Author: Tarek El-Ariss
Publisher: Princeton University Press
ISBN: 0691181934
Category : Literary Criticism
Languages : en
Pages : 238
Book Description
How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.
Leaks, Hacks, and Scandals
Author: Tarek El-Ariss
Publisher: Princeton University Press
ISBN: 0691181934
Category : Literary Criticism
Languages : en
Pages : 238
Book Description
How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.
Publisher: Princeton University Press
ISBN: 0691181934
Category : Literary Criticism
Languages : en
Pages : 238
Book Description
How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.
Trials of Arab Modernity
Author: Tarek El-Ariss
Publisher: Fordham Univ Press
ISBN: 0823252353
Category : Literary Criticism
Languages : en
Pages : 259
Book Description
Challenging prevalent conceptualizations of modernity—which treat it either as a Western ideology imposed by colonialism or as a universal narrative of progress and innovation—this study instead offers close readings of the simultaneous performances and contestations of modernity staged in works by authors such as Rifa’a al-Tahtawi, Ahmad Faris al-Shidyaq, Tayeb Salih, Hanan al-Shaykh, Hamdi Abu Golayyel, and Ahmad Alaidy. In dialogue with affect theory, deconstruction, and psychoanalysis, the book reveals these trials to be a violent and ongoing confrontation with and within modernity. In pointed and witty prose, El-Ariss bridges the gap between Nahda (the so-called Arab project of Enlightenment) and postcolonial and postmodern fiction.
Publisher: Fordham Univ Press
ISBN: 0823252353
Category : Literary Criticism
Languages : en
Pages : 259
Book Description
Challenging prevalent conceptualizations of modernity—which treat it either as a Western ideology imposed by colonialism or as a universal narrative of progress and innovation—this study instead offers close readings of the simultaneous performances and contestations of modernity staged in works by authors such as Rifa’a al-Tahtawi, Ahmad Faris al-Shidyaq, Tayeb Salih, Hanan al-Shaykh, Hamdi Abu Golayyel, and Ahmad Alaidy. In dialogue with affect theory, deconstruction, and psychoanalysis, the book reveals these trials to be a violent and ongoing confrontation with and within modernity. In pointed and witty prose, El-Ariss bridges the gap between Nahda (the so-called Arab project of Enlightenment) and postcolonial and postmodern fiction.
Information is Beautiful
Author: David McCandless
Publisher: HarperCollins UK
ISBN: 0007294662
Category : Art
Languages : en
Pages : 258
Book Description
Miscellaneous facts and ideas are interconnected and represented in a visual format, a "visual miscellaneum," which represents "a series of experiments in making information approachable and beautiful" -- from p.007
Publisher: HarperCollins UK
ISBN: 0007294662
Category : Art
Languages : en
Pages : 258
Book Description
Miscellaneous facts and ideas are interconnected and represented in a visual format, a "visual miscellaneum," which represents "a series of experiments in making information approachable and beautiful" -- from p.007
The Event of Postcolonial Shame
Author: Timothy Bewes
Publisher: Princeton University Press
ISBN: 1400836492
Category : Literary Criticism
Languages : en
Pages : 238
Book Description
In a postcolonial world, where structures of power, hierarchy, and domination operate on a global scale, writers face an ethical and aesthetic dilemma: How to write without contributing to the inscription of inequality? How to process the colonial past without reverting to a pathology of self-disgust? Can literature ever be free of the shame of the postcolonial epoch--ever be truly postcolonial? As disparities of power seem only to be increasing, such questions are more urgent than ever. In this book, Timothy Bewes argues that shame is a dominant temperament in twentieth-century literature, and the key to understanding the ethics and aesthetics of the contemporary world. Drawing on thinkers such as Jean-Paul Sartre, Frantz Fanon, Theodor Adorno, and Gilles Deleuze, Bewes argues that in literature there is an "event" of shame that brings together these ethical and aesthetic tensions. Reading works by J. M. Coetzee, Joseph Conrad, Nadine Gordimer, V. S. Naipaul, Caryl Phillips, Ngugi wa Thiong'o, and Zoë Wicomb, Bewes presents a startling theory: the practices of postcolonial literature depend upon and repeat the same structures of thought and perception that made colonialism possible in the first place. As long as those structures remain in place, literature and critical thinking will remain steeped in shame. Offering a new mode of postcolonial reading, The Event of Postcolonial Shame demands a literature and a criticism that acknowledge their own ethical deficiency without seeking absolution from it.
