Searching for rows : 57 results found | RSS Feed for this search

1 2

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment. 6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | identification | identification | intrusion detection | intrusion detection | virus | virus | operating system | operating system | software | software | protection | protection | electronic mail | electronic mail | email | email | electronic commerce | electronic commerce | electronic cash | electronic cash | firewall | firewall | computer | computer | digital | digital | signature | signature | electronic | electronic | cash | cash | commerce | commerce | mail | mail | operating | operating | system | system | intrustion | intrustion | detection | detection | distributed | distributed | physical | physical | discretionary | discretionary | mandatory | mandatory | access | access | control | control | biometrics | biometrics | information | information | flow | flow | models | models | covert | covert | channels | channels | integrity | integrity | logic | logic | voting | voting | risk | risk | assessment | assessment | secure | secure | web | web | browsers | browsers | architecture | architecture | engineering | engineering | certificates | certificates | multi-user computer systems | multi-user computer systems | distributed computer systems | distributed computer systems | physical security | physical security | discretionary access control | discretionary access control | mandatory access control | mandatory access control | information-flow models | information-flow models | covert channels | covert channels | integrity models | integrity models | elementary cryptography | elementary cryptography | authentication logic;electronic cash | authentication logic;electronic cash | viruses | viruses | firewalls | firewalls | electronic voting | electronic voting | risk assessment | risk assessment | secure web browsers | secure web browsers | network security | network security | architecture engineering | architecture engineering | digital signatures | digital signatures | authentication schemes | authentication schemes | identification schemes | identification schemes | formal models | formal models | secure operating systems | secure operating systems | software protection | software protection | electronic mail security | electronic mail security | World Wide Web | World Wide Web | ecommerce | ecommerce | email security | email security | www | www | payment protocols | payment protocols | authentication logic | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allpersiancourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

8.033 Relativity (MIT) 8.033 Relativity (MIT)

Description

Relativity is normally taken by physics majors in their sophomore year. Topics include: Einstein's postulates; consequences for simultaneity, time dilation, length contraction, clock synchronization; Lorentz transformation; relativistic effects and paradoxes; Minkowski diagrams; invariants and four-vectors; momentum, energy and mass; and particle collisions. Also covered is: Relativity and electricity; Coulomb's law; and magnetic fields. Brief introduction to Newtonian cosmology. There is also an introduction to some concepts of General Relativity; principle of equivalence; the Schwarzchild metric; gravitational red shift, particle and light trajectories, geodesics, and Shapiro delay. Relativity is normally taken by physics majors in their sophomore year. Topics include: Einstein's postulates; consequences for simultaneity, time dilation, length contraction, clock synchronization; Lorentz transformation; relativistic effects and paradoxes; Minkowski diagrams; invariants and four-vectors; momentum, energy and mass; and particle collisions. Also covered is: Relativity and electricity; Coulomb's law; and magnetic fields. Brief introduction to Newtonian cosmology. There is also an introduction to some concepts of General Relativity; principle of equivalence; the Schwarzchild metric; gravitational red shift, particle and light trajectories, geodesics, and Shapiro delay.

Subjects

Einstein's postulates | Einstein's postulates | consequences for simultaneity | time dilation | length contraction | clock synchronization | consequences for simultaneity | time dilation | length contraction | clock synchronization | Lorentz transformation | Lorentz transformation | relativistic effects and paradoxes | relativistic effects and paradoxes | Minkowski diagrams | Minkowski diagrams | invariants and four-vectors | invariants and four-vectors | momentum | energy and mass | momentum | energy and mass | particle collisions | particle collisions | Relativity and electricity | Relativity and electricity | Coulomb's law | Coulomb's law | magnetic fields | magnetic fields | Newtonian cosmology | Newtonian cosmology | General Relativity | General Relativity | principle of equivalence | principle of equivalence | the Schwarzchild metric | the Schwarzchild metric | gravitational red shift | particle and light trajectories | geodesics | Shapiro delay | gravitational red shift | particle and light trajectories | geodesics | Shapiro delay | gravitational red shift | gravitational red shift | particle trajectories | particle trajectories | light trajectories | light trajectories | invariants | invariants | four-vectors | four-vectors | momentum | momentum | energy | energy | mass | mass | relativistic effects | relativistic effects | paradoxes | paradoxes | electricity | electricity | time dilation | time dilation | length contraction | length contraction | clock synchronization | clock synchronization | Schwarzchild metric | Schwarzchild metric | geodesics | geodesics | Shaprio delay | Shaprio delay | relativistic kinematics | relativistic kinematics | relativistic dynamics | relativistic dynamics | electromagnetism | electromagnetism | hubble expansion | hubble expansion | universe | universe | equivalence principle | equivalence principle | curved space time | curved space time | Ether Theory | Ether Theory | constants | constants | speed of light | speed of light | c | c | graph | graph | pythagorem theorem | pythagorem theorem | triangle | triangle | arrows | arrows

