04057nam 2200469 450 991081608860332120201117081244.01-9755-0206-X(CKB)4100000011348128(MiAaPQ)EBC6265335(EXLCZ)99410000001134812820201117d2020 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierAfrican Americans in higher education a critical study of social and philosophical foundations of Africana culture /edited by James L. Conyers Jr., Crystal L. Edwards and Kevin B. ThompsonGorham, Maine :Myers Education Press,[2020]©20201 online resource (xvi, 345 pages)Critical race issues in education seriesIncludes index.1-9755-0204-3 1. Revisiting The Brownies' Book : (Re)Imagining Black Males' Youth -- 2. "Me Versus Them" : An African American Male Professor's Approach to Teaching Race at a Predominately White Institution -- 3. Challenges Faced by African American Adult Students : Within Higher Education -- 4. Educating for Social Justice : The Potential Role of Historically Black Colleges and Universities in the 21st Century -- 5. Where Am I : An Analysis of the Incongruence Between Black Men and the Teaching Profession6. Carter G. Woodson and the Association for the Study of African American Life and History : A Reflexive Analysis of the History of Black Education -- 7. "You Have to Get Your Mind Right for This" : Black Women's Graduate School Experiences -- 8. No Parent Left Behind : The Narratives of African American Fathers in Texas on Their Parental Involvement -- 9. Toward an Afrocentric Antiracist Pedagogy for Brazilian Music Ensembles -- 10. The Need for Beloved Community : Black Graduate Students and the Collaborative Creation of Counterspaces11. Counseling Psychology of African Americans : A Review of the Literature -- 12. Anti-Black Ontological Violence in Undergraduate Textbooks -- 13. Vertically Integrated : African American Studies Instruction as Co-Requisite to Education-Based Ontological Manipulation -- 14. Teaching Through Culture : Employing Culturally Responsive Pedagogy to Transform Postsecondary STEM Instructions -- 15. Visionary and Social Justice Leaders : Leading by Example in Educational Environments16. The Dimensions of a Departmentalized Literacy Classroom Infused with Culturally Relevant/Responsive Practices : Its Impact on African American Second-Grade Reading Achievement -- Contributors -- IndexThis book seeks to critically examine African Americans in higher education with an emphasis on social and philosophical foundations of Africana culture. This is a critical interdisciplinary study, which examines the collection, interpretation, and analysis of quantitative and qualitative data in the field of higher education. To date, there are not any single-authored or edited collections that attempt to research the logical and conceptual ideas of the disciplinary matrix of Africana social and philosophical foundations of African Americans in higher education. Therefore, this volume provides readers with a compilation of literary, historical, philosophical, and communicative essays that describe and evaluate the Black experience from an Afrocentric perspective for the first time. It is required reading in a wide range of African American Studies courses.African AmericansEducation (Higher)Social aspectsAfrican AmericansEducation (Higher)Social aspects.370.112Conyers James L.Jr.,Edwards Crystal L.Thompson Kevin B.MiAaPQMiAaPQMiAaPQBOOK9910816088603321African Americans in higher education3929375UNINA05567nam 22007455 450 991040967120332120211014221810.03-030-33649-2978303033649310.1007/978-3-030-33649-3(CKB)4100000011223350(MiAaPQ)EBC6157938(DE-He213)978-3-030-33649-3(PPN)243760760(EXLCZ)99410000001122335020200404d2020 u| 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierComputer security and the Internet tools and Jewels /by Paul C. van Oorschot1st ed.Cham :Springer International Publishing :Imprint: Springer,2020.1 online resource (381 pages)Information Security and Cryptography,1619-71003-030-33648-4 9783030336486 Basic Concepts and Principles -- Cryptographic Building Blocks -- User Authentication: Passwords, Biometrics and Alternatives -- Authentication Protocols and Key Establishment -- Operating System Security and Access Control -- Software Security: Exploits and Privilege Escalation -- Malicious Software -- Public-Key Certificate Management and Use Cases -- Web and Browser Security -- Firewalls and Tunnels -- Intrusion Detection and Network-Based Attacks -- Epilogue -- Index.This book provides a concise yet comprehensive overview of computer and Internet security, suitable for a one-term introductory course for junior/senior undergrad or first-year graduate students. It is also suitable for self-study by anyone seeking a solid footing in security – including software developers and computing professionals, technical managers and government staff. An overriding focus is on brevity, without sacrificing breadth of core topics or technical detail within them. The aim is to enable a broad understanding in roughly 350 pages. Further prioritization is supported by designating as optional selected content within this. Fundamental academic concepts are reinforced by specifics and examples, and related to applied problems and real-world incidents. The first chapter provides a gentle overview and 20 design principles for security. The ten chapters that follow provide a framework for understanding computer and Internet security. They regularly refer back to the principles, with supporting examples. These principles are the conceptual counterparts of security-related error patterns that have been recurring in software and system designs for over 50 years. The book is “elementary” in that it assumes no background in security, but unlike “soft” high-level texts it does not avoid low-level details, instead it selectively dives into fine points for exemplary topics to concretely illustrate concepts and principles. The book is rigorous in the sense of being technically sound, but avoids both mathematical proofs and lengthy source-code examples that typically make books inaccessible to general audiences. Knowledge of elementary operating system and networking concepts is helpful, but review sections summarize the essential background. For graduate students, inline exercises and supplemental references provided in per-chapter endnotes provide a bridge to further topics and a springboard to the research literature; for those in industry and government, pointers are provided to helpful surveys and relevant standards, e.g., documents from the Internet Engineering Task Force (IETF), and the U.S. National Institute of Standards and Technology.Information Security and Cryptography,1619-7100Seguretat informàticalemacOrdinadorsDisseny i funcionamentlemacComputer securitySystem safetyComputer organizationElectrical engineeringApplication softwareSystems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Security Science and Technologyhttps://scigraph.springernature.com/ontologies/product-market-codes/P31080Computer Systems Organization and Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13006Communications Engineering, Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/T24035Information Systems Applications (incl. Internet)https://scigraph.springernature.com/ontologies/product-market-codes/I18040Seguretat informàtica.OrdinadorsDisseny i funcionament.Computer security.System safety.Computer organization.Electrical engineering.Application software.Systems and Data Security.Security Science and Technology.Computer Systems Organization and Communication Networks.Communications Engineering, Networks.Information Systems Applications (incl. Internet).005.8005.8Van Oorschot Paul Cauthttp://id.loc.gov/vocabulary/relators/aut62935MiAaPQMiAaPQMiAaPQBOOK9910409671203321Computer security and the Internet2174458UNINA