The Hidden Threat

Download The Hidden Threat PDF Online Free

Author :
Publisher : Interaction Point Games
ISBN 13 : 1936326027
Total Pages : 36 pages
Book Rating : 4.9/5 (363 download)

DOWNLOAD NOW!


Book Synopsis The Hidden Threat by : Brent Evanger

Download or read book The Hidden Threat written by Brent Evanger and published by Interaction Point Games. This book was released on 2010-06 with total page 36 pages. Available in PDF, EPUB and Kindle. Book excerpt:

Insider Threat

Download Insider Threat PDF Online Free

Author :
Publisher : IT Governance Ltd
ISBN 13 : 1849288402
Total Pages : 301 pages
Book Rating : 4.8/5 (492 download)

DOWNLOAD NOW!


Book Synopsis Insider Threat by : Julie Mehan

Download or read book Insider Threat written by Julie Mehan and published by IT Governance Ltd. This book was released on 2016-09-20 with total page 301 pages. Available in PDF, EPUB and Kindle. Book excerpt: Every type of organization is vulnerable to insider abuse, errors, and malicious attacks: Grant anyone access to a system and you automatically introduce a vulnerability. Insiders can be current or former employees, contractors, or other business partners who have been granted authorized access to networks, systems, or data, and all of them can bypass security measures through legitimate means. Insider Threat – A Guide to Understanding, Detecting, and Defending Against the Enemy from Within shows how a security culture based on international best practice can help mitigate the insider threat, providing short-term quick fixes and long-term solutions that can be applied as part of an effective insider threat program. Read this book to learn the seven organizational characteristics common to insider threat victims; the ten stages of a malicious attack; the ten steps of a successful insider threat program; and the construction of a three-tier security culture, encompassing artefacts, values, and shared assumptions. Perhaps most importantly, it also sets out what not to do, listing a set of worst practices that should be avoided. About the author Dr Julie Mehan is the founder and president of JEMStone Strategies and a principal in a strategic consulting firm in Virginia. She has delivered cybersecurity and related privacy services to senior commercial, Department of Defense, and federal government clients. Dr Mehan is also an associate professor at the University of Maryland University College, specializing in courses in cybersecurity, cyberterror, IT in organizations, and ethics in an Internet society

Intelligence and Security Informatics

Download Intelligence and Security Informatics PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3540715495
Total Pages : 332 pages
Book Rating : 4.5/5 (47 download)

DOWNLOAD NOW!


Book Synopsis Intelligence and Security Informatics by : Christopher C. Yang

Download or read book Intelligence and Security Informatics written by Christopher C. Yang and published by Springer. This book was released on 2007-07-10 with total page 332 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2007, held in Chengdu, China in April 2007. Coverage includes crime analysis, emergency response and surveillance, intrusion detection, network security, data and text mining, cybercrime and information access and security, intrusion detection, network security, terrorism informatics and crime analysis.

Rogue Threat

Download Rogue Threat PDF Online Free

Author :
Publisher : Variance LLC
ISBN 13 : 1935142097
Total Pages : 448 pages
Book Rating : 4.9/5 (351 download)

DOWNLOAD NOW!


Book Synopsis Rogue Threat by : A. J. Tata

Download or read book Rogue Threat written by A. J. Tata and published by Variance LLC. This book was released on 2009 with total page 448 pages. Available in PDF, EPUB and Kindle. Book excerpt: When a fleet of unmanned aerial drones disappears, the U.S. vice president turns to Matt Garrett, still nursing the wounds he suffered in the Phillipines. The situation worsens when an enemy combatant commandeers Garrett's jet, and a former Iraqi general with a startling link to Garrett's brother emerges from hiding. Matt discovers that terrorists have kidnapped the world's expert on nanotechnology - and that coupled with the missing Predators, the enemy may have created the ultimate capability to locate, track, target and kill. Meanwhile, the enemy has launched a flurry of attacks throughout America's heartland. The country is on the edge as citizens wonder whether the terrorists have the capacity to deal a devestating blow with weapons of mass destruction. But Garrett is beginning to suspect that the true enemy may be all to close to home.

Incident Response in the Age of Cloud

Download Incident Response in the Age of Cloud PDF Online Free

Author :
Publisher : Packt Publishing Ltd
ISBN 13 : 1800569920
Total Pages : 623 pages
Book Rating : 4.8/5 (5 download)

DOWNLOAD NOW!