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allarchivedcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Tree of Noche Triste, where Cortez hid on the night of his defeat. Tree of Noche Triste, where Cortez hid on the night of his defeat.

Description

Subjects

tree | tree | mexico | mexico | churches | churches | stereograph | stereograph | hernancortes | hernancortes | churchbuildings | churchbuildings | arboldelanochetriste | arboldelanochetriste | historictrees | historictrees | treeofthenightofsorrows | treeofthenightofsorrows

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=41131493@N06&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT) 6.857 Network and Computer Security (MIT)

Description

6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration. 6.857 Network and Computer Security is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the Computer Systems and Architecture Engineering concentration.

Subjects

network | network | computer security | computer security | security | security | cryptography | cryptography | secret-key | secret-key | public-key | public-key | digital signature | digital signature | authentication | authentication | Bitcoin | Bitcoin | encryption | encryption | block ciphers | block ciphers | cryptographic hash functions | cryptographic hash functions | one-time pad | one-time pad | stream ciphers | stream ciphers | web browser security | web browser security | biometrics | biometrics | Viruses | Viruses | electronic voting | electronic voting

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-6.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Arbol de Hernan Cortes. Arbol de Hernan Cortes.

Description

Subjects

trees | trees | arboldelanochetriste | arboldelanochetriste | treeofthenightofsorrows | treeofthenightofsorrows | corteshernan14851547 | corteshernan14851547

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=41131493@N06&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

MAS.632 Conversational Computer Systems (MIT) MAS.632 Conversational Computer Systems (MIT)

Description

This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature. This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature.

Subjects

digital voice | digital voice | voice synthesis | voice synthesis | speech synthesis | speech synthesis | digital speech | digital speech | audio | audio | coding | coding | noise | noise | comprehension | comprehension | audio browsing | audio browsing | voice messaging | voice messaging | voice recognition | voice recognition | call center | call center | voice response | voice response | computer voice | computer voice | computer speech | computer speech | telephony | telephony | mobile applications | mobile applications | voicemail | voicemail

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses-MAS.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

6.857 Network and Computer Security (MIT)

Description

6.857 is an upper-level undergraduate, first-year graduate course on network and computer security. It fits within the department's Computer Systems and Architecture Engineering concentration. Topics covered include (but are not limited to) the following: Techniques for achieving security in multi-user computer systems and distributed computer systems; Cryptography: secret-key, public-key, digital signatures; Authentication and identification schemes; Intrusion detection: viruses; Formal models of computer security; Secure operating systems; Software protection; Security of electronic mail and the World Wide Web; Electronic commerce: payment protocols, electronic cash; Firewalls; and Risk assessment.

