Morrison's Sound-it-out Speller


Book Description

Guide to finding words when you do not know how to spell them. Users simply look up the word by its pronunciation (without the vowels).




Religion and American Cultures [4 volumes]


Book Description

This four-volume work provides a detailed, multicultural survey of established as well as "new" American religions and investigates the fascinating interactions between religion and ethnicity, gender, politics, regionalism, ethics, and popular culture. This revised and expanded edition of Religion and American Cultures: Tradition, Diversity, and Popular Expression presents more than 140 essays that address contemporary spiritual practice and culture with a historical perspective. The entries cover virtually every religion in modern-day America as well as the role of religion in various aspects of U.S. culture. Readers will discover that Americans aren't largely Protestant, Catholic, or Jewish anymore, and that the number of popular religious identities is far greater than many would imagine. And although most Americans believe in a higher power, the fastest growing identity in the United States is the "nones"—those Americans who elect "none" when asked about their religious identity—thereby demonstrating how many individuals see their spirituality as something not easily defined or categorized. The first volume explores America's multicultural communities and their religious practices, covering the range of different religions among Anglo-Americans and Euro-Americans as well as spirituality among Latino, African American, Native American, and Asian American communities. The second volume focuses on cultural aspects of religions, addressing topics such as film, Generation X, public sacred spaces, sexuality, and new religious expressions. The new third volume expands the range of topics covered with in-depth essays on additional topics such as interfaith families, religion in prisons, belief in the paranormal, and religion after September 11, 2001. The fourth volume is devoted to complementary primary source documents.







Soil Survey


Book Description




Engineering Human Computer Interaction and Interactive Systems


Book Description

As its name suggests, the EHCI-DSVIS conference has been a special event, merging two different, although overlapping, research communities: EHCI (Engineering for Human-Computer Interaction) is a conference organized by the IFIP 2.7/13.4 working group, started in 1974 and held every three years since 1989. The group’s activity is the scientific investigation of the relationships among the human factors in computing and software engineering. DSVIS (Design, Specification and Verification of Interactive Systems) is an annual conference started in 1994, and dedicated to the use of formal methods for the design of interactive systems. Of course these two research domains have a lot in common, and are informed by each other’s results. The year 2004 was a good opportunity to bring closer these two research communities for an event, the 11th edition of DSVIS and the 9th edition of EHCI. EHCI-DSVIS was set up as a working conference bringing together researchers and practitioners interested in strengthening the scientific foundations of user interface design, specification and verification, and in examining the relationships between software engineering and human-computer interaction. The call for papers attracted a lot of attention, and we received a record number of submissions: out of the 65 submissions, 23 full papers were accepted, which gives an acceptance rate of approximately 34%. Three short papers were also included. The contributions were categorized in 8 chapters: Chapter 1 (Usability and Software Architecture) contains three contributions which advance the state of the art in usability approaches for modern software engineering.




HTTP Developer's Handbook


Book Description

HTTP is the protocol that powers the Web. As Web applications become more sophisticated, and as emerging technologies continue to rely heavily on HTTP, understanding this protocol is becoming more and more essential for professional Web developers. By learning HTTP protocol, Web developers gain a deeper understanding of the Web's architecture and can create even better Web applications that are more reliable, faster, and more secure. The HTTP Developer's Handbook is written specifically for Web developers. It begins by introducing the protocol and explaining it in a straightforward manner. It then illustrates how to leverage this information to improve applications. Extensive information and examples are given covering a wide variety of issues, such as state and session management, caching, SSL, software architecture, and application security.







