Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
19 views91 pages

SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edition Gibson

The document promotes various cybersecurity exam preparation ebooks available for download on ebookgate.com, including titles like SSCP, CEH, CISSP, and more. It provides links to each ebook along with descriptions of their content, covering topics such as security fundamentals, access controls, networking, attacks, and risk management. The document emphasizes the availability of instant digital products in multiple formats for a better reading experience.

Uploaded by

joerncezari0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
19 views91 pages

SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edition Gibson

The document promotes various cybersecurity exam preparation ebooks available for download on ebookgate.com, including titles like SSCP, CEH, CISSP, and more. It provides links to each ebook along with descriptions of their content, covering topics such as security fundamentals, access controls, networking, attacks, and risk management. The document emphasizes the availability of instant digital products in multiple formats for a better reading experience.

Uploaded by

joerncezari0
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 91

Get the full ebook with Bonus Features for a Better Reading Experience on ebookgate.

com

SSCP Systems Security Certified Practitioner All


in One Exam Guide Third Edition Gibson

https://ebookgate.com/product/sscp-systems-security-
certified-practitioner-all-in-one-exam-guide-third-edition-
gibson/

OR CLICK HERE

DOWLOAD NOW

Download more ebook instantly today at https://ebookgate.com


Instant digital products (PDF, ePub, MOBI) available
Download now and explore formats that suit you...

CEH Certified Ethical Hacker all in one exam guide 2nd


edition Edition Horton

https://ebookgate.com/product/ceh-certified-ethical-hacker-all-in-one-
exam-guide-2nd-edition-edition-horton/

ebookgate.com

CISSP All in One Exam Guide Fifth Edition Shon Harris

https://ebookgate.com/product/cissp-all-in-one-exam-guide-fifth-
edition-shon-harris/

ebookgate.com

All in one A certification exam guide 3rd ed Edition


Michael Meyers

https://ebookgate.com/product/all-in-one-a-certification-exam-
guide-3rd-ed-edition-michael-meyers/

ebookgate.com

ISC2 Certified Cloud Security Professional CCSP Exam Guide


First Edition Kim Van Lavieren

https://ebookgate.com/product/isc2-certified-cloud-security-
professional-ccsp-exam-guide-first-edition-kim-van-lavieren/

ebookgate.com
CISSP Certified Information Systems Security Professional
Study Guide 2nd Edition Ed Tittle

https://ebookgate.com/product/cissp-certified-information-systems-
security-professional-study-guide-2nd-edition-ed-tittle/

ebookgate.com

Comptia A Certification All In One Exam Guide Exams 220


801 220 802 8th Edition Meyers

https://ebookgate.com/product/comptia-a-certification-all-in-one-exam-
guide-exams-220-801-220-802-8th-edition-meyers/

ebookgate.com

Wireshark Certified Network Analyst Exam Prep Guide Second


Edition Laura Chappell

https://ebookgate.com/product/wireshark-certified-network-analyst-
exam-prep-guide-second-edition-laura-chappell/

ebookgate.com

CWSP Certified Wireless Security Professional Official


Study Guide Exam PW0 204 CWNP Official Study Guides 1st
Edition David D. Coleman
https://ebookgate.com/product/cwsp-certified-wireless-security-
professional-official-study-guide-exam-pw0-204-cwnp-official-study-
guides-1st-edition-david-d-coleman/
ebookgate.com

Eleventh Hour Security Exam SY0 201 Study Guide Ido


Dubrawsky

https://ebookgate.com/product/eleventh-hour-security-exam-
sy0-201-study-guide-ido-dubrawsky/

ebookgate.com
Contents
1. Cover
2. Title Page
3. Copyright Page
4. Dedication
5. Contents at a Glance
6. Contents
7. Acknowledgments
8. Introduction
9. Exam Objective Map
10. Chapter 1 Security Fundamentals

1. Reviewing the Requirements for SSCP

1. Have One Year of Experience


2. Registering for the Exam
3. Passing the Exam
4. Subscribing to the (ISC)2 Code of Ethics andGetting Endorsed
5. Maintaining Your SSCP Certification

2. Understanding Basic Security Concepts

1. Confidentiality
2. Integrity
3. Availability

3. Exploring Fundamentals of Security

1. Least Privilege
2. Separation of Duties
3. Privacy and Data Sensitivity
4. Defense in Depth
5. Nonrepudiation
6. AAAs of Security
7. Accountability
8. Due Diligence
9. Due Care

4. Chapter Review

1. Questions
2. Answers

11. Chapter 2 Access Controls

1. Comparing Identification, Authentication, andAuthorization


2. Exploring Authentication

1. Three Factors of Authentication


2. Multifactor Authentication
3. Two-Step Verification
4. Reviewing Identification
5. Single Sign-on Authentication
6. Centralized vs. Decentralized Authentication
7. Offline Authentication
8. Device Authentication

3. Implementing Access Controls

1. Comparing Subjects and Objects


2. Logical Access Controls

4. Comparing Access Control Models

1. Discretionary Access Control


2. Non-Discretionary Access Control
3. Access Control Matrix vs. Capability Table

5. Participating in the Identity and Access ManagementLifecycle

1. Identity Proofing
2. Provisioning and Authorization
3. Maintenance and Entitlement
4. De-provisioning
6. Participating in Physical Security Operations

1. Badging
2. Data Center Assessment

7. Chapter Review

1. Questions
2. Answers

12. Chapter 3 Basic Networking and Communications

1. Understanding Use Cases


2. Reviewing the OSI Model

1. The Physical Layer (Layer 1)


2. The Data Link Layer (Layer 2)
3. The Network Layer (Layer 3)
4. The Transport Layer (Layer 4)
5. The Session Layer (Layer 5)
6. The Presentation Layer (Layer 6)
7. The Application Layer (Layer 7)

3. Comparing the OSI and TCP/IP Models


4. Understanding Network Topologies and Relationships

1. Ethernet
2. Bus Topology
3. Star Topology
4. Tree Topology
5. Token Ring Topology
6. Mesh Topology
7. Network Relationships

5. Reviewing Basic Protocols and Ports

1. Comparing IPv4 and IPv6


2. Dynamic Host Configuration Protocol
3. Address Resolution Protocol
4. Network Discovery Protocol
5. Domain Name System
6. Internet Control Message Protocol
7. Internet Group Message Protocol
8. Simple Network Management Protocol
9. File Transfer Protocol
10. Telnet
11. Secure Shell
12. Hypertext Transfer Protocol and HypertextTransfer Protocol Secure
13. Transport Layer Security and Secure Sockets Layer
14. Network File System
15. Routing Protocols
16. E-mail Protocols
17. Internet Protocol Security
18. Tunneling Protocols
19. Mapping Well-Known Ports to Protocols
20. Comparing Ports and Protocol Numbers

6. Comparing Internetwork Trust Architectures

1. Comparing Public and Private IP Addresses


2. Using NAT
3. Comparing Trust Relationships

7. Exploring Wireless Technologies

1. Securing Data Transmissions


2. Wireless Device Administrator Password
3. Wireless Service Set Identifier
4. MAC Address Filtering
5. Bluetooth
6. NFC
7. GSM
8. 3G, LTE, and 4G
9. WiMAX
10. Radio Frequency Identification
11. Protecting Mobile Devices

8. Chapter Review

1. Questions
2. Answers
13. Chapter 4 Advanced Networking and Communications

1. Managing LAN-based Security

1. Comparing Switches and Routers


2. Physical and Logical Segmentation
3. Secure Device Management
4. VoIP

2. Using Proxy Servers


3. Understanding Firewalls

1. Packet-Filtering Firewall
2. Stateful Inspection Firewall
3. Application Firewall
4. Next-Generation Firewall
5. Defense Diversity
6. Comparing Network-based and Host-basedFirewalls

4. Exploring Remote Access Solutions

1. Risks and Vulnerabilities


2. Tunneling Protocols
3. Authentication
4. Traffic Shaping and WAN Optimization

5. Managing Network Access Control


6. Exploring Virtual Environments

1. Virtualization Terminology
2. Shared Storage
3. Virtual Appliances
4. Virtual Desktop Infrastructure
5. Continuity and Resilience
6. Separation of Data Plane and Control Plane
7. Software-defined Networking
8. Protecting Virtualization Systems

7. Understanding Cloud Computing


1. Shared Responsibility Models
2. Cloud Operation Models
3. Storage
4. Privacy
5. Data Control and Third-party Outsourcing
6. Compliance

8. Chapter Review

1. Questions
2. Answers

14. Chapter 5 Attacks

1. Comparing Attackers

1. Hackers and Crackers


2. White Hats, Black Hats, and Gray Hats
3. Advanced Persistent Threats
4. Insider Threats
5. Script Kiddies

2. Exploring Attack Types and Countermeasures

1. Basic Countermeasures
2. Spoofing
3. Data Theft
4. DoS
5. DDoS
6. Botnets and Zombies
7. Sniffing Attack
8. Reconnaissance and Fingerprinting Attacks
9. Salami Attack
10. Man-in-the-Middle
11. Replay
12. Session Hijacking
13. DNS Cache Poisoning
14. Smurf and Fraggle Attacks
15. Software Security as a Countermeasure
16. Buffer Overflow Attacks
17. Injection Attacks
18. Cross-Site Scripting
19. Cross-Site Request Forgery
20. Password Attacks
21. Spam
22. Phishing Attacks
23. Phishing and Drive-by Downloads
24. Spear Phishing and Whaling
25. Vishing
26. Smishing
27. Zero Day Exploits
28. Covert Channel
29. Wireless Attacks and Countermeasures

3. Understanding Social Engineering

1. Tailgating
2. Impersonation
3. Skimming
4. Dumpster Diving
5. Shoulder Surfing
6. Social Networking Attacks
7. User Awareness as a Countermeasure

4. Chapter Review

1. Questions
2. Answers

15. Chapter 6 Malicious Code and Activity

1. Identifying Malicious Code

1. Virus
2. Worm
3. Trojan Horse
4. RATs
5. Scareware
6. Ransomware
7. Keylogger
8. Logic Bomb
9. Rootkits
10. Mobile Code
11. Backdoors and Trapdoors
12. Spyware
13. Malware Hoaxes
14. Analyzing the Stages of an Attack

