04685nam 22006254a 450 991045615190332120200520144314.00-313-00289-4(CKB)111056486884312(EBL)3000732(OCoLC)55143538(SSID)ssj0000196125(PQKBManifestationID)11180774(PQKBTitleCode)TC0000196125(PQKBWorkID)10143331(PQKB)11021896(MiAaPQ)EBC3000732(Au-PeEL)EBL3000732(CaPaEBR)ebr10020852(EXLCZ)9911105648688431220000628d2001 uy 0engur|n|---|||||txtccrMaking space[electronic resource] merging theory and practice in adult education /edited by Vanessa Sheared and Peggy A. Sissel ; foreword by Phyllis M. CunninghamWestport, CT Bergin & Garvey20011 online resource (375 p.)Description based upon print version of record.0-89789-600-9 Includes bibliographical references and index.Contents; Foreword; Acknowledgments; Part I Deconstructing Exclusion and Inclusion in Adult Education; Chapter 1 Opening the Gates: Reflections on Power, Hegemony, Language, and the Status Quo Peggy A. Sissel and Vanessa Sheared; Chapter 2 Incorporating Postmodernist Perspectives into Adult Education David F. Hemphill; Chapter 3 Challenging Adult Learning: A Feminist Perspective Daniele D. Flannery and Elisabeth Hayes; Chapter 4 Talking about Whiteness: ""Adult Learning Principles"" and the Invisible Norm Sue ShoreChapter 5 An Invisible Presence, Silenced Voices: African Americans in the Adult Education Professoriate Sherwood E. Smith and Scipio A. J. Colin IIIPart II History Revisited and Claimed; Chapter 6 The African- American Market Woman: Her Past, Our Future Cheryl A. Smith; Chapter 7 Creating an Intellectual Basis for Friendship: Practice and Politics in a White Women's Study Group Jane M. Hugo; Chapter 8 Northern Philanthropy's Ideological Influence on African- American Adult Education in the Rural South Bernadine S. ChapmanChapter 9 Struggling to Learn, Learning to Struggle: Workers, Workplace Learning, and the Emergence of Human Resource Development Fred M. SchiedChapter 10 The Role of Adult Education in Workplace Ageism Su- fen Liu and Frances Rees; Part III Classrooms and Communities: Contexts, Questions, and Critiques; Chapter 11 Communities in the Classroom: Critical Reflections on Adult Education in an Appalachian Community Mary Beth Bingman and Connie White with Amelia R. B. Kirby; Chapter 12 Education, Incarceration, and the Marginalization of Women Irene C. BairdChapter 13 Adult Basic Education: Equipped for the Future or for Failure? Donna AmstutzChapter 14 Teaching as Political Practice Ruth Bounous; Part IV Cultural Infusion: Reflections on Identity and Practice; Chapter 15 African- American Women of Inspiration Angela Humphrey Brown; Chapter 16 Through the Eyes of a Latina: Professional Women in Adult Education Rosita Lopez Marcano; Chapter 17 By My Own Eyes: A Story of Learning and Culture Lynette Harper and ""Mira""; Chapter 18 Using Queer Cultural Studies to Transgress Adult Educational Space Andre P. GraceChapter 19 Feminist Perspectives on Adult Education: Constantly Shifting Identities in Constantly Changing Times Elizabeth J. TisdellPart V Reconstructing the Field: Our Personal and Collective Identities; Chapter 20 Between a Rock and a Hard Place: Confronting Who ""We"" Are Merilyn Childs; Chapter 21 Technologies of Learning at Work: Disciplining the Self John Garrick and Nicky Solomon; Chapter 22 The Political Economy of Adult Education: Implications for Practice Jorge JeriaChapter 23 What Does Research, Resistance, and Inclusion Mean for Adult Education Practice? A Reflective Response Vanessa Sheared and Peggy A. SisselAdult educationSocial aspectsUnited StatesDiscrimination in educationUnited StatesCritical pedagogyUnited StatesElectronic books.Adult educationSocial aspectsDiscrimination in educationCritical pedagogy374/.973Sheared Vanessa1956-924814Sissel Peggy A924815MiAaPQMiAaPQMiAaPQBOOK9910456151903321Making space2075784UNINA05702nam 22008055 450 99646585860331620200704080806.03-642-04904-410.1007/978-3-642-04904-0(CKB)1000000000798316(SSID)ssj0000319951(PQKBManifestationID)11233792(PQKBTitleCode)TC0000319951(PQKBWorkID)10343198(PQKB)11725988(DE-He213)978-3-642-04904-0(MiAaPQ)EBC3064708(PPN)139959092(EXLCZ)99100000000079831620100301d2009 u| 0engurnn|008mamaatxtccrSecurity Protocols[electronic resource] 14th International Workshop, Cambridge, UK, March 27-29, 2006, Revised Selected Papers /edited by Bruce Christianson, Bruno Crispo, James A. Malcolm, Michael Roe1st ed. 2009.