The Purloined Encryption Caper


Book Description

Five renegade NATO intelligence officers sent by their governments to the U.S. to steal industrial secrets from government and hi-tech companies secretly conspire to sell technologies they acquire to rogue nations for personal profit. All have high-level contacts in European and Middle Eastern governments and criminal networks. They soon involve several U.S. government employees as information sources enabling the group to steal patent applications and hi-tech data. Planning to be married, Rachel Brown resigns from the CIA after successful tours in Germany and Hong Kong. However, her pilot fianc crashes en route to San Francisco for the wedding. With the help of a childhood friend, currently a powerful U.S. senators aide, she returns to Washington and joins a lobbying firm representing several small high technology companies. She meets and becomes involved with the conspirators at Capitol Hill social events. She is of intense interest to them, especially after she becomes romantically involved with Jason Conrad, a client and CEO of a California hi-tech company involved in developing cutting edge encryption software and biometrics--areas of major interest to the NATO conspirators. Her liaison with Jason gets complicated when her former lover, a college friend of Jasons and international journalist, reenters her life and wants to revive their old affair. Through her past contacts, she alerts the CIA and FBI of the European groups intrigues and, together with Jason, cooperates with the government to try and thwart the foreign agents whose ruthless schemes involve murder, kidnapping and blackmail. The action moves from Washington to West Virginia, San Francisco, Paris and Belgium as Rachel becomes more enmeshed in the nefarious schemes and intrigues. Her progress from innocence to the world of espionage and betrayal reflects the complexity of modern life for this young professional woman.




Acts of Deception


Book Description

ABOUT THE BOOK Human traffickinggun runningwomen using men for money and revenge. Realizing her philandering husband, Martin Gregory, wants a divorce to marry someone else, Jennifer Gregory seduces Mark Masters, her husbands look alike. while on business in the Blue Ridge Mountains. With Martins political connections, she is certain he could negate their prenuptial agreement, leaving her penniless. However a proviso states that if a child is born during their marriage, it would be impossible to negate the agreement.. Much to her delight, Alex was born nine months later, paternity unknown. The woman Martin subsequently weds, Amelia Palmer, a glamorous Hong Kong beauty, marries him planning to take over his international import-export business to enrich herself using illicit activities and eventually leave him to marry her Hong Kong Corsican lover, a major partner in her scheme. Jennifer and Alex, threatened by Martins adversaries, retreat to her Ohio home town for several years. Eventually she returns to her Virginia home, hoping all threats are past. However, she cannot forget her one night of passion, nor can her lover, although neither knows the others name. Martin discovers Amelias plan and tries to disentangle her from his company and his life. He also realizes he still loves Jennifer and hopes to win her back and become a father to Alex. However, Amelia has different plans and connives to counter his plans. Also, by accident Jennifer encounters her Blue Ridge lover who wants to marry her and lay claim to Alex. Although she realizes she loves him, Jennifer is conflicted: should she follow her heart or not involve him in her current situation? Attempts on Alexs life, coupled with the realization of Martins company involvement in importing young Asian women for prostitution and gun running to Mexico brings chaos and death.







The Mysterious Romance of Murder


Book Description

From Sherlock Holmes to Sam Spade; Nick and Nora Charles to Nero Wolfe and Archie Goodwin; Harry Lime to Gilda, Madeleine Elster, and other femmes fatales—crime and crime solving in fiction and film captivate us. Why do we keep returning to Agatha Christie's ingenious puzzles and Raymond Chandler's hard-boiled murder mysteries? What do spy thrillers teach us, and what accounts for the renewed popularity of morally ambiguous noirs? In The Mysterious Romance of Murder, the poet and critic David Lehman explores a wide variety of outstanding books and movies—some famous (The Maltese Falcon, Double Indemnity), some known mainly to aficionados—with style, wit, and passion. Lehman revisits the smoke-filled jazz clubs from the classic noir films of the 1940s, the iconic set pieces that defined Hitchcock's America, the interwar intrigue of Eric Ambler's best fictions, and the intensity of attraction between Humphrey Bogart and Lauren Bacall, Robert Mitchum and Jane Greer, Cary Grant and Ingrid Bergman. He also considers the evocative elements of noir—cigarettes, cocktails, wisecracks, and jazz standards—and offers five original noir poems (including a pantoum inspired by the 1944 film Laura) and ironic astrological profiles of Barbara Stanwyck, Marlene Dietrich, and Graham Greene. Written by a connoisseur with an uncanny feel for the language and mood of mystery, espionage, and noir, The Mysterious Romance of Murder will delight fans of the genre and newcomers alike.




Jane Eyre


Book Description

Charlotte Brontë (April 21, 1816 - March 31, 1855) was an English novelist and the eldest of the three Brontë sisters whose novels have become enduring classics of English literature.




The Hacker Crackdown


Book Description

Features the book, "The Hacker Crackdown," by Bruce Sterling. Includes a preface to the electronic release of the book and the chronology of the hacker crackdown. Notes that the book has chapters on crashing the computer system, the digital underground, law and order, and the civil libertarians.




Cybercrime


Book Description

The federal computer fraud and abuse statute, 18 U.S.C. 1030, outlaws conduct that victimizes computer systems. It is a cyber security law which protects federal computers, bank computers, and computers connected to the Internet. It shields them from trespassing, threats, damage, espionage, and from being corruptly used as instruments of fraud. It is not a comprehensive provision, but instead it fills cracks and gaps in the protection afforded by other federal criminal laws. This report provides a brief sketch of Section 1030 and some of its federal statutory companions, including the amendments found in the Identity Theft Enforcement and Restitution Act, P.L. 110-326. Extensive appendices. This is a print on demand publication.




Hollywood Genres: Formulas, Filmmaking, and The Studio System


Book Description

The central thesis of this book is that a genre approach provides the most effective means for understanding, analyzing and appreciating the Hollywood cinema. Taking into account not only the formal and aesthetic aspects of feature filmmaking, but various other cultural aspects as well, the genre approach treats movie production as a dynamic process of exchange between the film industry and its audience. This process, embodied by the Hollywood studio system, has been sustained primarily through genres, those popular narrative formulas like the Western, musical and gangster film, which have dominated the screen arts throughout this century.







Compiler Construction


Book Description

Compilers and operating systems constitute the basic interfaces between a programmer and the machine for which he is developing software. In this book we are concerned with the construction of the former. Our intent is to provide the reader with a firm theoretical basis for compiler construction and sound engineering principles for selecting alternate methods, imple menting them, and integrating them into a reliable, economically viable product. The emphasis is upon a clean decomposition employing modules that can be re-used for many compilers, separation of concerns to facilitate team programming, and flexibility to accommodate hardware and system constraints. A reader should be able to understand the questions he must ask when designing a compiler for language X on machine Y, what tradeoffs are possible, and what performance might be obtained. He should not feel that any part of the design rests on whim; each decision must be based upon specific, identifiable characteristics of the source and target languages or upon design goals of the compiler. The vast majority of computer professionals will never write a compiler. Nevertheless, study of compiler technology provides important benefits for almost everyone in the field . • It focuses attention on the basic relationships between languages and machines. Understanding of these relationships eases the inevitable tran sitions to new hardware and programming languages and improves a person's ability to make appropriate tradeoft's in design and implementa tion .