Subjects

network | computer security | security | cryptography | secret-key | public-key | digital signature | authentication | identification | intrusion detection | virus | operating system | software | protection | electronic mail | email | electronic commerce | electronic cash | firewall | computer | digital | signature | electronic | cash | commerce | mail | operating | system | intrustion | detection | distributed | physical | discretionary | mandatory | access | control | biometrics | information | flow | models | covert | channels | integrity | logic | voting | risk | assessment | secure | web | browsers | architecture | engineering | certificates | multi-user computer systems | distributed computer systems | physical security | discretionary access control | mandatory access control | information-flow models | covert channels | integrity models | elementary cryptography | authentication logic;electronic cash | viruses | firewalls | electronic voting | risk assessment | secure web browsers | network security | architecture engineering | digital signatures | authentication schemes | identification schemes | formal models | secure operating systems | software protection | electronic mail security | World Wide Web | ecommerce | email security | www | payment protocols | authentication logic

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see http://ocw.mit.edu/terms/index.htm

Site sourced from

http://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Passenger liner 'Orsova' at the Naval Yard Passenger liner 'Orsova' at the Naval Yard

Description

Subjects

chimney | chimney | abstract | abstract | blur | blur | reflection | reflection | industry | industry | water | water | river | river | reading | reading | boat | boat | interesting | interesting | cabin | cabin | industrial | industrial | ship | ship | unitedkingdom | unitedkingdom | timber | timber | debris | debris | letters | letters | bank | bank | rail | rail | ground | ground | vessel | vessel | rope | rope | tyne | tyne | pole | pole | cranes | cranes | deck | deck | soil | soil | pile | pile | pollution | pollution | porthole | porthole | signage | signage | po | po | cylinder | cylinder | archives | archives | land | land | unusual | unusual | mast | mast | shipyard | shipyard | majestic | majestic | tyneside | tyneside | impressive | impressive | newcastleupontyne | newcastleupontyne | fascinating | fascinating | 1960 | 1960 | measurement | measurement | oceanliner | oceanliner | rivertyne | rivertyne | shipbuilding | shipbuilding | launched | launched | industrialheritage | industrialheritage | northeastengland | northeastengland | refit | refit | blackandwhitephotograph | blackandwhitephotograph | walkernavalyard | walkernavalyard | calmwaters | calmwaters | navalyard | navalyard | orientline | orientline | passengerliner | passengerliner | shipbuildingheritage | shipbuildingheritage | poline | poline | maritimeheritage | maritimeheritage | orsova | orsova | vickersarmstrong | vickersarmstrong | vickersarmstrongs | vickersarmstrongs | peninsularandorientalsteamnavigationcompany | peninsularandorientalsteamnavigationcompany | ssorsova | ssorsova | sirwgarmstrongwhitworthcoltd | sirwgarmstrongwhitworthcoltd | barrowshipyard | barrowshipyard | orientsteamnavigationcompany | orientsteamnavigationcompany | vickersarmstrongsltd | vickersarmstrongsltd | digitialimage | digitialimage | highwalker | highwalker | elswickshipyard | elswickshipyard | swanhunterandtyneshipbuilders | swanhunterandtyneshipbuilders | 14may1953 | 14may1953

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Hamlin (LOC) Hamlin (LOC)

Description

Subjects

libraryofcongress | libraryofcongress | sallyhamlin | sallyhamlin | sallyemeryhamlin | sallyemeryhamlin | mrskarlmchworowsky | mrskarlmchworowsky | actors | actors | childactors | childactors | recordingartists | recordingartists | victorrecords | victorrecords | pianists | pianists | musicians | musicians | usvicepresidenthannibalhamlin | usvicepresidenthannibalhamlin | sarahemeryhamlin | sarahemeryhamlin | typewriters | typewriters | victor | victor

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=8623220@N02&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Young Farmers' Club rally at Shrewsbury

Description

Subjects

england | wales | cymru | teenagers | shrewsbury | clubs | scarecrows | youngadults | contests | llyfrgellgenedlaetholcymru | nationallibraryofwales | sociallife | filmnegatives | farmersgroups | charlesgeoff19092002 | negyddffilm

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=37199428@N06&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Aerial view of Byker, 1978

