LEADER 02938nam 2200577 a 450 001 9910451391503321 005 20200520144314.0 010 $a0-8389-9803-8 035 $a(CKB)1000000000345646 035 $a(EBL)289078 035 $a(OCoLC)476043526 035 $a(SSID)ssj0000165104 035 $a(PQKBManifestationID)11924509 035 $a(PQKBTitleCode)TC0000165104 035 $a(PQKBWorkID)10142909 035 $a(PQKB)11479689 035 $a(MiAaPQ)EBC4713500 035 $a(MiAaPQ)EBC289078 035 $a(Au-PeEL)EBL4713500 035 $a(CaPaEBR)ebr10194725 035 $a(OCoLC)960753219 035 $a(Au-PeEL)EBL289078 035 $a(EXLCZ)991000000000345646 100 $a20050506d2005 uy 0 101 0 $aeng 135 $aur|n|---||||| 181 $ctxt 182 $cc 183 $acr 200 10$aGraphic novels now$b[electronic resource] $ebuilding, managing, and marketing a dynamic collection /$fFrancisca Goldsmith 210 $aChicago $cAmerican Library Association$d2005 215 $a1 online resource (233 p.) 300 $aDescription based upon print version of record. 311 $a0-8389-0904-3 320 $aIncludes bibliographical references and index. 327 $aWhy graphic novels now? : modern readers, modern libraries -- What is the right word for a book that looks like this? : definitions -- What is good? : finding reviews and developing collections -- How can I deal with Pigeons from hell? : maintaining graphic novel collections -- Can readers find your library's graphic novels? : classification and descriptive cataloging -- How does the collection find new readers? : marketing and promotion -- How can you put legs on your graphic novels? : creating programs to get the collection up and walking -- The politics of graphic novels. 330 $aIn 1992, Maus, a graphic novel by Art Spiegelman, won the Pulitzer Prize. The genre has been growing ever since, appealing to the visual-oriented Gen-X and Gen-Y, as well as to reluctant readers, those of all ages seeking alternative viewpoints, and anyone willing to take both image and word into consideration. Graphic Novels Now helps librarians new to the genre with all the key issues related to these unique books. Expert author Francisca Goldsmith shares smart advice, from how to develop a well-rounded collection by finding reviews and reliable publishers and distributors to shelving, catal 606 $aLibraries$xSpecial collections$xGraphic novels 606 $aGraphic novels$zUnited States 608 $aElectronic books. 615 0$aLibraries$xSpecial collections$xGraphic novels. 615 0$aGraphic novels 676 $a025.2/77415973 700 $aGoldsmith$b Francisca$01029309 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910451391503321 996 $aGraphic novels now$92445634 997 $aUNINA LEADER 05750nam 22009015 450 001 9910483688703321 005 20251113184057.0 010 $a3-319-12778-0 024 7 $a10.1007/978-3-319-12778-1 035 $a(CKB)3710000000269713 035 $a(SSID)ssj0001372639 035 $a(PQKBManifestationID)11881979 035 $a(PQKBTitleCode)TC0001372639 035 $a(PQKBWorkID)11310407 035 $a(PQKB)10195923 035 $a(DE-He213)978-3-319-12778-1 035 $a(MiAaPQ)EBC6303657 035 $a(MiAaPQ)EBC5595108 035 $a(Au-PeEL)EBL5595108 035 $a(OCoLC)1076258172 035 $a(PPN)182098001 035 $a(EXLCZ)993710000000269713 100 $a20141021d2014 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aFuture Data and Security Engineering $e1st International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, November 19-21, 2014, Proceedings /$fedited by Tran Khanh Dang, Roland Wagner, Erich J. Neuhold, Makoto Takizawa, Josef Küng, Nam Thoai 205 $a1st ed. 2014. 210 1$aCham :$cSpringer International Publishing :$cImprint: Springer,$d2014. 215 $a1 online resource (XVI, 312 p. 103 illus.) 225 1 $aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v8860 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$a3-319-12777-2 327 $aOn Context- and Sequence-Aware Document Enrichment and Retrieval towards Personalized Recommendations -- Forests of Oblique Decision Stumps for Classifying Very Large Number of Tweets -- Performance Evaluation of a Natural Language Processing Approach Applied in White Collar Crime Investigation -- An Efficient Similarity Search in Large Data Collections with MapReduce -- Memory-Based Multi-pattern Signature Scanning for ClamAV Antivirus -- Constructing Private Indexes on Encrypted Data for Outsourced Databases -- An Extensible Framework for Web Application Vulnerabilities Visualization and Analysis -- A Combination of Negative Selection Algorithm and Artificial Immune Network for Virus Detection -- De-anonymising Set-Generalised Transactions Based on Semantic Relationships -- An Implementation of a Unified Security, Trust and Privacy (STP) Framework for Future Integrated RFID System -- Toward a Nexus Model Supporting the Establishment of Business Process Crowdsourcing -- Link Prediction in Social Networks Based on Local Weighted Paths -- An Architecture Utilizing the Crowd for Building an Anti-virus Knowledge Base -- Two-Way Biometrics-Based Authentication Scheme on Mobile Devices -- Prospective Cryptography in NFC with the Lightweight Block Encryption Algorithm LEA -- Enhance Fuzzy Vault Security Using Nonrandom Chaff Point Generator -- Smart Card Based User Authentication Scheme with Anonymity -- Cloud-Based ERP Solution for Modern Education in Vietnam -- Heuristics for Energy-Aware VM Allocation in HPC Clouds -- Information-Flow Analysis of Hibernate Query Language -- Investigation of Regularization Theory for Four-Class Classification in Brain-Computer Interface -- Enhancing Genetic Algorithm with Cumulative Probabilities to Derive Critical Test Scenarios from Use-Cases -- Towards a Semantic Linked Data Retrieval Model. 330 $aThis book constitutes the refereed proceedings of the First International Conference on Future Data and Security Engineering, FDSE 2014, held in Ho Chi Minh City, Vietnam, in November 2014. The 23 full papers presented were carefully reviewed and selected from 66 submissions. They have been organized in the following topical sections: big data analytics and applications; security and privacy engineering; crowdsourcing and social network data analytics; biometrics and data protection in smart devices; cloud data management and applications; and advances in query processing and optimization. 410 0$aInformation Systems and Applications, incl. Internet/Web, and HCI,$x2946-1642 ;$v8860 606 $aElectronic data processing$xManagement 606 $aData protection 606 $aInformation storage and retrieval systems 606 $aCryptography 606 $aData encryption (Computer science) 606 $aDatabase management 606 $aAlgorithms 606 $aIT Operations 606 $aData and Information Security 606 $aInformation Storage and Retrieval 606 $aCryptology 606 $aDatabase Management 606 $aAlgorithms 615 0$aElectronic data processing$xManagement. 615 0$aData protection. 615 0$aInformation storage and retrieval systems. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aDatabase management. 615 0$aAlgorithms. 615 14$aIT Operations. 615 24$aData and Information Security. 615 24$aInformation Storage and Retrieval. 615 24$aCryptology. 615 24$aDatabase Management. 615 24$aAlgorithms. 676 $a005.8 702 $aDang$b Tran Khanh$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aWagner$b Roland$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aNeuhold$b Erich J$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aTakizawa$b Makoto$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aKüng$b Josef$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aThoai$b Nam$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483688703321 996 $aFuture data and security engineering$91985658 997 $aUNINA