1.

Record Nr.

UNINA9910463474203321

Autore

Hohendahl Peter Uwe

Titolo

The fleeting promise of art : Adorno's aesthetic theory revisited / / Peter Uwe Hohendahl

Pubbl/distr/stampa

Ithaca, New York ; ; New York : , : Cornell University Press, , 2013

©2013

ISBN

0-8014-6927-9

1-322-52316-9

0-8014-6928-7

Descrizione fisica

1 online resource (197 p.)

Disciplina

111/.85092

Soggetti

Aesthetics, German - 20th century

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Bibliographic Level Mode of Issuance: Monograph

Nota di bibliografia

Includes bibliographical references and index.

Nota di contenuto

Front matter -- Contents -- Acknowledgments -- List of Abbreviations -- Introduction -- Part I -- 1. Human Freedom and the Autonomy of Art: The Legacy of Kant -- 2. The Ephemeral and the Absolute: The Truth Content of Art -- 3. Aesthetic Violence: The Concepts of the Ugly and Primitive -- Part II -- 4. Reality, Realism, and Representation -- 5. A Precarious Balance: Rereading German Classicism -- Epilogue -- Notes -- Index

Sommario/riassunto

A discussion of Theodor Adorno's Aesthetic Theory is bound to look significantly different today than it would have looked when the book was first published in 1970, or when it first appeared in English translation in the 1980's. In The Fleeting Promise of Art, Peter Uwe Hohendahl reexamines Aesthetic Theory along with Adorno's other writings on aesthetics in light of the unexpected return of the aesthetic to today's cultural debates. Is Adorno's aesthetic theory still relevant today? Hohendahl answers this question with an emphatic yes. As he shows, a careful reading of the work exposes different questions and arguments today than it did in the past. Over the years Adorno's concern over the fate of art in a late capitalist society has met with everything from suspicion to indifference. In part this could be



explained by relative unfamiliarity with the German dialectical tradition in North America. Today's debate is better informed, more multifaceted, and further removed from the immediate aftermath of the Cold War and of the shadow of postmodernism. Adorno's insistence on the radical autonomy of the artwork has much to offer contemporary discussions of art and the aesthetic in search of new responses to the pervasive effects of a neoliberal art market and culture industry. Focusing specifically on Adorno's engagement with literary works, Hohendahl shows how radically transformative Adorno's ideas have been and how thoroughly they have shaped current discussions in aesthetics. Among the topics he considers are the role of art in modernism and postmodernism, the truth claims of artworks, the function of the ugly in modern artworks, the precarious value of the literary tradition, and the surprising significance of realism for Adorno.

2.

Record Nr.

UNINA9910460221703321

Autore

Shimonski Robert

Titolo

Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor

Pubbl/distr/stampa

Waltham, Massachusetts : , : Syngress, , 2015

©2015

ISBN

0-12-801468-7

Edizione

[1st edition]

Descrizione fisica

1 online resource (258 p.)

Disciplina

327.12

Soggetti

Electronic intelligence

Internet in espionage

Cyber intelligence (Computer security)

Internet - Security measures

Computer crimes

Electronic books.

Lingua di pubblicazione

Inglese

Formato

Materiale a stampa

Livello bibliografico

Monografia

Note generali

Includes index.

Nota di contenuto

Cover; Title Page; Copyright Page; Dedication; Contents; About the



Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester

Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking

Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance

Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home)

Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods

Protect Yourself!

Sommario/riassunto

At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them.   Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