The Bookworm

Total Page:16

File Type:pdf, Size:1020Kb

The Bookworm ÆLEEN FRISCH the bookworm Æleen Frisch is a system adminis- trator and writer living in Connecticut (www.aeleen.com). Books Reviewed in this Column [email protected] FORENSIC DISCOVERY SENDMAIL MILTERS: A GUIDE FOR Dan Farmer and Wietse Venema FIGHTING SPAM Addison-Wesley, 2004, 0-201-63497-X, Brian Costales and Marcia Flynt 217 pp. Addison-Wesley, 2005, 0-321-21333-5, BUILDING A LOGGING 347 pp. INFRASTRUCTURE LIN UX APPLICATION DEVELOPMENT, Abe Singer and Tina Bird 2ND EDITION Short Topics in System Administration Michael K. Johnson and 12, USENIX Association, 2004, Erik W. Troan 1-931971-25-0, 82 pp. Addison-Wesley, 2005, 0-321-21914-7, TROUBLESHOOTING LINUX FIREWALLS 732 pp. Michael Shinn and Scott Shinn JAVA APPLICATION DEVELOPMENT Addison-Wesley, 2005, 0-321-22723-9, ON LIN UX 381 pp. Carl Albing and Michael Schwarz I NTERN ET DENIAL OF SERVICE: Prentice-Hall, 2005, 0-13-143697-X, ATTACK AND DEFENSE MECHANISMS 598 pp. Jelena Mirkovic, Sven Dietrich, KNOPPIX HACKS: 100 INDUSTRIAL- David Dittrich, and Peter Reiher STRENGTH TIPS & TOOLS Prentice-Hall, 2004, 0-13-147573-8, Kyle Rankin 400 pp. O’Reilly, 2005, 0-596-00787-6, THE EXECUTIVE GUIDE TO 314 pp. + CD. INFORMATION SECURITY: THREATS, CHALLENGES, AND SOLUTIONS Mark Egan with Tim Mather Addison-Wesley Symantec Press, 2005, 0-32-130451-9, 288 pp. SLAMMING SPAM: A GUIDE FOR SYSTEM ADMINISTRATORS Robert Haskins and Dale Nielsen Addison-Wesley, 2005, 0-13-146716-6, 420 pp. ;LOGIN: APRI L 2005 TH E BOOKWORM 49 I am thrilled and honored to be book’s final part, the authors have THREE MORE ON SECURITY taking over from the illustrious compiled and performed a number The authors of Troubleshooting Peter Salus as the Bookworm. This of useful experiments that enable Linux Firewalls describe their month’s books are a somewhat them to make very specific quanti- books as including “the Tao of fire- random set, as the review copy tative statements (e.g., how long wall security, the Zen of trou- pipes are just getting started for trace data from a deleted file can bleshooting, and the nitty-gritty me. be expected to linger under vari- step-by-step instructions to fix a ous system usage scenarios). This problem.” This is a good descrip- kind of information is needed to FEATURED: FORENSIC DISCOVERY tion of their approach to their make both analysis and prevention topic. The book does a very good Dan Farmer and Wietse Venema planning practical (or even feasi- job of handling the second and are best known collectively as the ble). third of these items, which is the authors of the SATAN security This book is extremely useful for a main thrust of their book. The first evaluation application. However, wide spectrum of readers. People topic, firewall security, covered in they are also the authors of the one who are just getting started with two early chapters, seems a bit of the most important security computer forensic analysis will rushed (more space needs to be articles in the literature, “Improv- find it a clear and useful first book given to system hardening in par- ing the Security of Your Site by that will provide additional bene- ticular). The book focuses on Red- Breaking into It,” which explained fits on rereading. At the other Hat and SuSE Linux, but the prin- the concept of (implicit) transitive extreme, experienced security ciples and many of the specifics trust. Venema and Farmer have administrators will appreciate the apply to almost any Linux distri- collaborated on a new software authors’ clarity and insight in bution. tool, the Coroner’s Toolkit, for per- thinking about forensics in general Internet Denial of Service: Attack forming post-break-in analysis; and the specific discovery/analysis and Defense Mechanisms is an in- this is also the subject of their new operations in particular. I always depth treatment of DoS and DDoS book (the software appears at vari- find that reading Dan and Wietse’s attacks and ways of responding to ous points throughout the book work inspires me to strive for and preventing them. The authors and is discussed in an appendix). greater excellence in my own. constitute a DoS dream team. Not The book is divided into three surprisingly, the level of detail, parts, covering an overview of TH E DEFIN ITIVE WORK ON LOGGING understanding, and technical forensics and related concepts, expertise is consistently high fundamental system entities/data Abe Singer and Tina Bird have throughout the book. The book is structures related to forensic dis- done a marvelous job with the lat- also quite readable and even in covery, and the specifics of data est volume in SAGE’s Short Topics tone and quality, despite having persistence. in System Administration series. four authors. Don’t let the book’s This book is an excellent mix of Building a Logging Infrastructure