Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Science Fiction: A Very Short Introduction

Buy

Frankenstein, The Time Machine, Star Trek, Dune, 1984, Blade Runner--science fiction has been explained as a combination of romance, science, and prophecy; as a genre based on an imagined alternative to the reader's environment; and as a form of fantastic fiction and historical literature. It has also been argued that science fiction narratives are the most engaged, socially relevant, and responsive to the modern technological environment. In this Very Short Introduction, David Seed doesn't offer a history of science fiction, but instead attempts to tie examples of science fiction to different historical moments, in order to demonstrate how science fiction has evolved over time, especially the emergence of science fiction as a popular genre in the 20th century. Seed looks not only at literature, but also at drama and poetry, as well as film. Examining recurrent themes in science fiction, he looks at voyages into space, the concept of the alien and alternative social identities, the role of technology in science fiction, and its relation to time--in the past, present, and future.

About the Series: Combining authority with wit, accessibility, and style, Very Short Introductions offer an introduction to some of life's most interesting topics. Written by experts for the newcomer, they demonstrate the finest contemporary thinking about the central problems and issues in hundreds of key topics, from philosophy to Freud, quantum theory to Islam.

(HTML tags aren't allowed.)

Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems
Industrial Network Security: Securing Critical Infrastructure Networks for Smart Grid, SCADA, and Other Industrial Control Systems

One of the most mysterious areas of information security is industrial system security.
No other area of information security contains that many myths, mistakes, misconceptions
and outright lies. Information available online, while voluminous, will
only lead information security professionals and industrial systems
...

Be Fast or Be Gone: Racing the Clock with Critical Chain Project Management
Be Fast or Be Gone: Racing the Clock with Critical Chain Project Management
Mike Knight, an executive in a semiconductor firm, learns that his eight-year-old son Tim has a rare form of brain cancer. Tim's best hope for long-term survival is a drug called Supragrel. Unfortunately, Supragrel is still in early clinical trials and may reach the market too late. Mike makes the agonizing decision to quit his job and go to...
Creating Flash Widgets with Flash CS4 and ActionScript 3.0 (FirstPress)
Creating Flash Widgets with Flash CS4 and ActionScript 3.0 (FirstPress)
If you are a Flash designer or developer and are not making widgets, you’re missing out! Creating widgets is a lot of fun and also a great way to make yourself known as a Flash developer. This book shows you how to create Flash widgets with some of the new features introduced in Flash CS4 and ActionScript 3.0. It also shows you how easy it is...

Empiricism and Philosophy of Physics (Synthese Library, 434)
Empiricism and Philosophy of Physics (Synthese Library, 434)

This book presents a thoroughly empiricist account of physics. By providing an overview of the development of empiricism from Ockham to van Fraassen the book lays the foundation for its own version of empiricism. Empiricism for the author consists of three ideas: nominalism, i.e. dismissing second order quantification as unnecessary,...

Combinatorial Optimization and Applications: Second International Conference, COCOA 2008, St. John's, NL, Canada, August 21-24, 2008, Proceedings
Combinatorial Optimization and Applications: Second International Conference, COCOA 2008, St. John's, NL, Canada, August 21-24, 2008, Proceedings
The papers in this volume were presented at the Second International Conference on Combinatorial Optimization and Applications (COCOA 2008), held August 21–24, 2008, in St. John’s, Newfoundland, Canada. The topics cover most areas in combinatorial optimization and applications.

A total of 84 papers were submitted, of which 44
...
Strategic Information Security
Strategic Information Security

The new emphasis on physical security resulting from the terrorist threat has forced many information security professionals to struggle to maintain their organization's focus on protecting information assets. In order to command attention, they need to emphasize the broader role of information security in the strategy of their companies....

©2021 LearnIT (support@pdfchm.net) - Privacy Policy