0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (213)
  • R250 - R500 (636)
  • R500+ (5,155)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Network security

Handbook of SCADA/Control Systems Security (Paperback, 2nd edition): Robert Radvanovsky, Jacob Brodsky Handbook of SCADA/Control Systems Security (Paperback, 2nd edition)
Robert Radvanovsky, Jacob Brodsky; Burt G. Look
R1,323 Discovery Miles 13 230 Ships in 10 - 15 working days

This comprehensive handbook covers fundamental security concepts, methodologies, and relevant information pertaining to supervisory control and data acquisition (SCADA) and other industrial control systems used in utility and industrial facilities worldwide. A community-based effort, it collects differing expert perspectives, ideas, and attitudes regarding securing SCADA and control systems environments toward establishing a strategy that can be established and utilized. Including six new chapters, six revised chapters, and numerous additional figures, photos, and illustrations, the second edition serves as a primer or baseline guide for SCADA and industrial control systems security. The book is divided into five focused sections addressing topics in Social implications and impacts Governance and management Architecture and modeling Commissioning and operations The future of SCADA and control systems security The book also includes four case studies of well-known public cyber security-related incidents. The Handbook of SCADA/Control Systems, Second Edition provides an updated and expanded source of essential concepts and information that are globally applicable to securing control systems within critical infrastructure protection programs. It presents best practices as well as methods for securing a business environment at the strategic, tactical, and operational levels.

Practical Data Security - Applied Information Technology (Paperback): John Gordon Practical Data Security - Applied Information Technology (Paperback)
John Gordon
R1,036 Discovery Miles 10 360 Ships in 10 - 15 working days

First published in 1993, this volume emerged in response to the genesis of the Internet and provides early considerations on issues including computer viruses, cyber security and network encryption management, with a particular focus on applying risk analysis to the data security of financial institutions. With the stage set by the UK Data Protection Act of 1984 and the Computer Misuse Act of 1990, this volume provides a series of useful contributions for large companies and home PCs and provides a clear introduction setting out the context and the relevant terminology.

Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access... Managing Security Services in Heterogenous Networks - Confidentiality, Integrity, Availability, Authentication, and Access Control (Hardcover)
R. Thandeeswaran, Thinagaran Perumal, Kun Ma, N. Jeyanthi
R1,981 Discovery Miles 19 810 Ships in 10 - 15 working days

A heterogeneous network is a network which connects computers and other devices with different operating systems, protocols, or access technologies. By definition, managing heterogenous networks is more difficult that homogenous networks. Confidentiality, integrity, availability (CIA) remain the foundation of security. This book sheds light upon security threats, defenses, and remediation on various networking and data processing domains, including wired networks, wireless networks, mobile ad-hoc networks, wireless sensor networks, and social networks through the prisms of confidentiality, integrity, availability, authentication, and access control. The book is broken into different chapters that explore central subjects and themes in the development of the heterogenous networks we see today. The chapters look at: Access control methods in cloud-enabled Internet of Things Secure routing algorithms for mobile ad-hoc networks Building security trust in mobile ad-hoc networks using soft computing methods The use and development of Blockchain technology, with a particular focus on the nonce-free hash generation in Blockchain Password authentication and keystroke biometrics Health care data analytics over Big Data Bluetooth: and its open issues for managing security services in heterogenous networks Managing Security Services in Heterogenous Networks will be a valuable resource for a whole host of undergraduate and postgraduate students studying related topics, as well as career professionals who have to effectively manage heterogenous networks in the workplace.