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2009.1 online resource (IX, 287 p.) Security and Cryptology ;5087Selected conference papers.3-642-04903-6 Includes bibliographical references and index.Putting the Human Back in the Protocol -- Composing Security Metrics -- Putting the Human Back in Voting Protocols -- Putting the Human Back in Voting Protocols -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Towards a Secure Application-Semantic Aware Policy Enforcement Architecture -- Phish and Chips -- Phish and Chips -- Where Next for Formal Methods? -- Where Next for Formal Methods? -- Cordial Security Protocol Programming -- Cordial Security Protocol Programming -- Privacy-Sensitive Congestion Charging -- Privacy-Sensitive Congestion Charging -- The Value of Location Information -- The Value of Location Information -- Update on PIN or Signature -- Innovations for Grid Security from Trusted Computing -- Innovations for Grid Security from Trusted Computing -- The Man-in-the-Middle Defence -- The Man-in-the-Middle Defence -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Using Human Interactive Proofs to Secure Human-Machine Interactions via Untrusted Intermediaries -- Secure Distributed Human Computation -- Secure Distributed Human Computation -- Bot, Cyborg and Automated Turing Test -- Bot, Cyborg and Automated Turing Test -- A 2-Round Anonymous Veto Protocol -- A 2-Round Anonymous Veto Protocol -- How to Speak an Authentication Secret Securely from an Eavesdropper -- How to Speak an Authentication Secret Securely from an Eavesdropper -- Secret Public Key Protocols Revisited -- Secret Public Key Protocols Revisited -- Vintage Bit Cryptography -- Vintage Bit Cryptography -- Usability of Security Management:Defining the Permissions of Guests -- Usability of Security Management: Defining the Permissions of Guests -- The Last Word.This book constitutes the thoroughly refereed post-proceedings of the 14th International Workshop on Security Protocols, held in Cambridge, UK, in March 2006. The 21 revised full papers presented together with edited transcriptions of some of the discussions following the presentations have passed through multiple rounds of reviewing, revision, and selection. Among the topics addressed are authentication, anonymity, cryptographics and biometrics, cryptographic protocols, network security, privacy, SPKI, user-friendliness, access control, API security, costs of security, and others.Security and Cryptology ;5087Data encryption (Computer science)Computer securityComputer communication systemsData structures (Computer science)Computers and civilizationPersonal computersCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Data Structures and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15009Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Personal Computinghttps://scigraph.springernature.com/ontologies/product-market-codes/I24083Data encryption (Computer science).Computer security.Computer communication systems.Data structures (Computer science).Computers and civilization.Personal computers.Cryptology.Systems and Data Security.Computer Communication Networks.Data Structures and Information Theory.Computers and Society.Personal Computing.005.8Christianson Bruceedthttp://id.loc.gov/vocabulary/relators/edtCrispo Brunoedthttp://id.loc.gov/vocabulary/relators/edtMalcolm James Aedthttp://id.loc.gov/vocabulary/relators/edtRoe Michaeledthttp://id.loc.gov/vocabulary/relators/edtInternational Workshop on Security ProtocolsBOOK996465858603316Security Protocols772025UNISA