2. Understanding Malware Delivery Methods

1. Delivering Malware via Drive-by Downloads


2. Delivering Malware via Malvertising
3. Delivering Malware via E-mail
4. Delivering Malware via USB Drives

3. Implementing Malicious Code Countermeasures

1. Antivirus Software
2. Keeping AV Signatures Up to Date
3. Spam Filters
4. Content-filtering Appliances
5. Keeping Operating Systems Up to Date
6. Scanners
7. Beware of Shortened Links
8. Sandboxing
9. Least Privilege
10. Software Security
11. Application Whitelisting and Blacklisting
12. Participating in Security Awareness and Training

4. Common Vulnerabilities and Exposures


5. Chapter Review

1. Questions
2. Answers

16. Chapter 7 Risk, Response, and Recovery

1. Defining Risk

1. Identifying Threat Sources


2. Identifying Threat Events
3. Understanding Vulnerabilities
4. Understanding Impact Assessments
5. Sharing Threat Intelligence

2. Managing Risk

1. Risk Treatment
2. Residual Risk
3. Identifying Assets
4. Risk Visibility and Reporting
5. Risk Register
6. Common Vulnerability Scoring System
7. Risk Management Frameworks

3. Performing Risk Assessments

1. Threat Modeling
2. Quantitative Analysis
3. Qualitative Analysis
4. Risk Assessment Steps
5. Address Findings

4. Supporting the Incident Lifecycle

1. Preparation
2. Detection, Analysis, and Escalation
3. Containment
4. Eradication
5. Recovery
6. Lessons Learned/Implementation of NewCountermeasure

5. Chapter Review

1. Questions
2. Answers

17. Chapter 8 Monitoring and Analysis

1. Operating and Maintaining Monitoring Systems

1. Events of Interest
2. Intrusion Detection Systems
3. IDS Alerts
4. Network-based Intrusion Detection Systems
5. Host-based Intrusion Detection Systems
6. Intrusion Prevention Systems
7. Detection Methods
8. Wireless Intrusion Detection and PreventionSystems
9. Analyze Monitoring Results
10. Detection Systems and Logs
11. Detecting Unauthorized Changes
12. Using Security Information and EventManagement Tools
13. Continuous Monitoring
14. Document and Communicate Findings

2. Performing Security Tests and Assessments

1. Vulnerability Assessments
2. Penetration Tests

3. Chapter Review

1. Questions
2. Answers

18. Chapter 9 Controls and Countermeasures

1. Using Security Controls, Safeguards, and Countermeasures

1. Performing a Cost-Benefit Analysis


2. Security Controls Lifecycle

2. Understanding Control Goals

1. Preventive
2. Detective
3. Corrective
4. Other Controls

3. Comparing Security Control Implementation Methods


1. Administrative Security Controls
2. Technical Security Controls
3. Physical Security Controls

4. Combining Control Goals and Classes


5. Exploring Some Basic Controls

1. Hardening Systems
2. Policies, Standards, Procedures, and Guidelines
3. Response Plans
4. Change Control and Configuration Management
5. Testing and Implementing Patches, Fixes, andUpdates
6. Endpoint Device Security
7. User Awareness and Training Programs

6. Understanding Fault Tolerance

1. Fault Tolerance for Disks


2. Failover Clusters
3. Load Balancing
4. Redundant Connections

7. Understanding Backups

1. Full Backups
2. Full/Incremental Backup Strategy
3. Full/Differential Backup Strategy
4. Image-based Backups

8. Chapter Review

1. Questions
2. Answers

19. Chapter 10 Auditing and Management Processes

1. Understanding Auditing and Accountability

1. Holding Users Accountable with Audit Logs


2. Auditing with Logs
3. Clipping Levels
4. Understanding Audit Trails

2. Exploring Audit Logs

1. Operating System Logs


2. Storing Logs on Remote Systems
3. *Nix Logs
4. Proxy Server Logs
5. Firewall Logs
6. Reviewing Logs
7. Managing Audit Logs

3. Performing Security Audits

1. Periodic Audit and Review


2. Auditing Passwords
3. Auditing Security Policies
4. ISACA
5. Exploring PCI DSS Requirements
6. Auditing Physical Access Controls

4. Understanding Configuration Management

1. Using Imaging for Configuration Management


2. Using Group Policy for Configuration Management
3. Using Other Tools for Configuration Management

5. Understanding Change Management

1. Change Management Process


2. Identifying Security Impact

6. Chapter Review

1. Questions
2. Answers

20. Chapter 11 Security Operations


1. Handling Data

1. Classifying Data
2. Marking and Labeling Data
3. Roles and Responsibilities
4. Protecting Data from Cradle to Grave
5. Data at Rest and Data in Motion
6. Data Management Policies
7. Understanding Databases
8. Data Inference
9. Data Diddling
10. Regulatory Requirements
11. Training

2. Managing Assets Through the Lifecycle

1. Hardware Inventory
2. Software Inventory and Licenses
3. Data Storage

3. Certification and Accreditation

1. Certification, Accreditation, and SecurityAssessments


2. Common Criteria
3. Using a Risk Management Framework
4. Understanding Security Within the SystemDevelopment Lifecycle

4. Chapter Review

1. Questions
2. Answers

21. Chapter 12 Security Administration and Planning

1. Understanding Security Policies

1. Security Policy Characteristics


2. Enforcing Security Policies
3. Value of a Security Policy
4. Security Policies Becoming More Common
5. Complying with Codes of Ethics
6. Policy Awareness
7. Updating Security Policies

2. Understanding BCP and DRP Activities

1. Business Impact Analysis


2. Disaster Recovery Plan
3. Emergency Response Plans and Procedures
4. Comparing a BCP and a DRP
5. Restoration Planning
6. Testing and Drills
7. Alternative Locations

3. Identifying Security Organizations

1. NIST
2. US-CERT
3. SANS Institute
4. CERT Division

4. Chapter Review

1. Questions
2. Answers

22. Chapter 13 Legal Issues

1. Exploring Computer Forensics

1. Supporting the Incident Lifecycle


2. Handling Evidence
3. Three Phases of a Computer ForensicsInvestigation
4. Legal and Ethical Principles

2. Comparing Computer Abuse and Computer Crime


3. Understanding Fraud and Embezzlement Crime

1. Mandatory Vacations
2. Job Rotation

4. Understanding Privacy Issues

1. General Data Protection Regulation


2. California Supreme Court Rules That ZIP CodesAre PII
3. Connecticut’s Public Act No. 08-167
4. Children’s Online Privacy Protection Act
5. California Online Privacy Protection Act of 2003

5. Legal and Regulatory Concerns


6. Chapter Review

1. Questions
2. Answers

23. Chapter 14 Cryptography

1. Understanding Basic Cryptography Concepts

1. Cryptography Terminology
2. Data Sensitivity
3. Regulatory Requirements
4. Participating in Security Awareness and Training

2. Enforcing Integrity with Hashing

1. Hashing Algorithms Provide One-Way Encryption


2. Hashing Algorithms
3. Verifying Integrity with a Hash
4. Salting Passwords

3. Exploring Symmetric Encryption

1. ROT13
2. Creating Strong Keys
3. Comparing Block and Stream Ciphers
4. Advanced Encryption Standard
5. Other Symmetric Encryption Algorithms
4. Exploring Asymmetric Encryption

1. RSA
2. Secure Sockets Layer
3. Transport Layer Security
4. SSL Decryptors
5. Diffie-Hellman
6. Elliptic Curve Cryptography
7. Secure Shell
8. Protecting E-mail with S/MIME
9. Protecting E-mail with DKIM
10. PGP and GPG

5. Other Encryption Schemes

1. Steganography
2. IPsec

6. Understanding Public Key Infrastructure Systems

1. Certificates
2. Certificate Authority
3. Key Escrow
4. Alternative Certificate Trusts

7. Comparing Cryptanalysis Attacks

1. Fundamental Key Management Concepts


2. Known-Plaintext Attack
3. Ciphertext-Only Attack
4. Hashing and Collisions
5. Countermeasures Against Cryptanalysis Attacks

8. Chapter Review

1. Questions
2. Answers

24. Appendix About the Online Content

1. System Requirements
2. Your Total Seminars Training Hub Account

1. Privacy Notice

3. Single User License Terms and Conditions


4. TotalTester Online
5. Technical Support

25. Glossary
26. Index

Guide
1. Cover
2. Title Page
3. SSCP Systems Security Certified Practitioner All-in-One ExamGuide

