Description : In a remote location within North Carolina's Fort Bragg, an ultra-secret American women's military unit--codename, The Athena Project--trains for some of the world's most dangerous international anti-terrorism assignments.
Description : A hands-on account of the design, implementation, and performance of Project Athena. Based on thousands of pages of reports and the author's own experience, this important book lets you in on the design, implementation, and performance of Project Athena - now a production system of networked workstations that is replacing time-sharing (which MIT also pioneered) as the preferred model of computing at MIT. The book is organized in four parts, covering management, pedagogy, technology, and administration. Appendixes describe deployment of Project Athena systems at five other schools, provide guidelines for installation, and recommend end-user policies.
Description : In this definitive assessment of the various representations and approaches to Athena, Susan Deacy does what no other has done before and brings all the aspects of this legendary figure into one, outstanding study. A survey of one of the most enduringly popular of ancient deities, the book introduces Athena’s myth, cult and reception, while directing the reader to detailed discussion as and when it is appropriate. Students will find it a great help in their studies, and for the general reader with an interest in the ancient world and for those from related disciplines such as literature, art history and religion, it provides a mine of information and insight into this fascinating classical figure.
Description : This book is the first to ask whether there is a specifically European dimension to certain major issues in Women's Studies. It strives to create a synergetic debate among different disciplines and cultural traditions in Europe, and, in doing so, fills some gaps in our knowledge about women and enriches debates hitherto dominated by Anglo-American influences.Among the new areas of enquiry opened up in this book by the specificities of European Women's Studies are:* The fact that Europe has repeatedly experienced warfare on its own territory which has impacted significantly on women. Hence the focus in this volume on women and militarism, and on ethnic cleansing as an attack on the family. * The abidingly problematic relationship between feminism and anti-semitism, and issues of migration and 'whiteness' in a context where racism reflects the colonial histories of particular European countries.* The importance of passion and the emotions, as well as psychoanalytical theory, for politics particularly in Southern and Eastern European countries.* Current problems facing Europe, including the decline of the welfare state, the phenomenon of the 'single' woman, and the relationship between women's rights and human rights.* The diverse faces of feminist movements in particular European countries.Reading feminism from a European perspective will enable readers to reflect upon the ways in which changes in political, social and cultural positions and practices over the past century in Europe have impacted on feminist thinking and theorizing. The volume raises important issues about the transfer of feminist concepts across cultures and languages. And to English-speaking audiences the volume also offers fresh viewpoints on some of the key debates in Women's Studies.
Description : An elegant hardcover boxed set including The Athena Project, Full Black, and Black List, from #1 New York Times bestselling author Brad Thor. “[Brad Thor] and Harvath are the real deal, and you should accept no substitutes.” —BookReporter.com Both a must-have for any fan of Brad Thor and the perfect introduction to his masterful thrillers, this handsomely bound edition is one of four special Collector’s Editions, available now. Follow counterterrorism operative and ex-SEAL Scot Harvath’s action-packed exploits, and discover why Brad Thor has been called “America’s favorite author” (KKTX). THE ATHENA PROJECT When a terrorist attack in Rome kills more than twenty Americans, four of Delta Force’s best and brightest women—part of a top-secret program codenamed the Athena Project—are tasked with hunting down a Venetian arms dealer. But as team members Gretchen Casey, Julie Ericsson, Megan Rhodes, and Alex Cooper close in on their target, the deadly assignment unearths a grisly discovery in the jungles of South America . . . and a foreign spy penetrating a mysterious secret hidden in the American West. With an unthinkable second attack already set in motion, the women of the Athena Project race to uncover the greatest of threats: the secrets kept by their own government. FULL BLACK Born in the shadows and kept from heads of state, some missions are so deadly, so sensitive, that they simply don’t exist. When one such mission goes horribly wrong, only former Navy SEAL Team 6 member turned covert counterterrorism operative Scot Harvath can carry out an audacious plan to prevent the United States from facing complete and total collapse. But as the identities of the perpetrators are laid bare, Harvath will be left with only one means to save America. Unable to trust anyone, he will be forced to go full black. BLACK LIST Somewhere…deep inside the United States government is a closely guarded list. Once your name is on the list, it doesn’t come off…until you’re dead. Someone…has just added counterterrorism operative Scot Harvath’s name. Somehow…Harvath must evade assassination long enough to untangle who has targeted him and why. Somewhere, someone, somehow…can put all the pieces together. But Harvath must get to that person before the United States suffers the most withering terrorist attack ever conceived.
