A Gift of Fire: Social, Legal, and Ethical Issues for Computers and the Internet


Sara Baase - 1996
    It covers the issues students will face both as members of a technological society and as professionals in computer-related fields. One of its goals is to develop computer professionals who understand the implications of what they create and how it fits into society at large-another is to bring these issues to the attention of students outside of computer science.

Dumbing Us Down: The Hidden Curriculum of Compulsory Schooling


John Taylor Gatto - 1991
    This Special Collector's Edition celebrates 100,000 copies or the book in print, and the book's on-going importance and popularity.

Fundamentals of Clinical Supervision


Janine M. Bernard - 1992
    Due to the overlap of the mental health disciplines and of supervision modalities, the authors have integrated psychology, counseling, marriage and family therapy, and social work contributions into the central themes that dominate the study and practice of clinical supervision. The authors offer a comprehensive look at the supervision relationship that must develop if supervision is to be successful. In doing so, the book serves as a valuable resource for the practitioner as well as the scholar. The authors also address the professional issues of ethical and legal concerns, evaluation, and establishing a productive context for supervision; the practice issues of supervisor training and development; and the research issues affecting both the study and practice of supervision. Appendices offer additional resources. These include materials to assist the readers in training supervisors. They also include selected instruments that might be used by supervision researchers and practitioners. Clinical supervisors.

Assessing Learners with Special Needs: An Applied Approach


Terry Overton - 1991
    Each chapter starts out with a chapter focus that contains CEC Knowledge and Skills Standards that show you what you are expected to master in the chapter. Concepts are presented in a step-by-step manner followed by exercises that help you understand each step. Portions of assessment instruments, protocols, and scoring tables are provided to help you with the practice exercises. Additionally, you will participate in the educational decision-making process using data from classroom observations, curriculum-based assessment, functional behavior assessment, and norm-referenced assessment. New to the seventh edition: An emphasis on progress monitoring, including progress monitoring applied to the acquisition of knowledge and skills presented in this text The assessment process according to the regulations of IDEA 2004 A separate chapter on transition issues and assessment A separate chapter on assessment in infancy and early childhood A new chapter on the measurement aspects of Response to Intervention Increased consideration of students from culturally and linguistically diverse backgrounds in the assessment process

CompTIA Project+ Study Guide Authorized Courseware: Exam PK0–003


Kim Heldman - 2010
    You'll find complete coverage of all exam objectives, including key topics such as project planning, execution, delivery, closure, and others. CompTIA's Project+ is the foundation-level professional exam in the complex world of project management; certified project managers often choose to go on and obtain their Project Management Professional (PMP) certifications as well Provides complete coverage of all exam objectives for CompTIA's first update to the Project+ exam in six years Covers project planning, execution, delivery, change, control, communication, and closure Demonstrates and reinforces exam preparation with practical examples and real-word scenarios Includes a CD with Sybex test engine, practice exams, electronic flashcards, and a PDF of the book Approach the new Project+ exam with confidence with this in-depth study guide! Reviews

Future Shock


Alvin Toffler - 1970
    Examines the effects of rapid industrial and technological changes upon the individual, the family, and society.

Networking for Systems Administrators (IT Mastery Book 5)


Michael W. Lucas - 2015
    Servers give sysadmins a incredible visibility into the network—once they know how to unlock it. Most sysadmins don’t need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you:•How modern networks really work•The essentials of TCP/IP•The next-generation protocol, IPv6•The right tools to diagnose network problems, and how to use them•Troubleshooting everything from the physical wire to DNS•How to see the traffic you send and receive•Connectivity testing•How to communicate with your network team to quickly resolve problemsA systems administrator doesn’t need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one.

Psychology Applied to Teaching


Jack Snowman - 1971
    "Psychology Applied to Teaching "takes complex psychological theories demonstrates how they apply to the everyday experiences of in-service teachers. The Eleventh Edition combines fresh concepts and contemporary research with long standing theory and applications to create a textbook that speaks to today' s teachers and students."New! "Chapter 9: Social Cognitive Theory has been added in response to reviewer suggestions and the many recent developments in cognitive research. No other educational psychology book currently offers a separate chapter on this topic."New! ""Take a Stand!" features give the author an opportunity to spotlight issues such as inclusion, school violence, or high-stakes testing, and encourages debate on critical issues in education. Also accessible on the textbook web site with additional resources and pedagogy and in the Eduspace course with online chats."New! "Coverage of key national standards including PRAXIS and INTASC has been added and referenced throughout the text. A convenient correlation table highlighting text coverage is located on the inside covers for students and professors, with additional suggestions for instructor use in the IRM."Case in Print" exercises in every chapter use recent news articles to demonstrate how basic ideas or techniques are being applied by educators from the primary grades through high school. Each article is followed by several open-ended questions to encourage reflection. This feature can also be found on the textbook Web site."Suggestions for Teaching in YourClassroom" sections include detailed descriptions of how to apply the information and concepts discussed in the chapter to the classroom. These features are intended to be read while the book is used as a text and to serve as a reference for in-service teachers later on.Journal entries help students to prepare and use a Reflective Journal. Entries appear in the margins of the text and encourage readers to consider their own personality, style, and teaching situation in establishing personal guidelines for teaching. A guide for setting up a Reflective Journal is included in Chapter 16--students can use their journals as a reference before and during their teaching experience.Eduspace is a customizable, powerful Interactive platform that provides instructors with text-specific online courses and content in multiple disciplines. Eduspace gives an instructor the ability to create all or part of their course online using the widely recognized tools of Blackboard and quality text-specific content from HMCo. Instructors can quickly and easily assign homework exercises, quizzes, tests, tutorials and supplemental study materials and can modify that content or even add their own.