Security in Distributed, Grid, Mobile, and Pervasive Computing (Hardcover): Yang Xiao Security in Distributed, Grid, Mobile, and Pervasive Computing (Hardcover)
Yang Xiao
R2,692 R2,494 Discovery Miles 24 940 Save R198 (7%) Ships in 10 - 15 working days

Despite recent dramatic advances in computer security regarding the proliferation of services and applications, security threats are still major impediments in the deployment of these services. Paying serious attention to these issues, Security in Distributed, Grid, Mobile, and Pervasive Computing focuses on the increasing demand to guarantee privacy, integrity, and availability of resources in networks and distributed systems. A rich and useful presentation of strategies for security issues, the book covers each computing area in separate sections. It first reviews security issues and challenges in content distribution networks, describes key agreement protocols based on the Diffie-Hellman key exchange and key management protocols for complex distributed systems like the Internet, and discusses securing design patterns for distributed systems. The next section focuses on security in mobile computing and wireless networks, covering wireless authentication methods, secure data aggregation, and anonymous routing protocol. After a section on grid computing security, the book presents an overview of security solutions for pervasive healthcare systems and surveys wireless sensor network security. With more and more vital information stored on computers, security professionals need to know how to combat threats and complications. Offering strategies to tackle these issues, this book provides essential security information for researchers, practitioners, educators, and graduate students in the field.

Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback): Michael Erbschloe Threat Level Red - Cybersecurity Research Programs of the U.S. Government (Paperback)
Michael Erbschloe
R1,392 Discovery Miles 13 920 Ships in 10 - 15 working days

There is extensive government research on cyber security science, technology, and applications. Much of this research will be transferred to the private sector to aid in product development and the improvement of protective measures against cyber warfare attacks. This research is not widely publicized. There are initiatives to coordinate these research efforts but there has never been a published comprehensive analysis of the content and direction of the numerous research programs. This book provides private sector developers, investors, and security planners with insight into the direction of the U.S. Government research efforts on cybersecurity.

Handbook of Image-Based Security Techniques (Paperback): Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri Handbook of Image-Based Security Techniques (Paperback)
Shivendra Shivani, Suneeta Agarwal, Jasjit S. Suri
R1,523 Discovery Miles 15 230 Ships in 10 - 15 working days

This book focuses on image based security techniques, namely visual cryptography, watermarking, and steganography. This book is divided into four sections. The first section explores basic to advanced concepts of visual cryptography. The second section of the book covers digital image watermarking including watermarking algorithms, frameworks for modeling watermarking systems, and the evaluation of watermarking techniques. The next section analyzes steganography and steganalysis, including the notion, terminology and building blocks of steganographic communication. The final section of the book describes the concept of hybrid approaches which includes all image-based security techniques. One can also explore various advanced research domains related to the multimedia security field in the final section. The book includes many examples and applications, as well as implementation using MATLAB, wherever required. Features: Provides a comprehensive introduction to visual cryptography, digital watermarking and steganography in one book Includes real-life examples and applications throughout Covers theoretical and practical concepts related to security of other multimedia objects using image based security techniques Presents the implementation of all important concepts in MATLAB

Wireless Security and Cryptography - Specifications and Implementations (Hardcover): Nicolas Sklavos, Xinmiao Zhang Wireless Security and Cryptography - Specifications and Implementations (Hardcover)
Nicolas Sklavos, Xinmiao Zhang; Contributions by Odysseas Koufopavlou, Vesna Hassler, Paris Kitsos, …
R4,664 Discovery Miles 46 640 Ships in 10 - 15 working days

As the use of wireless devices becomes widespread, so does the need for strong and secure transport protocols. Even with this intensified need for securing systems, using cryptography does not seem to be a viable solution due to difficulties in implementation. The security layers of many wireless protocols use outdated encryption algorithms, which have proven unsuitable for hardware usage, particularly with handheld devices. Summarizing key issues involved in achieving desirable performance in security implementations, Wireless Security and Cryptography: Specifications and Implementations focuses on alternative integration approaches for wireless communication security. It gives an overview of the current security layer of wireless protocols and presents the performance characteristics of implementations in both software and hardware. This resource also presents efficient and novel methods to execute security schemes in wireless protocols with high performance. It provides the state of the art research trends in implementations of wireless protocol security for current and future wireless communications. Unique in its coverage of specification and implementation concerns that include hardware design techniques, Wireless Security and Cryptography: Specifications and Implementations provides thorough coverage of wireless network security and recent research directions in the field.