is goofy cartoon cover illustration the theoretical and the practical. a very comprehensive discussion mislead you or put you off. This is Fundamental concepts are covered of syslog and its uses and foibles. a serious book on an important in detail, as are system data struc- The work covers logging on both topic. tures and entities (e.g., file sys- UNIX/Linux and Windows sys- Finally, The Executive Guide to tems, inodes, processes, system tems, and also discusses some Information Security is exactly calls), providing a helpful—and replacements for syslog and when what it sounds like: a book about necessary—knowledge base for they are useful or necessary. The computer security designed for the specific techniques for examin- relative lack of material on log nontechnical business executives. ing the latter that follow. As is typ- data reduction is due to the dearth It places security concepts and ical of their work, Farmer and of options in this area rather than practices within a typical business Venema have the knack of getting the authors’ omission. This book is framework (mindset). As such, it even experienced UNIX folks to so good that I find myself falling may be useful to some readers of look at and appreciate familiar into a typical writer’s emotional this column who need to present things/material in a new way. pitfall: being jealous that I didn’t such technical information to A significant thread running write it myself. A must-have for managers and other nontechnical through the book is the persist- everyone. audiences. ence of data, including data deleted from memory and storage media. In the first chapter of the 50 ;LO GIN: V OL. 30, NO. 2 SPAM IS THE WORD A PAIR ON LINUX PROGRAM- PARTING GLANCE Slamming Spam is another excel- MING lent book. It surveys all of the Both of the programming books I’m going to try to end each col- major spam-fighting techniques in this time are aimed at beginners of umn with a brief mention of some- common use today, covering both various sorts. Java Application thing a little out of the main- user-level and system-level strate- Development on Linux is written for stream. This time it’s Knoppix gies. It discusses—and provides readers with some programming Hacks, a book that made me nos- detailed, correct directions for— experience and a basic familiarity talgic for the days when I fre- configuring email clients (“user with object oriented programming quently used a Yggdrasil install agents”), Sendmail, Postfix, qmail, concepts. The first major section CD as a PC hardware diagnostic Exchange, and Lotus Notes for of the book introduces the Linux tool. Knoppix is a Linux distribu- spam filtering. It includes chapters environment and the basic Java tion that runs directly from a CD on procmail, SpamAssassin, language, and the remaining four without installation to disk. This Vipul’s Razor, blacklists, SMTP parts cover Java in action, includ- book describes the many tasks it authentication, sender verifica- ing database queries, GUIs, Web can perform, ranging from system tion, and, of course, Bayesian fil- interfaces, and distributed applica- configuration and repair to creat- tering. Mail administrators, system tions. The pace of the book is slow, ing computer kiosks and roll-your- administrators, and anyone who but this is appropriate for its own Tivo-like systems. My one has to deal with a significant spam intended audience, and the book is gripe with the book is its organiza- problem will find this book indis- long enough to introduce its topics tion. Like all of the volumes in the pensable. in nontrivial detail. Students—and O’Reilly Hacks series, it is struc- tured as a numbered series of short Sendmail Milters is the definitive others—with only a moderate amount of programming experi- articles, a scheme that inevitably reference for using Sendmail’s fil- favors breadth over depth. I’d say tering facility—milters—for deal- ence will have no trouble working through this book on their own, about two-thirds of the topics here ing with spam messages. Its four are useful and the other one-third parts cover the characteristics of and they’ll be ready for advanced Java texts when they are through. are cool, resulting in a book that is spam, deploying a test environ- a good reference and also fun to ment for developing and testing, Linux Application Development is flip open and start reading. writing milters, and configuring now in its second edition. Peter Sendmail to use milters. This book called the previous edition “a is very comprehensive, extremely superb piece of work,” while not- well written and eminently read- ing that it “makes no concessions able, and of the high quality one to the unwashed.” It would seem would expect from Brian Costales, that much of the effort that went working in concert here with Mar- into the second edition was cia Flynt.
