english

Dear me sudz: the life and times of addie may / K. W. Attle.

Keith Attle 700258 : Addie May was in many ways before her time. She was strong willed, not afraid to speak her mind, and could distinguish between right and wrong with good common sense. For her, there was no middle ground. This became evident at a very early age as she was born with two strikes against her. First, one leg was shorter than the other, which caused her to limp all of her life and subjecting her to be ridiculed as a child. Secondly, she was left-handed. Today this is not an issue, but for thousands of years, this attribute was associated with witchcraft and devil possession. Addie May's mother tried everything she could to change her but to no avail. Even a sore and blistered hand and punishment by her first-grade teacher did not dissuade her. Her formal education finished at eighth grade, yet she became a court deputy, a bookkeeper for her husband's hugely successful business, a practical nurse, mother, and grandmother. It was the later when I came to know her. Death was a frequent visitor throughout her life. Somehow she was able to mask her inner emotions while smiling and comforting others facing pain, distress, and death. She was a decent, honorable, and compassionate human being who never thought of herself as anything special. This book is a tribute to a woman who never received the recognition she deserved. It is my desire to correct this. It's unfortunate she will never know.




english

Dear Mary : lessons from the mother of Jesus for the modern mom / Sarah Jakes.

Hopeful, Inspiring Message for Moms from Sarah Jakes Mary, the mother of Jesus, is a remarkable example of quiet, resilient faith and courage in the face of adversity. From the angel's first announcement of her pregnancy to the death and resurrection of her son, Mary was witness to our Lord and Savior in a unique and special way. And as a mother herself, she speaks to the modern-day mom in a way few have explored before. Writing in the form of letters, Sarah Jakes examines the life of Mary--and through Mary, Jesus--to better understand what a life of faith looks like. Maybe you struggle to trust God's will for your life. Perhaps you have fears and insecurities that keep you from realizing the joy God wants for you, or the thought of raising little ones overwhelms you. Through the example of Mary, discover the freedom that only true faith can bring.




english

Dear Martha, WTF? : what i found in my search for why / Tricia LaVoice.

Tricia LaVoice's life turned upside-down when her parents were tragically killed in an automobile accident. Her close relationships with her mother and father made everyday life afterwards a challenge. Happily married and with a beautiful baby girl, Tricia had no time to fall apart. Over the years as her family grew, Tricia met two strong, dynamic women, both survivors of their own life challenges, whose wonderful friendships and unconditional maternal love and strength guide her to trust in life. But tragedy strikes Tricia's family again, shaking her faith in life once more. It was during this time of suffering and loneliness that she found an unexpected respite in nature, in the form of a beautiful pine tree Tricia named Martha. This rare bond inspires Tricia who literally talks to Martha daily as she heals the hurt in her heart. Tricia learns to listen to her inner voice, and heals herself by finding her source of courage and strength is within her.




english

Dear Maggie / Brenda Novak.

New York Times bestselling author Brenda Novak presents a suspenseful story of a woman searching for the truth. Maggie Russell, a police reporter in Sacramento, works the night shift, and she's finally stumbled on the big crime story that will truly establish her career-if it doesn't end her life. A serial killer who moves from one city to the next. As if things aren't complicated enough, Nick Sorenson, the paper's new photographer, seems to be taking an unusual interest in this case. And in her. Maggie doesn't realize that she's falling in love with a man who's not what he seems to be. A man whose deceptions may save her life.




english

Dear love doctor / Hailey North.

Daffodil "Daffy" Landry stared at her words of advice to the lovelorn and pressed her hand against her breast. Was she writing about this unknown Casanova...or about herself? Broken Hearts Mended Here Diagnosis Terminal! Charming, sexy, and self-made Hunter James isn't one to back away from a challenge. Slapping his copy of the New Orleans Crescent against his thigh, he approached the newspaper's outer office. How dare that anonymous, autocratic, and insufferable Love Doctor label him as incapable of commitment? Did she ever consider that he simply hasn't met the right woman? He'll uncover the author's identity and give her a piece of his mind. But first, appreciating an opportunity when it presents itself, he's got to meet the beckoning blonde behind the reception desk. Who knows? Maybe the Love Doctor has led him to the woman of his dreams after all...




english

Dear lord.... Love, Efua! / Amazing Grace Louis Danso.