Black Code: Inside the Battle for Cyberspace


Robert J. Deibert - 2013
    We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain.In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.

Beyond Good and Evil


Friedrich Nietzsche - 1886
    Hollingdale with an introduction by Michael Tanner in Penguin Classics.Beyond Good and Evil confirmed Nietzsche's position as the towering European philosopher of his age. The work dramatically rejects the tradition of Western thought with its notions of truth and God, good and evil. Nietzsche demonstrates that the Christian world is steeped in a false piety and infected with a 'slave morality'. With wit and energy, he turns from this critique to a philosophy that celebrates the present and demands that the individual imposes their own 'will to power' upon the world.This edition includes a commentary on the text by the translator and Michael Tanner's introduction, which explains some of the more abstract passages in Beyond Good and Evil.Frederich Nietzsche (1844-1900) became the chair of classical philology at Basel University at the age of 24 until his bad health forced him to retire in 1879. He divorced himself from society until his final collapse in 1899 when he became insane. A powerfully original thinker, Nietzsche's influence on subsequent writers, such as George Bernard Shaw, D.H. Lawrence, Thomas Mann and Jean-Paul Sartre, was considerable.If you enjoyed Beyond Good and Evil you might like Nietzsche's Thus Spoke Zarathustra, also available in Penguin Classics."One of the greatest books of a very great thinker." —Michael Tanner

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Twitter and Tear Gas: The Power and Fragility of Networked Protest


Zeynep Tufekci - 2017
    An incisive observer, writer, and participant in today’s social movements, Zeynep Tufekci explains in this accessible and compelling book the nuanced trajectories of modern protests—how they form, how they operate differently from past protests, and why they have difficulty persisting in their long-term quests for change.   Tufekci speaks from direct experience, combining on-the-ground interviews with insightful analysis. She describes how the internet helped the Zapatista uprisings in Mexico, the necessity of remote Twitter users to organize medical supplies during Arab Spring, the refusal to use bullhorns in the Occupy Movement that started in New York, and the empowering effect of tear gas in Istanbul’s Gezi Park. These details from life inside social movements complete a moving investigation of authority, technology, and culture—and offer essential insights into the future of governance.From New York Times opinion columnist Zeynep Tufekci, an firsthand account and incisive analysis of the role of social media in modern protest“[Tufekci’s] personal experience in the squares and streets, melded with her scholarly insights on technology and communication platforms, makes [this] such an unusual and illuminating work.”—Carlos Lozada, Washington Post “Twitter and Tear Gas is packed with evidence on how social media has changed social movements, based on rigorous research and placed in historical context.”—Hannah Kuchler, Financial Times

Ten Arguments For Deleting Your Social Media Accounts Right Now


Jaron Lanier - 2018
    In Ten Arguments For Deleting Your Social Media Accounts Right Now Jaron Lanier draws on his insider's expertise to explain precisely how social media works and why its cruel and dangerous effects are at the heart of its current business model and design. As well as offering ten simple arguments for liberating yourself from its addictive hold, his witty and urgent manifesto outlines a vision for an alternative that provides all the benefits of social media without the harm. nicer person in the process.

Data Feminism


Catherine D’Ignazio - 2020
    It has been used to expose injustice, improve health outcomes, and topple governments. But it has also been used to discriminate, police, and surveil. This potential for good, on the one hand, and harm, on the other, makes it essential to ask: Data science by whom? Data science for whom? Data science with whose interests in mind? The narratives around big data and data science are overwhelmingly white, male, and techno-heroic. In Data Feminism, Catherine D'Ignazio and Lauren Klein present a new way of thinking about data science and data ethics—one that is informed by intersectional feminist thought.Illustrating data feminism in action, D'Ignazio and Klein show how challenges to the male/female binary can help challenge other hierarchical (and empirically wrong) classification systems. They explain how, for example, an understanding of emotion can expand our ideas about effective data visualization, and how the concept of invisible labor can expose the significant human efforts required by our automated systems. And they show why the data never, ever “speak for themselves.”Data Feminism offers strategies for data scientists seeking to learn how feminism can help them work toward justice, and for feminists who want to focus their efforts on the growing field of data science. But Data Feminism is about much more than gender. It is about power, about who has it and who doesn't, and about how those differentials of power can be challenged and changed.

Classical Sociological Theory


Craig J. Calhoun - 2002
    It explores the pioneering minds of Marx, Durkheim, and Weber, who developed our modern idea of society; and looks at the powerful influence of the works of early the sociologists Mead, Simmel, Freud, and Du Bois.