Recommended publications
  • News Release for IMMEDIATE RELEASE
    News Release FOR IMMEDIATE RELEASE Media Contact: Caron Sjoberg, IDEAWORKS [email protected] (850) 434-9095 (O) | (850) 982-2410 (C) Alice Crann Good’s New Book Inspires Young Readers to Take a Break from Electronic Devices and Join a Reading Revolution “Betsy the Bookworm” tells the story of a loveable wiggler on a wild mission to save libraries and bookstores from extinction PENSACOLA, Fla. (December 1, 2020) — Written by Pensacola author Alice Crann Good, “Betsy the Bookworm’s Book Revolution” is the first book of an inspiring series, focusing on the value and importance of printed books, bookstores and libraries. Great for children aged 3-8, this colorful children's picture book is brimming with fun and action and shares Betsy the Bookworm's passion for reading. The book introduces us to Betsy the Bookworm, a smart, fun and adventurous character who loves to read. Betsy comes from a long line of proud book lovers and traces her ancestors back hundreds of years to a time when worms ate books because they could not read. But, once they learned to read, the worms fell in love with books and became bookworms – little worms that like to read more than anything else in the whole wide world. Over time, bookworms became too busy watching TV, playing video games, sending messages on smartphones and wrapping their little heads in earphones. Betsy’s bookworm friends wanted computers, iPads and Wi-Fi. Now they wished for mobile devices, not books. This is when Betsy decided to have a book revolution! “Betsy the Bookworm’s Book Revolution” takes children for quite a ride with Betsy as she saves print books, libraries and bookstores, multiplying the number of bookworms around the globe.
    [Show full text]
  • The Press of A. Colish Archives
    Special Collections Department The Press of A. Colish Archives 1913 - 1990 (bulk dates 1930s - 1950s) Manuscript Collection Number: 358 Accessioned: Purchase, September 1991. Extent: 5 linear ft. plus oversize material Content: Correspondence, galley and page proofs, drafts, notes, photographs, negatives, illustrations, advertisements, clippings, broadsides, books, chapbooks, pamphlets, journals, typography specimens, financial documents, and ephemera. Access: The collection is open for research. Processed: March 1998, by Shanon Lawson for reference assistance email Special Collections or contact: Special Collections, University of Delaware Library Newark, Delaware 19717-5267 (302) 831-2229 Table of Contents Biographical and Historical Note Scope and Contents Note Series Outline Contents List Biographical and Historical Note American fine printer and publisher Abraham Colish (1882-1963) immigrated with his family to the United States from Eastern Europe in the late nineteenth century. In 1894, at the age of twelve, he took an after-school job with a small printing shop in Bridgeport, Connecticut. Over the next few years, his duties progressed from sweeping the shop and selling papers to feeding the press and composing type. When he was sixteen, Colish and his mother moved to New York City, where he quickly found a position as a typesetter for Kane Brothers, a Broadway printing company. In 1907, Colish left his position as a composing room foreman at Rogers and Company and opened his own composing office. His business specialized in advertising typography and is credited as the first shop to exclusively cater to the advertising market. By the next year, Colish moved into larger quarters and began printing small orders. After several moves to successively larger offices in New York City, the Press of A.
