|
|
|
|
|
|
|
|
|
1. |
Record Nr. |
UNINA9910463474203321 |
|
|
Autore |
Hohendahl Peter Uwe |
|
|
Titolo |
The fleeting promise of art : Adorno's aesthetic theory revisited / / Peter Uwe Hohendahl |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Ithaca, New York ; ; New York : , : Cornell University Press, , 2013 |
|
©2013 |
|
|
|
|
|
|
|
|
|
ISBN |
|
0-8014-6927-9 |
1-322-52316-9 |
0-8014-6928-7 |
|
|
|
|
|
|
|
|
Descrizione fisica |
|
1 online resource (197 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Aesthetics, German - 20th century |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
Bibliographic Level Mode of Issuance: Monograph |
|
|
|
|
|
|
Nota di bibliografia |
|
Includes bibliographical references and index. |
|
|
|
|
|
|
Nota di contenuto |
|
Front matter -- Contents -- Acknowledgments -- List of Abbreviations -- Introduction -- Part I -- 1. Human Freedom and the Autonomy of Art: The Legacy of Kant -- 2. The Ephemeral and the Absolute: The Truth Content of Art -- 3. Aesthetic Violence: The Concepts of the Ugly and Primitive -- Part II -- 4. Reality, Realism, and Representation -- 5. A Precarious Balance: Rereading German Classicism -- Epilogue -- Notes -- Index |
|
|
|
|
|
|
|
|
Sommario/riassunto |
|
A discussion of Theodor Adorno's Aesthetic Theory is bound to look significantly different today than it would have looked when the book was first published in 1970, or when it first appeared in English translation in the 1980's. In The Fleeting Promise of Art, Peter Uwe Hohendahl reexamines Aesthetic Theory along with Adorno's other writings on aesthetics in light of the unexpected return of the aesthetic to today's cultural debates. Is Adorno's aesthetic theory still relevant today? Hohendahl answers this question with an emphatic yes. As he shows, a careful reading of the work exposes different questions and arguments today than it did in the past. Over the years Adorno's concern over the fate of art in a late capitalist society has met with everything from suspicion to indifference. In part this could be |
|
|
|
|
|
|
|
|
|
|
|
|
|
explained by relative unfamiliarity with the German dialectical tradition in North America. Today's debate is better informed, more multifaceted, and further removed from the immediate aftermath of the Cold War and of the shadow of postmodernism. Adorno's insistence on the radical autonomy of the artwork has much to offer contemporary discussions of art and the aesthetic in search of new responses to the pervasive effects of a neoliberal art market and culture industry. Focusing specifically on Adorno's engagement with literary works, Hohendahl shows how radically transformative Adorno's ideas have been and how thoroughly they have shaped current discussions in aesthetics. Among the topics he considers are the role of art in modernism and postmodernism, the truth claims of artworks, the function of the ugly in modern artworks, the precarious value of the literary tradition, and the surprising significance of realism for Adorno. |
|
|
|
|
|
|
2. |
Record Nr. |
UNINA9910460221703321 |
|
|
Autore |
Shimonski Robert |
|
|
Titolo |
Cyber reconnaissance, surveillance, and defense / / Robert Shimonski ; John Zenir, contributing editor ; Allison Bishop, technical editor |
|
|
|
|
|
|
|
Pubbl/distr/stampa |
|
|
Waltham, Massachusetts : , : Syngress, , 2015 |
|
©2015 |
|
|
|
|
|
|
|
|
|
ISBN |
|
|
|
|
|
|
Edizione |
[1st edition] |
|
|
|
|
|
Descrizione fisica |
|
1 online resource (258 p.) |
|
|
|
|
|
|
Disciplina |
|
|
|
|
|
|
Soggetti |
|
Electronic intelligence |
Internet in espionage |
Cyber intelligence (Computer security) |
Internet - Security measures |
Computer crimes |
Electronic books. |
|
|
|
|
|
|
|
|
Lingua di pubblicazione |
|
