Metadata


Jeffrey Pomerantz - 2015
    When "metadata" became breaking news, appearing in stories about surveillance by the National Security Agency, many members of the public encountered this once-obscure term from information science for the first time. Should people be reassured that the NSA was "only" collecting metadata about phone calls--information about the caller, the recipient, the time, the duration, the location--and not recordings of the conversations themselves? Or does phone call metadata reveal more than it seems? In this book, Jeffrey Pomerantz offers an accessible and concise introduction to metadata.In the era of ubiquitous computing, metadata has become infrastructural, like the electrical grid or the highway system. We interact with it or generate it every day. It is not, Pomerantz tell us, just "data about data." It is a means by which the complexity of an object is represented in a simpler form. For example, the title, the author, and the cover art are metadata about a book. When metadata does its job well, it fades into the background; everyone (except perhaps the NSA) takes it for granted.Pomerantz explains what metadata is, and why it exists. He distinguishes among different types of metadata--descriptive, administrative, structural, preservation, and use--and examines different users and uses of each type. He discusses the technologies that make modern metadata possible, and he speculates about metadata's future. By the end of the book, readers will see metadata everywhere. Because, Pomerantz warns us, it's metadata's world, and we are just living in it.

Medical Microbiology [with Student Consult Online Access]


Patrick R. Murray - 1990
    Murray's best-selling book "the most colorful and fun text to read in medical microbiology." Now it's back in an updated New Edition-and it's as succinct, user-friendly, and authoritative as ever. Readers will continue to enjoy its lucid discussions of how microbes cause disease in humans. Expert coverage of basic principles, the immune response, laboratory diagnosis, bacteriology, virology, mycology, and parasitology ensures they understand all the facts vital to the practice of medicine today. More than 550 brilliant full-color images make complex information easy to understand and illustrate the appearance of disease.The smart way to study!Elsevier titles with STUDENT CONSULT will help you master difficult concepts and study more efficiently in print and online! Perform rapid searches. Integrate bonus content from other disciplines. Download text to your handheld device. And a lot more. Each STUDENT CONSULT title comes with full text online, a unique image library, case studies, USMLE style questions, and online note-taking to enhance your learning experience.

CISSP Study Guide


Eric Conrad - 2010
    The exam is designed to ensure that someone who is handling computer security in a company has a standardized body of knowledge. The book is composed of 10 domains of the Common Body of Knowledge. In each section, it defines each domain. It also provides tips on how to prepare for the exam and take the exam. It also contains CISSP practice quizzes to test ones knowledge. The first domain provides information about risk analysis and mitigation. It also discusses security governance. The second domain discusses different techniques for access control, which is the basis for all the security disciplines. The third domain explains the concepts behind cryptography, which is a secure way of communicating that is understood only by certain recipients. Domain 5 discusses security system design, which is fundamental for operating the system and software security components. Domain 6 is a critical domain in the Common Body of Knowledge, the Business Continuity Planning, and Disaster Recovery Planning. It is the final control against extreme events such as injury, loss of life, or failure of an organization. Domains 7, 8, and 9 discuss telecommunications and network security, application development security, and the operations domain, respectively. Domain 10 focuses on the major legal systems that provide a framework in determining the laws about information system.

Structure & Function of the Body


Gary A. Thibodeau - 1900
    This book includes a companion CD-ROM that adds a visual emphasis with animations.

Introduction to Genetic Analysis


Anthony J.F. Griffiths - 1900
    Carroll, a recognized leader in the field of evolutionary development, to this new edition of Introduction to Genetic Analysis (IGA). The authors’ ambitious new plans for this edition focus on showing how genetics is practiced today. In particular, the new edition renews its emphasis on how genetic analysis can be a powerful tool for answering biological questions of all types.

Java: How to Program


Harvey Deitel - 1996
    The Deitels' groundbreaking How to Program series offers unparalleled breadth and depth of programming concepts and intermediate-level topics for further study. The texts in the series feature hundreds of complete, working programs with thousands of lines of code--more than any other texts of their kind. Now, the world's best-selling Java textbook is again completely up-to- date with The Java 2 Platform Standard Edition (J2SE) 5.0.

Action Research


Ernest T. Stringer - 1996
    Updated web links and expanded appendices provide cutting edge information on action research along with new case studies and examples.

The Practice of Public Relations


Fraser P. Seitel - 1980
    Unlike other PR texts that steer clear of the cases, the ethical challenges, the how to counsel, and the public relations conundrums that force students to think, this book prepares students to deal with a full range of situations and arrive at effective, ethical solutions that distinguish the practice.

The Elements of Moral Philosophy


James Rachels - 2003
    To illustrate the various theories, and to reveal their implications, important current issues such as abortion, euthanasia, the treatment of nonhuman animals, racial discrimination, and nuclear weapons are discussed in depth.

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

Probability And Statistics For Engineering And The Sciences


Jay L. Devore - 1982
    In this book, a wealth of exercises are provided throughout each section, designed to reinforce learning and the logical comprehension of topics. The use of real data is incorporated much more extensively than in any other book on the market. Consist of strong coverage of computer-based methods, especially in the coverage of analysis of variance and regression. This text stresses mastery of methods most often used in medical research, with specific reference to actual medical literature and actual medical research. The approach minimizes mathematical formulation, yet gives complete explanations of all important concepts. Every new concept is systematically developed through completely worked-out examples from current medical research problems. Computer output is used to illustrate concepts when appropriate.

Publication Manual of the American Psychological Association(r)


American Psychological Association - 1952
    With millions of copies sold, the Publication Manual of the American Psychological Association is the style manual of choice for writers, editors, students, educators, and professionals in psychology, sociology, business, economics, nursing, social work, and justice administration, and other disciplines in which effective communication with words and data is fundamental.In addition to providing clear guidance on grammar, the mechanics of writing, and APA style, the Publication Manual offers an authoritative and easy-to-use reference and citation system and comprehensive coverage of the treatment of numbers, metrication, statistical and mathematical data, tables, and figures for use in writing, reports, or presentations. The new edition has been revised and updated to include: The latest guidelines and examples for referencing electronic and online sources New and revised guidelines for submitting papers electronically Improved guidelines for avoiding plagiarism Simplified formatting guidelines for writers using up-to-date word-processing software All new guidelines for presenting case studies Improved guidelines for the construction of tables Updates on copyright and permissions issues for writers New reference examples for audiovisual media and patents An expanded and improved index for quick and easy access Writers, scholars, and professionals will also find: New guidelines on how to choose text, tables, or figures to present data Guidelines for writing cover letters for submitting articles for publication, plus a sample letter Expanded guidelines on the retention of raw data New advice on establishing written agreements for the use of shared data New information on the responsibilities of co-authors New and experienced readers alike will find the 5th Edition a complete resource for writing, presenting, or publishing with clarity and persuasiveness.Approximately 400 pages

Essentials of Sociology: A Down-to-Earth Approach


James M. Henslin - 1991
    This text is a brief version of the highly regarded hardcover introductory text, "Sociology: A Down-to-Earth Approach, 7/e." The essential 15 chapters cover all of the topics in the 22-chapter text, and retain the dual emphases on micro and macro (individual and structural) sociology. James Henslin has a unique ability to engage students without talking down to them or sacrificing content. With wit, personal reflection, and illuminating examples, he shares with readers a passion for sociology unmatched by any other introductory text.

You May Ask Yourself: An Introduction to Thinking Like a Sociologist


Dalton Conley - 2008
    

Principles of Information Security


Michael E. Whitman - 2002
    Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.