    [Show full text]
  • CHECK IT OUT: January • February • March • Issue 5
    CHECK IT OUT: January • February • March • Issue 5 CHECK IT OUT: January • February • March 2018 COLUSA COUNTY FREE LIBRARY’S QUARTERLY NEWSLETTER COLUSA • ARBUCKLE • GRIMES • MAXWELL • PRINCETON • STONYFORD • WILLIAMS HIGHLIGHTS Coming to a Branch Near You… Calendar of Events ZIP BOOKS! To stay up to date on library events, programs, and branch closures, check out 1!The Colusa County Free Library is now your Zip Book to the collection, or offer it our events calendar! Page 4 offering Zip Books, a project funded by to the Friends of the Library to be sold at the California State Library through a the Bookworm. BECOME A FRIEND OF THE LIBRARY! grant from the Library Services and The Friends of the Colusa County Free There is no cost to patrons to “check Technology Act! Zip Books allows Library work toward generating community out” a book through Zip Books, and all librarians to pull from the “shelves” of interest in the library’s services and facilities. Amazon.com when a book is requested Colusa County Free Library members are As ambassadors to the community, the encouraged to participate in the by the public that is not part of our Friends believe that the library is one of our program provided any fines and/or fees collection. community’s greatest assets as it serves they owe to the Library are less than more people in all walks of life than any Using a "buy vs. borrow" model, Zip $5.00. other institution. To become a Friend, pick Books is an alternative to traditional up an application at the Main Branch Library interlibrary loans.
    [Show full text]
  • Due to COVID-19, the Bookworm Bus Has Been Parked. This Has Greatly Diminished Our Efforts to Deliver Books Throughout the Community
    Due to COVID-19, The Bookworm Bus has been parked. This has greatly diminished our efforts to deliver books throughout the community. I'm still venturing out to one neighbor in dire need. The Bookworm Bus is providing Door Drop services to these patrons. We have changed our business strategy to conform with the current concerns and mandates. The Bookworm Bus has been dismantled. The bookshelves were removed from the bus and placed in the new library area. The library has over 2,400 books available for check out. This is how it works: An individual may contact The Bookworm Bus through our Facebook page or email us at [email protected] to schedule a library stop. Each slot is allotted 40 minutes in duration, and ask each patron to adhere strictly to their allotted time slot. There are step by step instructions on the reception counter on how an individual may check out or check in a book or books. Hand sanitizer is next to the instructions and we ask each visitor to use the hand sanitizer upon arrival and prior to exiting the front door. A manual library log may be found on the round white table requesting patron's name, address (if this is your first visit) and a contact number or email, and the barcode of each book to be checked out or checked in. A book return is located to the right of the log to place books being returned. The office is sectioned off to restrict access to the reception-library area only. If a patron needs assistance, a bell has been placed on the library log table, ring the bell and someone will be out to assist you adhering to the social distancing mandates.
    [Show full text]
  • The Bookworm Ages 6-8 from Your Local Library and Idaho’S Read to Me Program ◊ April, 2009
    The Bookworm Ages 6-8 From your Local Library and Idaho’s Read to Me Program ◊ April, 2009 SummerSummer ReadingReading Book of the Month Repeated studies show that over the summer Look! Look! Look! By months most children lose some of the reading Nancy Elizabeth gains they made throughout the school year. Wallace You can help prevent this set-back! This lovable mouse family SIX EASY WAYS TO GET YOUR KIDS TO borrows a postcard READ THIS SUMMER showing a famous painting, and as they 1. Get your child a library card at your local carefully study the portrait, they see public library. It’s free! And many libraries patterns, colors, lines, and shapes. They have offer free summer cards for those who live so much fun that they decide to create their out of the district. own pictures. This art adventure will inspire children to Be Creative! 2. Keep a list on the refrigerator of the books everyone has read during the summer. 3. Encourage your child to read every day. Check out some more books to help your Take advantage of “waiting” time to share child be creative: books: on trips, at the doctor’s office, in line Lester Fizz, Bubble Gum Artist, at the grocery store. Ruth Spiro 4. Set a good example: read on your own and Little Rat Makes Music, Monika talk to your child about what you’re reading. Bang-Campbell 5. Have books everywhere – in the car, in front Hip Hop Speaks to Children with CD: A of the TV, in the kitchen, on the porch..
