Cujo

Cujo

The #1 New York Times bestseller, Cujo “hits the jugular” (The New York Times) with the story of a friendly Saint Bernard that is bitten by a bat. Get ready to meet the most hideous menace ever to terrorize the town of Castle Rock, Maine. Outside a peaceful town in central Maine, a monster is waiting. Cujo is a two-hundred-pound Saint Bernard, the best friend Brett Camber has ever had. One day, Cujo chases a rabbit into a cave inhabited by sick bats and emerges as something new altogether. Meanwhile, Vic and Donna Trenton, and their young son Tad, move to Maine. They are seeking peace and quiet, but life in this small town is not what it seems. As Tad tries to fend off the terror that comes to him at night from his bedroom closet, and as Vic and Donna face their own nightmare of a marriage on the rocks, there is no way they can know that a monster, infinitely sinister, waits in the daylight. What happens to Cujo, how he becomes a horrifying vortex inescapably drawing in all the people around him, makes for one of the most heart-stopping novels Stephen King has ever written. “A genuine page-turner that grabs you and holds you and won’t let go” (Chattanooga Times), Cujo will forever change how you view man’s best friend.

Nope, Nothing Wrong Here

The Making of Cujo

Nope, Nothing Wrong Here

Lee Gambin analyzes the film scene by scene, including exhaustive coverage of the production from its problematic early days with originally-assigned director Peter Medak to the final edit by ultimate director Lewis Teague.

Information Systems Security and Privacy

First International Conference, ICISSP 2015, Angers, France, February 9-11, 2015, Revised Selected Papers

Information Systems Security and Privacy

This book constitutes revised selected papers from the First International Conference on Information Systems Security and Privacy, ICISSP 2015, held in Angers, France, in February 2015. The 12 papers presented in this volume were carefully reviewed and selection from a total of 56 submissions. They were organized in topical sections named: data and software security; privacy and confidentiality; mobile systems security; and biometric authentication. The book also contains two invited papers.

Data Privacy Management and Autonomous Spontaneous Security

8th International Workshop, DPM 2013, and 6th International Workshop, SETOP 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers

Data Privacy Management and Autonomous Spontaneous Security

This book constitutes the revised selected papers of the 8th International Workshop on Data Privacy Management, DPM 2013, and the 6th International Workshop on Autonomous and Spontaneous Security, SETOP 2013, held in Egham, UK, in September 2013 and co-located with the 18th European Symposium on Research in Computer Security (ESORICS 2013). The volume contains 13 full papers selected out of 46 submissions and 1 keynote lecturer from the DPM workshop and 6 full papers together with 5 short papers selected among numerous submissions to the SETOP workshop. The papers cover topics related to the management of privacy-sensitive information and automated configuration of security, focusing in particular on system-level privacy policies, administration of sensitive identifiers, data integration and privacy, engineering authentication and authorization, mobile security and vulnerabilities.

This Is Philosophy

An Introduction

This Is Philosophy

This is Philosophy: An Introduction offers an engagingly written introduction to philosophical concepts that include ethics, the existence of God, free will, personal identity, philosophy of mind, and epistemology. Conveys the excitement and importance of philosophy while explaining difficult concepts clearly for the average undergraduate Links throughout to supplemental materials and freely available online primary sources Features online student and instructor resources, including a 175-question test bank and answer key, 40 PowerPoint lectures, a glossary, student comprehension self-assessment exercises, and more. Represents a student-friendly yet knowledgeable guide to the questions, problems, and great thinkers of philosophy

Detection of Intrusions and Malware, and Vulnerability Assessment

15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings

Detection of Intrusions and Malware, and Vulnerability Assessment

This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.

Hollywood's Stephen King

Hollywood's Stephen King

A definitive overview of film adaptations of the works of horror master Stephen King analyzes the thematic, narative, and character links that are revealed among his films, exploring such popular films as Stand By Me, Misery, The Shining, The Green Mile, and The Shawshank Redemption, among others. Original. 15,000 first printing.

Stephen King from A to Z

An Encyclopedia of His Life and Work

Stephen King from A to Z

Contains hundreds of alphabetically arranged entries that provide information about various aspects of the life and work of popular novelist Stephen King.

Just After Sunset

Stories

Just After Sunset

This collection of short works is comprised of pieces that previously appeared in such publications as The New Yorker, Playboy, and McSweeney's, in a volume that includes such tales as ""The Gingerbread Girl"" and "N."