You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Dennis Tedlock presents startling new methods for transcribing, translating, and interpreting oral performance that carry wide implications for all areas of the spoken arts. Moreover, he reveals how the categories and concepts of poetics and hermeneutics based in Western literary traditions cannot be carried over in their entirety to the spoken arts of other cultures but require extensive reevaluation.
High school is usually a rough time, but imagine having to frequently move and join in the middle of the term. Who is Julia really? Why did she have to move so often? Can Julia face the horrifying fate that awaits her?
By casting a wide net for his interviews - from tiny hamlets to bustling Guatemala City - Carey gained insight into more than a single community or a single group of Maya."--BOOK JACKET.
Compelling stories and striking photographs illustrate the challenges and highlights of Latino/a life in Portland, Maine.
This is the true story of how, against all odds, a remote Mexican pueblo built its own autonomous cell phone network—without help from telecom companies or the government. Anthropologist Roberto J. González paints a vivid and nuanced picture of life in a Oaxaca mountain village and the collective tribulation, triumph, and tragedy the community experienced in pursuit of getting connected. In doing so, this book captures the challenges and contradictions facing Mexico's indigenous peoples today, as they struggle to wire themselves into the 21st century using mobile technologies, ingenuity, and sheer determination. It also holds a broader lesson about the great paradox of the digital age, by exploring how constant connection through virtual worlds can hinder our ability to communicate with those around us.
This book covers power systems cybersecurity. In order to enhance overall stability and security in wide-area cyber-physical power systems and defend against cyberattacks, new resilient operation, control, and protection methods are required. The cyberattack-resilient control methods improve overall cybersecurity and stability in normal and abnormal operating conditions. By contrast, cyberattack-resilient protection schemes are important to keep the secure operation of a system under the most severe contingencies and cyberattacks. The main subjects covered in the book are: 1) proposing new tolerant and cyberattack-resilient control and protection methods against cyberattacks for future power systems, 2) suggesting new methods for cyberattack detection and cybersecurity assessment, and 3) focusing on practical issues in modern power systems.
The information infrastructure--comprising computers, embedded devices, networks and software systems--is vital to operations in every sector. Global business and industry, governments, and society itself, cannot function effectively if major components of the critical information infrastructure are degraded, disabled or destroyed. This book contains a selection of 27 edited papers from the First Annual IFIP WG 11.10 International Conference on Critical Infrastructure Protection.
The myth and ceremony of Maya beliefs have been sustained for over five hundred years in spite of massacres, persecution, and discrimination.
Succinctly describes 140 sacred texts, dating from the earliest times to the present, in relation to the cultures that created them.
Capturing the important place and power role that culture plays in the decision-making process of migration, this Handbook looks at human movement outside of a vacuum; taking into account the impact of family relationships, access to resources, and security and insecurity at both the points of origin and destination.