The Unauthorized Version


Book Description

The Bible is moving, inspirational and endlessly fascinating - but is it true? Starting with Genesis and the implicit background to the birth of Christ, Robin Lane Fox sets out to discover how far biblical descriptions of people, places and events are confirmed or contradicted by external written and archaeological evidence. He turns a sharp historian's eye on when and where the individual books were composed, whether the texts as originally written exist, how the canon was assembled, and why the Gospels give varying accounts even of the trial and condemnation of Jesus.




Jesus


Book Description

Chronicles the life, ministry, and teachings of Jesus Christ, based on the texts of the Gnostic gospels and other early Christian writings that were not included in the authorized version of the New Testament.




Unauthorized Versions


Book Description







Dead Kennedys


Book Description

The Dead Kennedys roared to life in the late 1970s: their left-wing political stance, shock tactics, and messages of rebellion against corruption stirred everybody up, including Tipper Gore and her pack of conservative music-banning buddies. This book focuses on the band from its conception through its breakup in the mid-1980s, and includes reproductions of flyers, promo shots, snippets of interviews, lyrics, and rare photos. Lead singer Jello Biafra's candidacy in the 1979 San Francisco mayoral race is also entertainingly detailed.




Computer Crime


Book Description




The Holy Bible


Book Description




Unauthorized Access


Book Description

Going beyond current books on privacy and security, this book proposes specific solutions to public policy issues pertaining to online privacy and security. Requiring no technical or legal expertise, it provides a practical framework to address ethical and legal issues. The authors explore the well-established connection between social norms, privacy, security, and technological structure. They also discuss how rapid technological developments have created novel situations that lack relevant norms and present ways to develop these norms for protecting informational privacy and ensuring sufficient information security.




Material Culture and Authenticity


Book Description

The study of material culture demonstrates that objects make people just as much as people make, exchange and consume objects. But what if these objects are, in the eyes of others, only fakes? What kind of material mirror are people looking into? Are their real selves really reflected in this mirror? This book provides an original and revealing study into engagements with objects that are not what they are claimed and presumed to be and, subsequently, are believed to betray their makers as well as users. Drawing upon an ethnography of fake branded garments in Turkey and Romania, Material Culture and Authenticity shows how people can make authentic positions for themselves in and through fake objects. The book will be of interest to students and scholars working in the fields of anthropology, material culture and cultural studies as well as to general readers interested in ethnographic alternatives to biographies of famous fakers and fakes.




The Critic


Book Description