Page List
1. i
2. ii
3. iii
4. iv
5. v
6. vi
7. vii
8. viii
9. ix
10. x
11. xi
12. xii
13. xiii
14. xiv
15. xv
16. xvi
17. xvii
18. xviii
19. xix
20. xx
21. xxi
22. xxii
23. xxiii
24. xxiv
25. xxv
26. xxvi
27. 1
28. 2
29. 3
30. 4
31. 5
32. 6
33. 7
34. 8
35. 9 36. 1037. 11 38. 1239. 1340. 1441. 15 42. 1643. 17 44. 1845. 1946. 2047. 2148. 2249. 23
50. 2451. 25 52. 2653. 2754. 2855. 2956. 3057. 31 58. 3259. 3360. 34
61. 35
62. 36
63. 37
64. 38
65. 39
66. 40
67. 41
68. 42
69. 43
70. 44
71. 45
72. 46
73. 47
74. 48
75. 49
76. 50
77. 51
78. 52
79. 53
80. 54
81. 55
82. 56
83. 57
84. 58
85. 59
86. 60
87. 61
88. 62
89. 63
90. 64
91. 65
92. 66
93. 67
94. 68
95. 69
96. 70
97. 71
98. 72
99. 73
100. 74
101. 75
102. 76
103. 77
104. 78
105. 79
106. 80
107. 81
108. 82
109. 83
110. 84
111. 85
112. 86
113. 87
114. 88
115. 89
116. 90
117. 91
118. 92
119. 93
120. 94
121. 95
122. 96
123. 97
124. 98
125. 99 126. 100127. 101128. 102129. 103130. 104131. 105 132. 106133. 107134. 108135. 109
136. 110137. 111 138. 112139. 113 140. 114141. 115 142. 116 143. 117 144. 118145. 119 146. 120
147. 121
148. 122
149. 123
150. 124
151. 125
152. 126
153. 127
154. 128
155. 129
156. 130
157. 131
158. 132
159. 133
160. 134
161. 135
162. 136
163. 137
164. 138
165. 139
166. 140
167. 141
168. 142
169. 143
170. 144
171. 145
172. 146
173. 147
174. 148
175. 149
176. 150
177. 151
178. 152
179. 153
180. 154
181. 155
182. 156
183. 157
184. 158
185. 159
186. 160
187. 161
188. 162
189. 163
190. 164
191. 165
192. 166
193. 167
194. 168
195. 169
196. 170
197. 171
198. 172
199. 173
200. 174
201. 175
202. 176
203. 177
204. 178
205. 179
206. 180
207. 181
208. 182
209. 183
210. 184
211. 185
212. 186
213. 187
214. 188
215. 189
216. 190
217. 191
218. 192
219. 193
220. 194
221. 195
222. 196
223. 197
224. 198
225. 199
226. 200
227. 201
228. 202
229. 203
230. 204
231. 205
232. 206
233. 207
234. 208
235. 209
236. 210
237. 211
238. 212
239. 213
240. 214
241. 215
242. 216
243. 217
244. 218
245. 219
246. 220
247. 221
248. 222
249. 223
250. 224
251. 225
252. 226
253. 227
254. 228
255. 229
256. 230
257. 231
258. 232
259. 233
260. 234
261. 235
262. 236
263. 237
264. 238
265. 239
266. 240
267. 241
268. 242
269. 243
270. 244
271. 245
272. 246
273. 247
274. 248
275. 249
276. 250
277. 251
278. 252
279. 253
280. 254
281. 255
282. 256
283. 257
284. 258
285. 259
286. 260
287. 261
288. 262
289. 263
290. 264
291. 265
292. 266
293. 267
294. 268
295. 269
296. 270
297. 271
298. 272
299. 273
300. 274
301. 275
302. 276
303. 277
304. 278
305. 279
306. 280
307. 281
308. 282
309. 283
310. 284
311. 285
312. 286
313. 287
314. 288
315. 289
316. 290
317. 291
318. 292
319. 293
320. 294
321. 295
322. 296
323. 297
324. 298
325. 299
326. 300
327. 301
328. 302
329. 303
330. 304
331. 305
332. 306
333. 307
334. 308
335. 309
336. 310
337. 311
338. 312
339. 313
340. 314
341. 315
342. 316
343. 317
344. 318
345. 319
346. 320
347. 321
348. 322
349. 323
350. 324
351. 325
352. 326
353. 327
354. 328
355. 329
356. 330
357. 331
358. 332
359. 333
360. 334
361. 335
362. 336
363. 337
364. 338
365. 339
366. 340
367. 341
368. 342
369. 343
370. 344
371. 345
372. 346
373. 347
374. 348
375. 349
376. 350
377. 351
378. 352
379. 353
380. 354
381. 355
382. 356
383. 357
384. 358
385. 359
386. 360
387. 361
388. 362
389. 363
390. 364
391. 365
392. 366
393. 367
394. 368
395. 369
396. 370
397. 371
398. 372
399. 373
400. 374
401. 375
402. 376
403. 377
404. 378
405. 379
406. 380
407. 381
408. 382
409. 383
410. 384
411. 385
412. 386
413. 387
414. 388
415. 389
416. 390
417. 391
418. 392
419. 393
420. 394
421. 395
422. 396
423. 397
424. 398
425. 399
426. 400
427. 401
428. 402
429. 403
430. 404
431. 405
432. 406
433. 407
434. 408
435. 409
436. 410
437. 411
438. 412
439. 413
440. 414
441. 415
442. 416
443. 417
444. 418
445. 419
446. 420
447. 421
448. 422
449. 423
450. 424
451. 425
452. 426
453. 427
454. 428
455. 429
456. 430
457. 431
458. 432
459. 433
460. 434
461. 435
462. 436
463. 437
464. 438
465. 439
466. 440
467. 441
468. 442
469. 443
470. 444
471. 445
472. 446
473. 447
474. 448
475. 449
476. 450
477. 451
478. 452
479. 453
480. 454
481. 455
482. 456
483. 457
484. 458
485. 459
486. 460
487. 461
488. 462
489. 463
490. 464
491. 465
492. 466
493. 467
494. 468
495. 469
496. 470
497. 471
498. 472
499. 473
500. 474
501. 475
502. 476
503. 477
504. 478
505. 479
506. 480
507. 481
508. 482
509. 483
510. 484
511. 485
512. 486
513. 487
514. 488
515. 489
516. 490
517. 491
518. 492
519. 493
520. 494
521. 495
522. 496
523. 497
524. 498
525. 499
526. 500
527. 501
528. 502
529. 503
530. 504
531. 505
532. 506
533. 507
534. 508
535. 509
536. 510
537. 511
538. 512
539. 513
540. 514
541. 515
542. 516
543. 517
544. 518
545. 519
546. 520
547. 521
548. 522
549. 523
550. 524
551. 525
552. 526
553. 527
554. 528
555. 529
556. 530
557. 531
558. 532
559. 533
560. 534
561. 535
562. 536
563. 537
564. 538
565. 539
566. 540
567. 541
568. 542
569. 543
570. 544
571. 545
572. 546
573. 547
574. 548
575. 549
576. 550
577. 551
578. 552
579. 553
580. 554
581. 555
582. 556
583. 557
584. 558
585. 559
586. 560
587. 561
588. 562
589. 563
590. 564
591. 565
592. 566
593. 567
594. 568
595. 569
596. 570
597. 571
598. 572
599. 573
600. 574
601. 575
602. 576
603. 577
604. 578
605. 579
606. 580
607. 581
608. 582
609. 583
610. 584
611. 585
612. 586
613. 587
614. 588
615. 589
616. 590
617. 591
618. 592
619. 593
620. 594
621. 595
622. 596
623. 597
624. 598
625. 599
626. 600
627. 601
628. 602
629. 603
630. 604
631. 605
632. 606
633. 607
634. 608
635. 609
636. 610
637. 611
638. 612
639. 613
640. 614
ABOUT THE AUTHOR

Darril Gibson is the CEO of YCDA, LLC (short for You Can DoAnything) and
he has authored or coauthored more than 40 books. Darril regularly writes,
consults, and teaches on a wide variety of technical and security topics and
holds several certifications, including (ISC)2 SSCP and CISSP; CompTIA
Security+ and CASP; Microsoft MCSE and MCITP; and ITIL Foundations. In
response to repeated requests, Darril created the https://gcgapremium.com/
site where he provides additional study materials for several certification
exams. He regularly posts blog articles
(https://blogs.getcertifiedgetahead.com/) about certification topics and uses
that site to help people stay abreast of changes in certification exams. You can
contact him through either of these sites. Darril lives in Virginia Beach with his
wife and two dogs. Whenever possible, they escape to a small cabin in the
country on over 20 acres of land that continues to provide them with peace,
tranquility, and balance.

ABOUT THE TECHNICAL EDITOR


Josh More has more than 18 years of experience in security,IT, development,
and system and network administration.
Currently, he runs Eyra Security, a security and business improvement
consulting firm based in Minneapolis, MN. Josh holds various security and
technical certifications and has served in a leadership position on several
security-focused groups. He writes a blog on security at www.starmind.org,
oftentaking a unique approach to solving security problems by applying lessons
from other disciplines such as agile development, lean manufacturing,
psychology, economics, and
complexity science. He has also written several books on IT,information
security, and career management.
Copyright © 2019 by McGraw-Hill Education. All rights reserved. Except as
permitted under the United States Copyright Act of 1976, no part of this
publication may be reproduced or distributed in any form or by any means, or
stored in a database or retrieval system, without the prior written permission
of the publisher, with the exception that theprogram listings may be entered,
stored, and executed in a computer system, but they may not be reproduced for
publication.

ISBN: 978-1-26-012871-0
MHID: 1-26-012871-7

The material in this eBook also appears in the print version ofthis title: ISBN:
978-1-26-012870-3, MHID: 1-26-012870-9.

eBook conversion by codeMantraVersion 1.0

All trademarks are trademarks of their respective owners. Rather than put a
trademark symbol after every occurrence of a trademarked name, we use
names in an editorial fashion only, and to the benefit of the trademark owner,
with no intention of infringement of the trademark. Where such designations
appearin this book, they have been printed with initial caps.

McGraw-Hill Education eBooks are available at special quantity discounts to


use as premiums and sales promotions or for use in corporate training
programs. To contact a representative, please visit the Contact Us page at
www.mhprofessional.com.

Information has been obtained by McGraw-Hill Education fromsources


believed to be reliable. However, because of the possibility of human or
mechanical error by our sources, McGraw-Hill Education, or others, McGraw-
Hill Education does not guarantee the accuracy, adequacy, or completeness of
any information and is not responsible for any errors oromissions or the results
obtained from the use of such information.

TERMS OF USE

This is a copyrighted work and McGraw-Hill Education and itslicensors reserve


all rights in and to the work. Use of this workis subject to these terms. Except
as permitted under the Copyright Act of 1976 and the right to store and retrieve
one copy of the work, you may not decompile, disassemble, reverseengineer,
reproduce, modify, create derivative works based upon, transmit, distribute,
disseminate, sell, publish or sublicense the work or any part of it without
McGraw-Hill Education’s prior consent. You may use the work for your own
noncommercial and personal use; any other use of the work is strictly
prohibited. Your right to use the work may be terminated if you fail to comply
with these terms.