|
|
|
|
|
Formato |
Materiale a stampa |
|
|
|
|
|
Livello bibliografico |
Monografia |
|
|
|
|
|
Note generali |
|
|
|
|
|
|
Nota di contenuto |
|
Cover; Title Page; Copyright Page; Dedication; Contents; About the |
|
|
|
|
|
|
|
|
|
|
|
Authors; Acknowledgments; Introduction; Chapter 1 - Digital Reconnaissance and Surveillance; Digital Reconnaissance and Surveillance; Art and History of Spying; Threat of Digital Reconnaissance and Surveillance; Threat Landscape; Why Spy?; NSA and Edward Snowden; Public Trust; Cybercrime; Why Spy? Motivation; What Is to Gain? Reward; Digital Forensics; Who Spies?; Professional Roles; Hackers (White, Gray, and Black); Digital Forensics Examiner; Cyber Intelligence Analyst; Cyber Security Engineer; Penetration Tester |
Private InvestigatorLaw Enforcement; Legal and Ethical Principles; Ethics; The Law; Surveillance and Cybercrime Sample Law; Summary; Chapter 2 - Information Gathering; Information Gathering; Am I Being Spied On?; How Private Is Your Life?; Examples of Privacy Invasion; How to Gather Information; Information Gathering Tools; Online Reconnaissance; The Internet Threat; Search Engines; Phishing; Tracking; Social Media; Scanning, Sniffing, and Mapping; Wired and Wireless; Infrastructure; Mobile Device Threat; Data Threat (Metadata); Physical Reconnaissance; Tailing and Stalking |
Social EngineeringTapping; Legal and Ethical Concerns; Summary; Chapter 3 - Social Engineering; Social Engineering; Am I Being Spied On?; Scam Example; How to Gather Information; Dumpster Diving; Shoulder Surfing; Phishing; Social Engineering Toolkit; Bugging and Recording; Mitigation of Social Engineering; Mitigate Attack; Information Privacy; Legal and Ethical Concerns; More Legal Issues; Summary; Chapter 4 - Mobile Phone Tracking; Phone Tracking; Mobile Phones; Apple iPhone; Google Android; Windows Phone; Blackberry; Phone Tracking; Malicious Tracking; Tracking for Reconnaissance |
Location-Based ServicesTracking a SIM; Global Positioning System and Geolocation; Google Mapping; Legal and Ethical Concerns; Summary; Chapter 5 - Physical Device Tracking; Physical Tracking; Device fingerprint; Tracking for Reconnaissance Today; Application Installation Versus Physical Device; Physical Device Tracking; Safe Devices Used Against You; Location Tracking and Wearable Technology; Legal and Ethical Concerns; Summary; Chapter 6 - Web Camera and Video Tracking; Camera Tracking; Tracking examples; Security Surveillance Systems (Private Home) |
Security Surveillance Systems (Businesses)Security Surveillance Systems (Public); Satellite Surveillance Systems; PC devices and webcams; Creepware; Mobile Devices; Gaming Consoles; Legal and Ethical Concerns; Summary; Chapter 7 - Data Capture and Exploitation; Data Threat; Data Theft and Surveillance; Basic Data Capture Techniques; Data at Rest; Malware Protection; DLP Software; Firewall Systems; Removable Media; Encryption Protection; Data in Motion; Sniffers; Skimmers; Digital Forensics; Devices and Applications; Legal and Ethical Concerns; Summary; Chapter 8 - Protection Methods |
Protect Yourself! |
|
|
|
|
|
|
Sommario/riassunto |
|
At a time when online surveillance and cybercrime techniques are widespread, and are being used by governments, corporations, and individuals, Cyber Reconnaissance, Surveillance and Defense gives you a practical resource that explains how these activities are being carried out and shows how to defend against them. Expert author Rob Shimonski shows you how to carry out advanced IT surveillance and reconnaissance, describes when and how these techniques are used, and provides a full legal background for each threat. To help you understand how to defend against these attacks, this book describ |
|
|
|
|
|
|
|
| |