Enterprise Level Security 1 & 2 (Hardcover): Kevin Foltz, William R. Simpson Enterprise Level Security 1 & 2 (Hardcover)
Kevin Foltz, William R. Simpson
R3,218 Discovery Miles 32 180 Ships in 10 - 15 working days

* The ELS model of enterprise security is endorsed by the Secretary of the Air Force for Air Force computing systems and is a candidate for DoD systems under the Joint Information Environment Program. * The book is intended for enterprise IT architecture developers, application developers, and IT security professionals. * This is a unique approach to end-to-end security and fills a niche in the market.

Unnoticed in the Casual Light of Day - Phillip Larkin and the Plain Style (Hardcover): Tijana Stojkovic Unnoticed in the Casual Light of Day - Phillip Larkin and the Plain Style (Hardcover)
Tijana Stojkovic
R4,359 Discovery Miles 43 590 Ships in 10 - 15 working days

Larkin's poems are often regarded as falling somewhere between the traditional 'plain' and the more contemporary 'postmodern' categories. This study undertakes a comprehensive linguistic and historical study of the plain style tradition in poetry, its relationship with so-called 'difficult' poetry, and its particular realization in the cultural and historical context of 20th-century Britain. The author examines the nature of poetry as a type of discourse, the elements of, and factors in, the development of literary styles, a close rhetorical examination of Larkin's poems within the described poetic frameworks, and his position in the British twentieth-century poetic canon.

The Art of Attack - Attacker Mindset for Security Professionals (Paperback): M Reynolds The Art of Attack - Attacker Mindset for Security Professionals (Paperback)
M Reynolds
R545 Discovery Miles 5 450 Ships in 10 - 15 working days

Take on the perspective of an attacker with this insightful new resource for ethical hackers, pentesters, and social engineers In The Art of Attack: Attacker Mindset for Security Professionals, experienced physical pentester and social engineer Maxie Reynolds untangles the threads of a useful, sometimes dangerous, mentality. The book shows ethical hackers, social engineers, and pentesters what an attacker mindset is and how to use it to their advantage. Adopting this mindset will result in the improvement of security, offensively and defensively, by allowing you to see your environment objectively through the eyes of an attacker. The book shows you the laws of the mindset and the techniques attackers use, from persistence to "start with the end" strategies and non-linear thinking, that make them so dangerous. You'll discover: A variety of attacker strategies, including approaches, processes, reconnaissance, privilege escalation, redundant access, and escape techniques The unique tells and signs of an attack and how to avoid becoming a victim of one What the science of psychology tells us about amygdala hijacking and other tendencies that you need to protect against Perfect for red teams, social engineers, pentesters, and ethical hackers seeking to fortify and harden their systems and the systems of their clients, The Art of Attack is an invaluable resource for anyone in the technology security space seeking a one-stop resource that puts them in the mind of an attacker.

Privacy and Security Issues in Big Data - An Analytical View on Business Intelligence (Hardcover, 1st ed. 2021): Pradip Kumar... Privacy and Security Issues in Big Data - An Analytical View on Business Intelligence (Hardcover, 1st ed. 2021)
Pradip Kumar Das, Hrudaya Kumar Tripathy, Shafiz Affendi Mohd Yusof
R4,700 Discovery Miles 47 000 Ships in 18 - 22 working days

This book focuses on privacy and security concerns in big data and differentiates between privacy and security and privacy requirements in big data. It focuses on the results obtained after applying a systematic mapping study and implementation of security in the big data for utilizing in business under the establishment of "Business Intelligence". The chapters start with the definition of big data, discussions why security is used in business infrastructure and how the security can be improved. In this book, some of the data security and data protection techniques are focused and it presents the challenges and suggestions to meet the requirements of computing, communication and storage capabilities for data mining and analytics applications with large aggregate data in business.