Book Synopsis Incident Response in the Age of Cloud by : Dr. Erdal Ozkaya

Download or read book Incident Response in the Age of Cloud written by Dr. Erdal Ozkaya and published by Packt Publishing Ltd. This book was released on 2021-02-26 with total page 623 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn to identify security incidents and build a series of best practices to stop cyber attacks before they create serious consequences Key FeaturesDiscover Incident Response (IR), from its evolution to implementationUnderstand cybersecurity essentials and IR best practices through real-world phishing incident scenariosExplore the current challenges in IR through the perspectives of leading expertsBook Description Cybercriminals are always in search of new methods to infiltrate systems. Quickly responding to an incident will help organizations minimize losses, decrease vulnerabilities, and rebuild services and processes. In the wake of the COVID-19 pandemic, with most organizations gravitating towards remote working and cloud computing, this book uses frameworks such as MITRE ATT&CK® and the SANS IR model to assess security risks. The book begins by introducing you to the cybersecurity landscape and explaining why IR matters. You will understand the evolution of IR, current challenges, key metrics, and the composition of an IR team, along with an array of methods and tools used in an effective IR process. You will then learn how to apply these strategies, with discussions on incident alerting, handling, investigation, recovery, and reporting. Further, you will cover governing IR on multiple platforms and sharing cyber threat intelligence and the procedures involved in IR in the cloud. Finally, the book concludes with an “Ask the Experts” chapter wherein industry experts have provided their perspective on diverse topics in the IR sphere. By the end of this book, you should become proficient at building and applying IR strategies pre-emptively and confidently. What you will learnUnderstand IR and its significanceOrganize an IR teamExplore best practices for managing attack situations with your IR teamForm, organize, and operate a product security team to deal with product vulnerabilities and assess their severityOrganize all the entities involved in product security responseRespond to security vulnerabilities using tools developed by Keepnet Labs and BinalyzeAdapt all the above learnings for the cloudWho this book is for This book is aimed at first-time incident responders, cybersecurity enthusiasts who want to get into IR, and anyone who is responsible for maintaining business security. It will also interest CIOs, CISOs, and members of IR, SOC, and CSIRT teams. However, IR is not just about information technology or security teams, and anyone with a legal, HR, media, or other active business role would benefit from this book. The book assumes you have some admin experience. No prior DFIR experience is required. Some infosec knowledge will be a plus but isn’t mandatory.

Psychosis, Trauma and Dissociation

Download Psychosis, Trauma and Dissociation PDF Online Free

Author :
Publisher : John Wiley & Sons
ISBN 13 : 1118586026
Total Pages : 488 pages
Book Rating : 4.1/5 (185 download)

DOWNLOAD NOW!


Book Synopsis Psychosis, Trauma and Dissociation by : Andrew Moskowitz

Download or read book Psychosis, Trauma and Dissociation written by Andrew Moskowitz and published by John Wiley & Sons. This book was released on 2018-11-13 with total page 488 pages. Available in PDF, EPUB and Kindle. Book excerpt: An invaluable sourcebook on the complex relationship between psychosis, trauma, and dissociation, thoroughly revised and updated This revised and updated second edition of Psychosis, Trauma and Dissociation offers an important resource that takes a wide-ranging and in-depth look at the multifaceted relationship between trauma, dissociation and psychosis. The editors – leaders in their field – have drawn together more than fifty noted experts from around the world, to canvas the relevant literature from historical, conceptual, empirical and clinical perspectives. The result documents the impressive gains made over the past ten years in understanding multiple aspects of the interface between trauma, dissociation and psychosis. The historical/conceptual section clarifies the meaning of the terms dissociation, trauma and psychosis, proposes dissociation as central to the historical concepts of schizophrenia and borderline personality disorder, and considers unique development perspectives on delusions and the onset of schizophrenia. The empirical section of the text compares and contrasts psychotic and dissociative disorders from a wide range of perspectives, including phenomenology, childhood trauma, and memory and cognitive disturbances, whilst the clinical section focuses on the assessment, differential diagnosis and treatment of these disorders, along with proposals for new and novel hybrid disorders. This important resource: • Offers extensive updated coverage of the field, from all relevant perspectives • Brings together in one text contributions from scholars and clinicians working in diverse geographical and theoretical areas • Helps define and bring cohesion to this new and important field • Features nine new chapters on: conceptions of trauma, dissociation and psychosis, PTSD with psychotic features, delusions and memory, trauma treatment of psychotic symptoms, and differences between the diagnostic groups on hypnotizability, memory disturbances, brain imaging, auditory verbal hallucinations and psychological testing Written for clinicians, researchers and academics in the areas of trauma, child abuse, dissociation and psychosis, but relevant for psychiatrists, psychologists and psychotherapists working in any area, the revised second edition of Psychosis, Trauma and Dissociation makes an invaluable contribution to this important evolving field.