Description

Aerial view over Byker, Newcastle upon Tyne, showing the newly constructed Byker Wall, June 1978 (TWAM ref. DT.TUR/4/CN11182B). Tyne & Wear Archives presents a series of colour aerial photographs of Newcastle upon Tyne. These images were captured by the Newcastle-based photographic firm Turners Ltd during the mid to late 1970s. At first glance, some of these images give the impression that the Newcastle landscape hasn't changed much in 40 years. Look more closely, though, and some of the differences between then and now will reveal themselves - see how many you can spot. (Copyright) We're happy for you to share these digital images within the spirit of The Commons. Please cite 'Tyne & Wear Archives & Museums' when reusing. Certain restrictions on high quality reproductions and commercial use of the original physical version apply though; if you're unsure please email archives@twmuseums.org.uk

Subjects

aerialviews | aerialphotographs | newcastleupontyne | colourphotography | northeastengland | tyneside | bykerwall | colourphotograph | newcastleincolour | aerialphotograph | aerialview | unitedkingdom | archives | industry | industrialheritage | development | construction | progress | structure | buildings | infrastructure | economy | business | services | daylight | vegetation | roads | vehicle | transportation | june1978 | byker | turnersltd | glimpse | urban | city | cliffordstpolicestation | streets | oval | park | grass | wall | roof | fascinating | interesting | unusual | brilliant | bridge | window | door | chimney | carpark | debris | soil | plants | residential | rows | consumerism | land | water

License

No known copyright restrictions

Site sourced from

Tyne & Wear Archives & Museums | FlickR

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

From Jarrow to the Sea, 1973

Description

Subjects

industry | southshields | jarrow | rivertyne | aerialphotograph | southtyneside | northtyneside | tynedock | jarrowslake

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=29295370@N07&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

MAS.632 Conversational Computer Systems (MIT)

Description

This class explores interaction with mobile computing systems and telephones by voice, including speech synthesis, recognition, digital recording, and browsing recorded speech. Emphasis on human interface design issues and interaction techniques appropriate for cognitive requirements of speech. Topics include human speech production and perception, speech recognition and text-to-speech algorithms, telephone networks, and spatial and time-compressed listening. Extensive reading from current research literature.

Subjects

digital voice | voice synthesis | speech synthesis | digital speech | audio | coding | noise | comprehension | audio browsing | voice messaging | voice recognition | call center | voice response | computer voice | computer speech | telephony | mobile applications | voicemail

License

Content within individual OCW courses is (c) by the individual authors unless otherwise noted. MIT OpenCourseWare materials are licensed by the Massachusetts Institute of Technology under a Creative Commons License (Attribution-NonCommercial-ShareAlike). For further information see https://ocw.mit.edu/terms/index.htm

Site sourced from

https://ocw.mit.edu/rss/all/mit-allcourses.xml

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

The Browser - Internet Explorer - Unit 1

Description

Step by step guide - Using the Internet - Internet Explorer - including a demonstration. Zipped. Internet Explorer is recommended.

Subjects

internet browser | internet | zip | buttons | address bar | ie | INFORMATION TECHNOLOGY and INFORMATION | C

License

Attribution-Noncommercial 2.0 UK: England & Wales Attribution-Noncommercial 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc/2.0/uk/ http://creativecommons.org/licenses/by-nc/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Using Favorites - Internet Explorer - Unit 2

Description

Step by step guide - Using Favorites - Internet Explorer - including a demonstration. Zipped. Internet Explorer is recommended.

Subjects

favorites | internet browser | bookmarks | ie | zip | INFORMATION TECHNOLOGY and INFORMATION | C

License

Attribution-Noncommercial 2.0 UK: England & Wales Attribution-Noncommercial 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc/2.0/uk/ http://creativecommons.org/licenses/by-nc/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

InfosmART: Information Skills for Creatives

Description

InfosmART is the Glasgow School of Art Library's award-winning portfolio of easy-to-follow interactive modules in information, study and research skills. All InfosmART modules are self-directed, so you can follow each module from start to finish, or dip in and out when you need specific information. All InfosmART content is written in easy-to-understand language and is designed for you to work through at your own pace.

