usa Relación de la causa de Juana María, mulata: esclava, mulata y hechicera: historia inquisitorial de una mujer novohispana del siglo XVIII / edición, Alma Leticia Mejía González By library.mit.edu Published On :: Sun, 4 Aug 2019 07:38:14 EDT Online Resource Full Article
usa A twentieth-century crusade: the Vatican's battle to remake Christian Europe / Giuliana Chamedes By library.mit.edu Published On :: Sun, 17 Nov 2019 06:50:01 EST Online Resource Full Article
usa The accusation: blood libel in an American town / Edward Berenson By library.mit.edu Published On :: Sun, 19 Jan 2020 06:45:35 EST Hayden Library - BM585.2.B47 2019 Full Article
usa Women from the parsonage: pastors' daughters as writers, translators, salonnières, and educators / edited by Cindy K. Renker and Susanne Bach By library.mit.edu Published On :: Sun, 8 Mar 2020 06:48:05 EDT Dewey Library - BV4396.W66 2019 Full Article
usa Neural cell biology / editors, Cheng Wang, Director of Neurotoxicology, National Center for Toxicological Research (NCTR), Food and Drug Administration (FDA), Jefferson, AR, USA, William Slikker, Jr., National Center for Toxicological Research (NCTR), Fo By library.mit.edu Published On :: Sun, 9 Jul 2017 06:23:57 EDT Hayden Library - QP363.2.N47 2017 Full Article
usa Advances in cognitive neurodynamics (VI): proceedings of the sixth International Conference on Cognitive Neurodynamics -- 2017 / José M. Delgado-García, Xiaochuan Pan, Raudel Sánchez-Campusano, Rubin Wang, editors By library.mit.edu Published On :: Sun, 29 Jul 2018 07:36:13 EDT Online Resource Full Article
usa Champions of illusion: the science behind mind-boggling images and mystifying brain puzzles / Susana Martinez-Conde and Stephen Macknik By library.mit.edu Published On :: Sun, 29 Jul 2018 07:36:13 EDT Hayden Library - QP495.M37 2017 Full Article
usa Advances in neuroergonomics and cognitive engineering: proceedings of the AHFE 2018 International Conference on Neuroergonomics and Cognitive Engineering, July 21--25, 2018, Loews Sapphire Falls Resort at Universal Studios, Orlando, Florida USA / Hasan Ay By library.mit.edu Published On :: Sun, 12 Jan 2020 08:09:51 EST Online Resource Full Article
usa How brain arousal mechanisms work: paths toward consciousness / Donald Pfaff By library.mit.edu Published On :: Sun, 23 Feb 2020 09:06:07 EST Hayden Library - QP411.P43 2019 Full Article
usa America is in the heart / Carlos Bulosan ; foreword by Elaine Castillo ; introduction by E. San Juan, Jr. ; selected letters of Carlos Bulosan and suggestions for further exploration by Jeffrey Arellano Cabusao By library.mit.edu Published On :: Sun, 23 Feb 2020 07:00:06 EST Hayden Library - PR9550.9.B8 A8 2019 Full Article
usa Higher Education, Pedagogy and Social Justice [electronic resource] : Politics and Practice / edited by Kelly Freebody, Susan Goodwin, Helen Proctor By prospero.murdoch.edu.au Published On :: Full Article
usa Global Icons : Malala Yousafzai [electronic resource] By prospero.murdoch.edu.au Published On :: Full Article
usa Tens of thousands of Chinese PPE kits fail India safety test By economictimes.indiatimes.com Published On :: 2020-04-16T07:27:55+05:30 India continues to see a shortfall in the availability of personal protection equipment (PPE) for healthcare even as the government significantly ramps up domestic production and some kits from China failed quality tests. Full Article
usa Berlin stories / Robert Walser ; edited by Jochen Greven ; translated from the German by Susan Bernofsky and others ; [with an introduction by Susan Bernofsky] By library.mit.edu Published On :: Sun, 7 Sep 2014 06:24:28 EDT Hayden Library - PT2647.A64 A2 2012 Full Article
usa Emma schweigt / Susanne Scholl By library.mit.edu Published On :: Sun, 12 Oct 2014 06:32:31 EDT Hayden Library - PT2720.O46 E55 2014 Full Article
usa The end of days / Jenny Erpenbeck ; translated by German by Susan Bernofsky By library.mit.edu Published On :: Sun, 8 Mar 2015 06:07:43 EDT Hayden Library - PT2665.R59 A6413 2014 Full Article
usa The metamorphosis: a new translation, texts and contexts, criticism / Franz Kafka ; translated by Susan Bernofsky, Columbia University ; edited by Mark M. Anderson, Columbia University By library.mit.edu Published On :: Sun, 3 Apr 2016 06:15:10 EDT Hayden Library - PT2621.A26 V413 2016 Full Article
usa Kongs grosse Stunde: Chronik des Zusammenhangs / Alexander Kluge By library.mit.edu Published On :: Sun, 10 Dec 2017 06:13:46 EST Hayden Library - PT2671.L84 K66 2015 Full Article
usa Memoirs of a polar bear / Yoko Tawada ; translated from the German by Susan Bernofsky By library.mit.edu Published On :: Sun, 11 Mar 2018 06:22:35 EDT Hayden Library - PT2682.A87 E8813 2016 Full Article
usa The resistible rise of Arturo Ui: adapted by Bruce Norris from a literal translation by Susan Hingley / Bertolt brecht By library.mit.edu Published On :: Sun, 12 Aug 2018 06:42:43 EDT Hayden Library - PT2603.R397 A9513 2013b Full Article