    [Show full text]
  • Bibliomania in the Middle Ages, by 1
    Bibliomania in the Middle Ages, by 1 CHAPTER I. CHAPTER II. CHAPTER III. CHAPTER IV. CHAPTER V. CHAPTER VI. CHAPTER VII. CHAPTER VIII. CHAPTER IX. CHAPTER X. CHAPTER XI. CHAPTER XII. CHAPTER XIII. Bibliomania in the Middle Ages, by Frederick Somner Merryweather This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg Bibliomania in the Middle Ages, by 2 License included with this eBook or online at www.gutenberg.net Title: Bibliomania in the Middle Ages Author: Frederick Somner Merryweather Release Date: May 28, 2007 [EBook #21630] Language: English Character set encoding: ISO-8859-1 *** START OF THIS PROJECT GUTENBERG EBOOK BIBLIOMANIA IN THE MIDDLE AGES *** Produced by Suzanne Lybarger, Brian Janes and the Online Distributed Proofreading Team at http://www.pgdp.net BIBLIOMANIA IN THE MIDDLE AGES BY F. SOMNER MERRYWEATHER With an Introduction by CHARLES ORR Librarian of Case Library NEW YORK MEYER BROTHERS & COMPANY 1900 Copyright, 1900 By Meyer Bros. & Co. Louis Weiss & Co. Printers.... 118 Fulton Street ... New York Bibliomania in the Middle Ages, by 3 Bibliomania in the Middle Ages OR SKETCHES OF BOOKWORMS, COLLECTORS, BIBLE STUDENTS, SCRIBES AND ILLUMINATORS From the Anglo-Saxon and Norman Periods to the Introduction of Printing into England, with Anecdotes Illustrating the History of the Monastic Libraries of Great Britain in the Olden Time by F. Somner Merryweather, with an Introduction by Charles Orr, Librarian of Case Library. INTRODUCTION. In every century for more than two thousand years, many men have owed their chief enjoyment of life to books.
    [Show full text]
  • The Bookworm BOOKS REVIEWED in THIS COLUMN by Peter H
    the bookworm BOOKS REVIEWED IN THIS COLUMN by Peter H. Salus The fictitious news group periodically quoted at tedious length reads like no THE EFFECTIVE INCIDENT RESPONSE Peter H. Salus is a TEAM member of the ACM, news group I’ve ever seen. the Early English Text JULIE LUCAS AND BRIAN MOELLER Society, and the Trol- I look forward to reading Papadimitriou’s Boston: Addison-Wesley, 2004. Pp. 303. lope Society, and is a ISBN 0-201-76175-0. life member of the next theoretical work. American Oriental TURING Society. He owns nei- ther a dog nor a cat. Scheme CHRISTOS H. PAPADIMITRIOU Nearly everyone who knows me knows Cambridge, MA: MIT Press, 2003. Pp. 284. that I like Scheme. It’s the best of the ISBN 0-262-16218-0. [email protected] descendants of Lisp. But it’s over 25 years since Guy Steele and Gerry Suss- THE SCHEME PROGRAMMING I’ve only a few books I want to talk man wrote their MIT AI memo (#452, LANGUAGE, 3RD ED. about this month: it’s not that the pub- January 1978), and many pages have R. KENT DYBVIG lishers have ceased production, but I just Cambridge, MA: MIT Press, 2003. Pp. 295. been written about Scheme. Dybvig’s can’t get very interested in CSS or in M$. ISBN 0-262-54148-3. third edition is both an introduction Incident Response and a reference book. It’s really very THE BEST OF THE JOY OF TECH good and deserves a place on your book- NITROZAC AND SNAGGY Incident response teams are the thing shelf – but only after you read it.
