Search Results Heading

MBRLSearchResults

mbrl.module.common.modules.added.book.to.shelf
Title added to your shelf!
View what I already have on My Shelf.
Oops! Something went wrong.
Oops! Something went wrong.
While trying to add the title to your shelf something went wrong :( Kindly try again later!
Are you sure you want to remove the book from the shelf?
Oops! Something went wrong.
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
    Done
    Filters
    Reset
  • Discipline
      Discipline
      Clear All
      Discipline
  • Is Peer Reviewed
      Is Peer Reviewed
      Clear All
      Is Peer Reviewed
  • Reading Level
      Reading Level
      Clear All
      Reading Level
  • Content Type
      Content Type
      Clear All
      Content Type
  • Year
      Year
      Clear All
      From:
      -
      To:
  • More Filters
      More Filters
      Clear All
      More Filters
      Item Type
    • Is Full-Text Available
    • Subject
    • Publisher
    • Source
    • Donor
    • Language
    • Place of Publication
    • Contributors
    • Location
496 result(s) for "Dean, Russell"
Sort by:
Cloud security
\"Cloud computing allows for both large and small organizations to have the opportunity to use Internet-based services so that they can reduce start-up costs, lower capital expenditures, use services on a pay-as-you-use basis, access applications only as needed, and quickly reduce or increase capacities. However, these benefits are accompanied by a myriad of security issues, and this valuable book tackles the most common security challenges that cloud computing faces. The authors offer you years of unparalleled expertise and knowledge as they discuss the extremely challenging topics of data ownership, privacy protections, data mobility, quality of service and service levels, bandwidth costs, data protection, and support
The CEH Prep Guide
The Certified Ethical Hacker program began in 2003 and ensures that IT professionals apply security principles in the context of their daily job scope Presents critical information on footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, and more Discusses key areas such as Web application vulnerabilities, Web-based password cracking techniques, SQL injection, wireless hacking, viruses and worms, physical security, and Linux hacking Contains a CD-ROM that enables readers to prepare for the CEH exam by taking practice tests.
A Qualitative Examination of Teaching Strategies for First-Grade Students Who Are Not Reading at Grade Level
This qualitative research study uses qualitative data to analyze the construct contributing to first-grade regular education students who are reading at below grade level. Helping all students to learn how to read has long been a goal of teachers, school administrators, and parents. However, all students read on different levels. Teachers use the most effective reading intervention to help students who are reading at below grade level. Teachers use different strategies when working with struggling readers. Using reading intervention strategies that work can make a difference in helping struggling readers learn to read. Reading is the foundation for all future learning, so students who cannot read proficiently may find themselves lacking other critical skills later. Reading is not just an issue for individual students who need more support to develop strong reading skills. The qualitative research study addresses the most effective strategies for first-grade regular education students who are not reading at grade level. In this qualitative research study, the researcher used two variables: the independent variable and the method of instruction. The independent variable describes the strategies needed to help first-grade students who are not reading at grade level. The method of instruction focuses on guidance from the teachers. The data for this qualitative research study came from extensive interviews and a survey questionnaire of the ten participants. The participants in this study consist of ten teachers with many years of teaching experience. All these teachers have the knowledge and ability to teach first-grade students the skills to read. The literature review for this qualitative research study came from the theoretical framework, which uses cognitive psychology and educational psychology, and it focuses on why teachers must provide the best reading strategies to support first-grade regular education students who are not reading at grade level.
Using Social Media for Global Security
Essential reading for cybersecurity professionals, security analysts, policy experts, decision-makers, activists, and law enforcement! During the Arab Spring movements, the world witnessed the power of social media to dramatically shape events. Now this timely book shows government decision-makers, security analysts, and activists how to use the social world to improve security locally, nationally, and globally--and cost-effectively. Authored by two technology/behavior/security professionals, Using Social Media for Global Security offers pages of instruction and detail on cutting-edge social media technologies, analyzing social media data, and building crowdsourcing platforms. The book teaches how to collect social media data and analyze it to map the social networks of terrorists and sex traffickers, and forecast attacks and famines. You will learn how to coalesce communities through social media to help catch murderers, coordinate disaster relief, and collect intelligence about drug smuggling from hard-to-reach areas. Also highlighting dramatic case studies drawn from the headlines, this crucial book is a must-read. Illustrates linguistic, correlative, and network analysis of OSINT Examines using crowdsourcing technologies to work and engage with populations globally to solve security problems Explores how to ethically deal with social media data without compromising people's rights to privacy and freedom of expression Shows activists fighting against oppressive regimes how they can protect their identities online If you're responsible for maintaining local, national or global security, you'll want to read Using Social Media for Global Security.
What Really Works? Testing Augmented and Virtual Reality Messaging in Terrestrial Invasive Species Management Communications to Impact Visitor Preferences and Deter Visitor Displacement
Natural resource management is rapidly shifting to incorporate a deeper understanding of ecological processes and functioning, including attention to invasive species. The shift to understand public perceptions of resource management and invasives is much slower. Information influences both landscape preference and behaviors. Theory suggests that increasingly engaging information should have concurrently greater impacts. This research tested the effect of increasingly engaging information on visitor preferences and intentions to return to landscapes treated in response to emerald ash borer (EAB; Agrilus planipennis). Park visitors in a midwestern-U.S. state randomly received one of four messages about forest management in response to EAB (control, photo, augmented reality (AR) and virtual reality (VR)). Messaging impacted preferences for three of the four management approaches, but significant changes in displacement intentions emerged in only one of the four. Specifically, VR and AR increased preferences for complete harvest compared to photos/text, but not differently from those who received no information. VR significantly lowered preferences for select harvest with natural regeneration. The photo/text treatment increased preference for select harvest with planted trees over no information. Any information reduced displacement in response to a photo depicting “select harvest, planted trees.” Subsequently judicious use of advanced communications like VR can optimize increasing scarce resources and maintain or optimize ecological services. Future research directions across geographic and content areas are recommended.
The steady-state orgA specific mRNA levels in Salmonella enterica serovar Typhimurium are repressed by oxygen during logarithmic growth phase but not early-stationary phase
The orgA gene from Salmonella enterica serovar Typhimurium is involved in promoting cellular invasion of the pathogen. Its exact role in virulence is still unclear mainly due to difficulties in understanding its complex regulation. In this study a novel competitive RT-PCR (cRT-PCR) system was developed to measure the steady-state orgA specific mRNA levels in cells under various growth parameters. Previous studies have been inconsistent regarding oxygen regulation of orgA. Using our system we found that oxygen repressed the copy levels 3.5-fold in cells grown only to logarithmic phase. Oxygen repression was not observed in cells grown to early-stationary phase, a parameter that has previously been demonstrated to be the most invasive stage of growth. The importance of NaCl in orgA gene regulation is also illustrated. Significant increases in copy numbers were observed after growth in high NaCl conditions. Measuring the steady-state mRNA levels using cRT-PCR provides an accurate insight into prokaryotic gene regulation prior to translation.