THE WORK IS PROVIDED “AS IS.” McGRAW-HILL EDUCATION AND ITS


LICENSORS MAKE NO GUARANTEESOR WARRANTIES AS TO THE
ACCURACY, ADEQUACY OR COMPLETENESS OF OR RESULTS TO BE
OBTAINED FROM USING THE WORK, INCLUDING ANY INFORMATION
THATCAN BE ACCESSED THROUGH THE WORK VIA HYPERLINKOR
OTHERWISE, AND EXPRESSLY DISCLAIM ANY WARRANTY, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE. McGraw-Hill Education and its licensors do not warrant or
guarantee that the functions contained in the workwill meet your requirements
or that its operation will be uninterrupted or error free. Neither McGraw-Hill
Education nor its licensors shall be liable to you or anyone else for any
inaccuracy, error or omission, regardless of cause, in the workor for any
damages resulting therefrom. McGraw-Hill
Education has no responsibility for the content of any information accessed
through the work. Under no circumstances shall McGraw-Hill Education
and/or its licensorsbe liable for any indirect, incidental, special, punitive,
consequential or similar damages that result from the use of or inability to use
the work, even if any of them has been advised ofthe possibility of such
damages. This limitation of liability shall apply to any claim or cause
whatsoever whether such claim or cause arises in contract, tort or otherwise.
To my wife Nimfa.Thanks for
sharing your life with me for the past 26 years and
letting me share mine with you.
CONTENTS AT A GLANCE

Chapter 1 Security Fundamentals

Chapter 2 Access Controls

Chapter 3 Basic Networking and Communications Chapter 4 Advanced

Networking and CommunicationsChapter 5 Attacks

Chapter 6 Malicious Code and Activity Chapter 7 Risk, Response, and

Recovery Chapter 8 Monitoring and Analysis Chapter 9 Controls and

Countermeasures

Chapter 10 Auditing and Management Processes

Chapter 11 Security Operations

Chapter 12 Security Administration and Planning


Chapter 13 Legal Issues

Chapter 14 Cryptography Appendix About the Online Content

GlossaryIndex
CONTENTS

AcknowledgmentsIntroduction
Exam Objective Map

Chapter 1 Security Fundamentals


Reviewing the Requirements for SSCPHave One Year of Experience Registering for
the Exam Passing the Exam
Subscribing to the (ISC)2 Code of Ethics andGetting Endorsed
Maintaining Your SSCP CertificationUnderstanding Basic Security
Concepts
Confidentiality
Integrity Availability
Exploring Fundamentals of Security
Least Privilege Separation of Duties
Privacy and Data SensitivityDefense in Depth Nonrepudiation
AAAs of SecurityAccountability Due Diligence Due Care
Chapter Review
QuestionsAnswers

Chapter 2 Access Controls


Comparing Identification, Authentication, andAuthorization
Exploring Authentication
Three Factors of AuthenticationMultifactor Authentication
Two-Step Verification Reviewing Identification Single Sign-on Authentication
Centralized vs. Decentralized AuthenticationOffline Authentication
Device Authentication
Implementing Access Controls Comparing Subjects and ObjectsLogical Access
Controls
Comparing Access Control ModelsDiscretionary Access Control
Non-Discretionary Access Control
Access Control Matrix vs. Capability TableParticipating in the Identity
and Access Management Lifecycle
Identity Proofing
Provisioning and AuthorizationMaintenance and Entitlement De-provisioning
Participating in Physical Security OperationsBadging
Data Center AssessmentChapter Review
Questions
Answers

Chapter 3 Basic Networking and CommunicationsUnderstanding Use Cases


Reviewing the OSI Model
The Physical Layer (Layer 1) The Data Link Layer (Layer 2)The Network Layer
(Layer 3) The Transport Layer (Layer 4)The Session Layer (Layer 5)
The Presentation Layer (Layer 6)The Application Layer (Layer 7)
Comparing the OSI and TCP/IP Models Understanding Network Topologies
andRelationships
Ethernet Bus Topology
Star TopologyTree Topology
Token Ring Topology Mesh Topology Network Relationships
Reviewing Basic Protocols and PortsComparing IPv4 and IPv6
Dynamic Host Configuration ProtocolAddress Resolution Protocol
Network Discovery Protocol
Domain Name System
Internet Control Message Protocol Internet Group Message Protocol Simple
Network Management ProtocolFile Transfer Protocol
Telnet Secure Shell
Hypertext Transfer Protocol and HypertextTransfer Protocol Secure
Transport Layer Security and Secure SocketsLayer
Network File SystemRouting Protocols
E-mail Protocols
Internet Protocol SecurityTunneling Protocols
Mapping Well-Known Ports to Protocols
Comparing Ports and Protocol NumbersComparing Internetwork Trust
Architectures
Comparing Public and Private IP Addresses
Using NAT
Comparing Trust RelationshipsExploring Wireless Technologies
Securing Data Transmissions
Wireless Device Administrator PasswordWireless Service Set Identifier
MAC Address Filtering
BluetoothNFC GSM
3G, LTE, and 4GWiMAX
Radio Frequency Identification
Protecting Mobile DevicesChapter Review
Questions
Answers
Chapter 4 Advanced Networking and CommunicationsManaging LAN-based Security
Comparing Switches and Routers
Physical and Logical SegmentationSecure Device Management
VoIP
Using Proxy Servers Understanding Firewalls
Packet-Filtering Firewall Stateful Inspection FirewallApplication Firewall
Next-Generation FirewallDefense Diversity
Comparing Network-based and Host-based Firewalls
Exploring Remote Access SolutionsRisks and Vulnerabilities Tunneling Protocols
Authentication
Traffic Shaping and WAN OptimizationManaging Network Access
Control Exploring Virtual Environments
Virtualization TerminologyShared Storage
Virtual Appliances
Virtual Desktop InfrastructureContinuity and Resilience
Separation of Data Plane and Control PlaneSoftware-defined Networking
Protecting Virtualization SystemsUnderstanding Cloud Computing
Shared Responsibility Models
Cloud Operation ModelsStorage
Privacy
Data Control and Third-party OutsourcingCompliance
Chapter Review
QuestionsAnswers
Chapter 5 Attacks
Comparing Attackers Hackers and Crackers
White Hats, Black Hats, and Gray HatsAdvanced Persistent Threats
Insider ThreatsScript Kiddies
Exploring Attack Types and Countermeasures
Basic CountermeasuresSpoofing
Data TheftDoS
DDoS
Botnets and ZombiesSniffing Attack
Reconnaissance and Fingerprinting Attacks
Salami Attack
Man-in-the-Middle Replay
Session Hijacking DNS Cache Poisoning
Smurf and Fraggle Attacks
Software Security as a Countermeasure
Buffer Overflow AttacksInjection Attacks
Cross-Site Scripting
Cross-Site Request ForgeryPassword Attacks
Spam
Phishing Attacks
Phishing and Drive-by DownloadsSpear Phishing and Whaling Vishing
Smishing
Zero Day ExploitsCovert Channel
Wireless Attacks and CountermeasuresUnderstanding Social Engineering
Tailgating
Impersonation Skimming Dumpster DivingShoulder Surfing
Social Networking Attacks
User Awareness as a CountermeasureChapter Review
Questions
Answers
Chapter 6 Malicious Code and ActivityIdentifying Malicious Code
Virus
Worm Trojan HorseRATs
Scareware RansomwareKeylogger Logic Bomb Rootkits Mobile Code
Backdoors and TrapdoorsSpyware
Malware Hoaxes
Analyzing the Stages of an Attack Understanding Malware Delivery
Methods
Delivering Malware via Drive-by Downloads
Delivering Malware via MalvertisingDelivering Malware via E-mail Delivering
Malware via USB Drives
Implementing Malicious Code CountermeasuresAntivirus Software
Keeping AV Signatures Up to DateSpam Filters
Content-filtering Appliances
Keeping Operating Systems Up to DateScanners
Beware of Shortened Links
Sandboxing Least Privilege Software Security
Application Whitelisting and BlacklistingParticipating in Security Awareness
and
Training
Common Vulnerabilities and ExposuresChapter Review
Questions
Another Random Scribd Document
with Unrelated Content
interruption until love comes when she is changed into a
thoughtful woman.

“A sterling book unmarred by convention.” Frederic Taber


Cooper.
+ Bookm. 26: 270. N. ’07. 580w.
“With so much of the smart and the tailormade in our fiction,
it is a pleasure to come now and then upon a novel which holds
one such human breathing creature as Gret.”
+ Nation. 85: 400. O. 31, ’07. 590w.

N. Y. Times. 12: 654. O. 19, ’07. 30w.


“But vivid as Gret’s personality is made and absorbing as is the
story of her triumphs, there is never a moment when either gets
out of the realm of romance into commonplace reality.”
+ N. Y. Times. 12: 764. N. 30, ’07. 300w.

“Altogether the story has a refreshing novelty, and is well
worth reading.”
+ Outlook. 87: 450. O. 26, ’07. 180w.

* Marble, Annie Russell. Heralds of American


literature: a group of patriot writers of the
revolutionary and national periods. *$1.50. Univ.
of Chicago press.
The aim of this book is to recount in detailed study, and
largely from original sources, the lives and services of a group of
typical writers during the pioneer days of national growth, who
revealed the standards and aspirations of their time, and who
announced the dawn of a national literature, although their own
products were often immature and crude. The group includes
Franklin, Francis Hopkinson, Philip Freneau, John Trumbull, a
group of Hartford wits, Joseph Dennie, William Dunlap and
Charles Brockden Brown.

Marchmont, Arthur Williams. By wit of woman.


†$1.50. Stokes.
6–16736.

“Given the ingredients of the girl, the prince, the kingdom-in-


the-mountains, garnished with palaces, gold-laced officials, and
highly spiced with an unprincipled lady spy, one can stir together
a romantic pudding that is sure to appeal to the average
appetite.... The author ... has sought to do nothing more than to
turn out precisely such a readable yarn.”—N. Y. Times.

“A novel devoid of evidence of artistic ambition.”


− Ath. 1906, 1: 662. Je. 2. 150w.
“Obviously one need claim nothing strikingly new for the
book.”
+ N. Y. Times. 11: 419. Je. 30, ’06. 250w.

Marchmont, Arthur Williams. In the cause of


freedom; with a front. in colors by Archie Gunn.
†$1.50. Stokes.
7–16375.

“A travelling Englishman comes upon a Polish maiden, in the


company of a notorious conspirator, both pursued by the police,
in a village of Russian Poland. The conspirator is dispatched early
in the game, and the maiden is left on the Englishman’s hands.
Being highspirited and impressionable, the Englishman is nothing
loth to accept the charge, and the pair lead the police a merry
chase all the way to Warsaw, where the action culminates in
street riots and other forms of excitement.”—Dial.

Reviewed by Wm. M. Payne.


Dial. 42: 379. Je. 16, ’07. 110w.
“The pages fairly sizzle with excitement from beginning to
end.”
+ N. Y. Times. 12: 500. Ag. 17, ’07. 130w.

“If our credulity had not been strengthened by much similar
strong food, it would be overtaxed to learn of the succession of
hairbreadth escapes and gallant rescues credited to Robert
Anstruther, the hero. But, if we must read these romances, it is
less fatiguing to believe than to question.”
− Outlook. 86: 340. Je. 15, ’07. 90w.