Computational Intelligence and Security

Download Computational Intelligence and Security PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 3540315985
Total Pages : 1166 pages
Book Rating : 4.5/5 (43 download)

DOWNLOAD NOW!


Book Synopsis Computational Intelligence and Security by : Yue Hao

Download or read book Computational Intelligence and Security written by Yue Hao and published by Springer. This book was released on 2006-06-18 with total page 1166 pages. Available in PDF, EPUB and Kindle. Book excerpt: The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.

Hidden Threat

Download Hidden Threat PDF Online Free

Author :
Publisher : Createspace Independent Publishing Platform
ISBN 13 : 9781508403913
Total Pages : 0 pages
Book Rating : 4.4/5 (39 download)

DOWNLOAD NOW!


Book Synopsis Hidden Threat by : Anthony J. Tata

Download or read book Hidden Threat written by Anthony J. Tata and published by Createspace Independent Publishing Platform. This book was released on 2015-02-08 with total page 0 pages. Available in PDF, EPUB and Kindle. Book excerpt: When Special Forces Colonel Zachary Garrett leads a team of commandos into an enemy base-camp inside forbidden Pakistan territory, the ensuing combat destroys his helicopter and all its occupants. After military officers notify his estranged daughter, 17-year-old Amanda Garrett, of her father's death, she is apathetic until they mention a $500,000 life insurance payout. But there's a catch: before she can collect her cash, Amanda must visit revered psychiatrist Riley Dwyer for counseling. With his eyes on Amanda's coming bonanza, Spartanburg, South Carolina bad-boy Del Dangurs keeps close tabs on Amanda and the long hoped-for windfall. Meanwhile, Matt Garrett, Amanda's uncle, leaves his CIA post and arrives in Afghanistan to recover Zachary's remains. But first he leads a daring vengeance raid into Pakistan that results in a clue to Zachary's fate. With hopeful evidence in hand, Matt continues the search for his brother as physical reminders of him are being destroyed or attacked back home, including Riley, who holds her own secrets close. The story alternates between thrilling combat scenes in Afghanistan and Pakistan as Matt pursues his brother's fate and attempts to complete a politically sensitive mission while Amanda races to uncover the truth about her father.

Ultimate Pentesting for Web Applications

Download Ultimate Pentesting for Web Applications PDF Online Free

Author :
Publisher : Orange Education Pvt Ltd
ISBN 13 : 8197081875
Total Pages : 405 pages
Book Rating : 4.1/5 (97 download)

DOWNLOAD NOW!


Book Synopsis Ultimate Pentesting for Web Applications by : Dr. Rohit Gautam

Download or read book Ultimate Pentesting for Web Applications written by Dr. Rohit Gautam and published by Orange Education Pvt Ltd. This book was released on 2024-05-09 with total page 405 pages. Available in PDF, EPUB and Kindle. Book excerpt: TAGLINE Learn how real-life hackers and pentesters break into systems. KEY FEATURES ● Dive deep into hands-on methodologies designed to fortify web security and penetration testing. ● Gain invaluable insights from real-world case studies that bridge theory with practice. ● Leverage the latest tools, frameworks, and methodologies to adapt to evolving cybersecurity landscapes and maintain robust web security posture. DESCRIPTION Discover the essential tools and insights to safeguard your digital assets with the "Ultimate Pentesting for Web Applications". This essential resource comprehensively covers ethical hacking fundamentals to advanced testing methodologies, making it a one-stop resource for web application security knowledge. Delve into the intricacies of security testing in web applications, exploring powerful tools like Burp Suite, ZAP Proxy, Fiddler, and Charles Proxy. Real-world case studies dissect recent security breaches, offering practical insights into identifying vulnerabilities and fortifying web applications against attacks. This handbook provides step-by-step tutorials, insightful discussions, and actionable advice, serving as a trusted companion for individuals engaged in web application security. Each chapter covers vital topics, from creating ethical hacking environments to incorporating proxy tools into web browsers. It offers essential knowledge and practical skills to navigate the intricate cybersecurity landscape confidently. By the end of this book, you will gain the expertise to identify, prevent, and address cyber threats, bolstering the resilience of web applications in the modern digital era. WHAT WILL YOU LEARN ● Learn how to fortify your digital assets by mastering the core principles of web application security and penetration testing. ● Dive into hands-on tutorials using industry-leading tools such as Burp Suite, ZAP Proxy, Fiddler, and Charles Proxy to conduct thorough security tests. ● Analyze real-world case studies of recent security breaches to identify vulnerabilities and apply practical techniques to secure web applications. ● Gain practical skills and knowledge that you can immediately apply to enhance the security posture of your web applications. WHO IS THIS BOOK FOR? This book is tailored for cybersecurity enthusiasts, ethical hackers, and web developers seeking to fortify their understanding of web application security. Prior familiarity with basic cybersecurity concepts and programming fundamentals, particularly in Python, is recommended to fully benefit from the content. TABLE OF CONTENTS 1. The Basics of Ethical Hacking 2. Linux Fundamentals 3. Networking Fundamentals 4. Cryptography and Steganography 5. Social Engineering Attacks 6. Reconnaissance and OSINT 7. Security Testing and Proxy Tools 8. Cross-Site Scripting 9. Broken Access Control 10. Authentication Bypass Techniques Index