Practical Hacking Techniques and Countermeasures (Paperback): Mark D Spivey Practical Hacking Techniques and Countermeasures (Paperback)
Mark D Spivey
R2,948 Discovery Miles 29 480 Ships in 10 - 15 working days

Examining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results. It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to duplicate and understand how the attack works. It enables experimenting with hacking techniques without fear of corrupting computers or violating any laws. Written in a lab manual style, the book begins with the installation of the VMware(R) Workstation product and guides the users through detailed hacking labs enabling them to experience what a hacker actually does during an attack. It covers social engineering techniques, footprinting techniques, and scanning tools. Later chapters examine spoofing techniques, sniffing techniques, password cracking, and attack tools. Identifying wireless attacks, the book also explores Trojans, Man-in-the-Middle (MTM) attacks, and Denial of Service (DoS) attacks. Learn how to secure your computers with this comprehensive guide on hacking techniques and countermeasures By understanding how an attack occurs the reader can better understand how to defend against it. This book shows how an attack is conceptualized, formulated, and performed. It offers valuable information for constructing a system to defend against attacks and provides a better understanding of securing your own computer or corporate network.

Fraud Hotlines - Design, Performance, and Assessment (Paperback): Chelsea A. Binns Fraud Hotlines - Design, Performance, and Assessment (Paperback)
Chelsea A. Binns
R1,063 Discovery Miles 10 630 Ships in 10 - 15 working days

This book provides a complete guide on fraud hotlines. It is designed to educate readers with respect to the history, purpose, operation, use and utility of fraud hotlines. It also equips readers with the knowledge to create, analyze and assess the performance of fraud hotlines.

Big Data Analytics with Applications in Insider Threat Detection (Paperback): Bhavani Thuraisingham, Pallabi Parveen, Mohammad... Big Data Analytics with Applications in Insider Threat Detection (Paperback)
Bhavani Thuraisingham, Pallabi Parveen, Mohammad Mehedy Masud, Latifur Khan
R1,429 Discovery Miles 14 290 Ships in 10 - 15 working days

Today's malware mutates randomly to avoid detection, but reactively adaptive malware is more intelligent, learning and adapting to new computer defenses on the fly. Using the same algorithms that antivirus software uses to detect viruses, reactively adaptive malware deploys those algorithms to outwit antivirus defenses and to go undetected. This book provides details of the tools, the types of malware the tools will detect, implementation of the tools in a cloud computing framework and the applications for insider threat detection.

Flexible Network Architectures Security - Principles and Issues (Paperback): Bhawana Rudra Flexible Network Architectures Security - Principles and Issues (Paperback)
Bhawana Rudra
R1,384 Discovery Miles 13 840 Ships in 10 - 15 working days

The future of Internet security doesn't lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. Two trends have come together to make the topic of this book of vital interest. First, the explosive growth of the Internet connections for the exchange of information via networks increased the dependence of both organizations and individuals on the systems stored and communicated. This, in turn, has increased the awareness for the need to protect the data and add security as chief ingredient in the newly emerged architectures. Second, the disciplines of cryptography and network security have matured and are leading to the development of new techniques and protocols to enforce the network security in Future Internet. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they'll contribute to a more secure Internet.

Information Security - Design, Implementation, Measurement, and Compliance (Hardcover): Timothy P Layton Information Security - Design, Implementation, Measurement, and Compliance (Hardcover)
Timothy P Layton
R3,656 Discovery Miles 36 560 Ships in 10 - 15 working days

Organizations rely on digital information today more than ever before. Unfortunately, that information is equally sought after by criminals. New security standards and regulations are being implemented to deal with these threats, but they are very broad and organizations require focused guidance to adapt the guidelines to their specific needs. Fortunately, Information Security: Design, Implementation, Measurement, and Compliance outlines a complete roadmap to successful adaptation and implementation of a security program based on the ISO/IEC 17799:2005 (27002) Code of Practice for Information Security Management. The book first describes a risk assessment model, a detailed risk assessment methodology, and an information security evaluation process. Upon this foundation, the author presents a proposed security baseline for all organizations, an executive summary of the ISO/IEC 17799 standard, and a gap analysis exposing the differences between the recently rescinded version and the newly released version of the standard. Finally, he devotes individual chapters to each of the 11 control areas defined in the standard, covering systematically the 133 controls within the 39 control objectives. Tim Layton's Information Security is a practical tool to help you understand the ISO/IEC 17799 standard and apply its principles within your organization's unique context.

