You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A report from the front lines of higher education and technology that chronicles efforts to transform teaching, learning, and opportunity. Colleges and universities have become increasingly costly, and, except for a handful of highly selective, elite institutions, unresponsive to twenty-first-century needs. But for the past few years, technology-fueled innovation has begun to transform higher education, introducing new ways to disseminate knowledge and better ways to learn—all at lower cost. In this impassioned account, Richard DeMillo tells the behind-the-scenes story of these pioneering efforts and offers a roadmap for transforming higher education. Building on his earlier book, Abelard ...
How institutions of higher learning can rescue themselves from irrelevance and marginalization in the age of iTunes U and YouTube EDU. The vast majority of American college students attend two thousand or so private and public institutions that might be described as the Middle—reputable educational institutions, but not considered equal to the elite and entrenched upper echelon of the Ivy League and other prestigious schools. Richard DeMillo has a warning for these colleges and universities in the Middle: If you do not change, you are heading for irrelevance and marginalization. In Abelard to Apple, DeMillo argues that these institutions, clinging precariously to a centuries-old model of h...
A guide to both theory and practice of blended learning offering rigorous research, case studies, and methods for the assessment of educational effectiveness. Blended learning combines traditional in-person learning with technology-enabled education. Its pedagogical aim is to merge the scale, asynchrony, and flexibility of online learning with the benefits of the traditional classroom—content-rich instruction and the development of learning relationships. This book offers a guide to both theory and practice of blended learning, offering rigorous research, case studies, and methods for the assessment of educational effectiveness. The contributors to this volume adopt a range of approaches t...
Data base security; Encryption as a security mechanism; Design-oriented models of operating system security; Theoretical models of operating system security.
? DoesP=NP. In just ?ve symbols Dick Karp –in 1972–captured one of the deepest and most important questions of all time. When he ?rst wrote his famous paper, I think it’s fair to say he did not know the depth and importance of his question. Now over three decades later, we know P=NP is central to our understanding of compu- tion, it is a very hard problem, and its resolution will have potentially tremendous consequences. This book is a collection of some of the most popular posts from my blog— Godel ̈ Lost Letter andP=NP—which I started in early 2009. The main thrust of the blog, especially when I started, was to explore various aspects of computational complexity around the famousP=NP question. As I published posts I branched out and covered additional material, sometimes a timely event, sometimes a fun idea, sometimes a new result, and sometimes an old result. I have always tried to make the posts readable by a wide audience, and I believe I have succeeded in doing this.
Extensively class-tested, this textbook takes an innovative approach to software testing: it defines testing as the process of applying a few well-defined, general-purpose test criteria to a structure or model of the software. It incorporates the latest innovations in testing, including techniques to test modern types of software such as OO, web applications, and embedded software. The book contains numerous examples throughout. An instructor's solution manual, PowerPoint slides, sample syllabi, additional examples and updates, testing tools for students, and example software programs in Java are available on an extensive website.
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
For many of us, the presidential election of 2000 was a wake-up call. The controversy following the vote count led to demands for election reform. But the new voting systems that were subsequently introduced to the market have serious security flaws, and many are confusing and difficult to use. Moreover, legislation has not kept up with the constantly evolving voting technology, leaving little to no legal recourse when votes are improperly counted. How did we come to acquire the complex technology we now depend on to count votes? Douglas Jones and Barbara Simons probe this question, along with public policy and regulatory issues raised by our voting technologies. Broken Ballots is a thorough and incisive analysis of the current voting climate that approaches American elections from technological, legal, and historical perspectives. The authors examine the ways in which Americans vote today, gauging how inaccurate, unreliable, and insecure our voting systems are. An important book for election administrators, political scientists, and students of government and technology policy, Broken Ballots is also a vital tool for any voting American.
Most aspects of our private and social lives—our safety, the integrity of the financial system, the functioning of utilities and other services, and national security—now depend on computing. But how can we know that this computing is trustworthy? In Mechanizing Proof, Donald MacKenzie addresses this key issue by investigating the interrelations of computing, risk, and mathematical proof over the last half century from the perspectives of history and sociology. His discussion draws on the technical literature of computer science and artificial intelligence and on extensive interviews with participants. MacKenzie argues that our culture now contains two ideals of proof: proof as tradition...
Is the end in sight for college tuition hikes? Tuition and fees at public colleges and universities consistently have risen twice or even three times as fast as comparable increases in the Consumer Price Index in recent years. Since 2000 these costs have even grown 60 percent faster than health care costs. The results have been rapidly rising student debt (now $1.4 trillion nationally), rising delinquencies in debt repayment, and a dysfunctional stratification of public college student bodies on the basis of family incomes. This is a broken, unsustainable model for the majority of public colleges. Why has this occurred? The multiple causes include declining state support, the avaricious beha...