This important new book will help librarians make better reference decisions, aligned to customer needs and expectations, especially significant with today’s limited budgets.
Access and reference services are central to engaging with historical resources. As more people encounter archives for scholarly and avocational research, as part of creative pursuits, or to exercise their rights as citizens to access records, the possibilities for how collections are used will continue to evolve. Archivists need to be familiar with who their users are, understand why they're using archival collections, and engage in outreach so that they can provide excellent reference services. Reference and Access for Archives and Manuscripts outlines the various components of: providing physical, intellectual, and virtual access, acquiring reference knowledge and skills, navigating legal regulations and ethics, and designing use policies and effective outreach. Cheryl Oestreicher contextualizes how all of these components fit within other archival functions and offers strategies and detailed practices for creating comprehensive reference programs that archivists can adapt for any type of institution. Both new and experienced archivists will find Reference and Access for Archives and Manuscripts a solid foundation on which to add their own ideas for how to bring people into the archives as well as bring archives to the people. Readers are encouraged to examine these concepts and practices in conversation with others and to consider how archivists can continue to advance reference and access.
C is one of the oldest programming languages and still one of the most widely used. Whether you're an experienced C programmer or you're new to the language, you know how frustrating it can be to hunt through hundreds of pages in your reference books to find that bit of information on a certain function, type or other syntax element. Or even worse, you may not have your books with you. Your answer is the C Pocket Reference. Concise and easy to use, this handy pocket guide to C is a must-have quick reference for any C programmer. It's the only C reference that fits in your pocket and is an excellent companion to O'Reilly's other C books.Ideal as an introduction for beginners and a quick reference for advanced programmers, the C Pocket Reference consists of two parts: a compact description of the C language and a thematically structured reference to the standard library. The representation of the language is based on the ANSI standard and includes extensions introduced in 1999. An index is included to help you quickly find the information you need.This small book covers the following: C language fundamentals Data types Expressions and operators C statements Declarations Functions Preprocessor directives The standard library O'Reilly's Pocket References have become a favorite among programmers everywhere. By providing a wealth of important details in a concise, well-organized format, these handy books deliver just what you need to complete the task at hand. When you've reached a sticking point in your work and need to get to a solution quickly, the new C Pocket Reference is the book you'll want to have.
The protection of sensitive information against unauthorized access or fraudulent changes has been of prime concern throughout the centuries. Modern communication techniques, using computers connected through networks, make all data even more vulnerable for these threats. Also, new issues have come up that were not relevant before, e. g. how to add a (digital) signature to an electronic document in such a way that the signer can not deny later on that the document was signed by him/her. Cryptology addresses the above issues. It is at the foundation of all information security. The techniques employed to this end have become increasingly mathematical of nature. This book serves as an introduction to modern cryptographic methods. After a brief survey of classical cryptosystems, it concentrates on three main areas. First of all, stream ciphers and block ciphers are discussed. These systems have extremely fast implementations, but sender and receiver have to share a secret key. Public key cryptosystems (the second main area) make it possible to protect data without a prearranged key. Their security is based on intractable mathematical problems, like the factorization of large numbers. The remaining chapters cover a variety of topics, such as zero-knowledge proofs, secret sharing schemes and authentication codes. Two appendices explain all mathematical prerequisites in great detail. One is on elementary number theory (Euclid's Algorithm, the Chinese Remainder Theorem, quadratic residues, inversion formulas, and continued fractions). The other appendix gives a thorough introduction to finite fields and their algebraic structure.
Metadata is used to organize and access information in an effective way. This is a comprehensive description of the various forms of metadata, its applications, and how librarians can use it. Both descriptive and nondescriptive forms of metadata are defined and applied to library functions.
This classic reference, now updated with the newest applications and results, addresses the fundamentals of such trials based on sound scientific methodology, statistical principles, and years of accumulated experience by the three authors.