Publisher: Princeton University Press
ISBN: 1400836492
Category : Literary Criticism
Languages : en
Pages : 238
Book Description
In a postcolonial world, where structures of power, hierarchy, and domination operate on a global scale, writers face an ethical and aesthetic dilemma: How to write without contributing to the inscription of inequality? How to process the colonial past without reverting to a pathology of self-disgust? Can literature ever be free of the shame of the postcolonial epoch--ever be truly postcolonial? As disparities of power seem only to be increasing, such questions are more urgent than ever. In this book, Timothy Bewes argues that shame is a dominant temperament in twentieth-century literature, and the key to understanding the ethics and aesthetics of the contemporary world. Drawing on thinkers such as Jean-Paul Sartre, Frantz Fanon, Theodor Adorno, and Gilles Deleuze, Bewes argues that in literature there is an "event" of shame that brings together these ethical and aesthetic tensions. Reading works by J. M. Coetzee, Joseph Conrad, Nadine Gordimer, V. S. Naipaul, Caryl Phillips, Ngugi wa Thiong'o, and Zoë Wicomb, Bewes presents a startling theory: the practices of postcolonial literature depend upon and repeat the same structures of thought and perception that made colonialism possible in the first place. As long as those structures remain in place, literature and critical thinking will remain steeped in shame. Offering a new mode of postcolonial reading, The Event of Postcolonial Shame demands a literature and a criticism that acknowledge their own ethical deficiency without seeking absolution from it.
Impostor
Author: Bruce R. Bartlett
Publisher: Doubleday Books
ISBN: 0385518277
Category : Conservatism
Languages : en
Pages : 319
Book Description
"In this book, Bartlett attacks the Bush Administration's economic performance root and branch, from the "stovepiping" of its policy process to the coercive tactics used to ram its policies through Congress, to the effects of the policies themselves. He is especially hard on Bush s enormous new Medicare entitlement and predicts that within a few years, Bush's tax cuts and unrestricted spending will produce an economic crisis that will require a major tax increase, probably in the form of a European-style VAT."--BOOK JACKET.
Publisher: Doubleday Books
ISBN: 0385518277
Category : Conservatism
Languages : en
Pages : 319
Book Description
"In this book, Bartlett attacks the Bush Administration's economic performance root and branch, from the "stovepiping" of its policy process to the coercive tactics used to ram its policies through Congress, to the effects of the policies themselves. He is especially hard on Bush s enormous new Medicare entitlement and predicts that within a few years, Bush's tax cuts and unrestricted spending will produce an economic crisis that will require a major tax increase, probably in the form of a European-style VAT."--BOOK JACKET.
Leaks, Hacks, and Scandals
Author: Tarek El-Ariss
Publisher: Princeton University Press
ISBN: 0691184917
Category : Literary Criticism
Languages : en
Pages : 239
Book Description
How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.
Publisher: Princeton University Press
ISBN: 0691184917
Category : Literary Criticism
Languages : en
Pages : 239
Book Description
How digital media are transforming Arab culture, literature, and politics In recent years, Arab activists have confronted authoritarian regimes both on the street and online, leaking videos and exposing atrocities, and demanding political rights. Tarek El-Ariss situates these critiques of power within a pervasive culture of scandal and leaks and shows how cultural production and political change in the contemporary Arab world are enabled by digital technology yet emerge from traditional cultural models. Focusing on a new generation of activists and authors from Egypt and the Arabian Peninsula, El-Ariss connects WikiLeaks to The Arabian Nights, Twitter to mystical revelation, cyberattacks to pre-Islamic tribal raids, and digital activism to the affective scene-making of Arab popular culture. He shifts the epistemological and historical frameworks from the postcolonial condition to the digital condition and shows how new media challenge the novel as the traditional vehicle for political consciousness and intellectual debate. Theorizing the rise of “the leaking subject” who reveals, contests, and writes through chaotic yet highly political means, El-Ariss investigates the digital consciousness, virality, and affective forms of knowledge that jolt and inform the public and that draw readers in to the unfolding fiction of scandal. Leaks, Hacks, and Scandals maps the changing landscape of Arab modernity, or Nahda, in the digital age and traces how concepts such as the nation, community, power, the intellectual, the author, and the novel are hacked and recoded through new modes of confrontation, circulation, and dissent.
The Arab Renaissance
Author: Tarek El-Ariss
Publisher:
ISBN: 9781603293099
Category : FICTION
Languages : en
Pages :
Book Description
"An anthology of Arabic texts and English translations of works from the Arab Renaissance (Nahda) on modernity, language, gender, transnationalism, literary criticism, politics, travel, social justice, technology, history, and commerce. The edition is designed for the classroom, with an introduction, translator's note, and textual notes for students and teachers"--
Publisher:
ISBN: 9781603293099
Category : FICTION
Languages : en
Pages :
Book Description
"An anthology of Arabic texts and English translations of works from the Arab Renaissance (Nahda) on modernity, language, gender, transnationalism, literary criticism, politics, travel, social justice, technology, history, and commerce. The edition is designed for the classroom, with an introduction, translator's note, and textual notes for students and teachers"--
Sandworm
Author: Andy Greenberg
Publisher: Anchor
ISBN: 0525564632
Category : Computers
Languages : en
Pages : 370
Book Description
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.
