Author: Josephine Wolff
Publisher: MIT Press
ISBN: 026234954X
Category : Computers
Languages : en
Pages : 335
Book Description
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
You'll See This Message When It Is Too Late
Author: Josephine Wolff
Publisher: MIT Press
ISBN: 026234954X
Category : Computers
Languages : en
Pages : 335
Book Description
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
Publisher: MIT Press
ISBN: 026234954X
Category : Computers
Languages : en
Pages : 335
Book Description
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
You'll See This Message When It Is Too Late
Author: Josephine Wolff
Publisher: MIT Press
ISBN: 0262038854
Category : Computers
Languages : en
Pages : 335
Book Description
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
Publisher: MIT Press
ISBN: 0262038854
Category : Computers
Languages : en
Pages : 335
Book Description
What we can learn from the aftermath of cybersecurity breaches and how we can do a better job protecting online data. Cybersecurity incidents make the news with startling regularity. Each breach—the theft of 145.5 million Americans' information from Equifax, for example, or the Russian government's theft of National Security Agency documents, or the Sony Pictures data dump—makes headlines, inspires panic, instigates lawsuits, and is then forgotten. The cycle of alarm and amnesia continues with the next attack, and the one after that. In this book, cybersecurity expert Josephine Wolff argues that we shouldn't forget about these incidents, we should investigate their trajectory, from technology flaws to reparations for harm done to their impact on future security measures. We can learn valuable lessons in the aftermath of cybersecurity breaches. Wolff describes a series of significant cybersecurity incidents between 2005 and 2015, mapping the entire life cycle of each breach in order to identify opportunities for defensive intervention. She outlines three types of motives underlying these attacks—financial gain, espionage, and public humiliation of the victims—that have remained consistent through a decade of cyberattacks, offers examples of each, and analyzes the emergence of different attack patterns. The enormous TJX breach in 2006, for instance, set the pattern for a series of payment card fraud incidents that led to identity fraud and extortion; the Chinese army conducted cyberespionage campaigns directed at U.S.-based companies from 2006 to 2014, sparking debate about the distinction between economic and political espionage; and the 2014 breach of the Ashley Madison website was aimed at reputations rather than bank accounts.
If You're Reading This, It's Too Late
Author: Pseudonymous Bosch
Publisher: Little, Brown Books for Young Readers
ISBN: 0316041033
Category : Juvenile Fiction
Languages : en
Pages : 319
Book Description
Beware! Dangerous secrets lie between the pages of this book. OK, I warned you. But if you think I'll give anything away, or tell you that this is the sequel to my first literary endeavor, The Name of This Book is Secret, you're wrong. I'm not going to remind you of how we last left our heroes, Cass and Max-Ernest, as they awaited intiation into the mysterious Terces Society, or the ongoing fight against the evil Dr. L and Ms. Mauvais. I certainly won't be telling you about how the kids stumble upon the Museum of Magic, where they finally meet the amazing Pietro! Oh, blast! I've done it again. Well, at least I didn't tell you about the missing Sound Prism, the nefarious Lord Pharaoh, or the mysterious creature born in a bottle over 500 years ago, the key to the biggest secret of all. I really can't help myself, now can I? Let's face it - if you're reading this, it's too late.
Publisher: Little, Brown Books for Young Readers
ISBN: 0316041033
Category : Juvenile Fiction
Languages : en
Pages : 319
Book Description
Beware! Dangerous secrets lie between the pages of this book. OK, I warned you. But if you think I'll give anything away, or tell you that this is the sequel to my first literary endeavor, The Name of This Book is Secret, you're wrong. I'm not going to remind you of how we last left our heroes, Cass and Max-Ernest, as they awaited intiation into the mysterious Terces Society, or the ongoing fight against the evil Dr. L and Ms. Mauvais. I certainly won't be telling you about how the kids stumble upon the Museum of Magic, where they finally meet the amazing Pietro! Oh, blast! I've done it again. Well, at least I didn't tell you about the missing Sound Prism, the nefarious Lord Pharaoh, or the mysterious creature born in a bottle over 500 years ago, the key to the biggest secret of all. I really can't help myself, now can I? Let's face it - if you're reading this, it's too late.
