working environment to explore an IaaS cloudManage users, projects, and quotasTackle maintenance, debugging, and network troubleshootingMonitor, log, backup, and restore
A 3D printer transforms digital information into a physical object by carrying out instructions from an electronic design file, or 'blueprint.' Guided by a design file, a 3D printer lays down layer after layer of a raw material to 'print' out an object. That's not the whole story, however. The magic happens when you plug a 3D printer into today’s mind-boggling digital technologies. Add to that the Internet, tiny, low cost electronic circuitry, radical advances in materials science and biotech and voila! The result is an explosion of technological and social innovation.
Fabricated takes the reader onto a rich and fulfilling journey that explores how 3D printing is poised to impact nearly every part of our lives.
Aimed at people who enjoy books on business strategy, popular science and novel technology, Fabricated will provide readers with practical and imaginative insights to the question 'how will this technology change my life?' Based on hundreds of hours of research and dozens of interviews with experts from a broad range of industries, Fabricated offers readers an informative, engaging and fast-paced introduction to 3D printing now and in the future.
The answer is time management. And not just any time management theory--you want Time Management for System Administrators, to be exact. With keen insights into the challenges you face as a sys admin, bestselling author Thomas Limoncelli has put together a collection of tips and techniques that will help you cultivate the time management skills you need to flourish as a system administrator.
Time Management for System Administrators understands that an Sys Admin often has competing goals: the concurrent responsibilities of working on large projects and taking care of a user's needs. That's why it focuses on strategies that help you work through daily tasks, yet still allow you to handle critical situations that inevitably arise.
Among other skills, you'll learn how to:Manage interruptionsEliminate timewastersKeep an effective calendarDevelop routines for things that occur regularlyUse your brain only for what you're currently working onPrioritize based on customer expectationsDocument and automate processes for faster execution
What's more, the book doesn't confine itself to just the work environment, either. It also offers tips on how to apply these time management tools to your social life. It's the first step to a more productive, happier you.
Best Android Apps leads you beyond the titles in Android Market's "Top Paid" and "Top Free" bins to showcase apps that will truly delight, empower, and entertain you. The authors have tested and handpicked more than 200 apps and games, each listed with a description and details highlighting the app's valuable tips and special features. Flip through the book to browse their suggestions, or head directly to the category of your choice to find the best apps to use at work, on the town, at play, at home, or on the road.
Discover great Android apps to help you:Juggle tasksConnect with friendsPlay gamesOrganize documentsExplore what's nearbyGet in shapeTravel the worldFind new musicDine outManage your money
...and much more!
The Internet has been hailed as an unprecedented democratizing force, a place where everyone can be heard and all can participate equally. But how true is this claim? In a seminal dismantling of techno-utopian visions, The People's Platform argues that for all that we "tweet" and "like" and "share," the Internet in fact reflects and amplifies real-world inequities at least as much as it ameliorates them. Online, just as off-line, attention and influence largely accrue to those who already have plenty of both.
What we have seen so far, Astra Taylor says, has been not a revolution but a rearrangement. Although Silicon Valley tycoons have eclipsed Hollywood moguls, a handful of giants like Amazon, Apple, Google, and Facebook remain the gatekeepers. And the worst habits of the old media model—the pressure to seek easy celebrity, to be quick and sensational above all—have proliferated on the web, where "aggregating" the work of others is the surest way to attract eyeballs and ad revenue. When culture is "free," creative work has diminishing value and advertising fuels the system. The new order looks suspiciously like the old one.
We can do better, Taylor insists. The online world does offer a unique opportunity, but a democratic culture that supports diverse voices and work of lasting value will not spring up from technology alone. If we want the Internet to truly be a people's platform, we will have to make it so.
Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you’re a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers.
Selected topics include:The filesystem and shellFile creation and editingText manipulation and pipelinesBackups and remote storageViewing and controlling processesUser account managementBecoming the superuserNetwork connectionsAudio and videoInstalling softwareProgramming with shell scripts
The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.
The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring.
And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police.
Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead.
Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today.
Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.
From the Hardcover edition.
Don’t believe it.
In Glow Kids, Dr. Nicholas Kardaras will examine how technology—more specifically, age-inappropriate screen tech, with all of its glowing ubiquity—has profoundly affected the brains of an entire generation. Brain imaging research is showing that stimulating glowing screens are as dopaminergic (dopamine activating) to the brain’s pleasure center as sex. And a growing mountain of clinical research correlates screen tech with disorders like ADHD, addiction, anxiety, depression, increased aggression, and even psychosis. Most shocking of all, recent brain imaging studies conclusively show that excessive screen exposure can neurologically damage a young person’s developing brain in the same way that cocaine addiction can.
Kardaras will dive into the sociological, psychological, cultural, and economic factors involved in the global tech epidemic with one major goal: to explore the effect all of our wonderful shiny new technology is having on kids. Glow Kids also includes an opt-out letter and a "quiz" for parents in the back of the book.
Conversion Optimization offers practical advice on how to persuade visitors to make a buying decision -- without driving them away through data overload or tedious navigation. You'll learn how to use marketing principles, design, usability, and analytics on your site to increase your buyer-to-visitor ratio, whether you're involved with marketing or designing a large ecommerce site, or managing a modest online operation.
Based on the authors' broad experience in helping businesses attract online customers, this book addresses every aspect of the process, from landing visitors to finalizing the sale. You'll learn several techniques for blending successful sales approaches with the particular needs of the people you want to attract. Are you ready to do what it takes to get a double-digit conversion rate?Explore case studies involving significant conversion rate improvementsWalk through different stages of a sale and understand the value of eachUnderstand your website visitors through persona creationConnect with potential customers and guide them toward a conversionLearn how to deal with FUDs -- customer fears, uncertainties, and doubtsExamine the path that visitors take from landing page to checkoutTest any change you make against your original design
"The Web is unique in its ability to deliver this almost improbable win-win: You can increase revenue AND make your customers happy. Yet most websites stink. Worry not, Khalid and Ayat to the rescue! Buy this book to follow their practical advice on how to create high converting websites that your visitors love."--Avinash Kaushik, author of Web Analytics 2.0 and Web Analytics: An Hour A Day (both Sybex)
The example code for this unique data science book is maintained in a public GitHub repository. It’s designed to be easily accessible through a turnkey virtual machine that facilitates interactive learning with an easy-to-use collection of IPython Notebooks.
We are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?
Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.
Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."
The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.
Digital information is a powerful tool that spreads unbelievably rapidly, infects all corners of society, and is all but impossible to control—even when that information is actually a lie. In Virtual Unreality, Charles Seife uses the skepticism, wit, and sharp facility for analysis that captivated readers in Proofiness and Zero to take us deep into the Internet information jungle and cut a path through the trickery, fakery, and cyber skullduggery that the online world enables.
Taking on everything from breaking news coverage and online dating to program trading and that eccentric and unreliable source that is Wikipedia, Seife arms his readers with actual tools—or weapons—for discerning truth from fiction online.
From the Trade Paperback edition.