Emerging Trends in Computing and Communication - ETCC 2014, March 22-23, 2014 (Hardcover, 2014 ed.): Sabnam Sengupta, Kunal... Emerging Trends in Computing and Communication - ETCC 2014, March 22-23, 2014 (Hardcover, 2014 ed.)
Sabnam Sengupta, Kunal Das, Gitosree Khan
R6,507 Discovery Miles 65 070 Ships in 10 - 15 working days

The book presents papers delivered by researchers, industrial experts and academicians at the Conference on Emerging Trends in Computing and Communication (ETCC 2014). As such, the book is a collection of recent and innovative works in the field Network Security and Cryptography, Cloud Computing and Big Data Analytics, Data Mining and Data Warehouse, Communication and Nanotechnology and VLSI and Image Processing.

Guide to Optimal Operational Risk and BASEL II (Hardcover): Ioannis S. Akkizidis, Vivianne Bouchereau Guide to Optimal Operational Risk and BASEL II (Hardcover)
Ioannis S. Akkizidis, Vivianne Bouchereau
R3,820 Discovery Miles 38 200 Ships in 10 - 15 working days

Guide to Optimal Operational Risk and Basel II presents the key aspects of operational risk management that are also aligned with the Basel II requirements. This volume provides detailed guidance for the design and implementation of an efficient operational risk management system. It contains all elements of assessment, including operational risk identification, measurement, modeling, and monitoring analysis, along with evaluation analysis and the estimation of capital requirements. The authors also address the managing and controlling of operational risks including operational risk profiling, risk optimization, cost & optimal resource allocation, decision-making, and design of optimal risk policies. Divided into four parts, this book begins by introducing the idea of operational risks and how they affect financial organizations. This section also focuses on the main aspects of managing operational risks. The second part focuses on the requirements of an operational risk management framework according to the Basel II Accord. The third part focuses on all stages of operational risk assessment, and the fourth part focuses on the control and management stages. All of these stages combine to implement efficient and optimal operational risk management systems.

Applied Network Security Monitoring - Collection, Detection, and Analysis (Paperback, New): Chris Sanders, Jason Smith Applied Network Security Monitoring - Collection, Detection, and Analysis (Paperback, New)
Chris Sanders, Jason Smith
R1,232 R1,146 Discovery Miles 11 460 Save R86 (7%) Ships in 10 - 15 working days

"Applied Network Security Monitoring" is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM.

Network security monitoring is based on the principle that prevention eventually fails. In the current threat landscape, no matter how much you try, motivated attackers will eventually find their way into your network. At that point, it is your ability to detect and respond to that intrusion that can be the difference between a small incident and a major disaster.

The book follows the three stages of the NSM cycle: collection, detection, and analysis. As you progress through each section, you will have access to insights from seasoned NSM professionals while being introduced to relevant, practical scenarios complete with sample data.

If you've never performed NSM analysis, "Applied Network Security Monitoring" will give you an adequate grasp on the core concepts needed to become an effective analyst. If you are already a practicing analyst, this book will allow you to grow your analytic technique to make you more effective at your job.
Discusses the proper methods for data collection, and teaches you how to become a skilled NSM analystProvides thorough hands-on coverage of Snort, Suricata, Bro-IDS, SiLK, and ArgusLoaded with practical examples containing real PCAP files you can replay, and uses Security Onion for all its lab examplesCompanion website includes up-to-date blogs from the authors about the latest developments in NSM

Network Security (Hardcover, 2010 ed.): Scott C -H Huang, David MacCallum, Dingzhu Du Network Security (Hardcover, 2010 ed.)
Scott C -H Huang, David MacCallum, Dingzhu Du
R2,806 Discovery Miles 28 060 Ships in 18 - 22 working days

This book provides a reference tool for the increasing number of scientists whose research is related to sensor network security. It is organised into sections, each including chapters exploring a specific topic. Topics covered include network design and modeling, network management, data management, security and applications.