Healing Personal Psychology


Book Description

The "mental health" professions are responsible for creating and maintaining a folie a deux or shared public delusion that their intention is to heal. On close inspection, we see that the primary function of "mental health" professionals is to serve as moral arbiters of human behavior. The legislature has granted clinical psychology and psychiatry the legal rights to define certain behaviors as "mental illness." Behaviors are defined as "mental illness," by morally tinged personal (clinical) opinion. Cleverly hidden from the public, is the fact that the concept of "mental illness" has never been established by rigorous science to qualify as an "illness" or disease. The concept of "mental illness" continues to be created or invented by selected moral judgments and committee discussions, not science. Healing Personal Psychology presents an historical line of development of psychology and psychiatry from its roots in 19th Century German authoritarianism and oppression to the present state of the field, where little has changed. The clinical gaze is the bedrock of the professions. Therein lies the failure of the "mental health" professions to effectively heal. Mainstream clinical psychology and psychiatry, by their very natures, engage in some of the most repressive practices in modern society. Supporting the thesis of this failure with factual references, we are taken on an experiential journey through the system to see the devastation "mental health" treatment has caused by the creation of disease, including central nervous system, motor neuron, and organ diseases, found in different studies to range between 10%-75% of all those treated. Not to mention the personal ruin caused for millions of people every year, by effectively eliminating their freedom of choice to engage in a pleasurable life existence. Strategic change exercises, effective in healing a range of serious difficulties, are presented as a solution to this devastation. Valuable resources for healing from surprising sources are illustrated, with references for daily practice. The author brings more than 30 years of experience to bear in pointing towards a healthy way out. This book can be utilized by professionals and the public, both as an instructive textbook on alternative healing approaches for psychosis, depression, anxiety, fears, phobias, obsessive or compulsive behaviors, trauma or post-traumatic related difficulties, and as a resource that documents the system of oppression and inconsistent level of competence in the clinical psychology and psychiatry professions.




Google Hacking for Penetration Testers


Book Description

This book helps people find sensitive information on the Web. Google is one of the 5 most popular sites on the internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and “self-police their own organizations. Readers will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with MySpace, LinkedIn, and more for passive reconaissance. • Learn Google Searching Basics Explore Google’s Web-based Interface, build Google queries, and work with Google URLs. • Use Advanced Operators to Perform Advanced Queries Combine advanced operators and learn about colliding operators and bad search-fu. • Learn the Ways of the Google Hacker See how to use caches for anonymity and review directory listings and traversal techniques. • Review Document Grinding and Database Digging See the ways to use Google to locate documents and then search within the documents to locate information. • Understand Google’s Part in an Information Collection Framework Learn the principles of automating searches and the applications of data mining. • Locate Exploits and Finding Targets Locate exploit code and then vulnerable targets. • See Ten Simple Security Searches Learn a few searches that give good results just about every time and are good for a security assessment. • Track Down Web Servers Locate and profile web servers, login portals, network hardware and utilities. • See How Bad Guys Troll for Data Find ways to search for usernames, passwords, credit card numbers, social security numbers, and other juicy information. • Hack Google Services Learn more about the AJAX Search API, Calendar, Blogger, Blog Search, and more.




Alien Policy in Belgium, 1840-1940


Book Description

Belgium has a unique place in the history of migration in that it was the first among industrialized nations in Continental Europe to develop into an immigrant society. In the nineteenth century Italians, Jews, Poles, Czechs, and North Africans settled in Belgium to work in industry and commerce. They were followed by Russians in the 1920s and Germans in the 1930s who were seeking a safe haven from persecution by totalitarian regimes. In the nineteenth century immigrants were to a larger extent integrated into Belgian society: they were denied political rights but participated on equal terms with Belgians in social life. This changed radically in the twentieth century; by 1940 the rights of aliens were severely curtailed, while those of Belgian citizens, in particular in the social domain, were extended. While the state evolved into a "welfare state" for its citizens it became more of a police state for immigrants. The state only tolerated immigrants who were prepared to carry out those jobs that were shunned by the Belgians. Under the pressure of public opinion, an exception was made in the cases of thousands of Jewish refugees that had fled from Nazi Germany. However, other immigrants were subjected to harsh regulations and in fact became the outcasts of twentieth-century Belgian liberal society. This remarkable study examines in depth and over a long time span how (anti-) alien policies were transformed, resulting in an illiberal exclusion of foreigners at the same time as democratization and the welfare state expanded. In this respect Belgium is certainly not unique but offers an interesting case study of developments that are characteristic for Europe as a whole.