Marden, Orison Swett. Optimistic life; or, In the


cheering-up business. **$1.25. Crowell.
7–27001.

Thirty-eight chapters of optimistic wisdom which constitute


what might be termed the “scriptures of the toilers.” The keynote
is the higher success, and Mr. Marden points out how and when
it may be discovered in all phases of business. He discusses such
subjects as business integrity, the need of proper vocations,
leaving one’s troubles at the office, the difference between work
and drudgery, the cost of an explosive temper, and the habit of
not feeling well.
+ N. Y. Times. 12: 564. S. 21, ’07. 180w.

* Marden, Philip Sanford. Greece and the Aegean


islands. **$3. Houghton.
7–36985.

A book of travel and description which will serve as a guide to


many who have the Grecian archipelago in view and as a book of
reminiscence to all who have taken the journey. Entering Greece
by “the front door of the kingdom”—by way of the Piræus—the
tour includes Athens, Delphi, Mycenæ, Nauplia, Epidaurus,
Olympia, and among the islands, Delos, Samos, Cos, Cnidos,
Rhodes, and others. The book is handsomely illustrated.

Markham, Sir Clements Robert. Richard III, his


life and character reviewed in the light of recent
research; with a portrait and a map. *$3.50.
Dutton.
7–10996.

In which the character of Richard III is rehabilitated, and this


last of the Plantagenets is made to appear as “a good son, a
devoted husband, and a loving father;” in which it is affirmed
“that he cherished his relatives, was a kind and trusty friend, and
an honorable and magnanimous foe.” (N. Y. Times.) The defense
goes to prove that the two sons of Edward IV. did not die in the
reign of Richard III. but survived until after the accession of
Henry VII.

“He seems to imagine that to repeat a statement over and


over again makes it true, and that citations from earlier writers
take the place of original documents.”
− Acad. 72: 10. Ja. 5, ’07. 1220w.
“The reasoning that Sir Clements Markham uses is very
ingenious but hardly convincing, and he does not improve his
case by attempting in his closing chapter to show that Mr.
Gairdner is inconsistent in his portrayal of Richard.” N. M.
Trenholme.
+ Am. Hist. R. 13: 134. O. ’07. 870w.

“His book is ingenious, bright and readable; he marshals his
arguments cunningly, and he scores some good points. But it is
not too much to say that he approaches the whole subject in the
spirit of an advocate, and consequently his essay can hardly be
considered a serious addition to historical literature.”
− Ath. 1907, 1: 220. F. 23. 750w.
+
“Had Sir Clements been content to show that the allegations
of Tudor historians were in some matters unfounded, we might
have been more ready to accept a verdict of not proven on the
serious charges; more than this he has not after all been able at
the best to establish.” C. L. Kingsford.
− Eng. Hist. R. 22: 579. Jl. ’07. 1190w.
+
“Shakespeare students as well as those interested in English
history cannot afford to neglect the volume. It is based upon
critical research, and makes out a strong case against Henry.”
+ Ind. 63: 1122. N. 7, ’07. 380w.
“He has shown us how very uncertain any verdict must be,
and he has done good service in sweeping away many of the
myths with which Tudor prejudice and falsehood have obscured
the reign of Richard III.”
+ Lond. Times. 6: 11. Ja. 11, ’07. 1570w.

“If he could have imposed upon himself something of the
cynical temper and cool judgment with which Horace Walpole,
first of Richard’s defenders, wrote his ‘Historic doubts,’ his book
would have been doubled in value to the general reader.”
Florence Finch Kelley.
− N. Y. Times. 12: 226. Ap. 6, ’07. 1390w.
+

Outlook. 87: 350. O. 19, ’07. 3900w.


“Sometimes the chain of argument is really pitiable. That most
fallacious method of writing history is adopted, that of treating
official versions and transparent pretexts as actual facts.”
− Sat. R. 103: 657. My. 25, ’07. 840w.

“Though we judge him to have failed in his main contention,
the author has painted a vivid picture of the epoch between the
battles of Northampton and Bosworth; he has bestowed the skill
of a trained geographer in elucidating the topography of Towton,
and Wakefield, and Barnet; and he was swept into limbo a mass
of crude absurdity.”
− Spec. 97: 175. F. 2, ’07. 1720w.
+

Marks, Edward C. R. Mechanical engineering


materials: their properties and treatment in
construction. 60c. Van Nostrand.
“A very useful little volume of information on methods of
manufacture, properties and tests of steel, iron, copper and the
various copper, manganese, tin and aluminum alloys used, for
the most part, in machinery.”—Engin. N.
“The one criticism of this book is that the author has selected
a too pretentious title.”
+ Engin. N. 57: 197. F. 14, ’07. 60w.
+

* Marks, Mrs. Mary A. M. England and America.


1763–1783. 2v. *$6. Appleton.
7–34222.

Something of the spirited attitude which Mrs. Marks assumes


toward her work is summed up in the statement that her book is
the Tory reaction against the monopoly of office by the Whigs
and the consequences of that reaction, the loss of American
colonies and an addition of £129,000,000 to the national debt.
“The years covered by this history are those in which the final
effect of the causes of the American movement toward
independence are studied, as well as the conduct of England
brought to face the new situation. A characteristic of the book,
its determining characteristic, is that it keeps to the point of view
of the time and the point of view of the English.” (N. Y. Times.)

“To students of history this book should be invaluable; it puts


things in a clear, simple light, and is the work of one who has
made careful research into the records of the period.”
+ Acad. 73: 675. Jl. 13, ’07. 420w.
“A spirited piece of work, to which much conscientious search
has been devoted and which displays sobriety of judgment in
dealing with the motives of individuals placed in desperate
circumstances. Though Miss Marks as a rule writes clearly, if
rather colloquially, she is guilty of an obscure allusion or two.”
+ Ath. 1907, 2: 209. Ag. 24. 680w.
+

“She has produced a book which is very readable and
interesting in spite of obvious faults. The style, which is equally
free from the dignity which was formerly and the dullness which
is now thought appropriate to history, is too often careless and
even slipshod. The arrangement is not happy. There is a
disregard of proportion and not seldom a superfluity of
unimportant detail. It is the most serious defect of the book that
the author writes throughout as a partisan.”
+ Lond. Times. 6: 265. S. 6, ’07. 1800w.

N. Y. Times. 12: 333. My. ’07. 240w.


“It is apparent that this work violates the most fundamental
requirements of modern scholarship. Nor is it in minor points
more satisfactory. Gross blunders, glaring inconsistencies and ill-
considered conclusions abound. While the narrative is lively, its
style is more undignified than that usually countenanced by the
Muse of history.”
− N. Y. Times. 12: 742. N. 23, ’07. 1000w.
“Thoroughness, fullness, and fairness are the distinctive
characteristics [of the book] which into the bargain is written
with a keen sense of the dramatic value of the great events of
twenty years whose history she narrates.”
+ Outlook. 87: 543. N. 9, ’07. 350w.
+
“Miss Marks has studied the period thoroughly, and her work
can hardly fail to take a permanent place among the authorities
on the subject.”
+ Spec. 99: 133. Jl. 27, ’07. 330w.

Marriott, John A. R. Life and times of Lucius Cary,
Viscount Falkland. *$2.25. Putnam.
7–25683.

“Mr. Marriott has not only written a life of the young statesman
whose career and character inspired one of Matthew Arnold’s
most brilliant essays, but he has also given us a masterly treatise
upon one of the most absorbingly interesting periods of English
history,” (N. Y. Times) viz., “the times of Laud and of Strafford, of
vexed issues in church and state, of the petition of rights and the
grand remonstrance.... Among the most charming of his
chapters are those describing Falkland’s existence before the
revolution, in his well-loved home at Great Tew.” (Lond. Times.)

“Mr. Marriott has done a real service in conveying to us in a


volume of absorbing human interest so much of the vital charm
and personality of the man. He has managed in masterly fashion
to disentangle the real points at issue. He has given us an
estimate of Falkland’s character that bears the impress of truth.”
+ Acad. 72: 383. Ap. 20, ’07. 1470w.
+
“In the industrious and sympathetic analysis of Falkland
himself, of his character and the part he played, Mr. Marriott’s
work appears to us to suffer from the fact that he sets out with a
strong preconception, a preconception founded, no doubt, upon
close and loving study before he began his book.”
+ Ath. 1907, 2: 61. Jl. 20. 2060w.

“This is a delightful book, on a delightful subject. Mr. Marriott
is a historian of the new school in so far as he is a student and
scholar; but, unlike many of his contemporaries, not so far as to
be a scientific pedant. He never forgets the importance of the
personal element, and is a painter no less than a critic.”
+ Lond. Times. 6: 153. My. 17, 07. 2300w.
+
“The facts are well presented, the characters clearly drawn,
but the transmuting skill is not present that would make
literature of one of the richest themes in English history.”
+ Nation. 85: 103. Ag. 1, ’07. 1100w.

“May well be deemed a representative type of the highest
literary scholarship of our time.”
+ N. Y. Times. 12: 373. Je. 8, ’07. 500w.
+
“There is thus ample reason for the biography now written by
Mr. J. A. R. Marriott. It is not a book of inspiring interest.” H.
Addington Bruce.
+ Outlook. 87: 783. D. 7, ’07. 3250w.
“We have no fault to find with Mr. Marriott’s graceful biography
of one of the most interesting figures in a fascinating age except
the air of confessorship and greatness eclipsed by a conspiracy
of detraction which he throws around the ‘apostle of moderation
and martyr of the via media.’”
+ Sat. R. 103: 751. Je. 15, ’07. 1290w.

“In pleading the claims of Falkland to consistency and
foresight he has produced a sober and well-balanced study of
those times, so sorely out of joint, against which his hero was
doomed to struggle in vain.”
+ Spec. 99: 54. Jl. 13, ’07. 2550w.

Marsh, Harriet B. Point of view in modern


education. 60c. Public school.
“Consists of a collection of lectures delivered before Mothers
clubs. It is an attempt to state in simple concrete terms the
changes in ideas in education brought about by fundamental,
philosophical, scientific, social and religious thought.”—Bookm.

“Despite the naïve manner in which most complex problems of


science, of ethics, or of social, practical or economic relationships
are settled, the lectures are at least suggestive and give a point
of view of education differing from the formal and mechanical
one.”
+ Bookm. 23: 219. Ap. ’06. 110w.