Efua has one dream; to make it out of Gedu village as an accomplished author. Through a rare opportunity afforded by her school, Gedu Junior Secondary School, Efua begins on a journey to achieve her dreams. On the road to success, she encounters many obstacles that seem insurmountable: lack of support from an important family member, a broken friendship, and cruelty at the hands of a virtual stranger. Her faith in God pushes her to dream big. But when trials and tribulations hit, will Efuas faith stand the test of time? Will she survive? Can she keep her dream alive? Will God grow silent or respond to the earnest prayers of a 15 year old girl who is on the verge of losing all hope? In Dear Lord Love, Efua! Amazing Grace Lois Danso, author of Bound By Kente, tells an unforgettable, touching tale of the love, faith, and hope of a young girl determined to achieve her dreams in a city that is a melting pot of hospitality and cruelty, dreams and reality, opportunities and disappointments, success and failures.




english

Dear limits, get out of my way / Ky-lee Hanson.

How often do you feel restricted; physically, socially, mentally or financially? Are you aware of your limitations? How often is time or lack of experience the cause of anxious procrastination; waiting for the right moment? Relearn and rethink the way you perceive limitations with each chapter from a tribe of successful, driven, strong and soulful women.




english

Dear Lilly : from father to daughter : the truth about life, love, and the world we live in.

A father offers his advice, opinions, and the many useful stories gleaned from his past experiences in order to help his beloved daughter not only survive, but thrive in the dangerous and unpredictable world of young adulthood. From the pen of a former abused child, drug addict, womanizing frat boy, and suicidal depressive, comes forth the emotionally stirring account of a young man's battle with crippling inner demons and his eventual road to enlightenment. Peter Greyson calls upon his wisdom as both father and school teacher to gently lead teenage girls through a maze of truth, deception, and adolescent uncertainty. Greyson's literary style sparkles with a youthful enthusiasm that will capture your heart and provide boundless inspiration. Dear Lilly is a survival guide that offers the brutally honest male perspective to young women struggling for answers to life's deepest questions. Topics include: Boys lie What every guy wants from his girlfriend Tales from the drug world Everybody hurts High school exposed




english

Dear life, you suck / Scott Blagden.

"The shrinkadinks think I have a screw loose. Ain't playing with a full deck. Whacked-out wiring. Missing marbles." Irreverent, foulmouthed seventeen-year-old Cricket is the oldest ward in a Catholic boys' home in Maine-and his life sucks. With prospects for the future that range from professional fighter to professional drug dealer, he seems doomed to a life of "criminal rapscallinity." In fact, things look so bleak that Cricket can't help but wonder if his best option is one final cliff dive into the great unknown. But then Wynona Bidaban steps into his world, and Cricket slowly realizes that maybe, just maybe, life doesn't totally suck.




english

Dear life / Lisa Wylie.

Beth Taylor is a young girl growing up in Sydney with her parents and grandmother, and aspiring to become a doctor when she graduates. But in one tragic moment, Beth's life will be changed forever. She moves on with her life--now alone--and fate brings her to meet Chad, the dashing real estate entrepreneur from Los Angeles, and her life is complete again. Then a tragic accident happens, and Beth is thrown back into her grief of earlier years. The story follows her path through the process of grief and loss. Through this, Beth is left at rock bottom, and Chad, as her rock, works tirelessly to help her through the pain. Full circle is experienced by Beth when she is trying to heal and meets a person that may be the key to her survival.




english

Dear Libby : will you answer my questions about friendship?.