Secrets and Lies
Author: Bruce Schneier
Publisher: John Wiley & Sons
ISBN: 1119092434
Category : Computers
Languages : en
Pages : 453
Book Description
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
Publisher: John Wiley & Sons
ISBN: 1119092434
Category : Computers
Languages : en
Pages : 453
Book Description
This anniversary edition which has stood the test of time as a runaway best-seller provides a practical, straight-forward guide to achieving security throughout computer networks. No theory, no math, no fiction of what should be working but isn't, just the facts. Known as the master of cryptography, Schneier uses his extensive field experience with his own clients to dispel the myths that often mislead IT managers as they try to build secure systems. A much-touted section: Schneier's tutorial on just what cryptography (a subset of computer security) can and cannot do for them, has received far-reaching praise from both the technical and business community. Praise for Secrets and Lies "This is a business issue, not a technical one, and executives can no longer leave such decisions to techies. That's why Secrets and Lies belongs in every manager's library."-Business Week "Startlingly lively....a jewel box of little surprises you can actually use."-Fortune "Secrets is a comprehensive, well-written work on a topic few business leaders can afford to neglect."-Business 2.0 "Instead of talking algorithms to geeky programmers, [Schneier] offers a primer in practical computer security aimed at those shopping, communicating or doing business online-almost everyone, in other words."-The Economist "Schneier...peppers the book with lively anecdotes and aphorisms, making it unusually accessible."-Los Angeles Times With a new and compelling Introduction by the author, this premium edition will become a keepsake for security enthusiasts of every stripe.
It's Never Too Late to Be What You Might Have Been
Author: BJ Gallagher
Publisher: Cleis Press
ISBN: 1936740699
Category : Self-Help
Languages : en
Pages : 188
Book Description
Inspired by the timeless quote by the great writer George Eliot, It's Never Too Late to Be What You Might Have Been is a guidebook to getting the life you've always wanted. Written in best-selling author BJ Gallagher's trademark warm and witty style, this book is written for, in her own words, "Everyone who has let fear or busyness or any reason good or bad get in the way of achieving your highest goals and long-held dreams, and isn't that everyone?" Whether you are a brand new college graduate going out into the big, wide world, a business executive escaping burnout, or a 40-something mom looking for a 'second life,' this book is a wonderful combination of great advice, step-by-step guidelines, and pure inspiration to listen to and honor your inner voice and seize not just the day, but the rest of your life!
Publisher: Cleis Press
ISBN: 1936740699
Category : Self-Help
Languages : en
Pages : 188
Book Description
Inspired by the timeless quote by the great writer George Eliot, It's Never Too Late to Be What You Might Have Been is a guidebook to getting the life you've always wanted. Written in best-selling author BJ Gallagher's trademark warm and witty style, this book is written for, in her own words, "Everyone who has let fear or busyness or any reason good or bad get in the way of achieving your highest goals and long-held dreams, and isn't that everyone?" Whether you are a brand new college graduate going out into the big, wide world, a business executive escaping burnout, or a 40-something mom looking for a 'second life,' this book is a wonderful combination of great advice, step-by-step guidelines, and pure inspiration to listen to and honor your inner voice and seize not just the day, but the rest of your life!
Cyberinsurance Policy
Author: Josephine Wolff
Publisher: MIT Press
ISBN: 026237076X
Category : Business & Economics
Languages : en
Pages : 291
Book Description
Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early “Internet Security Liability” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite—to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood.
Publisher: MIT Press
ISBN: 026237076X
Category : Business & Economics
Languages : en
Pages : 291
Book Description
Why cyberinsurance has not improved cybersecurity and what governments can do to make it a more effective tool for cyber risk management. As cybersecurity incidents—ranging from data breaches and denial-of-service attacks to computer fraud and ransomware—become more common, a cyberinsurance industry has emerged to provide coverage for any resulting liability, business interruption, extortion payments, regulatory fines, or repairs. In this book, Josephine Wolff offers the first comprehensive history of cyberinsurance, from the early “Internet Security Liability” policies in the late 1990s to the expansive coverage offered today. Drawing on legal records, government reports, cyberinsurance policies, and interviews with regulators and insurers, Wolff finds that cyberinsurance has not improved cybersecurity or reduced cyber risks. Wolff examines the development of cyberinsurance, comparing it to other insurance sectors, including car and flood insurance; explores legal disputes between insurers and policyholders about whether cyber-related losses were covered under policies designed for liability, crime, or property and casualty losses; and traces the trend toward standalone cyberinsurance policies and government efforts to regulate and promote the industry. Cyberinsurance, she argues, is ineffective at curbing cybersecurity losses because it normalizes the payment of online ransoms, whereas the goal of cybersecurity is the opposite—to disincentivize such payments to make ransomware less profitable. An industry built on modeling risk has found itself confronted by new technologies before the risks posed by those technologies can be fully understood.