Publisher: Anchor
ISBN: 0525564632
Category : Computers
Languages : en
Pages : 370
Book Description
"With the nuance of a reporter and the pace of a thriller writer, Andy Greenberg gives us a glimpse of the cyberwars of the future while at the same time placing his story in the long arc of Russian and Ukrainian history." —Anne Applebaum, bestselling author of Twilight of Democracy The true story of the most devastating act of cyberwarfare in history and the desperate hunt to identify and track the elite Russian agents behind it: "[A] chilling account of a Kremlin-led cyberattack, a new front in global conflict" (Financial Times). In 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses—from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage—the largest, most destructive cyberattack the world had ever seen. The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike. A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the lines between digital and physical conflict, between wartime and peacetime, have begun to blur—with world-shaking implications.
Data Breaches
Author: Sherri Davidoff
Publisher: Addison-Wesley Professional
ISBN: 013450772X
Category : Business & Economics
Languages : en
Pages : 552
Book Description
Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Publisher: Addison-Wesley Professional
ISBN: 013450772X
Category : Business & Economics
Languages : en
Pages : 552
Book Description
Protect Your Organization Against Massive Data Breaches and Their Consequences Data breaches can be catastrophic, but they remain mysterious because victims don’t want to talk about them. In Data Breaches, world-renowned cybersecurity expert Sherri Davidoff shines a light on these events, offering practical guidance for reducing risk and mitigating consequences. Reflecting extensive personal experience and lessons from the world’s most damaging breaches, Davidoff identifies proven tactics for reducing damage caused by breaches and avoiding common mistakes that cause them to spiral out of control. You’ll learn how to manage data breaches as the true crises they are; minimize reputational damage and legal exposure; address unique challenges associated with health and payment card data; respond to hacktivism, ransomware, and cyber extortion; and prepare for the emerging battlefront of cloud-based breaches. Understand what you need to know about data breaches, the dark web, and markets for stolen data Limit damage by going beyond conventional incident response Navigate high-risk payment card breaches in the context of PCI DSS Assess and mitigate data breach risks associated with vendors and third-party suppliers Manage compliance requirements associated with healthcare and HIPAA Quickly respond to ransomware and data exposure cases Make better decisions about cyber insurance and maximize the value of your policy Reduce cloud risks and properly prepare for cloud-based data breaches Data Breaches is indispensable for everyone involved in breach avoidance or response: executives, managers, IT staff, consultants, investigators, students, and more. Read it before a breach happens! Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Threatcasting
Author: Brian David Johnson
Publisher: Springer Nature
ISBN: 303102575X
Category : Mathematics
Languages : en
Pages : 285
Book Description
Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.
Publisher: Springer Nature
ISBN: 303102575X
Category : Mathematics
Languages : en
Pages : 285
Book Description
Impending technological advances will widen an adversary’s attack plane over the next decade. Visualizing what the future will hold, and what new threat vectors could emerge, is a task that traditional planning mechanisms struggle to accomplish given the wide range of potential issues. Understanding and preparing for the future operating environment is the basis of an analytical method known as Threatcasting. It is a method that gives researchers a structured way to envision and plan for risks ten years in the future. Threatcasting uses input from social science, technical research, cultural history, economics, trends, expert interviews, and even a little science fiction to recognize future threats and design potential futures. During this human-centric process, participants brainstorm what actions can be taken to identify, track, disrupt, mitigate, and recover from the possible threats. Specifically, groups explore how to transform the future they desire into reality while avoiding an undesired future. The Threatcasting method also exposes what events could happen that indicate the progression toward an increasingly possible threat landscape. This book begins with an overview of the Threatcasting method with examples and case studies to enhance the academic foundation. Along with end-of-chapter exercises to enhance the reader’s understanding of the concepts, there is also a full project where the reader can conduct a mock Threatcasting on the topic of “the next biological public health crisis.” The second half of the book is designed as a practitioner’s handbook. It has three separate chapters (based on the general size of the Threatcasting group) that walk the reader through how to apply the knowledge from Part I to conduct an actual Threatcasting activity. This book will be useful for a wide audience (from student to practitioner) and will hopefully promote new dialogues across communities and novel developments in the area.