An empathetic biography of the apartheid author, Richard Rive. Richard Moore Rive (1930-1989) was a writer, scholar, literary critic and college teacher in Cape Town, South Africa. He is best known for his short stories written in the late 1950s and for his second novel, 'Buckingham Palace', District Six, in which he depicted the well-known cosmopolitan area of District Six, where he grew up. In this biography Shaun Viljoen, a former colleague of Rive's, creates the composite qualities of a man who was committed to the struggle against racial oppression and to the ideals of non-racialism but was also variously described as irascible, pompous and arrogant, with a 'cultivated urbanity'. Beneath these public personae lurked a constant and troubled awareness of his dark skin colour and guardedness about his homosexuality. Using his own and others' memories, and drawing on Rive's fiction, Viljoen brings the author to life with sensitivity and empathy. The biography follows Rive from his early years in the 1950s, writing for Drum magazine and spending time in the company of great anti-establishment writers such as Jack Cope, Ingrid Jonker, Jan Rabie, Marjorie Wallace, Es'kia Mphahlele and Nadine Gordimer, to his acceptance at Magdalene College, Oxford, where he completed his doctorate on Olive Schreiner, before returning to South Africa to resume his position as senior lecturer at Hewat College of Education. This biography will resurface Richard Rive the man and the writer, and invite us to think anew about how we read writers who lived and worked during the years of apartheid.
Molecular Aspects of Placental and Fetal Membrane Autacoids critically reviews current paradigms and working models concerning the regulation and function of placental and fetal membrane autacoids. These topics include cytokines; growth factors, such as EGF, TGF, IGF, PDGF, and the products of the prolactin-growth hormone gene family; eicosanoids and eicosanoid-forming enzymes; relaxin, imhibin, PTHRP, LHRH, endothelin, steroid-synthesizing enzymes and steroid receptors; and acetylcholine. The book is an excellent contemporary reference for researchers and students in reproductive biology, endocrinology, perinatology, and obstetrics.
K2 blackpearl and the K2 platform is a large, powerful, "game-changing" application platform built on Microsoft technologies. Understanding it from top to bottom would be a great task for a single person, which is why we have gathered more than a dozen authors to supply you with the information to successfully transform your company into a process-oriented, efficient business that can grow with the K2 platform. Since this is the first book on K2 blackpearl, you will find a broad range of topics in this book, from the market in which K2 blackpearl is aimed to the architecture of the platform, from how to approach process design to developing your own custom user manager. The first part of the book is meant for everyone and provides an understanding of K2 blackpearl and where it fits in the marketplace. It is included to provide a framework for thinking about various aspects of process-driven applications, including how they differ from business process management techniques; identifying processes in your company to automate, the different pieces that make up a process; measuring the success of your efforts; and finally shifting your company's culture in the direction of process efficiency. This section may be the only section you need to read if you are sponsoring a process improvement effort in your company. If you are responsible for leading the effort, make sure to read Chapters 3 and 4. The other parts are meant to provide details on how to effectively deploy and use K2 blackpearl and include a broad range of topics. Read what you are most interested in, but also make sure to read Chapter 8, which will give you a great foundation to start designing processes with K2 blackpearl. Chapter 14 is also recommended for everyone because it provides an overview of the available K2 Designers and how you can share projects among them. K2 blackpearl is the main subject of this book, although we devote an entire chapter, Chapter 23, to the add-on product K2 connect to give you an understanding of how to bring SAP data into your processes. We also talk a bit about K2 blackpoint, particularly in the SharePoint chapters. Since K2 blackpoint is built on the K2 blackpearl foundation, many of the same concepts apply to that product as well, but we do not point out the differences between K2 blackpearl and K2 blackpoint. For that information browse to www.k2.com.
See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeated Set up an environment for identifying insecurities and the data leakages that arise Develop extensions to bypass security controls and perform injection attacks Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.