    [Show full text]
  • 2020 Berkshire Hathaway Book List These Books Were Approved by Mr
    2020 Berkshire Hathaway Book List These books were approved by Mr. Buffett for sale at the 2020 Berkshire Hathaway Annual Meeting. To order go to bookwormomaha.com or call The Bookworm at 402.392.2877 >NEW BOOKS FOR 2020< Margin of Trust: The Berkshire Business Model by Larry Cunningham and Stephanie Cuba ($24.95, Columbia Business School, 2020). Cunningham and Cuba develop a new account of how Berkshire Hathaway works, showing that the key to its success is trust. Profiling partnership practices and business methods, they contend that Berkshire's distinguishing feature is a culture in which autonomy and decentralization are core management principles. They provide instructive examples of how this model has been successfully adapted by other companies that share a faith in trust as an organizing principle. They also offer candid commentary on the risks of a trust-based approach and how to mitigate them. Margin of Trust features illuminating analysis of Buffett's take on the role trust plays in business agreements, what Buffett looks for in great corporate boards, and what lies ahead for Berkshire after its iconic leader leaves the scene. My New Berkshire ABC by Nancy Rips, illustrated by Matt Haney ($19.95. 2020). Kids will learn the alphabet the Warren Buffett way: A is for Apple, B is for Benjamin Moore, C is for Coca Cola, D is for Duracell. It’s everyone’s favorite family Berkshire book, brand new and updated for 2020! 1 <New Edition> Of Permanent Value: The Story of Warren Buffett‐ 2020 Elephant Edition by Andrew Kilpatrick ($75, 2020).
    [Show full text]
  • Carl Spitzweg Kunst Museum Winterthur | Reinhart Am Stadtgarten 29 February – 2 August 2020
    Press release Carl Spitzweg Kunst Museum Winterthur | Reinhart am Stadtgarten 29 February – 2 August 2020 Press conference for the exhibition Thursday, 27 February 2020, 11 o’clock, or individual tour by appointment Kunst Museum Winterthur | Reinhart am Stadtgarten Stadthausstrasse 6, CH-8400 Winterthur Der arme Poet (The Poor Poet), one of the landmarks of German painting, is now being shown for the first time in Winterthur in a major exhibition on Carl Spitzweg. Together with Der Bücherwurm (The Bookworm), Der Kaktusfreund (The Cactus Friend) and other masterpieces, it is the highlight of the first exhibition on the Biedermeier master in Switzerland in almost 20 years. Carl Spitzweg (1808 - 1885) is one of the most successful and popular German painters of his time. However, the tranquility of his paintings is deceptive, for Spitzweg was a precise and critical observer. He described the Biedermeier zeitgeist with humour and irony and exposed society with its sometimes eccentric excesses, for example in quirky characters like The Bookworm or The Cactus Friend. Even when he painted a sentry placing his knitting aside to look into the distance - only to discover nothing – this witty subject has a decidedly political component: the painter is ridiculing the unnecessary military excesses in 19th century Germany. By eluding censorship and apparently innocently, Spitzweg exposed political grievances. In this interpretation, The Poor Poet emerges not simply as a romantic idealization of the poet, but as an unsparing display of the artist's poverty, representative of the restriction of art in general. The exhibition at the Kunst Museum Winterthur brings together numerous major works by the Munich master.
