A Most Malicious Messenger


Book Description

Menacing texts lead to murder in an English village, in this unmissable, witty mystery by the Dagger Award–nominated author of A Most Unusual Demise. May Morrigan is in her bookshop one morning when she—and everyone else in the shop—receives an anonymous text. It contains a reference to a Shakespeare quotation—and seems to be aimed at the vicar and his partner, Juan. The next morning, one of them is dead. Meanwhile, May’s elderly mother, Minty, is staying with her, her old friend Fletcher, and her two dogs. To her dismay, Minty is quite preoccupied with death herself lately. She also keeps reminiscing about her past in ways that make May wonder what secrets she’s hiding. As disturbing texts continue to arrive, the Blackheath residents are threatened with further revelations and titillations. Then Fletcher becomes the focus of the tormenting texter . . . and barely escapes an attempt on his life. It’s time for May to send a strong message—and block this killer permanently . . .




Francis Meadowes Mysteries Books One to Four


Book Description

The first four novels in the series starring a globetrotting sleuth whose travels include some deadly detours. The Festival Murders Scathing in his reviews and unseemly in his affairs, Bryce Peabody is ready to give a talk at the annual literary festival in the pretty English town of Mold-on-Wold—until he’s found dead in his hotel room. Soon, author Francis Meadowes is drawn into a role he knows only from his own fiction—that of amateur detective . . . “A wicked send-up of literary festivals.” —The Independent Cruising to Murder Francis is lecturing aboard a luxurious ship as it cruises down the West African coast. Among the passengers are a retired surgeon, a mischievous elderly widow, and a beautiful American accompanied by her tedious but extremely wealthy aunt. But when two of them die, the sleuthing crime writer may be out of his depth . . . “[An] eclectic mix of characters—none of whom would be out of place in an Agatha Christie tale.” —Daily Mail “A likable and smart series lead.” —Booklist Murder Your Darlings—A Mail on Sunday Book of the Year Francis is in Italy, running a creative writing course at an Umbrian villa. His students include snooty Poppy and her husband; a Northern Irishman who writes angry poems about the Troubles; a kooky American; and a possible spy. But things turn sinister when a body is found in the sauna. “A neat twist on the classic English-country-house formula.” —Kirkus Reviews Murder on Tour On his first paid detective gig, Francis joins a rock star’s entourage as they tour from Berlin to Brussels and beyond. The musician’s manager has been concerned about some dangerous events—but the biggest shock comes from the guitar that electrocutes a bandmate . . .




A Most Unusual Demise


Book Description

A well-read old dear has an unhealthy interest in murder, in this sharp, witty, and refreshingly original cozy crime novel. Retired librarian and bookshop owner May Morrigan lives in the affluent village of Blackheath with Fletcher, her best friend since they met decades ago, and May’s two dogs. What could be more normal? But May is not your average little old lady . . . After an unpleasant church volunteer and an annoying local butcher meet their untimely ends, Fletcher and May team up to do some sleuthing. Soon, the elderly pair start working with a young journalist to investigate the case of a missing girl and its possible link to previous unsolved crimes. May finds this new project quite intriguing. She’s never met a murderer before—and now she just may get the chance, if they play their cards right . . .




The Complete Sophocles


Book Description

Herbert Golder also served as General Editor. --Book Jacket.




Murder on Tour


Book Description

A novice detective joins a rock star’s entourage to follow a trail of sex, drugs, and suspicious deaths, in this brand-new murder mystery by the author of Murder Your Darlings. Crime writer Francis Meadowes has just been offered his first paid detective gig—which means going on the road with gender-fluid rock star JonniK, tagging along as the musician’s entourage travels from Berlin to Brussels and beyond. Jonni’s manager is already worried by a guitar tech’s fatal overdose on a tour bus, but then the star himself is attacked on stage . . . Another shock comes as Jonni’s lead guitarist is electrocuted by his own instrument in the middle of a gig—and Francis realises he is in a dangerous race against time to find out exactly what is going on . . . Praise for the Francis Meadowes mysteries “A rollicking read.” —London Evening Standard “Very engaging.” —The Sydney Morning Herald “Readers will have fun.” —Publishers Weekly




Securing IM and P2P Applications for the Enterprise


Book Description

This book is for system administrators and security professionals who need to bring now ubiquitous IM and P2P applications under their control. Many businesses are now taking advantage of the speed and efficiency offered by both IM and P2P applications, yet are completely ill-equipped to deal with the management and security ramifications. These companies are now finding out the hard way that these applications which have infiltrated their networks are now the prime targets for malicious network traffic. This book will provide specific information for IT professionals to protect themselves from these vulnerabilities at both the network and application layers by identifying and blocking this malicious traffic.* A recent study by the Yankee group ranked "managing and securing IM and P2P applications" as the #3 priority for IT managers in 2004* The recently updated SANS/FBI top 10 list of vulnerabilities for computers running Microsoft Windows contained both P2P and IM applications for the first time* The recently released Symantec Threat Assessment report for the first half of 2004 showed that 19 of the top 50 virus threats targeted IM or P2P applications. Despite the prevalence of IM and P2P applications on corporate networks and the risks they pose, there are no other books covering these topics




Detecting and Combating Malicious Email


Book Description

Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both personal and enterprise email environments. - Discusses how and why malicious e-mail is used - Explains how to find hidden viruses in e-mails - Provides hands-on concrete steps to detect and stop malicious e-mail before it is too late - Covers what you need to do if a malicious e-mail slips through




A Most Dangerous Profession


Book Description

Robert Hurst is on the trail of a mysterious onyx box needed to ransom his kidnapped brother. Moira Muir is seeks the box for a similar reason: her young daughter is being held captive. But there are further complications: years ago, the pair had an affair. Now, they must put aside the past and join forces to find the box.




IM Instant Messaging Security


Book Description

There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap. There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today's corporate environment. - Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security - Addresses IM security for day-to-day operations and management of IM-capable networks in today's corporate environment




Women of Trachis


Book Description

Based on the conviction that only translators who write poetry themselves can properly recreate the celebrated and timeless tragedies of Aeschylus, Sophocles, and Euripides, the Greek Tragedy in New Translations series offers new translations that go beyond the literal meaning of the Greek in order to evoke the poetry of the originals.