“There is much sound advice and instruction in these pages,
which will repay the study of a teacher.”
+ Cath. World. 84: 823. Mr. ’07. 360w.

Marsh, Richard. Who killed Lady Poynder? †$1.50.


Appleton.
7–26342.

“‘Who killed Lady Poynder?’ is a story of nearly 130,000 words,


constructed on the principle which has produced so many rattling
stories in the past, that of supplying really damning evidence
against every person, male or female, who has any connection
with the plot at all. Lady Poynder was shot in her own house in
London. The author’s ingenuity is expended in showing how
many persons had or might have had the opportunity and motive
for the murder.”—Nation.

“Granting one tremendous coincidence—a coincidence of


coincidences, in fact—the reasoning is plausible and the tale
entertaining enough. But in respect to method it is a horrible
example of the effect of trying to put a novel of mystery and a
novel of manners between the same covers.”
+ Nation. 85: 285. S. 26, ’07. 280w.

“A promising situation, surely, for a vigorous minded novelist,
and Mr. Richard Marsh is quite equal to it in the remainder of the
book.”
+ N. Y. Times. 12: 633. O. 19, ’07. 140w.

Marshall, H. E. Island story: a child’s history of


England; with col. pictures by A. S. Forrest.
*$2.50. Stokes.
7–35150.

A child’s history of England to be placed not at the lesson-book


end of the shelf, but with “Robinson Crusoe” and the like,—so
the preface suggests.

“The especial value of this book is that the stories include


legendary as well as historical events. Well written, though with
no particular quality of style; beautifully made as to paper and
print, but illustrated by poor colored pictures.”
+ A. L. A. Bkl. 3: 82. Mr. ’07.

“It is not a history, if by that we mean facts and dates alone,
but if we want motives as well, and the personality of the chief
actors, then this thick ornamental book accomplishes its aim
admirably.”
+ Ind. 61: 1409. D. 13, ’06. 70w.

R. of Rs. 34: 764. D. ’06. 60w.


“It is eminently readable, a success, we would say, in what
looks much easier than it is, telling a story in simple words.”
+ Spec. 95: 1091. D. 23, ’05. 80w.

* Marshall, Herbert Menzies, and Marshall,


Hester. Cathedral cities of France. *$3.50. Dodd.
7–32829.

A finely illustrated book of French cathedral cities which serves


to enlighten the stay-at-home tourist and to refresh the memory
of one who has covered the ground.

“Is one of the best of its class. [The authors’] very lack of
familiarity with the country might make their original notes of
travel the more valuable, as they are evidently intelligent as well
as artistic observers.”
+ Ath. 1907, 2: 556. N. 2. 580w.
“The author seems oppressed by the weight of her
authorities.”
+ Dial. 43: 426. D. 1, ’07. 140w.

“Her knowledge of architecture is singularly accurate and
discriminating.”
+ Lit. D. 35: 918. D. 14, ’07. 110w.
+
“The writing is simple and dignified; the pictures are in some
cases clear and attractive, but in others show that blotchy, messy
surface which is still the bane of most color printing.”
+ Nation. 85: 543. D. 12, ’07. 80w.

N. Y. Times. 12: 666. O. 19, ’07. 20w.


“The pictures have a charm of their own, even to those who
are familiar with the most famous of the buildings with which
they deal in so original and unconventional a way.”
+ N. Y. Times. 12: 828. D. 14, ’07. 330w.
“The authors of this book have been more successful than
many of their predecessors. They have lingered in the localities
and have fortified their observation, by some study of what
others have written. Unfortunately, though they always indicate
quotations, they by no means always mention whence they
came. We regret that Mr. Marshall’s great skill as a draughtsman
is often neutralized by the failure of the medium he has chosen
to convey what he was clever enough to perceive.”
+ Sat. R. 104: 642. N. 23, ’07. 230w.

Marshall, John. Constitutional decisions; ed. by


Joseph P. Cotton, jr. 2 v. ea. *$5. Putnam.
5–39509.

Descriptive note in Annual, 1906.


“A compilation of the constitutional decisions of Marshall is
well worth the making. It seems captious to mention two
typographical errors—in volume one, page 255, where, ‘1858’ is
printed for ‘1758,’ and in volume two, page 1, where ‘1875’
appears instead of ‘1775.’” Frederick C. Hicks.
+ Ann. Am. Acad. 28: 475. N. ’06. 990w.
+

Marston, Edward. Fishing for pleasure and


catching it, and two chapters on angling in North
Wales, by R. B. Marston. *$1.25. Scribner.
6–34385.

“The book is quite varied in its contents, turning aside from


the author’s own angling experiences to extracts from the nature
books of William J. Long, paraphrases of portions of ‘The song of
Hiawatha,’ and other not very intimately related subjects.”—
Nation.

Dial. 40: 396. Je. 16, ’06. 100w.

+ Nation. 82: 407. My. 17, ’06. 120w.


“Readers who know how pleasantly Mr. E. Marston can write
need not have his new volume any further recommended.”
+ Spec. 96: 546. Ap. 7, ’06. 300w.

Marti, Karl. Religion of the Old Testament: its place


among the religions of the nearer East. (Crown
theological lib., no. 18.) *$1.25. Putnam.
7–37540.

“A sketch giving a bird’s-eye view of the development of


Israel’s religion in its relation to other religions of western Asia.
The point of view is that of the historical school of which Marti is
a leading representative.”—Bib. World.

“An interesting and suggestive sketch.”


+ Bib. World. 30: 239. S. ’07. 40w.
“The novice will scarcely appreciate the skill with which
Professor Marti has selected salient facts and the features which
need to be kept prominent, and avoided confusing the learner by
a mass of details.”
+ Ind. 63: 760. S. 26, ’07. 330w.
+

N. Y. Times. 12: 372. Je. 8, ’07. 100w.


“It is a pity that so good a book should be published without
an index.”
+ N. Y. Times. 12: 548. S. 14, ’07. 140w.

“It is a valuable contribution to a great theme by one who has
devoted his life to its study. Not only the general reader, for
whom it is especially intended, but the theologian will learn not a
little from its pages.”
+ Spec. 99: 127. Jl. 27, ’07. 1390w.
+

Martin, Benjamin E., and Martin, Charlotte M.


Stones of Paris in history and letters. $2. Scribner.
6–35587.

A new edition of a book which traces the history and letters of


Paris thru its structures. There are numerous illustrations from
photographs.

+ Ath. 1907, 1: 251. Mr. 2. 530w.



“An entirely admirable book.” Harriet Waters Preston.
+ Atlan. 99: 420. Mr. ’07. 710w.
“The streets of Paris have also been carefully scanned and a
most entertaining story has been created out of the assembled
material and has been skillfully synthesized.”
+ Ind. 61: 1397. D. 22, ’06. 110w.
“In all essential respects the work holds its own.”
+ Nation. 83: 392. N. 8, ’06. 90w.

+ Outlook. 84: 682. N. 17, ’06. 20w.


“We have a good deal more of the real social and political
history of the French capital than is found in many a more
pretentious historical work.”
+ R. of Rs. 35: 111. Ja. ’07. 100w.
“The charm of these records is unquestionable, and for this
reason, as we have said before, the faults in their construction
may be overlooked.”
+ Spec. 99: 201. Ag. 10, ’07. 1390w.

Martin, George Madden. Abbie Ann. † $1.50.


Century.
7–29096.

Abby Ann, Emmy Lou’s successor, is a little Coal City


inhabitant, who with only a father’s care has not made much
headway towards the graces. She is a spirited little miss who is
finally sent away to school, to the school that had once claimed
her mother as a pupil. Children will take keen delight in the part
Abbie Ann plays in bringing about a reconciliation between her
father and two very austere aunts.

“The story is told with much of the sympathy and humor that
characterizes ‘Emmy Lou’ by the same author, but the incidents
of this book will appeal more to a child than those of its
charming predecessor.”
+ A. L. A. Bkl. 3: 209. N. ’07. ✠
“‘Abbie Ann’ skips into our affections as gaily as she skipt
along the railroad station at the opening of another bright story
by the author of ‘Emmy Lou.’”
+ Lit. D. 35: 796. N. 23, ’07. 260w.
“The little girl is sure to be warmly welcomed by other little
girls outside the story books.”
+ N. Y. Times. 12: 765. N. 30, ’07. 60w.

+ Outlook. 87: 310. O. 12, ’07. 60w.


“Not only shows that she understands her art thoroughly, but,
like Mrs. Burnett, she lets the facts move the reader, and abjures
adjectives.”
+ R. of Rs. 36: 763. D. ’07. 150w.

Martin, Mrs. Helen Reimensnyder. Betrothal of


Elypholate, and other tales of the Pennsylvania
Dutch. †$1.50 Century.
7–30437.

The sturdy qualities of Mennonite men and maidens are


revealed in their life and lovemaking with which these stories
deal.

“Decidedly more interesting than the longer stories by the


same author.”
+ A. L. A. Bkl. 3: 202. N. ’07. ✠

N. Y. Times. 12: 654. O. 19, ’07. 20w.


“The contrasts that she depicts by bringing in now and then an
outsider from the city, or a son who has gone into the outside
world and won success and culture, are almost too vivid to be
artistic.”
+ N. Y. Times. 12: 676. O. 26, ’07. 130w.

“The tales are charmingly written and disclose a phase of
unusually interesting life.”
+ Outlook. 87: 450. O. 26, ’07. 120w.

Martin, Helen R. (Mrs. Frederic C. Martin). His


courtship; il. by Alice Barber Stephens. † $1.50.
McClure.
7–15920.

A professor of psychology rusticating among the Pennsylvania


Dutch during his vacation, becomes interested in a much
persecuted slave of the kitchen. That the girl proves to be the
daughter of cultured parents and had been kidnapped in infancy,
that during her bondage she had found solace and books in a
haunted room suggest the lines along which the professor may
make some impersonal observations for the cause of psychology
but more especially for his own personal cause of happiness.

“The author is certainly more successful when she confines


herself to Dutch characters, and has in this case spoiled an
excellent short story by expanding it into the more ambitious
novel.”
+ A. L. A. Bkl. 3: 203. N. ’07.

