Medusa's Proxy


Book Description

Voyeurism comes with the territory, whether you're a gargoyle assigned to roof duty or a half-fae/half-human constrained by a magical contract. Rhain Beauchêne's perch is the roof of the Winslow's Park Avenue mansion. He's a Watcher, a position custom-made for gargoyles and one that suits his physical appearance and grouchy demeanor. He knows he can manage this second and final year of his contract without losing his mind to the monotony of his days--until the building across the street gains an intriguing new occupant. Maddie Meadows lucks into the chance of a lifetime when a mythological creature in need of a break makes her an offer she can't refuse. All Maddie has to do is care for Medusa's snakes for an entire year. The biggest challenge? Maddie's got to keep lovers out of her bed. If she can do that, she’ll be financially secure for the rest of her life. And maybe even befriend Medusa in the process. There's a perfect solution to Rhain and Maddie's mutual longing for physical touch—but first they've got to learn to trust.




The Medusa Proxy


Book Description




The Limits of Eroticism in Post-Petrarchan Narrative


Book Description

Although theories of exploitation and subversion have radically changed our understanding of gender in Renaissance literature, to favour only those theories is to risk ignoring productive exchanges between 'masculine' and 'feminine' in Renaissance culture. 'Appropriation' is too simple a term to describe these exchanges - as when Petrarchan lovers flirt dangerously with potentially destructive femininity. Spenser revises this Petrarchan phenomenon, constructing flirtations whose participants are figures of speech, readers or narrative voices. His plots allow such exchanges to occur only through conditional speech, but this very conditionality powerfully shapes his work. Seventeenth-century works - including a comedy by Jane Cavendish and Elizabeth Brackley, and Upon Appleton House by Andrew Marvell - suggest that the civil war and the upsurge of female writers necessitated a reformulation of conditional erotics.




Jellyfish Blooms: Causes, Consequences and Recent Advances


Book Description

Jellyfish form spectacular population blooms and there is compelling evidence that jellyfish blooms are becoming more frequent and widespread. Blooms have enormous ecological, economic, and social impacts. For example, they have been implicated in the decline of commercial fisheries, they block the cooling water intakes of coastal industries and ships, and reduce the amenity of coastal waters for tourists. Blooms may be caused by overfishing, climate change, and coastal pollution, which all affect coastal waters around the world. Jellyfish Blooms: Causes, Consequences and Recent Advances presents reviews and original research articles written by the world’s leading experts on jellyfish. Topics covered include the evolution of jellyfish blooms, the impacts of climate change on jellyfish populations, advances in acoustic and molecular methods used to study jellyfish, the role of jellyfish in food webs and nutrient cycles, and the ecology of the benthic stages of the jellyfish life history. This is a valuable resource for students and professional marine biologists, fisheries scientists, oceanographers, and researchers of climate change.







Into Others Arms


Book Description




Poetics


Book Description

A collection of seven essays, six of which are interpretations of major poems by Romantic and modern poets. One other treats two modes of construction--synecdochic and metonymic--in Ernest Hemingway's poems.




Cyber Operations


Book Description

Cyber Operations walks you through all the processes to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources. You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases. Key defensive techniques are integrated throughout the exposition. You will develop situational awareness of your network and will build a complete defensive infrastructure—including log servers, network firewalls, web application firewalls, and intrusion detection systems. Of course, you cannot truly understand how to defend a network if you do not know how to attack it, so you will attack your test systems in a variety of ways beginning with elementary attacks against browsers and culminating with a case study of the compromise of a defended e-commerce site. The author, who has coached his university’s cyber defense team three times to the finals of the National Collegiate Cyber Defense Competition, provides a practical, hands-on approach to cyber security.




Company Filing Index


Book Description




Wall Street Journal Index


Book Description