Do we have your attention? New literacies, digital technologies and the education of adolescents
- Authors: Lankshear, Colin , Knobel, Michele
- Date: 2002
- Type: Text , Book chapter
- Relation: Adolescents and Literacies in a Digital World Chapter 12 p. 19-39
- Full Text: false
- Reviewed:
- Description: B1
- Description: 2003000072
Grid.for.learning@clampdown.edu
- Authors: Lankshear, Colin , Knobel, Michele
- Date: 2002
- Type: Text , Book chapter
- Relation: Cyber Spaces/Social Spaces : Struggling with Technology in the Global Classroom Chapter 7 p. 105-135
- Full Text: false
- Reviewed:
- Description: B1
- Description: 2003000274
Indigenous children and institutions
- Authors: Clark, Ian
- Date: 2002
- Type: Text , Book chapter
- Relation: Many voices:reflections on experiences of Indigenous child separation Chapter 9 p. 165-177
- Full Text:
- Description: 2003004028
Machines and mindsets
- Authors: Lankshear, Colin , Knobel, Michele
- Date: 2002
- Type: Text , Book chapter
- Relation: Cyber Spaces/Social Spaces : Struggling with Technology in the Global Classroom Chapter 7 p. 59-84
- Full Text: false
- Reviewed:
- Description: B1
- Description: 2003000272
Teaching, researching and evaluating : Action research as an approach to evaluation
- Authors: Noone, Lynne , Cartwright, Patricia
- Date: 2002
- Type: Text , Book chapter
- Relation: Academic Skills Advising: Evaluating for Program Improvement and Accountability Chapter 11 p. 5-28
- Full Text: false
- Reviewed:
- Description: B1
- Description: 2003000183
The effects of perceived maternal parenting styles on the disruptive behaviours of children with attention deficit hyperactivity disorder/oppositional defiant disorder : Mediation by hostile biased social cognitions
- Authors: Gomez, Rapson , Gomez, Andre
- Date: 2002
- Type: Text , Book chapter
- Relation: Advances in Psychology, Volume II Chapter 8 p. 37-55
- Full Text: false
- Reviewed:
- Description: B1
- Description: 2003000181
The trials and tribulations of two dogsbodies : A Jungian reading of Diana Wynne Jones's Dogsbody
- Authors: Mills, Alice
- Date: 2002
- Type: Text , Book chapter
- Relation: Diana Wynne Jones : An Exciting and Exacting Wisdom Chapter 13 p. 138-148
- Full Text:
- Reviewed:
- Description: B1
- Description: 2003000188
A culture of teaching under 'new management'
- Authors: Smyth, John
- Date: 2001
- Type: Text , Book chapter
- Relation: The performing school : managing, teaching, and learning in a performance culture p. 118-136
- Full Text: false
- Reviewed:
A rose by any other name, Is not merely another rose
- Authors: Taylor, Caroline
- Date: 2001
- Type: Text , Book chapter
- Relation: Utter silence : voicing the unspeakable Chapter p. [243]-255
- Full Text: false
- Reviewed:
- Description: B1
- Description: 2003002411
Engendering public debate on Federation
- Authors: Beggs-Sunter, Anne
- Date: 2001
- Type: Text , Book chapter
- Relation: Becoming Australians : the movement towards federation in Ballarat and the nation Chapter p. 42-49
- Full Text: false
- Reviewed:
- Description: B1
Managing the myth of the self-managing school as an international education reform
- Authors: Smyth, John
- Date: 2001
- Type: Text , Book chapter
- Relation: Taking education really seriously: Four years' hard labour p. 238-253
- Full Text: false
- Reviewed:
Secure network solutions for enterprise cloud services
- Authors: Huang, Chengcheng , Smith, Philip , Sun, Zhaohao
- Type: Text , Book chapter
- Relation: Handbook of research on demand-driven web services : Theory, technologies, and applications 10 p. 222-244
- Full Text: false
- Reviewed:
- Description: Securing a cloud network is an important challenge for delivering cloud services to enterprise clouds. There are a number of secure network protocols, such as VPN protocols, currently available, to provide different secure network solutions for enterprise clouds. For example, PPTP, IP Sec, and SSUFLS are the most widely used VPN protocols in today's securing network solutions. However, there are some significant challenges in the implementation stage. For example, which VPN solution is easy to deploy in delivering cloud services? Which VPN solution is most user-friendly in enterprise clouds? This chapter explores these issues by implementing different VPNs in a virtual cloud network environment using open source software and tools. This chapter also reviews cloud computing and cloud services and looks at their relationships. The results not only provide experimental evidence but also facilitate the network implementers in deployment of secure network solutions for enterprise cloud services.