“The book is a curious mingling of keen-eyed observation,
great naturalness in narrative and dialogue, and exasperating
artificiality of construction.” Frederic Taber Cooper.
+ Bookm. 26: 80. S. ’07. 440w.

“A story marked by unusual powers of penetrating
observation.” Wm. M. Payne.
+ Dial. 43: 65. Ag. 1, ’07. 220w.
“This is a short story which made up of its mind to grow into a
novel, and got spoiled in the process.”
− Nation. 85: 37. Jl. 11, ’07. 300w.

N. Y. Times. 12: 382. Je. 15, ’07. 180w.


“The author’s management of the dialect is commendable, for
she does not overdo the matter and put in dialect for its own
sake.”
+ N. Y. Times. 12: 434. Jl. 6, ’07. 360w.
“As long as she portrays the Mennonites, or the ordinary
Dutch, she has a field unique and worthy of her talents, but in
introducing outsiders from the gay world she strikes as ordinary
a note as did the fascinating Jubilee singers of long ago when
they tried to sing our concert pieces.”
− Outlook. 86: 256. Je. 1, ’07. 100w.

Martin, Louis Adolphe. Text-book of mechanics.


*$1.25. Wiley.
6–17261.

v. 1. Statics. “This is the first part of a text-book designed for


an introductory course to applied mechanics, for use in colleges
and technical schools. The author has arranged the book so that
statics only is covered in this volume.”—Engin. N.
v. 2. Kinematics and kinetics. “Chapters are included on the
following subjects: Kinematics—Rectilinear motion of a particle;
curvilinear motion of a particle; motion of a rigid body; Kinetics—
Kinetics of a particle and of the mass-center of a rigid body;
application of the equations of motion for translation and for
rotation; work and energy; impact.” (Technical Literature.)

“The book is a very good one for class work in technical


schools.” Amasa Trowbridge.
+ Engin. N. 56: 50. Jl. 12, ’06. 390w. (Review of v. 1.)

“The fundamental principles of elementary mechanics are
presented in simple manner and in logical order in this volume.”
+ Engin. N. 58: 659. D. 12, ’07, 60w. (Review of v. 2.)

Technical Literature. 2: 334. O. ’07. 140w. (Review of v.


2.)

Martin, Martha Evans. Friendly stars. **$1.25.


Harper.
7–14831.

A personal friendship with the stars which the author shares


with her readers. It is an untechnical study and points out to the
naked eye the most interesting facts about the stars. Their rising
and setting, their number, colors, distances, movements and
distinguishing characteristics are made clear to the observer who
has had no preparatory instruction.

+ A. L. A. Bkl. 3: 125. My. ’07. S.


“The delicate, yet sure and accurate touch of the author, and
her genuine love for the sky, combine to charm the reader, and
to make him wish to have the book within reach, in case he too
is a lover of the heavens.”
+ Dial. 42: 317. My. 16, ’07. 360w.
“The graceful introductory note of commendation from Doctor
Jacoby leaves nothing more to be said as to the scientific
accuracy of the author’s work.”
+ Lit. D. 34: 766. My. 11, ’07. 160w.
“This volume will appeal to the beginner in astronomy and to
the general reader quite as much as to the astronomer.” W. E. R.
+ Nature. 76: 412. Ag. 22, ’07. 180w.
“[Told] in a plain simple way, quite free from the technical
language which baffles the unscientific mind.”
+ N. Y. Times. 12: 254. Ap. 20. ’07. 620w.
“A useful and even interesting study.”
+ R. of Rs. 36: 512. O. ’07. 60w.

Martin, Percy Falcke. Mexico’s treasure-house


(Guanajuato): an illustrated and descriptive
account of the mines and their operations in
1906. $3. Cheltenham press.
6–40260.

“A full account, with many illustrations, of the mines of a


region which has been pronounced more ‘thoroughly mineralized’
than any equal portion of the globe.... Perhaps the most
suggestive parts of the volume are those which tell of the new
methods, mostly devised by Americans, to draw fresh wealth
from the old workings.”—Nation.

“The story of what has been done, and the discussions of


present conditions in the Mexican labor market and in industry
are the features that render the book valuable. These subjects
are treated in an interesting manner, and so far as the reader
can judge, with impartiality and accuracy.”
+ Ann. Am. Acad. 29: 641. My. ’07. 500w.

J. Pol. Econ. 15: 187. Mr. ’07. 250w.


“The description is technical and highly detailed.”
+ Nation. 84: 384. Ap. 25, ’07. 80w.

Martin, Percy Falcke. Through five republics (of


South America); a critical description of Argentine,
Brazil, Chile, Uruguay and Venezuela in 1905; il.
*$5. Dodd.
6–18334.

The subtitle furnishes the scope of this book of which the


author says: “First, I believe it is timely, in view of the enormous
advances made by the South American republics of late years,
and the amount of British capital invested therein. Secondly, I
have in my journalistic capacity been enabled to gather much
information of value, which I have found no opportunity for
utilising in the newspapers I have represented, but which,
accompanied by illustrations and somewhat fuller descriptions,
should be acceptable as a critical account of the countries
visited.”

“The book contains a great deal of information—though it


lacks arrangement.”
+ Acad. 69: 1366. D. 30. ’05. 270w.

“A book which will be found of some value by commercial men
and possibly by politicians. In matters apart from trade and
figures Mr. Martin is hardly a safe guide. There are minor
inaccuracies scattered throughout the volume.”
+ Ath. 1905, 2: 760. D. 2. 1300w.

“The industry with which Mr. Martin has collected his figures
and endless minutiae is commendable in spite of the rather
deadening effect when they are all massed and offered you in
lieu of entertainment.”
+ Nation. 84: 63. Ja. 17, ’07. 450w.

“Perhaps no book ever was written the illustrations to which
more completely supplemented the shortcomings of the letter-
press.” George R. Bishop.
+ N. Y. Times. 12: 44. Ja. 26, ’07. 2580w.

“If only Mr. Martin had ‘boiled down’ these four hundred and
sixty-five closely printed pages, and set forth plainly his
conclusions, it would have been better. As it is, we do not quite
know what he means.”
+ Spec. 95: 1130. D. 30, ’05. 240w.

Martin, Sir Theodore. Monographs: Garrick,


Macready, Rachel and Baron Stockmar. *$3.50.
Dutton.
6–41036.

Descriptive note in Annual, 1906.


A. L. A. Bkl. 3: 46. F. ’07.
“In less than a hundred pages this accomplished man of
letters and wise commentator on things dramatic has produced a
model brief biography [of Garrick].” S. M. Francis.
+ Atlan. 100: 490. O. 19, ’07. 110w.
+
“Each is interesting, the paper on Stockmar having many
touches of intimacy.”
+ Sat. R. 102: 86. Jl. 21, ’06. 80w.

Martin, William A. P. Awakening of China, il. from


photographs. (Geographical lib.) **$3.80.
Doubleday.
7–19477.

Written as a result of close-range study this work represents


China as “the theater of the most important events now taking
place in the world.” It is an optimistic study, and the author
“aims to explain those subterranean forces which seem to be
raising the China of to-day from the bosom of the deep. Political
agitation, whether periodic like the tides or unforeseen like the
hurricane, is in general superficial and temporary, and the
present reform movement in China, the author believes, has its
root in forces more deep seated than such sporadic phenomena.”
(N. Y. Times.)

“Optimistic in tone, philosophic in temper.”


+ A. L. A. Bkl. 3: 196. N. ’07.

Ath. 1907, 2: 439. O. 12. 700w.

+ Lit. D. 35: 98. Jl. 20, ’07. 690w.


“‘Awakening of China’ maintains Dr. Martin’s reputation as a
leading authority on Chinese affairs, and though some allowance
must be made for the optimism of a writer whose deep
sympathy and interest have induced him to spend the evening of
his days among the people where his life work has been done, it
is a valuable and interesting contribution to our knowledge.”
+ Lond. Times. 6: 290. S. 27, ’07. 1200w.

Nation. 85: 60. Jl. ’07. 580w.


“Not many authors are so well qualified as Dr. Martin to write a
great book on the movement now taking place in China.” K. K.
Kawakami.
+ N. Y. Times. 12: 440. Jl. 13. ’07. 1960w.
“It is safe to say that no volume yet issued in this valuable
series is of such immediate importance as Dr. Martin’s work. But
it is rounded out by an index so hopelessly inadequate as to be a
burden rather than a help to the student who would use the
work for reference purposes.”
+ Outlook. 87: 266. O. 5, ’07. 1900w.
+

“A well informed work, and describes, in a readable, though
somewhat succinct manner, the process of transformation now
going on in China.” G: Louis Beer.
+ Putnam’s. 2: 746. S. ’07. 30w.
“Dr. Martin’s book is scarcely equal to the expectations which
the reader naturally forms from its title and its general
appearance.”
+ Spec. 99: 743. N. 16, ’07. 1290w.

Marx, Karl. Capital: a critique of political economy.


$2. Kerr.
6–43940.
v. 2. This second volume devoted to the circulation of capital
is edited by Frederick Engels and is translated from the second
German edition by Ernest Untermann. Pt. 1, deals with The
metamorphoses of capital and their cycles, pt. 2, with The turn-
over of capital, and pt. 3, The reproduction and circulation of the
aggregate social capital.

Reviewed by Ernest Untermann.


+ Arena. 38: 457. O. ’07. 3480w. (Review of v. 1.)
“This edition is well made, and easy reading.”
+ N. Y. Times. 12: 151. Mr. 9, ’07. 180w. (Review of v. 1.)

Outlook. 87: 537. N. 9, ’07. 230w. (Review of v. 1 and 2.)

Marx, Karl. Revolution and counter-revolution; or,


Germany in 1848. 50c. Kerr.
Articles collected and brought forward from the years 1851–
1852. They form an “invaluable pendant to Marx’s work on the
coup d’état of Napoleon III.,” and give readers some idea of the
conditions under which Marx was working and under which he
prepared the papers as well as his “Achtzehnte brumaire” and
“Zur kritik der politischen und oeconomie.”

Marx, W. J. For the admiral. †$1.50. Jacobs.


7–28959.

A story for young people which turns back to France in the


16th century when Catholics and Huguenots were engaged in
hostilities. The hero is a youth who enters upon the perilous
undertaking of carrying an important packet to the Huguenot
leader, Admiral de Coligny, and later joins him in a campaign
filled with daring adventure.