usa Go, went, gone / Jenny Erpenbeck ; translated by Susan Bernofsky By library.mit.edu Published On :: Sun, 19 Aug 2018 06:44:31 EDT Hayden Library - PT2665.R59 G3713 2017 Full Article
usa When I go: selected French poems / Rainer Maria Rilke ; translated with an introduction by Susanne Petermann ; forward by David Rosen By library.mit.edu Published On :: Sun, 19 Aug 2018 06:44:31 EDT Hayden Library - PT2635.I65 A2 2017 Full Article
usa <i>Science</i> and <i>Nature</i> get their social science studies replicated—or not, the mechanisms behind human-induced earthquakes, and the taboo of claiming causality in science By traffic.omny.fm Published On :: Thu, 30 Aug 2018 14:30:00 -0400 A new project out of the Center for Open Science in Charlottesville, Virginia, found that of all the experimental social science papers published in Science and Nature from 2010–15, 62% successfully replicated, even when larger sample sizes were used. What does this say about peer review? Host Sarah Crespi talks with Staff Writer Kelly Servick about how this project stacks up against similar replication efforts, and whether we can achieve similar results by merely asking people to guess whether a study can be replicated. Podcast producer Meagan Cantwell interviews Emily Brodsky of the University of California, Santa Cruz, about her research report examining why earthquakes occur as far as 10 kilometers from wastewater injection and fracking sites. Emily discusses why the well-established mechanism for human-induced earthquakes doesn’t explain this distance, and how these findings may influence where we place injection wells in the future. In this month’s book podcast, Jen Golbeck interviews Judea Pearl and Dana McKenzie, authors of The Book of Why: The New Science of Cause and Effect. They propose that researchers have for too long shied away from claiming causality and provide a road map for bringing cause and effect back into science. This week’s episode was edited by Podigy. Download a transcript of this episode (PDF) Listen to previous podcasts. About the Science Podcast [Image: Jens Lambert, Shutterstock; Music: Jeffrey Cook] Full Article Scientific Community
usa Cloud Computing - CLOUD 2019 : 12th International Conference, held as part of the Services Conference Federation, SCF 2019, San Diego, CA, USA, June 25-30, 2019 ; proceedings / Dilma Da Silva, Qingyang Wang, Liang-Jie Zhang (eds.) By prospero.murdoch.edu.au Published On :: CLOUD (Conference) (12th : 2019 : San Diego, Calif.) Full Article
usa Organization design / edited by John Joseph (University of California, Irvine, USA), Oliver Baumann (University of Southern Denmark, Denmark), Richard Burton (Duke University, USA), Kannan Srikanth (Ohio State University, USA) By library.mit.edu Published On :: Sun, 23 Feb 2020 06:28:52 EST Dewey Library - HD30.28.O72 2019 Full Article
usa The greater good: media, family removal, and TVA dam construction in North Alabama / Laura Beth Daws and Susan L. Brinson By library.mit.edu Published On :: Sun, 26 Apr 2020 06:32:35 EDT Hayden Library - TC557.A2 D39 2019 Full Article
usa Crusade and Jihad : the thousand-year war between the Muslim world and the global north / William R. Polk By prospero.murdoch.edu.au Published On :: Polk, William R. (William Roe), 1929- author Full Article
usa Rome and Jerusalem : the clash of ancient civilizations / Martin Goodman By prospero.murdoch.edu.au Published On :: Goodman, Martin, 1953- author Full Article
usa Ancient Jerusalem revealed : archaeological discoveries, 1998-2018 / editor : Hillel Geva By prospero.murdoch.edu.au Published On :: Full Article
usa In Vitro Plant Breeding Towards Novel Agronomic Traits: Biotic and Abiotic Stress Tolerance / Manoj Kumar, Annamalai Muthusamy, Vivek Kumar, Neera Bhalla-Sarin, editors By library.mit.edu Published On :: Sun, 22 Dec 2019 07:46:07 EST Online Resource Full Article
usa Community ecology / Gary G. Mittelbach, Michigan State University, USA, Brian J. McGill, University of Maine, USA By library.mit.edu Published On :: Sun, 19 Jan 2020 07:42:04 EST Dewey Library - QH541.M526 2019 Full Article
usa Machine learning in aquaculture: hunger classification of Lates Calcarifer / Mohd Azraai Mohd Razman, Anwar P. P. Abdul Majeed, Rabiu Muazu Musa, Zahari Taha, Gian-Antonio Susto, Yukinori Mukai By library.mit.edu Published On :: Sun, 16 Feb 2020 07:32:02 EST Online Resource Full Article
usa The biology of grasslands / Brian J. Wilsey (Iowa State University, Ames, USA) By library.mit.edu Published On :: Sun, 23 Feb 2020 09:06:07 EST Hayden Library - QH541.5.P7 W435 2018 Full Article