Introduction to Industrial Automation (Paperback, 3rd Edition): George Nikolakopoulos, Stamatios Manesis Introduction to Industrial Automation (Paperback, 3rd Edition)
George Nikolakopoulos, Stamatios Manesis
R1,200 R1,133 Discovery Miles 11 330 Save R67 (6%) Ships with 19 working days

This book provides an extended overview and fundamental knowledge in industrial automation, while building the necessary knowledge level for further specialization in advanced concepts of industrial automation. It covers a number of central concepts of industrial automation, such as basic automation elements, hardware components for automation and process control, the latch principle, industrial automation synthesis, logical design for automation, electropneumatic automation, industrial networks, basic programming in PLC, and PID in the industry.

Table of Contents

Introduction to Automation. Hardware Components for Automation and Process Control. Industrial Automation Synthesis. Logical Design of Industrial Automation. Basic Components of Electro Pneumatic Automation. Industrial Networks. Basic Programming Principles of PLCs Author. PID Control in the Industry.

Colonialism and the Modernist Moment in the Early Novels of Jean Rhys (Hardcover): Carol Dell'Amico Colonialism and the Modernist Moment in the Early Novels of Jean Rhys (Hardcover)
Carol Dell'Amico
R2,862 R1,177 Discovery Miles 11 770 Save R1,685 (59%) Ships in 10 - 15 working days

Colonialism and the Modernist Moment in the Early Novels of Jean Rhys explores the postcolonial significance of Rhys's modernist period work, which depicts an urban scene more varied than that found in other canonical representations of the period. Arguing against the view that Rhys comes into her own as a colonial thinker only in the post-WWII period of her career, this study examines the austere insights gained by Rhys's active cultivation of her fringe status vis-a-vis British social life and artistic circles, where her sharp study of the aporias of marginal lives and the violence of imperial ideology is distilled into an artistic statement positing the outcome of the imperial venture as a state of homelessness across the board, for colonized and 'metropolitans' alike. Bringing to view heretofore overlooked emigre populations, or their children, alongside locals, Rhys's urbanites struggle to construct secure lives not simply as a consequence of commodification, alienation, or voluntary expatriation, but also as a consequence of marginalization and migration. This view of Rhys's early work asserts its vital importance to postcolonial studies, an importance that has been overlooked owing to an over hasty critical consensus that only one of her early novels contains significant colonial content. Yet, as this study demonstrates, proper consideration of colonial elements long considered only incidental illuminates a colonial continuum in Rhys's work from her earliest publications.

Protecting Critical Infrastructures Against Cyber-Attack (Paperback): Stephen Lukasik Protecting Critical Infrastructures Against Cyber-Attack (Paperback)
Stephen Lukasik
R828 Discovery Miles 8 280 Ships in 10 - 15 working days

The threat that is posed by 'cyber warriors' is illustrated by recent incidents such as the Year 2000 'Millennium bug'. Strategies to reduce the risk that cyber attack poses, at both individual and national level, are described and compared with the actions being taken by a number of Western governments.