    [Show full text]
  • In Defense of Bookworms Worm Created This Epithet to Mock Some­ to Suffer Withdrawal
    In Defense of Bookworms worm created this epithet to mock some­ to suffer withdrawal. A bookworm with­ one who was. My guess is that the person out anything to read starts to get nervous By David Isaacson, who first used this term was an illiterate and itchy. Deprive us of print too long Professor & Humanities Librarian or semi-literate lazy person who envied and we may have panic attacks about am a bookworm. I say this proudly, the bookworm's elated state. Not willing where our next reading fix is coming but also a bit warily. Bookworms to admit he didn't have such an ability from. l belong to the same genus as himself, this killjoy pretended that the Non-bookworms cannot really booklovers, but we are in a separate bookworm was what Jonson calls a "per­ empathize with us. Where they might get species. Librarians have traditionally verse whoreson." Prejudiced people put tired if they've been too long with Mark catered to booklovers. After all, many bookworms in the same mental sideshow Twain down the Mississippi, bookworms librarians are themselves booklovers. But as nerds, dweebs, wonks, pointy-headed resent coming back. Reading something is not all of us who know we are book­ intellectuals, absent-minded professors, more important than reading any particu­ worms are ready to come out of the closet. and other wierdos, who, they insist, don't lar thing. If I can't have Twain, I will settle I'm going to risk outing myself here. have real lives. for Agatha Christie. In a pinch, a I'm not a literal bookworm, defined by Harlequin romance is better than no book the Oxford English Dictionary as "a kind of at all.
    [Show full text]
  • German Writing, American Reading
    German Writing, American Reading German Writing, American Reading Women and the Import of Fiction, 1866–1917 LYNNE TatlOCK THE OHIO StatE UNIVERSITY PRESS | COLUMBUS Copyright © 2012 by The Ohio State University. All rights reserved. Library of Congress Cataloging-in-Publication Data Tatlock, Lynne, 1950– German writing, American reading : women and the import of fiction, 1866–1917 / Lynne Tatlock. p. cm. Includes bibliographical references and index. ISBN 978-0-8142-1194-6 (cloth : alk. paper)—ISBN 978-0-8142-9295-2 (cd-rom) 1. American literature—German influences. 2. German literature—Translations into English—History and criticism. 3. German literature—Women authors—History and criticism. 4. German literature—Appreciation—United States. 5. Literature and soci- ety—United States. I. Title. PS159.G3T38 2012 810.9'3243—dc23 2012018741 Cover design by Laurence J. Nozik Text design by Juliet Williams Type set in Adobe Minion Pro Printed by Thomson-Shore, Inc. The paper used in this publication meets the minimum requirements of the American National Standard for Information Sciences—Permanence of Paper for Printed Library Materials. ANSI Z39.48-1992. 9 8 7 6 5 4 3 2 1 For Joe CONTENTS List of Illustrations ix Preface xi Acknowledgments xiii PART ONE · German Writing, American Reading Chapter 1 Introduction: Made in Germany, Read in America 3 Chapter 2 German Women Writers at Home and Abroad 28 PART TWO · German Texts as American Books Chapter 3 “Family Likenesses”: Marlitt’s Texts as American Books 53 Chapter 4 The German Art of the Happy
    [Show full text]
  • Bookworm Fall Issue November 2012
    Friends of the Library Bookworm Fall Issue November 2012 President’s Letter New Workroom Information Dear Friends: Phone 478-745-2422 There are only 5 months until our next big Sale in March of 2013. The dates are March 21- P O Box 18175 24, with the preview Sale on March 20. We will return to the Macon Centreplex again , as this location was enjoyed by the majority of our customers. We are well on our way, with Macon, GA 31209 over 1500 boxes of books already priced, boxed and packed in storage. Our volunteers con- tinue to work diligently every Tuesday and Thursday at our workroom in the Riverstreet 2720 Riverside Dr. Corners location. Our new workroom location has improved our efficiency greatly. As we continue to provide major support to our public libraries, we also have found more Suite 129 ways to support the literacy effort in our community. We recently made a $500 donation to the Central High School Book Club , a $2500 donation to the FERST Foundation for Macon, GA 31209 Childhood Literacy, donated books to the DISMAS charities, Bibb County Law Enforce- ment Center, and are working with the Daybreak ministry for the homeless. Email: Info@ Our next Sale promises to be bigger and better than ever and it is always a challenge for our friendsofthelibrary- volunteers to get set up in a timely fashion. In order to save money, we will be accelerating macon.com our setup time. We will begin setting up tables on Monday morning March 18, and have all the books arranged on the tables before 5 PM on Wednesday, March 20.
    [Show full text]