usa Usability and Security; Better Together By feedproxy.google.com Published On :: Sun, 22 Dec 2019 12:00:00 +0000 Divya Sasidharan calls into question the trade-offs often made between security and usability. Does a secure interface by necessity need to be hard to use? Or is it the choice we make based on years of habit? Snow has fallen, snow on snow. Security is often synonymous with poor usability. We assume that in order for something to be secure, it needs to by default appear impenetrable to disincentivize potential bad actors. While this premise is true in many instances like in the security of a bank, it relies on a fundamental assumption: that there is no room for choice. With the option to choose, a user almost inevitably picks a more usable system or adapts how they interact with it regardless of how insecure it may be. In the context of the web, passwords are a prime example of such behavior. Though passwords were implemented as a way to drastically reduce the risk of attack, they proved to be marginally effective. In the name of convenience, complex, more secure passwords were shirked in favor of easy to remember ones, and passwords were liberally reused across accounts. This example clearly illustrates that usability and security are not mutually exclusive. Rather, security depends on usability, and it is imperative to get user buy-in in order to properly secure our applications. Security and Usability; a tale of broken trust At its core, security is about fostering trust. In addition to protecting user accounts from malicious attacks, security protocols provide users with the peace of mind that their accounts and personal information is safe. Ironically, that peace of mind is incumbent on users using the security protocols in the first place, which further relies on them accepting that security is needed. With the increased frequency of cyber security threats and data breaches over the last couple of years, users have grown to be less trusting of security experts and their measures. Security experts have equally become less trusting of users, and see them as the “the weakest link in the chain”. This has led to more cumbersome security practices such as mandatory 2FA and constant re-login flows which bottlenecks users from accomplishing essential tasks. Because of this break down in trust, there is a natural inclination to shortcut security altogether. Build a culture of trust not fear Building trust among users requires empowering them to believe that their individual actions have a larger impact on the security of the overall organization. If a user understands that their behavior can put critical resources of an organization at risk, they will more likely behave with security in mind. For this to work, nuance is key. Deeming that every resource needs a similarly high number of checks and balances diminishes how users perceive security and adds unnecessary bottlenecks to user workflows. In order to lay the foundation for good security, it’s worth noting that risk analysis is the bedrock of security design. Instead of blindly implementing standard security measures recommended by the experts, a better approach is to tailor security protocols to meet specific use cases and adapt as much as possible to user workflows. Here are some examples of how to do just that: Risk based authentication Risk based authentication is a powerful way to perform a holistic assessment of the threats facing an organization. Risks occur at the intersection of vulnerability and threat. A high risk account is vulnerable and faces the very real threat of a potential breach. Generally, risk based authentication is about calculating a risk score associated with accounts and determining the proper approach to securing it. It takes into account a combination of the likelihood that that risk will materialize and the impact on the organization should the risk come to pass. With this system, an organization can easily adapt access to resources depending on how critical they are to the business; for instance, internal documentation may not warrant 2FA, while accessing business and financial records may. Dynamically adaptive auth Similar to risk based auth, dynamically adaptive auth adjusts to the current situation. Security can be strengthened and slackened as warranted, depending on how risky the access point is. A user accessing an account from a trusted device in a known location may be deemed low risk and therefore not in need of extra security layers. Likewise, a user exhibiting predictive patterns of use should be granted quick and easy access to resources. The ability to adapt authentication based on the most recent security profile of a user significantly improves the experience by reducing unnecessary friction. Conclusion Historically, security failed to take the user experience into account, putting the onus of securing accounts solely on users. Considering the fate of password security, we can neither rely on users nor stringent security mechanisms to keep our accounts