Marvel 1602 Neil Gaiman  
More Details

All's not well in the Marvel Universe in the year 1602 as strange storms are brewing and strange new powers are emerging! Spider-Man, the X-Men, Nick Fury, Dr. Strange, Daredevil, Dr. Doom, Black Widow, Captain America, and more appear in the waning days of the reign of Queen Elizabeth. As the world begins to change and enter into a new age, Gaiman weaves a thrilling mystery. How and why are these Marvel stars appearing nearly 400 years before they're supposed to? Collects Marvel 1602 #1-8.

0785123113
Protocol: How Control Exists after Decentralization (Leonardo Books) Alexander R. Galloway  
More Details

Is the Internet a vast arena of unrestricted communication and freely exchanged information or a regulated, highly structured virtual bureaucracy? In Protocol, Alexander Galloway argues that the founding principle of the Net is control, not freedom, and that the controlling power lies in the technical protocols that make network connections (and disconnections) possible. He does this by treating the computer as a textual medium that is based on a technological language, code. Code, he argues, can be subject to the same kind of cultural and literary analysis as any natural language; computer languages have their own syntax, grammar, communities, and cultures. Instead of relying on established theoretical approaches, Galloway finds a new way to write about digital media, drawing on his backgrounds in computer programming and critical theory. "Discipline-hopping is a necessity when it comes to complicated socio-technical topics like protocol," he writes in the preface.

Galloway begins by examining the types of protocols that exist, including TCP/IP, DNS, and HTML. He then looks at examples of resistance and subversion — hackers, viruses, cyberfeminism, Internet art — which he views as emblematic of the larger transformations now taking place within digital culture. Written for a nontechnical audience, Protocol serves as a necessary counterpoint to the wildly utopian visions of the Net that were so widespread in earlier days.

0262572338
Fads and Fallacies in the Name of Science Martin Gardner  
More Details

Fair, witty appraisal of cranks, quacks, and quackeries of science and pseudoscience: hollow earth, Velikovsky, orgone energy, Dianetics, flying saucers, Bridey Murphy, food and medical fads, etc. Revised, expanded In the Name of Science. "A very able and even-tempered presentation."—The New Yorker.

0486203948
Security and Usability Lorrie Cranor Simson Garfinkel  
More Details

Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues—both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them.

But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users.

Still, many people believe there is an inherent tradeoff between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless.

There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security & Usabilityis the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computerinteraction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research.

Security & Usabilitygroups 34 essays into six parts: Realigning Usability and Security—-with careful attention to user-centered design principles, security and usability can be synergistic.Authentication Mechanisms— techniques for identifying and authenticating computer users.Secure Systems—how system software can deliver or destroy a secure user experience.Privacy and Anonymity Systems—methods for allowing people to control the release of personal information.Commercializing Usability: The Vendor Perspective—specific experiences of security and software vendors (e.g.,IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability.The Classics—groundbreaking papers that sparked the field of security and usability.

This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.

0596008279
Garner on Language and Writing Bryan A. Garner  
More Details

The nation's foremost expert on writing, style, and usage, Bryan Garner, now collects his finest essays on writing, language, and style, and offers them in this in this massive anthology. These articles cover the gamut from advice for beginning writers, to essays on writing successfully as a professional. Also included are hilarious chapters on puns, curiosities, vocabulary use, and other comical writing escapades. Further chapters contain solid advice on making oneself a great writer, grammarian, and stylist. It's perfect for anyone who works with the written word.

159031588X
Hobbies Steven M. Gelber  
More Details

Whether it's needlepoint or woodworking, collecting stamps or dolls, everyone has a hobby, or is told they need one. But why do we fill our leisure time with the activities we do? And what do our hobbies say about our culture? Steven Gelber here traces the history and significance of hobbies from the mid-nineteenth century through the 1950s. Although hobbies are often touted as a break from work, Gelber demonstrates that they reflect and reproduce the values and activities of the workplace by bringing utilitarian rationality into the home, imitating the economic stratification of the marketplace, and reinforcing traditional gender roles.

Drawing on a wide array of social and cultural theory, Hobbiesfills a critical gap in American cultural history and provides a compelling new perspective on the meaning of leisure.

0231113935