It's Only Too Late If You Don't Start Now
Author: Barbara Sher
Publisher: Dell
ISBN: 0307764044
Category : Self-Help
Languages : en
Pages : 355
Book Description
It’s never too late—to reclaim your creativity, recapture long-lost dreams, and embark on an exciting new life! New York Times bestselling author Barbara Sher has transformed the lives of millions with her phenomenally successful books, workshops, and television appearances. Now, in a provocative new book, she offers a bold new strategy for creating a “second life”—no matter what your age! Combining step-by-step exercise with motivational techniques, she reminds you of the dreams you abandoned along the path to adulthood, providing all the tools you need to weave those aspirations into a richly textured, rewarding new life. According to Sher, it’s never too late to start over. In fact, life’s “second half” is the perfect time to do so, when dreams for the future and experiences of the past finally come together. So don’t wait. Discover: • How to make life’s built-in “time limit” work for you • How to identify—and overcome—the illusions that stand between you and your dreams • Which of your “regrets” can point the way to a more rewarding life • How to rediscover the inspired, enthusiastic adventurer you wanted to be before you became the responsible adult you had to be • Dozens of ways to recapture your freedom, reclaim a sense of wonder, and embark on an amazing new beginning
Publisher: Dell
ISBN: 0307764044
Category : Self-Help
Languages : en
Pages : 355
Book Description
It’s never too late—to reclaim your creativity, recapture long-lost dreams, and embark on an exciting new life! New York Times bestselling author Barbara Sher has transformed the lives of millions with her phenomenally successful books, workshops, and television appearances. Now, in a provocative new book, she offers a bold new strategy for creating a “second life”—no matter what your age! Combining step-by-step exercise with motivational techniques, she reminds you of the dreams you abandoned along the path to adulthood, providing all the tools you need to weave those aspirations into a richly textured, rewarding new life. According to Sher, it’s never too late to start over. In fact, life’s “second half” is the perfect time to do so, when dreams for the future and experiences of the past finally come together. So don’t wait. Discover: • How to make life’s built-in “time limit” work for you • How to identify—and overcome—the illusions that stand between you and your dreams • Which of your “regrets” can point the way to a more rewarding life • How to rediscover the inspired, enthusiastic adventurer you wanted to be before you became the responsible adult you had to be • Dozens of ways to recapture your freedom, reclaim a sense of wonder, and embark on an amazing new beginning
This Is Why We Can't Have Nice Things
Author: Whitney Phillips
Publisher: MIT Press
ISBN: 0262028948
Category : Computers
Languages : en
Pages : 251
Book Description
Internet trolls live to upset as many people as possible, using all the technical and psychological tools at their disposal. They gleefully whip the media into a frenzy over a fake teen drug crisis; they post offensive messages on Facebook memorial pages, traumatizing grief-stricken friends and family; they use unabashedly racist language and images. They take pleasure in ruining a complete stranger's day and find amusement in their victim's anguish. In short, trolling is the obstacle to a kinder, gentler Internet. To quote a famous Internet meme, trolling is why we can't have nice things online. Or at least that's what we have been led to believe. In this provocative book, Whitney Phillips argues that trolling, widely condemned as obscene and deviant, actually fits comfortably within the contemporary media landscape. Trolling may be obscene, but, Phillips argues, it isn't all that deviant. Trolls' actions are born of and fueled by culturally sanctioned impulses -- which are just as damaging as the trolls' most disruptive behaviors. Phillips describes, for example, the relationship between trolling and sensationalist corporate media -- pointing out that for trolls, exploitation is a leisure activity; for media, it's a business strategy. She shows how trolls, "the grimacing poster children for a socially networked world," align with social media. And she documents how trolls, in addition to parroting media tropes, also offer a grotesque pantomime of dominant cultural tropes, including gendered notions of dominance and success and an ideology of entitlement. We don't just have a trolling problem, Phillips argues; we have a culture problem. This Is Why We Can't Have Nice Things isn't only about trolls; it's about a culture in which trolls thrive.
Publisher: MIT Press
ISBN: 0262028948
Category : Computers
Languages : en
Pages : 251
Book Description
Internet trolls live to upset as many people as possible, using all the technical and psychological tools at their disposal. They gleefully whip the media into a frenzy over a fake teen drug crisis; they post offensive messages on Facebook memorial pages, traumatizing grief-stricken friends and family; they use unabashedly racist language and images. They take pleasure in ruining a complete stranger's day and find amusement in their victim's anguish. In short, trolling is the obstacle to a kinder, gentler Internet. To quote a famous Internet meme, trolling is why we can't have nice things online. Or at least that's what we have been led to believe. In this provocative book, Whitney Phillips argues that trolling, widely condemned as obscene and deviant, actually fits comfortably within the contemporary media landscape. Trolling may be obscene, but, Phillips argues, it isn't all that deviant. Trolls' actions are born of and fueled by culturally sanctioned impulses -- which are just as damaging as the trolls' most disruptive behaviors. Phillips describes, for example, the relationship between trolling and sensationalist corporate media -- pointing out that for trolls, exploitation is a leisure activity; for media, it's a business strategy. She shows how trolls, "the grimacing poster children for a socially networked world," align with social media. And she documents how trolls, in addition to parroting media tropes, also offer a grotesque pantomime of dominant cultural tropes, including gendered notions of dominance and success and an ideology of entitlement. We don't just have a trolling problem, Phillips argues; we have a culture problem. This Is Why We Can't Have Nice Things isn't only about trolls; it's about a culture in which trolls thrive.