Paranoia

Download Paranoia PDF Online Free

Author :
Publisher : Psychology Press
ISBN 13 : 9781841695228
Total Pages : 212 pages
Book Rating : 4.6/5 (952 download)

DOWNLOAD NOW!


Book Synopsis Paranoia by : Daniel Freeman

Download or read book Paranoia written by Daniel Freeman and published by Psychology Press. This book was released on 2004 with total page 212 pages. Available in PDF, EPUB and Kindle. Book excerpt: Scholarly, comprehensive, illustrated by clinical examples throughout and written by leading researchers in this field, this study defines the phenomenon of paranoia in detail and analyzes the content of persecutory delusions.

ECCWS 2019 18th European Conference on Cyber Warfare and Security

Download ECCWS 2019 18th European Conference on Cyber Warfare and Security PDF Online Free

Author :
Publisher : Academic Conferences and publishing limited
ISBN 13 : 1912764296
Total Pages : pages
Book Rating : 4.9/5 (127 download)

DOWNLOAD NOW!


Book Synopsis ECCWS 2019 18th European Conference on Cyber Warfare and Security by : Tiago Cruz

Download or read book ECCWS 2019 18th European Conference on Cyber Warfare and Security written by Tiago Cruz and published by Academic Conferences and publishing limited. This book was released on 2019-07-04 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Interventions

Download Interventions PDF Online Free

Author :
Publisher : Springer
ISBN 13 : 1403981566
Total Pages : 247 pages
Book Rating : 4.4/5 (39 download)

DOWNLOAD NOW!


Book Synopsis Interventions by : E. Castelli

Download or read book Interventions written by E. Castelli and published by Springer. This book was released on 2004-11-26 with total page 247 pages. Available in PDF, EPUB and Kindle. Book excerpt: This collection brings together top scholars to discuss the significance of violence from a global perspective and the intersections between the global structures of violence and more localized and intimate forms of violence. Activists and academics consider questions such as; are there situations in which violence should be politically supported? Are non-violent or anti-war movements in the US able to effectively respond to violence? Do we need to rethink our understanding of both 'religion' and 'secularism' in light of the current world situation? Have new paradigms been developed in response to violence? The essays in this collection offer inclusive analysis of particular situations and creative alternatives to the omnipresence of violence.

Network Security Through Data Analysis

Download Network Security Through Data Analysis PDF Online Free

Author :
Publisher : "O'Reilly Media, Inc."
ISBN 13 : 149196281X
Total Pages : 427 pages
Book Rating : 4.4/5 (919 download)

DOWNLOAD NOW!


Book Synopsis Network Security Through Data Analysis by : Michael Collins

Download or read book Network Security Through Data Analysis written by Michael Collins and published by "O'Reilly Media, Inc.". This book was released on 2017-09-08 with total page 427 pages. Available in PDF, EPUB and Kindle. Book excerpt: Traditional intrusion detection and logfile analysis are no longer enough to protect today’s complex networks. In the updated second edition of this practical guide, security researcher Michael Collins shows InfoSec personnel the latest techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to harden and defend the systems within it. In three sections, this book examines the process of collecting and organizing data, various tools for analysis, and several different analytic scenarios and techniques. New chapters focus on active monitoring and traffic manipulation, insider threat detection, data mining, regression and machine learning, and other topics. You’ll learn how to: Use sensors to collect network, service, host, and active domain data Work with the SiLK toolset, Python, and other tools and techniques for manipulating data you collect Detect unusual phenomena through exploratory data analysis (EDA), using visualization and mathematical techniques Analyze text data, traffic behavior, and communications mistakes Identify significant structures in your network with graph analysis Examine insider threat data and acquire threat intelligence Map your network and identify significant hosts within it Work with operations to develop defenses and analysis techniques

