You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
None
From New York to San Francisco, Times Square to the Tenderloin, graffiti artists, young people, radical environmentalists, and the homeless clash with police on city streets in an attempt take back urban spaces from the developers and "disneyfiers". Drawing on more than a decade of first-hand research, this lively account goes inside the worlds of street musicians, homeless punks, militant bicycle activists, high-risk "BASE jump" parachutists, skateboarders, outlaw radio operators, and hip hop graffiti artists, to explore the day-to-day skirmishes in the struggle over public life and public space.
A post-9/11 look at the new radicalism that has captured the imagination of activists worldwide.
This book constitutes the refereed proceedings of the 10th International Symposium, PETS 2010, held in Berlin, Germany in July 2010. The 16 revised full papers were carefully reviewed and selected from 57 submissions for inclusion in the book. The papers handle topics such as access control, privacy of web based search, anonymus webs of trust, security attacks, active timing attacks in lo-latency anonymus communication, network topology and web search with malicious adversaries
Most people shun the word conspiracy. The media has made it seem like all conspiracies are theories and that anyone who discusses them is a tinfoil hat. Yet anyone who has studied history or business knows that conspiracies are a part of the human experience. Once we realize this, the question arises: what conspiracies are occurring in our time that are significant? What perceptions of the world do we hold that are incorrect? Western civilization, although technologically advanced beyond the days of a Flat Earth or geocentric universe, is blind to it's own corruptions. Our governing practices were established over a century ago - and have evolved very little. If we could apply the success we...
This comprehensive narrative account of religion in America from 1607 through the present depicts the religious life of the American people within the context of American society. It addresses topics ranging from the European/Puritan origins of American religious thought, the ramifications of the "Great Awakening", the effect of nationhood on religious practice, and the shifting religious configuration of the late 20th century.
"For thousands of years, Jewish people have lived in a global diaspora, carrying culinary traditions bound by kosher law. For many, Ashkenazi and Sephardic cooking define Jewish cuisine today, but in The New Mediterranean Jewish Table, Joyce Goldstein expands the repertoire with a comprehensive collection of over 400 recipes from the greater Mediterranean, including North Africa, Italy, Greece, Turkey, Spain, Portugal, and the Middle East. This vibrant treasury is filled with vibrant and seasonal recipes that embrace fresh fruits and vegetables, whole grains, small portions of meat, poultry, and fish, enhanced by herbs and spices that create distinct regional flavors. By bringing Old World Mediterranean recipes into the modern home, Joyce Goldstein will inspire a new generation of home cooks as they prepare everyday meals and build their Shabbat and holiday menus"--Provided by publisher.
Modern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape. In The Tangled Web, Michal Zalewski, one of the world’s top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they’re fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points...
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring. For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way. You'll learn how to: –Set up a safe virtual environment to analyze malware –Quickly extract network signatures and host-based indicators –Use key analysis tools like IDA Pro, OllyDbg, and WinDbg –Overcome m...
Documenting 10 years of fun, radical, spontaneous bicycle demonstrations that challenge the autocentric world.