Never Too Late
Author: Kathryn Kuhlman
Publisher: Bridge Logos Foundation
ISBN: 9780882707204
Category : Religion
Languages : en
Pages : 84
Book Description
This is Kathryn Kuhlman's account of Marion Burgio, a middle aged Catholic woman who developed an extremely debilitating form of multiple sclerosis. After countless operations and medical procedures, she was unable to walk and was nearly blind--until she experienced a dramatic divine healing.
Publisher: Bridge Logos Foundation
ISBN: 9780882707204
Category : Religion
Languages : en
Pages : 84
Book Description
This is Kathryn Kuhlman's account of Marion Burgio, a middle aged Catholic woman who developed an extremely debilitating form of multiple sclerosis. After countless operations and medical procedures, she was unable to walk and was nearly blind--until she experienced a dramatic divine healing.
A Breath Too Late
Author: Rocky Callen
Publisher: Henry Holt and Company (BYR)
ISBN: 1250238803
Category : Young Adult Fiction
Languages : en
Pages : 272
Book Description
For fans of Girl in Pieces, All the Bright Places, and Girl, Interrupted comes a haunting and breathtaking YA contemporary debut novel that packs a powerful message: hope can be found in the darkness. "Raw, heartbreaking, and poignant." —New York Times-bestselling author Kathleen Glasgow A Chicago Public Library and Kirkus Best Book of the Year! Seventeen-year-old Ellie had no hope left. Yet the day after she dies by suicide, she finds herself in the midst of an out-of-body experience. She is a spectator, swaying between past and present, retracing the events that unfolded prior to her death. But there are gaps in her memory, fractured pieces Ellie is desperate to re-assemble. There's her mother, a songbird who wanted to break free from her oppressive cage. The boy made of brushstrokes and goofy smiles who brought color into a gray world. Her brooding father, with his sad puppy eyes and clenched fists. And Ellie's determined to find out why a piece of her was left behind. Told in epistolary-like style, Rocky Callen's deeply moving A Breath Too Late sensitively examines the beautiful and terrible moments that make up a life and the possibilities that live in even the darkest of places. Perfect for fans of the critically-acclaimed Speak, I’ll Give You the Sun, and If I Stay. "An exquisitely played love song to life, in all of its hurts, wonders, memories, and loves." –Jeff Zentner, Morris Award winning author of The Serpent King and Goodbye Days "A haunting story, punctuated with brilliant points of hope and light. This is an important story. A necessary story . . . Callen’s writing radiates with passion, honesty and love." —National Book Award finalist and Printz Award–winning author An Na
Publisher: Henry Holt and Company (BYR)
ISBN: 1250238803
Category : Young Adult Fiction
Languages : en
Pages : 272
Book Description
For fans of Girl in Pieces, All the Bright Places, and Girl, Interrupted comes a haunting and breathtaking YA contemporary debut novel that packs a powerful message: hope can be found in the darkness. "Raw, heartbreaking, and poignant." —New York Times-bestselling author Kathleen Glasgow A Chicago Public Library and Kirkus Best Book of the Year! Seventeen-year-old Ellie had no hope left. Yet the day after she dies by suicide, she finds herself in the midst of an out-of-body experience. She is a spectator, swaying between past and present, retracing the events that unfolded prior to her death. But there are gaps in her memory, fractured pieces Ellie is desperate to re-assemble. There's her mother, a songbird who wanted to break free from her oppressive cage. The boy made of brushstrokes and goofy smiles who brought color into a gray world. Her brooding father, with his sad puppy eyes and clenched fists. And Ellie's determined to find out why a piece of her was left behind. Told in epistolary-like style, Rocky Callen's deeply moving A Breath Too Late sensitively examines the beautiful and terrible moments that make up a life and the possibilities that live in even the darkest of places. Perfect for fans of the critically-acclaimed Speak, I’ll Give You the Sun, and If I Stay. "An exquisitely played love song to life, in all of its hurts, wonders, memories, and loves." –Jeff Zentner, Morris Award winning author of The Serpent King and Goodbye Days "A haunting story, punctuated with brilliant points of hope and light. This is an important story. A necessary story . . . Callen’s writing radiates with passion, honesty and love." —National Book Award finalist and Printz Award–winning author An Na