Subjects

information literacy | study skills | research | literature review | search | browse | Google | currency | authority | relevance | methodology | accuracy | objectivity | peer review | Wikipedia | bibliography | endnote | footnote | citation | referencing | copyright

License

Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales Attribution-Noncommercial-Share Alike 2.0 UK: England & Wales http://creativecommons.org/licenses/by-nc-sa/2.0/uk/ http://creativecommons.org/licenses/by-nc-sa/2.0/uk/

Site sourced from

http://dspace.jorum.ac.uk/oai/request?verb=ListRecords&metadataPrefix=oai_dc

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

A small vessel on the stocks at Yarrow’s Yard

Description

Reproduction ID: H4124 Maker: Unknown Date: about 1895

Subjects

nationalmaritimemuseum | steamboat | yarrowsyard | shipyard

License

No known copyright restrictions

Site sourced from

Royal Museums Greenwich | FlickR

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Set of Benjamin Harrison-Morton Campaign Ribbons, ca. 1888

Description

Collection: Cornell University Collection of Political Americana, Cornell University Library Repository: Susan H. Douglas Political Americana Collection, #2214 Rare & Manuscript Collections, Cornell University Library, Cornell University Title: Set of Benjamin Harrison-Morton Campaign Ribbons, ca. 1888 Political Party: Republican Election Year: 1888 Date Made: ca. 1888 Measurement: Ribbon: 5 x 4 in.; 12.7 x 10.16 cm Classification: Costume Persistent URI: hdl.handle.net/1813.001/60ff There are no known U.S. copyright restrictions on this image. The digital file is owned by the Cornell University Library which is making it freely available with the request that, when possible, the Library be credited as its source.

Subjects

cornelluniversitylibrary | badges | portraits | harrisonbenjamin | promotionalmaterials | mortonlevip | politics | tippecanoekosciuskocountyindiana | americanflags | shields | busts | symbols | animals | eagles | profileportraits | arrows | birds | culidentifier:value=2214rb0127 | culidentifier:lunafield=idnumber

License

No known copyright restrictions

Site sourced from

Cornell University Library | FlickR

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Set of Benjamin Harrison-Morton Campaign Ribbons, ca. 1888

Description

Collection: Cornell University Collection of Political Americana, Cornell University Library Repository: Susan H. Douglas Political Americana Collection, #2214 Rare & Manuscript Collections, Cornell University Library, Cornell University Title: Set of Benjamin Harrison-Morton Campaign Ribbons, ca. 1888 Political Party: Republican Election Year: 1888 Date Made: ca. 1888 Measurement: Ribbon: 5 x 4 in.; 12.7 x 10.16 cm Classification: Costume Persistent URI: hdl.handle.net/1813.001/60fd There are no known U.S. copyright restrictions on this image. The digital file is owned by the Cornell University Library which is making it freely available with the request that, when possible, the Library be credited as its source.

Subjects

cornelluniversitylibrary | badges | portraits | harrisonbenjamin | promotionalmaterials | mortonlevip | politics | tippecanoekosciuskocountyindiana | americanflags | shields | busts | symbols | animals | eagles | profileportraits | arrows | birds | culidentifier:value=2214rb0127 | culidentifier:lunafield=idnumber

License

No known copyright restrictions

Site sourced from

Cornell University Library | FlickR

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Set of Benjamin Harrison-Morton Campaign Ribbons, ca. 1888

Description

Collection: Cornell University Collection of Political Americana, Cornell University Library Repository: Susan H. Douglas Political Americana Collection, #2214 Rare & Manuscript Collections, Cornell University Library, Cornell University Title: Set of Benjamin Harrison-Morton Campaign Ribbons, ca. 1888 Political Party: Republican Election Year: 1888 Date Made: ca. 1888 Measurement: Ribbon: 5 x 4 in.; 12.7 x 10.16 cm Classification: Costume Persistent URI: hdl.handle.net/1813.001/60fc There are no known U.S. copyright restrictions on this image. The digital file is owned by the Cornell University Library which is making it freely available with the request that, when possible, the Library be credited as its source.