safe. Instead, we should aim for security measures that give users the freedom to bypass them as needed while still protecting our accounts from attack. The fate of secure systems lies in the understanding that security is a process that must constantly adapt to face the shifting landscape of user behavior and potential threats. About the author Divya is a web developer who is passionate about open source and the web. She is currently a developer experience engineer at Netlify, and believes that there is a better workflow for building and deploying sites that doesn’t require a server—ask her about the JAMstack. You will most likely find her in the sunniest spot in the room with a cup of tea in hand. More articles by Divya Full Article UX security
usa Why they marched: untold stories of the women who fought for the right to vote / Susan Ware By library.mit.edu Published On :: Sun, 29 Mar 2020 07:44:51 EDT Dewey Library - JK1896.W37 2019 Full Article
usa New York after 9/11 / Susan Opotow and Zachary Baron Shemtob, editors By library.mit.edu Published On :: Sun, 26 Apr 2020 09:04:30 EDT Rotch Library - HV6432.7.N485 2018 Full Article
usa Vadodara: Thousands affected by floods; Army roped in By archive.indianexpress.com Published On :: Wed, 25 Sep 2013 07:39:09 GMT About 25,000 people from over 114 affected villages have been shifted to safer places. Full Article
usa Ensembles ordonnés finis [electronic resource] : concepts, résultats et usages / by Nathalie Caspard, Bruno Leclerc, Bernard Monjardet By darius.uleth.ca Published On :: Berlin, Heidelberg : Springer Berlin Heidelberg, 2007 Full Article
usa Developments in language theory [electronic resource] : 10th international conference, DLT 2006, Santa Barbara, CA, USA, June 26-29, 2006 : proceedings / Oscar H. Ibarra, Zhe Dang (eds.) By darius.uleth.ca Published On :: Berlin ; New York : Springer, [2006] Full Article
usa Diagrammatic representation and inference [electronic resource] : 4th international conference, Diagrams 2006, Stanford, CA, USA, June 28-30, 2006 : proceedings / Dave Barker-Plummer, Richard Cox, Nik Swoboda (eds.) By darius.uleth.ca Published On :: Berlin ; New York : Springer, [2006] Full Article
usa Effective conservation science : data not dogma / edited by Peter Kareiva (University of California, USA), Michelle Marvier (Santa Clara University, USA), Brian Silliman (Duke University, USA) By prospero.murdoch.edu.au Published On :: Full Article
usa Adaptive food webs : stability and transitions of real and model ecosystems / edited by John C. Moore (Colorado State University, CO, USA), Peter C. de Ruiter (Wageningen Universiteit, The Netherlands), Kevin S. McCann (University of Guelph, ON, Canada), By prospero.murdoch.edu.au Published On :: Full Article
usa Economics and liability for environmental problems / edited by Kathleen Segerson (University of Connecticut, USA) By prospero.murdoch.edu.au Published On :: Full Article
usa Climate change and the UN Security Council / edited by Shirley V. Scott (School of Humanities and Social Sciences, UNSW Canberra, Australia), Charlotte Ku (School of Law, Texas A&M University, USA) By prospero.murdoch.edu.au Published On :: Full Article
usa Environmental assessment on energy and sustainability by data envelopment analysis / Toshiyuki Sueyoshi (New Mexico Institute of Mining and Technology, New Mexico, USA), Mika Gogo (Tokyo Institute of Technology, Tokyo, Japan) By prospero.murdoch.edu.au Published On :: Sueyoshi, T. (Toshiyuki), 1954- author Full Article
usa Global environmental governance and the accountability trap / edited by Susan Park and Teresa Kramarz By prospero.murdoch.edu.au Published On :: Full Article
usa Arsenic metallurgy : proceedings of a symposium sponsored by the Copper, Nickel, Cobalt Committee ... [et al.] of TMS (the Minerals, Metals & Materials Society) held during the TMS 2005 Annual Meeting : San Francisco, California, USA, February 13-17, By prospero.murdoch.edu.au Published On :: Full Article
usa Converter and fire refining practices : proceedings of a symposium held at the 2005 TMS Annual Meeting : San Francisco, California, USA, February 13-17, 2005 / sponsored by the Pyrometallurgy Committee of the Extraction and Processing Division (EPD) of TM By prospero.murdoch.edu.au Published On :: Converter and Fire Refining Practices Symposium (2005 : San Francisco, Calif.) Full Article
usa ALTA 2000 Nickel/Cobalt-6 : SX fundamentals, contactor design & application to Ni/Co processes, Thursday 18th May 2000, Hotel Rendezvous, Perth, Western Australia / Roger Cusack By prospero.murdoch.edu.au Published On :: Full Article
usa International Peirce-Smith converting centennial : held during TMS 2009 annual meeting & exhibition : San Francisco, California, USA : February 15-19, 2009 / edited by Joël Kapusta and Tony Warner By prospero.murdoch.edu.au Published On :: Full Article