“It is by much the best book of its kind sent us for review this
season, and stands head and shoulders above its rivals.”
+ Acad. 71: 607. D. 15, ’06. 140w.
+

Marzials, Sir Frank Thomas. Moliere. $1.


Macmillan.
Illustrated with reproductions of portraits and title-pages this
little volume contains “a bibliographical criticism of the man of
letters.” (N. Y. Times.) “The literary criticism is particularly good.
The great dramatist’s genius has never been better appreciated.”
(Spec.)

“It is a seemly little book.” Brander Matthews.


+ N. Y. Times. 11: 792. D. 1, ’06. 990w.

“Sir F. T. Marzials writes with unflagging spirit, and shows a
sane and sober judgment.”
+ Spec. 97: 733. N. 10, ’06. 250w.

Masefield, John, ed. Sailor’s garland. $1.50.


Macmillan.
7–12996.

An anthology of sea poems. Miscellaneous poems, poems


based upon historical fact, poems of mermaids and sea spirits, of
pirates and smugglers and love poems are found here. The last
thirty pages are devoted to a collection of sea chanties with a
goodly bit of interesting folk-lore.

“The exercise of a little judgment might have made it so much


better.”
+ Acad. 71: 642. D. 22, ’06. 490w.

“The selection is good and wise, one we should like to see in
the forecastle, as well as in the saloon of every British ship
afloat.”
+ Ath. 1906, 2: 827. D. 29. 660w.

Ind. 61: 883. O. 11, ’06. 30w.

+ Lond. Times. 6: 44. F. 8, ’07. 1170w.


“Containing a surprising amount of good seaverse.”
+ Nation. 83: 508. D. 13, ’06. 40w.

+ N. Y. Times. 12: 100. F. 16, ’07. 1170w. (Reprinted from


Lond. Times.)

+ Spec. 97: sup. 760. N. 17, ’06. 210w.


* Mason, Alfred E. W. Broken road. † $1.50.


Scribner.
7–37552.

An Indian prince educated at Eton and Oxford and a young


Englishman continuing the work of opening the great road thru
Chiltistan begun by his father, are the principal figures in this
story which deals with the English rule over India.

“It is a vigorous story, and a strong story—an earnest story


also. The lights and shades are cleverly put in, and the narrative
in Mr. Mason’s hands becomes a veritable fragment of Doom.”
+ Ath. 1907, 2: 682. N. 30. 270w.
+
“The style suffers from a touch of the overemphatic, a slight
suggestion of parade in its implication of significances, which the
story does not go deep enough to warrant. But in spite of these
shortcomings, the author succeeds in conveying to us his own
regretful sense of life’s contrasts, ironies, and frustrations.”
+ Lond. Times. 6: 357. N. 22, ’07. 450w.

N. Y. Times. 12: 652. O. 19, ’07. 50w.


“His new book will rank with his ‘The four feathers’ as a capital
piece of clear, direct, romantic narrative—intensely exciting, yet
not unduly sensational.”
+ Outlook. 87: 827. D. 14, ’07. 260w.

Mason, Alfred E. W. Running water. † $1.50.


Century.
7–7196.

Whatever of deep sentiment, of resolution and also of villainy


there is in the tale is magnetically associated with the ice fields
of the Alps above Chamonix. There is an unrelated company of
people upon the stage of the little drama, chief among whom is
a brave-hearted girl who took her lesson of life from the Alpine
guides—“If you have knowledge that can save a life—well you
have got to use it, that’s the law.” Tired of her mother’s vain life,
she hunts up her father, whom she has never seen, and tries to
operate the law she had learned by saving a soul from the net
which her dissolute father had drawn about it. The tale is one of
her failures and successes.

“Here it would seem that all the elements that go to make a


novelist of the highest rank were present, and yet the novel itself
belongs to the hopeless second grade of literature.”
− Acad. 72: 205. Mr. 2, ’07. 1640w.
+
“The characters are more than ordinarily well-drawn, but the
situations are painful, and, on the whole, the book leaves an
unpleasant impression.”
− A. L. A. Bkl. 3: 110. Ap. ’07.
+
“It is a sheer melodrama on one side, but so treated as to
appear a human document.”
+ Ath. 1907, 1: 349. Mr. 23. 270w.

“A thoroughly readable story.” Grace Isabel Colbron.
+ Bookm. 25: 300. My. ’07. 750w.
“Elements of human and natural interest combine to make a
tale of singular fascination, over which the mountain glamour is
cast with such compelling effect that it acts as a shaping
influence upon the lives of all the persons chiefly concerned.”
Wm. M. Payne.
+ Dial. 42: 376. Je. 16, ’07. 460w.
Lit. D. 34: 509. Mr. 30, ’07. 350w.
“The book ends tamely, and leaves an impression of casual
workmanship.”
− Lond. Times. 6: 70. Mr. 1, ’07. 270w.
“The story is told with great fluency—too much, in fact.
Throughout it resembles the last act of those congenitally three-
act plays to which a fourth is added, to lengthen the
entertainment till supper-time.”
− Nation. 84: 246. Mr. 14, ’07. 390w.
“It is a pretty and pleasing tale notwithstanding the numerous
extremely repulsive people who move through its pages.”
+ N. Y. Times. 12: 157. Mr. 16, ’07. 500w.

+ N. Y. Times. 12: 382. Je. 15, ’07. 160w.


“While he always interests his reader’s mind, does not always
convince him as to the plausibility of the incidents.”
+ Outlook. 85: 717. Mr. 23, ’07. 230w.

“The author is really more concerned with telling his story than
with portraying character and interpreting experience, but the
very story he selects to tell proves how wide-spread, for the
moment, is the grip of the ideal upon the mind of the novelist.”
Cornelia Atwood Pratt.
+ Putnam’s. 2: 185. My. ’07. 180w.

R. of Rs. 35: 764. Je. ’07. 40w.

+ Sat. R. 103: 369. Mr. 23, ’07. 810w.



“Happily named, but unequal, romance.”
− Spec. 98: 377. Mr. 9, ’07. 1320w.
+

Mason, Daniel Gregory. Romantic composers.


**$1.75. Macmillan.
6–43759.

Following an introductory chapter on Romanticism in music,


there are studies of Schubert, Schumann, Mendelssohn, Chopin,
Berlioz and Liszt. “In his two previous volumes Mr. Mason has
already dealt with Beethoven and his forerunners, and with the
development of composition from Grieg to Brahms; in his
present volume he fills the gap, and traces the wandering paths
which led from one to the other of these frontier lines.” (Lond.
Times.)

A. L. A. Bkl. 3: 70. Mr. ’07. S.


“That Mr. Mason so singularly misapprehends the essential
significance of modern music seems little short of lamentable, for
it vitiates what would otherwise be an influential and important
body of critical writing.” Lawrence Gilman.
− Bookm. 25: 77. Mr. ’07. 1460w.
+
“To the study of the widely varying natures. Mr. Mason brings
acute musical perception, a sure grasp of his thesis, and an
intelligent sympathy which never weakens into partisanship.”
Josiah Renick Smith.
+ Dial. 42: 224. Ap. ’07. 270w.
“This series of essays, tho they would be both servicable and
satisfactory to the professional musician, are quite intelligible to
the average reader, and will find their best public among concert-
goers who wish to get the most out of their concerts.”
+ Ind. 62: 497. F. 28, ’07. 330w.
“His book is an excellent piece of work throughout; delicate
and sensitive in criticism, clear and often felicitous in style,
marked by wide knowledge and carefully considered judgment.
Now and again his taste appears to us a little fastidious.”
+ Lond. Times. 6: 14. Ja. 11, ’07. 650w.
+

− Nation. 83: 518. D. 13, ’06. 280w.


+
“This book is written with more flexibility and interest of style
than his earlier one on ‘Beethoven and his forerunners.’” Richard
Aldrich.
+ N. Y. Times. 12: 148. Mr. 9, ’07. 1030w.

R. of Rs. 35: 114. Ja. ’07. 70w.

* Mason, Edith Huntington. Real Agatha. **$1.


McClurg.
The will which leaves a man’s millions to his step-daughter
contains a clause intended to thwart fortune-hunting husbands.
The Honorable Agatha must surround herself by “not less than
five nor more than six” young women of her own age each of
whom is to be known as the Honorable Agatha. The caprice of
the real Agatha moves her to assume the rôle of private
secretary to her chaperon, leaving the field to the six Agathas
and the puzzled suitors. Of course the real romance concerns the
secretary and a young lord who in the face of convention woos
her.
Dial. 43: 428. D. 16, ’07. 100w.

Masse, Henri Jean L. J. Oxford. (Langham series


of art monographs.) *$1. Scribner.
6–46316.

A handy pocket volume of information which will interest the


traveler. The picture accompaniment does full justice to the
historic university town.

“It is as unreadable as a guide-book, and more like one than


anything else, yet we imagine it would be an inefficient guide.
For those who love dessicated information it may have its place,
but its place is not in a series of art monographs.”
+ Nation. 84: 185. F. 21, ’07. 70w.

“That peculiar rhetoric which guide books almost infallibly
possess does not taint the language here. Considering the
shortness of the book ... its amount of information is amazing. It
does not seem possible that one single art treasure can have
been omitted.”
+ N. Y. Times. 12: 91. F. 16, ’07. 390w.
“In many ways it would be vastly superior to the ordinary
guide-book.”
+ Outlook. 85: 46. Ja. 6, ’07. 90w.

* Masson, Thomas Lansing. Bachelor’s baby, and


some grown-ups. **$1.60. Moffat.
7–29740.
Welcome to Our Bookstore - The Ultimate Destination for Book Lovers
Are you passionate about books and eager to explore new worlds of
knowledge? At our website, we offer a vast collection of books that
cater to every interest and age group. From classic literature to
specialized publications, self-help books, and children’s stories, we
have it all! Each book is a gateway to new adventures, helping you
expand your knowledge and nourish your soul
Experience Convenient and Enjoyable Book Shopping Our website is more
than just an online bookstore—it’s a bridge connecting readers to the
timeless values of culture and wisdom. With a sleek and user-friendly
interface and a smart search system, you can find your favorite books
quickly and easily. Enjoy special promotions, fast home delivery, and
a seamless shopping experience that saves you time and enhances your
love for reading.
Let us accompany you on the journey of exploring knowledge and
personal growth!

ebookgate.com

You might also like