Subjects

cornelluniversitylibrary | badges | portraits | harrisonbenjamin | promotionalmaterials | mortonlevip | politics | tippecanoekosciuskocountyindiana | americanflags | shields | busts | symbols | animals | eagles | profileportraits | arrows | birds | culidentifier:value=2214rb0127 | culidentifier:lunafield=idnumber

License

No known copyright restrictions

Site sourced from

Cornell University Library | FlickR

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Workmen with wheelbarrows collecting gravel, Indooroopilly

Description

Subjects

brisbane | queensland | 1915 | gravel | wheelbarrows | indooroopilly | labourers | mensclothing

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=32605636@N06&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

Messrs Cooke Bros, Baronstrand Street, Waterford, shopfront

Description

Subjects

ireland | waterford | munster | glassnegative | nationallibraryofireland | ahpoole | katherinemcsharry | poolecollection | arthurhenripoole | mccormicksharvestingmachines | cookebros | barrowstrandstreet | graingersshop | 16thjuly1912

License

No known copyright restrictions

Site sourced from

http://api.flickr.com/services/feeds/photos_public.gne?id=47290943@N03&lang=en-us&format=rss_200

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata

U-Boat 110, the Torpedo Room showing an overhead arrangement

Description

This photograph shows the U-Boat 110, a German Submarine that was sunk and risen in 1918. This photograph shows the Submarine's forward Torpedo Room. Reference: DS.SWH/5/3/2/14/1/9 This image is taken from an album of photographs found in the Swan Hunter shipbuilders collection at Tyne & Wear Archives. The album is from 1918 and documents the U.B. 110 before she was scrapped on the dry docks of Swan Hunter Wigham Richardson Ltd, Wallsend. The twin-screw German submarine U.B. 110 was built by Blohm & Voss, Hamburg. On the 19th July 1918, when attacking a convoy of merchant ships near Hartlepool, she herself was attacked by H.M. Motor-Launch No. 263 and suffered from depth charges. Coming to the surface she was rammed by H.M.S. Garry, a torpedo boat destroyer, and sunk. In September she was salvaged and placed in the admiralty dock off Jarrow slake. She was then berthed at Swan Hunter's dry docks department with an order to restore her as a fighting unit. The Armistice on 11th November 1918 caused work on her to be stopped. She was towed on the 19th December 1918 from Wallsend to the Northumberland Dock at Howdon and was subsequently sold as scrap. The album of photographs, taken by Frank & Sons of South Shields, documents the U.B. 110 in extensive detail. The photographs provide a rare glimpse into the mechanics and atmosphere of the raised German submarine. More images of the U-Boat 110 can be viewed here. (Copyright) We're happy for you to share these digital images within the spirit of The Commons. Please cite 'Tyne & Wear Archives & Museums' when reusing. Certain restrictions on high quality reproductions and commercial use of the original physical version apply though; if you're unsure please email archives@twmuseums.org.uk

Subjects

submarine | uboat | german | firstworldwar | steampunk | wheels | maritimeheritage | naval | blackandwhitephotograph | uboat110 | torpedoroom | overheadarrangement | germansubmarine | sunk | risen | 1918 | forwardtorpedoroom | swanhuntershipbuilderscollection | service | bloh | swanhunterwighamrichardsonltd | wallsend | blohmvoss | tube | pipe | hamburg | 19thjuly1918 | attacked | hmmotorlaunchno263 | depthcharges | rammed | hmsgarry | torpedoboatdestroyer | sinking | salvaged | admiraltydock | jarrowslake | berthed | drydocksdepartment | swanhunters | restoration | armistice | 11november1918 | 19december1918 | northumberlanddock | howden | scrap | franksons | southshields | mechanical | mechanics | impressive | industry | industrial | parts | cylinder | wire | wheel | handle | blur | detail | grain | mark | bolt | nut | metal | steel | plate | lid | number | identification | thesinkingandraisingofuboat110 | surreal | fastener | label

License

No known copyright restrictions

Site sourced from

Tyne & Wear Archives & Museums | FlickR

Attribution

Click to get HTML | Click to get attribution | Click to get URL

All metadata

See all metadata