Practical Cyber Threat Intelligence

Download Practical Cyber Threat Intelligence PDF Online Free

Author :
Publisher : BPB Publications
ISBN 13 : 9355510292
Total Pages : 525 pages
Book Rating : 4.3/5 (555 download)

DOWNLOAD NOW!


Book Synopsis Practical Cyber Threat Intelligence by : Dr. Erdal Ozkaya

Download or read book Practical Cyber Threat Intelligence written by Dr. Erdal Ozkaya and published by BPB Publications. This book was released on 2022-05-27 with total page 525 pages. Available in PDF, EPUB and Kindle. Book excerpt: Knowing your threat actors together with your weaknesses and the technology will master your defense KEY FEATURES ● Gain practical experience with cyber threat intelligence by using the book's lab sections. ● Improve your CTI skills by designing a threat intelligence system. ● Assisting you in bridging the gap between cybersecurity teams. ● Developing your knowledge of Cyber Intelligence tools and how to choose them. DESCRIPTION When your business assets are threatened or exposed to cyber risk, you want a high-quality threat hunting team armed with cutting-edge threat intelligence to build the shield. Unfortunately, regardless of how effective your cyber defense solutions are, if you are unfamiliar with the tools, strategies, and procedures used by threat actors, you will be unable to stop them. This book is intended to provide you with the practical exposure necessary to improve your cyber threat intelligence and hands-on experience with numerous CTI technologies. This book will teach you how to model threats by gathering adversarial data from various sources, pivoting on the adversarial data you have collected, developing the knowledge necessary to analyse them and discriminating between bad and good information. The book develops and hones the analytical abilities necessary for extracting, comprehending, and analyzing threats comprehensively. The readers will understand the most common indicators of vulnerability that security professionals can use to determine hacking attacks or threats in their systems quickly. In addition, the reader will investigate and illustrate ways to forecast the scope of attacks and assess the potential harm they can cause. WHAT YOU WILL LEARN ● Hands-on experience in developing a powerful and robust threat intelligence model. ● Acquire the ability to gather, exploit, and leverage adversary data. ● Recognize the difference between bad intelligence and good intelligence. ● Creating heatmaps and various visualization reports for better insights. ● Investigate the most typical indicators of security compromise. ● Strengthen your analytical skills to understand complicated threat scenarios better. WHO THIS BOOK IS FOR The book is designed for aspiring Cyber Threat Analysts, Security Analysts, Cybersecurity specialists, Security Consultants, and Network Security Professionals who wish to acquire and hone their analytical abilities to identify and counter threats quickly. TABLE OF CONTENTS 1. Basics of Threat Analysis and Modeling 2. Formulate a Threat Intelligence Model 3. Adversary Data Collection Sources & Methods 4. Pivot Off and Extracting Adversarial Data 5. Primary Indicators of Security Compromise 6. Identify & Build Indicators of Compromise 7. Conduct Threat Assessments In Depth 8. Produce Heat Maps, Infographics & Dashboards 9. Build Reliable & Robust Threat Intelligence System 10. Learn Statistical Approaches for Threat Intelligence 11. Develop Analytical Skills for Complex Threats 12. Planning for Disaster

SECRET POWER

Download SECRET POWER PDF Online Free

Author :
Publisher : Le Tran Bao Phuong
ISBN 13 :
Total Pages : 285 pages
Book Rating : 4./5 ( download)

DOWNLOAD NOW!