How do we find lasting, trusting, and fulfilling friendships? Is it by being popular? Dazzling others with your genius? Looking for that ultimate BFF? Hiding all your imperfections and trying hard to fit in? Deep and enduring friendships are essential to our psychological and physical well-being. Unfortunately, between bullying, social anxiety, peer pressure, and other issues, many teens feel isolated. In Dear Libby, trusted columnist Libby Kiszner offers a breakthrough approach to friendship and connection. You can create friendships from the inside out-rather than from the outside in. You can experience friendships with vibrant self-expression in every stage of life, making Dear Libby a book that can be read and reread at any age. Containing seven core principles, this life-changing resource not only explains the dynamics of connections and friendships but also gives practical tools to develop them. Integrating contemporary issues, timeless insight, real-life skills, and unique perspectives, Dear Libby provides a hands-on guide for dealing with everyday friendship struggles faced by teens today. Teens and readers of all ages will gain insight and understanding on how to make profound, joyful relationships possible. Find answers to real questions like: What should I do when people who are supposed to be my friends call me names or embarrass me? What should I do I do if I'm being ignored at school? What is the best way to handle loneliness? Someone just stole my friend. What can I do? What can I do when my friends get together and "forget" to invite me?




english

Dear Lady Disdain / Paula Marshall.

Running Blanchard's Bank after her father's death was fulfilling for Anastasia but, even so, she felt there was something missing from her life. Problems with the branch in York, decided Stacy. She would go herself. But the November weather turned severe and, with her retinue, she sought refuge at Pontisford Hall. It was a nightmare! The Hall was in a parlous state, and the man she thought to be the butler turned out to be Matthew, Lord Radley. He was quite as forceful and autocratic as herself, and the sparks that flew during her enforced stay had repercussions that quite appalled her.




english

Dear lady / Robin Lee Hatcher.

Dear Mary, New Prospects, Montana, is nothing like England-so terrifying and beautiful at the same time, and much larger than I dared imagine when you and I first embarked on our adventures in the New World. I have had the good fortune of becoming the town's schoolmistress. Young Janie Steele is as precious as I imagined from her letters. As for her father, Garret Steele...Oh, I feel like such a fool! I've run halfway around the world to escape a man I loathed, only to discover I'm losing my heart to a man still in love with the wife he buried. The mayor, kind man, has been most attentive. But I wish he were someone else. I wish he were Garret. With affection, Your friend Beth Wellington In the big-sky country of Montana, the past doesn't always stay buried. Circumstances have a way of forcing secrets into the open, sometimes bringing hearts together in unlikely ways, and sometimes tearing them apart. Dear Lady is Book One in the Coming to America series about women who come to America to start new lives. Set in the late 1800's and early 1900's, these novels by best-selling author Robin Lee Hatcher craft intense chemistry and conflict between the characters, lit by a glowing faith and humanity that will win your heart. Look for other books in the series at your favorite Christian bookstore.




english

Dear killer / Katherine Ewell.

Full of "can't look away" moments, Dear Killer is a psychological thriller perfect for fans of gritty realistic fiction such as Dan Wells's I Am Not a Serial Killer and Jay Asher's Thirteen Reasons Why, as well as television's Dexter. Rule One-Nothing is right, nothing is wrong. Kit looks like your average seventeen-year-old high school student, but she has a secret-she's London's notorious "Perfect Killer." She chooses who to murder based on letters left in a secret mailbox, and she's good-no, perfect-at what she does. Her moral nihilism-the fact that she doesn't believe in right and wrong-makes being a serial killer a whole lot easier . . . until she breaks her own rules by befriending someone she's supposed to murder, as well as the detective in charge of the Perfect Killer case.




english

Dear kevin / Amerine Graham.

Patricia writes to Kevin about some of the the experiences that they shared from her perspective.




english

Dear Katharine courageous : the letters of Sir Edward Grey to Katharine Lyttelton.