Description : This collection of essays continues Barrett's investigations into implementingnetworked online systems described in his first book Text, ConText, and HyperText, with a morefocused emphasis on specific hypermedia systems. In four parts the 22 essays take up designinghypertext and hypermedia systems for the online user; textual intervention and collaboration; newroles for writers; and sensemaking and learning in the online environment.In his introduction,Barrett analyzes the design of networked online systems as part of a collaborative process,asserting that the online environment fosters collaboration by using computer technology to supportinteraction among those who design, use, and write software.The first five essays present agenealogy of hypertext development, assess various hypertext designs, discuss users' wants andneeds, and analyze the "rhetoric" of hypertext applications in light of new models for computerhuman interaction. Seven essays then take up new, important online systems for informationretrieval, document production, and training in the online environment. Included are a first timefull scale analysis of the Athena Muse hypermedia system developed at MIT, the hypertext environmentIntermedia, developed at Brown, the University of Maryland's Hyperties, and the Educational OnlineSystem for document production and training technical writers, now in its second year of use atMIT.New roles for writers and productivity gains provided by online environments are the subject ofthe next six essays. The final four essays discuss instructional efficiency and the failures ofinstructional materials. Novel proposals are described for addressing the needs and strategies oflearners, for supporting cooperative work in creating, revising, and testing a software program, forevaluating online help systems, and for eliminating ambiguity in online text.Edward Barrett isLecturer in the Writing Program at MIT. The Society of Text is included in the Information Systemsseries, edited by Michael Lesk.
Description : This pioneering guide to Internet and intranet security is the first to cover all of the relevant technologies in one comprehensive reference, and enhances the ability to create and deploy secure architectures. It gives users the knowledge needed for improved productivity, whether setting up commerce on line, assembling a firewall, or selecting access controls and cryptographic protocols to secure TCP/IP-based networks.
Description : The techniques of natural language processing (NLP) have been widely applied in machine translation and automated message understanding, but have only recently been utilized in second language teaching. This book offers both an argument for and a critical examination of this new application, with an examination of how systems may be designed to exploit the power of NLP, accomodate its limitations, and minimize its risks. This volume marks the first collection of work in the U.S. and Canada that incorporates advanced human language technologies into language tutoring systems, covering languages as diverse as Arabic, Spanish, Japanese, and English. The book is organized into sections that express the levels of analysis dealt with in learning and teaching a language and with the tasks of the student as writer, reader, conversant, and actor in the world. These sections bring together research by specialists in linguistics, artificial intelligence, psychology, instructional design, and language teaching. In addition to providing detailed descriptions of working systems, amply illustrated with screens from lesson and authoring interfaces, the contributors address a spectrum of common issues: * What can current NLP technology contribute to computer-assisted language instruction and to research on language learning? * How can this technology meet the demands of pedagogical theory for communicative language teaching in authentic contexts? * How can designers constrain tutoring environments to ensure accurate analysis of learners' language? * What can NLP-based systems teach us about language acquisition, about linguistic theory, and about theories of language pedagogy? * What lessons have been learned in using these systems to date? Discipline-specific issues are illuminated as well: the relative merits of the major syntactic frameworks for NLP-based language tutoring; the adaptation of theories like lexical conceptual structure to support semantic interpretation; the integration of input language with visual microworlds and dialogue games; the pragmatics of the tutoring discourse; the selection of instructional principles to guide system design; and the accomodation of design to individual differences and learner styles. A concluding section assesses this work from larger theoretical and practical perspectives -- experimental psychology and psycholinguistics, linguistics, language teaching, and second language acquisition research.