Book Synopsis SECRET POWER by : Le Tran Bao Phuong

Download or read book SECRET POWER written by Le Tran Bao Phuong and published by Le Tran Bao Phuong. This book was released on 2017-01-15 with total page 285 pages. Available in PDF, EPUB and Kindle. Book excerpt: Introduction Easy to understand, deep and profound, Phuong has completely made readers infatuated with his book Secret Power – it is about a type of power which could disseminate profoundly and form powerful thought, opinion or knowledge which in turn can be used to shape the attitude and influence the emotion of the crowd, thus directing the crowd’s behavior according to the will of the user. Phuong also shows us quite a few things about dark PR techniques (Dark Art) in business which are being used to manipulate and to mislead public opinion as well as to eliminate enemies, to help us identify and protect ourselves, thus enhancing our ability to control the society. How to apply the secret power to shape the attitude and to influence the emotion of the crowd will be presented in detail in this book along with many practical examples to help you have an easier time understanding and applying it. One notable thing about the Secret Power is that it contains power of the modern doctrine of PR - a very new approach of PR to the age-old business problems (sales, building and protecting company's reputation). The modern doctrine of PR is more comprehensive than the PR concepts in the past because it contains both value of professional knowledge and value of social contribution. Regarding the value of social contribution, the modern PR doctrine publicizes techniques which can help people perceive PR correctly and make it become more popular to the public. In terms of the value of professional knowledge, the modern PR doctrine shows us how to apply the power of 5 Supreme Arts to help enterprises achieve their goals as well as a sustainable development. As containing in it both the value of professional knowledge and the value of social contribution, this book is considered to be one of the remarkable efforts to bring the PR industry back to its roots and its original mission which is contributing to the building of a healthy information society and a transparent business environment, thus enhancing the society. Video: https://youtu.be/SqQzTYB7oxE

The Two Powers

Download The Two Powers PDF Online Free

Author :
Publisher : University of Pennsylvania Press
ISBN 13 : 0812250869
Total Pages : 328 pages
Book Rating : 4.8/5 (122 download)

DOWNLOAD NOW!


Book Synopsis The Two Powers by : Brett Edward Whalen

Download or read book The Two Powers written by Brett Edward Whalen and published by University of Pennsylvania Press. This book was released on 2019-06-25 with total page 328 pages. Available in PDF, EPUB and Kindle. Book excerpt: Historians commonly designate the High Middle Ages as the era of the "papal monarchy," when the popes of Rome vied with secular rulers for spiritual and temporal supremacy. Indeed, in many ways the story of the papal monarchy encapsulates that of medieval Europe as often remembered: a time before the modern age, when religious authorities openly clashed with emperors, kings, and princes for political mastery of their world, claiming sovereignty over Christendom, the universal community of Christian kingdoms, churches, and peoples. At no point was this conflict more widespread and dramatic than during the papacies of Gregory IX (1227-1241) and Innocent IV (1243-1254). Their struggles with the Hohenstaufen Emperor Frederick II (1212-1250) echoed in the corridors of power and the court of public opinion, ranging from the battlefields of Italy to the streets of Jerusalem. In The Two Powers, Brett Edward Whalen has written a new history of this combative relationship between the thirteenth-century papacy and empire. Countering the dominant trend of modern historiography, which focuses on Frederick instead of the popes, he redirects our attention to the papal side of the historical equation. By doing so, Whalen highlights the ways in which Gregory and Innocent acted politically and publicly, realizing their priestly sovereignty through the networks of communication, performance, and documentary culture that lay at the unique disposal of the Apostolic See. Covering pivotal decades that included the last major crusades, the birth of the Inquisition, and the unexpected invasion of the Mongols, The Two Powers shows how Gregory and Innocent's battles with Frederick shaped the historical destiny of the thirteenth-century papacy and its role in the public realm of medieval Christendom.

The Secret Country

Download The Secret Country PDF Online Free

Author :
Publisher : Rodopi
ISBN 13 : 9042021403
Total Pages : 299 pages
Book Rating : 4.0/5 (42 download)

DOWNLOAD NOW!


Book Synopsis The Secret Country by : Sarah Robertson

Download or read book The Secret Country written by Sarah Robertson and published by Rodopi. This book was released on 2007 with total page 299 pages. Available in PDF, EPUB and Kindle. Book excerpt: The Secret Country is the first monograph on the work of the contemporary American novelist Jayne Anne Phillips. Through detailed and innovative textual analysis this study considers the southern aspects of Phillips' writing. Robertson demonstrates the importance of Phillips' place within the southern literary canon by identifying the echoes of William Faulkner, Katherine Anne Porter and Edgar Allan Poe that permeate her work. Phillips' complex attachments to a regional past are explored through both psychoanalytical and historical materialist approaches, revealing not only the writer's distinctly southern preoccupations, but also her reflections on contemporary American society. Tracing the family dynamics in Phillips' work from the turn of the twentieth century to the present, this book examines the effects of increased modernization and capitalization on everyday interactions, and questions the nature of the author's backward glance to the past. This volume is of interest for a wide audience, particularly students and scholars of contemporary southern and American literature.