The Verifiers


Book Description

ONE OF THE WASHINGTON POST'S BEST MYSTERY BOOKS OF THE YEAR • Introducing Claudia Lin: a sharp-witted amateur sleuth for the 21st century. This debut novel follows Claudia as she verifies people's online lives, and lies, for a dating detective agency in New York City. Until a client with an unusual request goes missing.... “The world of social media, big tech and internet connectivity provides fertile new ground for humans to deceive, defraud and possibly murder one another.... Well rendered and charming.... Original and intriguing.” —The New York Times Book Review Claudia is used to disregarding her fractious family’s model-minority expectations: she has no interest in finding either a conventional career or a nice Chinese boy. She’s also used to keeping secrets from them, such as that she prefers girls—and that she's just been stealth-recruited by Veracity, a referrals-only online-dating detective agency. A lifelong mystery reader who wrote her senior thesis on Jane Austen, Claudia believes she's landed her ideal job. But when a client vanishes, Claudia breaks protocol to investigate—and uncovers a maelstrom of personal and corporate deceit. Part literary mystery, part family story, The Verifiers is a clever and incisive examination of how technology shapes our choices, and the nature of romantic love in the digital age.




The Atmospherians


Book Description

"Sasha Marcus was once the epitome of contemporary success: an internet sensation, social media darling, and a creator of a high-profile wellness brand for women. But a confrontation with an abusive troll has taken a horrifying turn, and now she's at rock bottom: canceled and doxxed online, isolated in her apartment while men's rights protestors rage outside. Sasha confides in her oldest childhood friend, Dyson--a failed actor with a history of body issues--who hatches a plan for her to restore her reputation by becoming the face of his new business venture, The Atmosphere: a rehabilitation community for men."--




Topics of Conversation


Book Description

'If you're a fan of Sally Rooney's work, then you can't go wrong by picking up a copy of Topics Of Conversation ... She's a fresh voice, and one that it's certainly worth listening to.' Vogue 'Miranda Popkey's debut explores the paradox of longing to assert control and longing to lose it ... She depicts what it feels like to exist, actually live, at that intersection, which can so often bring about paralysis.' New Yorker What is the shape of a life? Is it the things that happen to us? Or is it the stories we tell about the things that happen to us? From the coast of the Adriatic to the salt spray of Santa Barbara, the narrator of Topics of Conversation maps out her life through two decades of bad relationships, motherhood, crisis and consolation. The novel unfurls through a series of conversations - in private with friends, late at night at parties with acquaintances, with strangers in hotel rooms, in moments of revelation, shame, cynicism, envy and intimacy. Sizzling with enigmatic desire, Miranda Popkey's debut novel is a seductive exploration of life as a woman in the modern world, of the stories we tell ourselves and of the things we reveal only to strangers.




Trust, Privacy, and Security in Digital Business


Book Description

This book constitutes the refereed proceedings of the 11th International Conference on Trust and Privacy in Digital Business, TrustBus 2014, held in Munich, Germany, in September 2014 in conjunction with DEXA 2014. The 16 revised full papers presented were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: trust management; trust metrics and evaluation models; privacy and trust in cloud computing; security management; and security, trust, and privacy in mobile and pervasive environments.




Principles of Distributed Systems


Book Description

The 8th International Conference on Principles of Distributed Systems (OPODIS 2004) was held during December 15 –17, 2004 at Grenoble, France.




Leśniewski’s Systems Protothetic


Book Description

Between the two world wars, Stanislaw Lesniewski (1886-1939), created the famous and important system of foundations of mathematics that comprises three deductive theories: Protothetic, Ontology, and Mereology. His research started in 1914 with studies on the general theory of sets (later named `Mereology'). Ontology followed between 1919 and 1921, and was the next step towards an integrated system. In order to combine these two systematically he constructed Protothetic - the system of `first principles'. Together they amount to what Z. Jordan called `... most thorough, original, and philosophically significant attempt to provide a logically secure foundation for the whole of mathematics'. The volume collects many of the most significant commentaries on, and contributions to, Protothetic. A Protothetic Bibliography is included.










Kit Fine on Truthmakers, Relevance, and Non-classical Logic


Book Description

This book explores some of Kit Fine's outstanding contributions to logic, philosophy of language, philosophy of mathematics, and metaphysics, among others. Contributing authors address in-depth issues about truthmaker semantics, counterfactual conditionals, grounding, vagueness, non-classical consequence relations, and arbitrary objects, offering critical reflections and novel research contributions. Each chapter is accompanied by an extensive commentary, in which Kit Fine offers detailed responses to the ideas and themes raised by the contributors. The book includes a brief autobiography and exhaustive list of his publications to this date. This book is of interest to logicians of all stripes and to analytic philosophers more generally.




Decision and Game Theory for Security


Book Description

Securing complex and networked systems has become increasingly important as these systems play an indispensable role in modern life at the turn of the - formation age. Concurrently, security of ubiquitous communication, data, and computing poses novel research challenges. Security is a multi-faceted problem due to the complexity of underlying hardware, software, and network inter- pendencies as well as human and social factors. It involves decision making on multiple levels and multiple time scales, given the limited resources available to both malicious attackers and administrators defending networked systems. - cision and game theory provides a rich set of analyticalmethods and approaches to address various resource allocation and decision-making problems arising in security. This edited volume contains the contributions presented at the inaugural Conference on Decision and Game Theory for Security - GameSec 2010. These 18 articles (12 full and 6 short papers) are thematically categorized into the following six sections: – “Security investments and planning” contains two articles, which present optimization methods for (security) investments when facing adversaries. – “Privacy and anonymity” has three articles discussing location privacy, - line anonymity, and economic aspects of privacy. – “Adversarial and robust control” contains three articles, which investigate security and robustness aspects of control in networks. – “Networksecurityandbotnets”hasfourarticlesfocusingondefensivestra- giesagainstbotnetsaswellasdetectionofmaliciousadversariesinnetworks. – “Authorizationandauthentication”hasanarticleonpasswordpracticesand another one presenting a game-theoretic authorization model. – “Theory and algorithms for security” contains four articles on various th- retic and algorithmic aspects of security.