Sir Edward Grey (1862-1933) was Britain's longest-serving Foreign Secretary, holding office from December 1905 to December 1916. Best known today for his observation on the eve of World War I, "The lamps are going out all over Europe; we won't see them lit again in our lifetime," Grey had worked tirelessly to keep the lamps on, while keeping Britain and the Empire secure. During his eventful and stressful years in office, and before and after, Grey corresponded extensively with Katharine Lyttelton (1860-1943), the wife of a high-ranking general who served as the first Chief of the General Staff. Though they were probably not lovers-readers can decide for themselves-the relationship was an intimate one, and Grey was able confide in her thoughts and feelings he concealed from Cabinet colleagues and his male friends. The letters, selected and edited by Jeff Lipkes, reveal a side to Grey that has not been fully appreciated. He was amusing, shrewd, and humane, and a close observer of individuals as well as of nature. His observations still speak to us. They will resonate with everyone who loves the outdoors and solitude. Those coping with an overpowering grief, with a strong distaste for their work, or with approaching blindness may find them especially poignant. But others not so afflicted may discover they have become kinder, more courageous, and more observant for having read Grey's letters. Dear Kathanine Courageous includes an eighty-page introduction by Lipkes on Grey, Lytellton, and their circle, and an Afterword on the Foreign Secretary's private life.




english

Dear Juliet : letters from the lovestruck and lovelorn to Shakespeare's Juliet in Verona.

Every year, over 10,000 letters addressed to Juliet Capulet arrive in Verona, Italy, the famous hometown of Shakespeare's Romeo & Juliet. These handwritten letters come from people all over the world, seeking guidance and support from Juliet herself. Capturing the pain, joy, humor, and confusion of love, the 60 letters in this book offers encouragement, comfort, hope-and a nod to the human condition. Including responses from Juliet herself, this romantic and relatable, and perfect as a Valentine's Day gift, Dear Juliet proves that love is the universal language.




english

Dear Jesus : seeking his life in your life / Sarah Young.

From your heart's deepest cry to life's joyful praises, nothing is off limits to Jesus. Knowing Jesus on a deeper, more personal level means sharing all aspects of your life with Him...every day. In Dear Jesus, Sarah Young exemplifies what it means to do this-to dialogue with the Savior. She begins each of the 120 devotionals by sharing intimate struggles and longings that weigh on the heart-being preoccupied with problems; being dissatisfied with oneself, and other spiritual issues. Jesus then responds in His loving way by giving guidance and encouragement, using Scripture as the foundation from which His words flow. Readers will be drawn into the presence of God through these spiritual letters of grace.




english

Dear Jeril ... love, Dad / Wayne P. Anderson.

As a Father's Day gift Wayne Anderson's oldest daughter Jerilyn, often called Jeril, presented him with a fat three-hole notebook containing the letters and stories he had written her from the time she was twenty until she was thirty-eight-from 1977 to 1995. It was one of his dearest Father's Day gifts ever. And it was an especially appropriate gift as she had been an avid reader since childhood and was now a creative librarian who continued to cherish the written word. Anderson was amazed at how much detail there was in the letters about his adventures around the world. He has decided to share the parts of these letters that other travelers, active or armchair, might enjoy in this Venture Bound Book.




english

Dear Jane / Kendall Ryan.

He's a cocky pro athlete at the top of his game. But all he wants is another shot with the girl who got away. I broke her heart ten years ago and left town. She hates me, and rightly so. It doesn't matter that the rest of the country loves me, that I'm a starting quarterback with a multimillion-dollar contract. Because when I look in the mirror, all I see is a failure who was too young-and too afraid-to fight for what I wanted. But I'm not that guy anymore, and all I need is one shot to convince her. *** He has no idea what happened after he left. And now I'm supposed to work alongside him like we don't have this huge, messy history? But I'm older now, wiser, and I won't let anything stand in my way of doing a good job for this league. Not even one overpaid, arrogant player who thinks we're going to kiss and make up. News flash, buddy: I am over you.




english

Dear Jacob / Sabelo Soweto Mandlanzi.

