You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
Away from the spotlight of the pop charts and the demands of mainstream audiences, original music is still being played and audiences continue to engage with innovative artists. This collection of fresh essays gathers together critical writing on such genres as Power Electronics, Black Metal, Neo-Folk, Martial Industrial, Hard-Core Punk and Horrorcore. The contributors report from the periphery of the music world, seeking to understand these new genres, how fans connect with artists and how artists engage with their audiences. Diverse music scenes are covered, from small-town New Zealand to Washington, D.C., and Ljubljana, Slovenia. Artists discussed include Coil, Laibach, Whitehouse, Insane Clown Posse, Wolves in the Throne Room, Turisas, Tyr, GG Allin and many others.
This is the first book- length academic study of the portrayal in contemporary historical crime fiction of Nazi Germany and the Holocaust and their legacies. It discusses novels written by five authors: David Downing, Philip Kerr, Luke McCallin, Joseph Kanon and David Thomas. Their work belongs to a subgenre of the historical crime novel that has emerged since the late 1980s to become a significant body of writing located at the intersection of crime fiction and Holocaust literature. The readings of these novels explore questions of form and genre to ask how popular fiction might approach the Holocaust. Themes of resistance and complicity and the relationship between them, and problems of guilt and responsibility are also discussed. This book also explores questions of justice to show how these novels explore social and moral justice, and vengeance and revenge, as alternatives to ordinary legal justice after the Holocaust.
In this book, Margaret Atwood’s dystopian novels—The Handmaid’s Tale, the MaddAddam trilogy, The Heart Goes Last, and The Testaments—are analyzed from the perspective provided by the combined views of the construction of the posthuman subject in its interactions with science and technology, and the Anthropocene as a cultural field of enquiry. Posthumanist critical concerns try to dismantle anthropocentric notions of the human and defend the need for a closer relationship between humanity and the environment. Supported by the exemplification of the generic characteristics of the cli-fi genre, this book discusses the effects of climate change, at the individual level, and as a collecti...
First multi-year cumulation covers six years: 1965-70.
None
This volume brings together the voices of a number of translation and interpreting scholars and educators representing several different cultures and language combinations, in order to present their views on, and experiences with, authentic experiential learning in professional translation and interpreting programmes. Readers who happen to be translator educators and who have not yet explored the possibility of incorporating authentic experiential learning into their teaching will be encouraged by this short collection of chapters to consider, or reconsider, this pedagogical option. In addition, the volume will inspire new and up-and-coming translator educators to reflect on their own understandings of what it means to know, to learn and to teach as they set out to educate translators competently and wisely in this still-new millennium. Finally, it also provides a context and justification for experiential learning on the wider canvas of teacher development and organizational learning. This second edition includes two new chapters (Chapters 10 and 11) and updated versions of many other chapters from the first edition.
None
This book constitutes the refereed proceedings of the 30th IFIP TC 11 International Information Security and Privacy Conference, SEC 2015, held in Hamburg, Germany, in May 2015. The 42 revised full papers presented were carefully reviewed and selected from 212 submissions. The papers are organized in topical sections on privacy, web security, access control, trust and identity management, network security, security management and human aspects of security, software security, applied cryptography, mobile and cloud services security, and cyber-physical systems and critical infrastructures security.