Memory Made, Hacked, and Outsourced
Title | Memory Made, Hacked, and Outsourced PDF eBook |
Author | Chia-Chieh Mavis Tseng |
Publisher | Springer Nature |
Pages | 152 |
Release | 2023-08-02 |
Genre | Literary Criticism |
ISBN | 9811992517 |
This book probes the complex relationship between memory and storytelling in contemporary literature. It not only examines how memory is constantly made and remade through words and stories but also explores how literary practices and imagination are shaping new concepts of memory in the 21st century. By analyzing the selected novels – Penelope Lively’s The Photograph, Tom McCarthy’s Remainder, Julian Barnes’ The Sense of an Ending and The Only Story, Kazuo Ishiguro’s Never Let Me Go, and Felicia Yap’s Yesterday – this book explores the dynamic interplay of remembering and forgetting, and redefines the relationship between fiction and memory in the 21st century.
Memory Made, Hacked, and Outsourced
Title | Memory Made, Hacked, and Outsourced PDF eBook |
Author | Chia-Chieh Mavis Tseng |
Publisher | |
Pages | 0 |
Release | 2023 |
Genre | |
ISBN | 9789811992520 |
This book probes the complex relationship between memory and storytelling in contemporary literature. It not only examines how memory is constantly made and remade through words and stories but also explores how literary practices and imagination are shaping new concepts of memory in the 21st century. By analyzing the selected novels - Penelope Lively's The Photograph, Tom McCarthy's Remainder, Julian Barnes' The Sense of an Ending and The Only Story, Kazuo Ishiguro's Never Let Me Go, and Felicia Yap's Yesterday - this book explores the dynamic interplay of remembering and forgetting, and redefines the relationship between fiction and memory in the 21st century. Chia-Chieh Mavis Tseng is the director and associate professor in the Language Center at Taipei Medical University. She received her Ph.D. in Comparative Literature at Rutgers, The State University of New Jersey. Her publications have addressed memory studies, film studies, visual culture, urban modernity, Amy Levy, Kate Chopin, Virginia Woolf, Kazuo Ishiguro, Walter Benjamin, and Jacques Tati's works. Her several research projects (2017-2023), funded by the National Science and Technology Council in Taiwan, R.O.C., focus on representations of memory in contemporary novels and films.
The Basics of Hacking and Penetration Testing
Title | The Basics of Hacking and Penetration Testing PDF eBook |
Author | Patrick Engebretson |
Publisher | Elsevier |
Pages | 223 |
Release | 2013-06-24 |
Genre | Computers |
ISBN | 0124116418 |
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test
Out Of Control
Title | Out Of Control PDF eBook |
Author | Kevin Kelly |
Publisher | Basic Books |
Pages | 666 |
Release | 2009-04-30 |
Genre | Science |
ISBN | 078674703X |
Out of Control chronicles the dawn of a new era in which the machines and systems that drive our economy are so complex and autonomous as to be indistinguishable from living things.
Neptune's Brood
Title | Neptune's Brood PDF eBook |
Author | Charles Stross |
Publisher | Penguin |
Pages | 335 |
Release | 2013 |
Genre | Androids |
ISBN | 0425256774 |
After being stalked across the galaxy by an assassin, post-human Krina Alzon-114 journeys to the water-world Shin-Tethys in search of her sister.
EBOOK: Basic Marketing
Title | EBOOK: Basic Marketing PDF eBook |
Author | William Perreault |
Publisher | McGraw Hill |
Pages | 783 |
Release | 2013-04-16 |
Genre | Business & Economics |
ISBN | 0077173554 |
Built on a strong foundation, Basic Marketing 18e with ConnectPlus and LearnSmart provides an integrated teaching and learning solution for presenting the four Ps framework and managerial orientation with a strategy planning focus. The Perreault franchise was the pioneer of the “four Ps” in the introductory marketing course. The unifying focus of Basic Marketing has always been on how to make marketing decisions in deciding what customers to focus on and how best to meet their needs. Consistent with our belief in continuous quality improvement, this edition has been critically revised, updated, and rewritten to reflect new concepts, new examples, recent “best practices,” and to tightly integrate the best digital tools in the industry for ensuring that students are prepared to engage in classroom lectures and pursue future business and marketing careers.
The Art of Intrusion
Title | The Art of Intrusion PDF eBook |
Author | Kevin D. Mitnick |
Publisher | John Wiley & Sons |
Pages | 354 |
Release | 2009-03-17 |
Genre | Computers |
ISBN | 0470503823 |
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.