Dear reader, The fact that Jacob Zuma is the twelfth president of ANC and Jacob had twelve sons makes me sigh because folks may lie but numbers dont. Besides, Jacobs successor was Joseph while Jacob Zumas brother is Joseph, now this offsets my axis. My reasons to conduct an audit on these signs of fate finds more evidencecould Jacobs life be the pieces of the puzzle of Jacob Zumas that weve been looking for? What you see right now is the answer. Dear Jacob is a radical connection between these two Jacobs: the grandson of Abraham and the honorable president of the Republic of South Africa, Mr. Jacob G. Zuma. This is billion miles ahead of inspiration, a healthy root of the political expertise and leadership evolution. But here I focus on presenting Jacob as Jacob Zuma, human yet divine, dejected, rejected, and despised, but chosen. In this letter, the worst and the best moments of Jacob are prognostic to the life of Jacob Zuma, but negativity is to me a myth because positivity is my path. The story that brings nemesis to the enemies of positive reception is found from Genesis 25:19 and beyond in the King James Bible. I have cared for the meanings on the wall because words can start a war. Not only will you see Jacob Zuma different after reading this book, but you should be able to predict the next events that might occur as the clock of life moves toward the beginning.




english

Dear Isaac Newton, you're ruining my life / Rachel Hruza.

As if seventh grade isn't hard enough, Truth Trendon learns she has to wear a back brace to help her worsening scoliosis. She decides gravity is to blame for curving her spine and ruining her life. Thanks for nothing, Isaac Newton! Truth's brace is hard plastic, tight, and uncomfortable. She has to wear a t-shirt under it and bulky clothes over it, making her feel both sweaty and unfashionable. She's terrified that her classmates are going to find out about it. But it's hard keeping it a secret (especially when gym class is involved), and secrets quickly turn into lies. When Truth's crush entrusts her with a big secret of his own, it leads to even more lying. Add to that a fight with her best friend, a looming school-wide presentation, and mean rumors, and it's a recipe for disaster. As Truth navigates the ups and downs of middle school, can she learn to accept her true self, curvy spine and all?




english

Dear indie author / Tonya Nagle.

This book contains curse words and sarcasm along with a lot of really good food for thought for anyone embarking upon an indie author adventure. From choosing a pen name to attending a convention as a featured author, this is not a book about writing. It is a book about being a writer and some things you should know about before giving up or giving in! This is part of a series of real talk books from an Indie Author.




english

Dear husband / Joyce Carol Oates.

The inimitable Joyce Carol Oates returns with Dear Husband-a gripping and moving story collection that powerfully re-imagines the meaning of family in America, often through violent means. Oates, a former recipient of the PEN/Malamud Award for Excellence in Short Fiction-as well as the National Book Award, Prix Femina, and numerous other literary honors-dazzles and disturbs with an outstanding compilation. Dear Husband is another triumph for the author of The Gravedigger's Daughter, We Were the Mulvaneys, and Blonde.




english

AI/LLM Findings Report

In an era of rapidly evolving Artificial Intelligence/Large Language Model (AI/LLM) technologies, cybersecurity practitioners face significant challenges in monitoring unauthorized AI solutions, detecting AI vulnerabilities, and identifying unexpected AI/LLM development. Tenable Security Center leverages advanced detection technologies - agents, passive network monitoring, dynamic application security testing, and distributed scan engines - to surface AI/LLM software, libraries, and browser plugins. The risk managers utilize this report to begin a comprehensive review of the AI/LLM packages in systems and web applications, along with associated vulnerabilities, mitigating risks of exploitation, data leakage, and unauthorized resource consumption.

