Memory Made, Hacked, and Outsourced


Book Description

This book probes the complex relationship between memory and storytelling in contemporary literature. It not only examines how memory is constantly made and remade through words and stories but also explores how literary practices and imagination are shaping new concepts of memory in the 21st century. By analyzing the selected novels – Penelope Lively’s The Photograph, Tom McCarthy’s Remainder, Julian Barnes’ The Sense of an Ending and The Only Story, Kazuo Ishiguro’s Never Let Me Go, and Felicia Yap’s Yesterday – this book explores the dynamic interplay of remembering and forgetting, and redefines the relationship between fiction and memory in the 21st century.




Memory Made, Hacked, and Outsourced


Book Description

This book probes the complex relationship between memory and storytelling in contemporary literature. It not only examines how memory is constantly made and remade through words and stories but also explores how literary practices and imagination are shaping new concepts of memory in the 21st century. By analyzing the selected novels - Penelope Lively's The Photograph, Tom McCarthy's Remainder, Julian Barnes' The Sense of an Ending and The Only Story, Kazuo Ishiguro's Never Let Me Go, and Felicia Yap's Yesterday - this book explores the dynamic interplay of remembering and forgetting, and redefines the relationship between fiction and memory in the 21st century. Chia-Chieh Mavis Tseng is the director and associate professor in the Language Center at Taipei Medical University. She received her Ph.D. in Comparative Literature at Rutgers, The State University of New Jersey. Her publications have addressed memory studies, film studies, visual culture, urban modernity, Amy Levy, Kate Chopin, Virginia Woolf, Kazuo Ishiguro, Walter Benjamin, and Jacques Tati's works. Her several research projects (2017-2023), funded by the National Science and Technology Council in Taiwan, R.O.C., focus on representations of memory in contemporary novels and films.




The Basics of Hacking and Penetration Testing


Book Description

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test




Neptune's Brood


Book Description

After being stalked across the galaxy by an assassin, post-human Krina Alzon-114 journeys to the water-world Shin-Tethys in search of her sister.




Out Of Control


Book Description

Out of Control chronicles the dawn of a new era in which the machines and systems that drive our economy are so complex and autonomous as to be indistinguishable from living things.




EBOOK: Basic Marketing


Book Description

Built on a strong foundation, Basic Marketing 18e with ConnectPlus and LearnSmart provides an integrated teaching and learning solution for presenting the four Ps framework and managerial orientation with a strategy planning focus. The Perreault franchise was the pioneer of the “four Ps” in the introductory marketing course. The unifying focus of Basic Marketing has always been on how to make marketing decisions in deciding what customers to focus on and how best to meet their needs. Consistent with our belief in continuous quality improvement, this edition has been critically revised, updated, and rewritten to reflect new concepts, new examples, recent “best practices,” and to tightly integrate the best digital tools in the industry for ensuring that students are prepared to engage in classroom lectures and pursue future business and marketing careers.




No Logo


Book Description

"What corporations fear most are consumers who ask questions. Naomi Klein offers us the arguments with which to take on the superbrands." Billy Bragg from the bookjacket.




The Art of Intrusion


Book Description

Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.




Harboring Data


Book Description

As identity theft and corporate data vulnerability continue to escalate, corporations must protect both the valuable consumer data they collect and their own intangible assets. Both Congress and the states have passed laws to improve practices, but the rate of data loss persists unabated and companies remain slow to invest in information security. Engaged in a bottom-up investigation, Harboring Data reveals the emergent nature of data leakage and vulnerability, as well as some of the areas where our current regulatory frameworks fall short. With insights from leading academics, information security professionals, and other area experts, this original work explores the business, legal, and social dynamics behind corporate information leakage and data breaches. The authors reveal common mistakes companies make, which breaches go unreported despite notification statutes, and surprising weaknesses in the federal laws that regulate financial data privacy, children's data collection, and health data privacy. This forward-looking book will be vital to meeting the increasing information security concerns that new data-intensive business models will have.




The Emperor of All Maladies


Book Description

Winner of the Pulitzer Prize and a documentary from Ken Burns on PBS, this New York Times bestseller is “an extraordinary achievement” (The New Yorker)—a magnificent, profoundly humane “biography” of cancer—from its first documented appearances thousands of years ago through the epic battles in the twentieth century to cure, control, and conquer it to a radical new understanding of its essence. Physician, researcher, and award-winning science writer, Siddhartha Mukherjee examines cancer with a cellular biologist’s precision, a historian’s perspective, and a biographer’s passion. The result is an astonishingly lucid and eloquent chronicle of a disease humans have lived with—and perished from—for more than five thousand years. The story of cancer is a story of human ingenuity, resilience, and perseverance, but also of hubris, paternalism, and misperception. Mukherjee recounts centuries of discoveries, setbacks, victories, and deaths, told through the eyes of his predecessors and peers, training their wits against an infinitely resourceful adversary that, just three decades ago, was thought to be easily vanquished in an all-out “war against cancer.” The book reads like a literary thriller with cancer as the protagonist. Riveting, urgent, and surprising, The Emperor of All Maladies provides a fascinating glimpse into the future of cancer treatments. It is an illuminating book that provides hope and clarity to those seeking to demystify cancer.