Trends in Corrections - Interviews with Corrections Leaders Around the World, Volume Two (Paperback): Martha Henderson Hurley,... Trends in Corrections - Interviews with Corrections Leaders Around the World, Volume Two (Paperback)
Martha Henderson Hurley, Dilip K Das
R1,082 Discovery Miles 10 820 Ships in 10 - 15 working days

The first volume of the Trends in Corrections: Interviews with Corrections Leaders Around the World series introduced readers to the great diversity that exists cross-culturally in the political, social, and economic context of the correctional system. Presenting transcribed interviews of corrections leaders, it offered a comprehensive survey of correctional programming and management styles used across nations. The general conclusion drawn from the inaugural publication was that the correctional leaders interviewed exhibited striking similarities despite vast differences in the social and political climates in which they worked. They all appeared to struggle with some of the same issues. With a fresh set of interviews exploring further cross-cultural differences and similarities, Volume Two extends the reach to several new countries, including Slovenia, Slovakia, Northern Ireland, Switzerland, and France. The interviews are conducted by scholars or practitioners with intimate knowledge of correctional practice and who are familiar with the correctional system in the country of the interviewees. They expand the knowledge base by asking correction leaders specifically about the impact of the economic downturn on corrections in each country, the changes in correctional practice they've experienced, and how they think about and evaluate trends and developments. This revealing series affords correctional leaders an unprecedented opportunity to express their views on current practices and the future of corrections in their countries, facilitating the development of solutions to corrections challenges worldwide. This book is a volume in the Interviews with Global Leaders in Policing, Courts and Corrections series.

A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Hardcover): Meg Tyler A Singing Contest - Conventions of Sound in the Poetry of Seamus Heaney (Hardcover)
Meg Tyler
R4,215 Discovery Miles 42 150 Ships in 10 - 15 working days

A formal analysis A Singing Contest comprises close readings of Seamus
Heaney's poetry. Tyler argues that in an era of fractured poetry and politics, Seamus Heaney stands out: his impulse is towards unity and regeneration. Her book considers the interplay between different kinds of literary tradition and community in his poetry. For Heaney, poetry represents a structure allowing imaginative mediation of conflicts that appear irreconcilable in the social, political and historical realms. By detailed structural analysis of diction, meter, imagery and generic form, Tyler illustrates how Heaney's poems create concords from discords, unities from fracture.
From the preface by Rosanna Warren:
"A Singing Contest is written with imaginative and emotional urgency, and in some large sense, as it examines Heaney's spells, it seems itself to want to cast a spell against death. Hence Tyler's return, in various ways, to readings of elegy, whether the fictive elegies of classical pastoral poems, or Heaney's personal elegies. She pores in detail over "Clearances," the sonnet sequence composed in memory of the poet's mother in The Haw Lantern, and she concludes her book with a chapter on literary elegies, Heaney's farewells to his friends and admired contemporaries Ted Hughes, Zbigniew Herbert, and Joseph Brodsky. In these analyses, one sees the wholeness of Tyler's project: her argument that for Heaney, literary tradition itself, rightly received and transformed, reaches into the voids made by death, and establishes connection across rupture. Her thesis is an ancient one, and she gives it particular shape and force in asking us to contemplate it at work in Heaney, where it binds individualto collective experience, and past to present."

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
#Myprivacy #Myright - Protect It While…
Robin M Singh Hardcover R536 Discovery Miles 5 360
RIoT Control - Understanding and…
Tyson Macaulay Paperback R1,374 R1,161 Discovery Miles 11 610
CompTIA Security+ Guide To Network…
Mark Ciampa Paperback R1,335 R1,242 Discovery Miles 12 420
Safety of Web Applications - Risks…
Eric Quinton Hardcover R2,330 Discovery Miles 23 300
Managing Business Projects - The…
Frank Einhorn Paperback R1,370 R1,283 Discovery Miles 12 830
Cybersecurity Capabilities in Developing…
Maurice Dawson, Oteng Tabona, … Hardcover R5,931 Discovery Miles 59 310
Two-Factor Authentication
Mark Stanislav Paperback R507 Discovery Miles 5 070
Fraud Prevention, Confidentiality, and…
Arshi Naim, Praveen Kumar Malik, … Hardcover R6,200 Discovery Miles 62 000
ISO27001/ISO27002 - A Pocket Guide
Alan Calder Paperback R647 Discovery Miles 6 470
Computer Science Security - Concepts and…
AS Zaidoun Hardcover R3,483 Discovery Miles 34 830

 

Partners