Search results
Results from the WOW.Com Content Network
The book is written almost entirety in dialogue and is presented as the research notes for Roth’s earlier novel The Counterlife.The novel marks the first time Roth uses his own name as the name of the protagonist within a fictional work; he had previously used himself as a main character in a work of non-fiction - The Facts: A Novelist's Autobiography, and would do so again in the memoir ...
Main page; Contents; Current events; Random article; About Wikipedia; Contact us; Donate
Get AOL Mail for FREE! Manage your email like never before with travel, photo & document views. Personalize your inbox with themes & tabs. You've Got Mail!
The Deceiver is a novel by English writer Frederick Forsyth, about a retiring agent of the British SIS named Sam McCready. He is the head of Deception, Disinformation and Psychological Operations, and his maverick but brilliant successes have led to his nickname "The Deceiver."
The Doctor Who Fooled the World: Science, Deception, and the War on Vaccines is a 2020 non-fiction book by Brian Deer, published by Johns Hopkins University Press. Written in narrative style, it sets out Deer's investigation of Andrew Wakefield and the Lancet MMR autism fraud .
Cover of The Songs of Bilitis (1894), a French pseudotranslation of Ancient Greek erotic poetry by Pierre Louÿs. Literary forgery (also known as literary mystification, literary fraud or literary hoax) is writing, such as a manuscript or a literary work, which is either deliberately misattributed to a historical or invented author, or is a purported memoir or other presumably nonfictional ...
The Folly of Fools: The Logic of Deceit and Self-Deception in Human Life (2011, Basic Books, ISBN 0465027555) by Robert Trivers is a book that examines the evolutionary explanations for deceit and self-deception. Trivers focuses primarily on humans but he includes examples from many other organisms as well.
The Art of Deception is a book by Kevin Mitnick that covers the art of social engineering. [1] [2] Part of the book is composed of real stories and examples of how social engineering can be combined with hacking. All, or nearly all, of the examples, are fictional but quite plausible.