AI/LLM technologies are promising and can transform many industries and businesses, offering new innovation and efficiency opportunities. However, the technology represents a huge security challenge at many layers and this impact should not be overlooked. By using Tenable Security Center and Tenable Web App Scanning the organization is able to take a security-first approach. When combined with best practices and robust governance policies, the organizations can harness the power of AI/LLM and mitigate the associated emerging threats.  

This report provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). By combining all methods of data collection, the risk managers are able to identify problem areas and other risks associated with AI/LLM.

Chapters

Executive Summary: This chapter provides a detailed view of AI/LLM use by leveraging Nessus plugin (196906) to detect AI/LLM usage in 3 ways: browser extensions, applications, and file paths all common to AI/LLM implementations. AI/LLM vulnerabilities discovered in web applications are identified using the Web Application Scanner, alongside network traffic analysis using the Nessus Network Monitor (NNM). 

AI/LLM Browser Extensions Chapter: This chapter provides the details for Assets that we found to have one or more of the AI/LLM detection browser extension plugins detected by Nessus. The chapter will search through plugins that include certain keywords: GPT, CopIlot, or AI. The AI/LLM Browser Detection chart shows the count of plugins related to the detection of GPT, AI, or Copilot AI or LLM browser extensions. 

AI/LLM Software Detected Using Nessus: This chapter provides the details for Assets that we found to have one or more of the AI/LLM software plugins detected by Nessus. The introductory matrix provides an indicator for all the matches found in the organization, followed by a a chart and table showing the affected assets.

AI/LLM Usage Detected Using Web Application Security: This chapter provides the details for web application assets that we found to have one or more of the AI/LLM detection plugins. The LLM/AI Usage Detected by WAS chart shows the count of plugins related to the detection of AI or LLM. 

 




english

OWASP Categories

Web application security is a key concern for any organization that develops or uses web applications. The software security community created the Open Web Application Security Project (OWASP) to help educate developers and security professionals on the latest web application security risks. Tenable has published reports for each OWASP version that has been released (2010,2013,2017, API 2019, and 2021). The individual reports provide organizations the ability to monitor web applications by identifying the top 10 most critical web application security risks as described in OWASP's Top 10 Application Security Risks document for the OWASP version being utilized.

The OWASP Top 10 Application Security Risks document outlines several different aspects of web-based security concerns, such as Cross-Site Scripting attacks (XSS), security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable business assets across the internet. Following these guidelines empowers organizations to reduce risk of organizational and consumer data theft.

Administrators need to ensure that their organization is not vulnerable to any of the attacks identified in the OWASP Top 10 Application Security Risks document for the relevant OWASP version being currently being used. Compliance related issues, such as known vulnerable components and insufficient logging, must be remediated to eliminate gaps in an organization's security that are not directly tied to exploitable attacks.

This report covers all aspects of the OWASP Top 10 version being utilized and provides administrators the tools and information needed to aid their efforts. The report contains 10 chapters, each aligned with one of the ten most critical web application risks (A1-A10). The information provides guidance to organizations on the actions necessary to mitigate business risk through strong security practices. The report requirements are Tenable Web App Scanning.

Report Templates:

The OWASP Top 10 categories are updated every 3 to 4 years and highlight the most critical web application security vulnerabilities. The following report templates are available and contain sections for each of the listed OWASP Top 10 categories.

  • OWASP Categories 2010 - For 2010, the OWASP Top 10 focuses on Injection, Cross-Site Scripting (XSS), and Broken Authentication in the top three positions.
  • OWASP Categories 2013 - For 2013, the OWASP Top 10 focuses on Injection, Broken Authentication and Session Management in the top three positions.
  • OWASP Categories 2017 - For 2017, the OWASP Top 10 focuses on Injection, Broken Authentication, and Sensitive Data Exposure in the top three positions.
  • OWASP Categories API 2019 - For 2019, the OWASP Top 10 focuses on Broken Object Level Authorization, Broken User Authentication, and Excessive Data Exposure in the top three positions.
  • OWASP Categories 2021 - For 2021, the OWASP Top 10 focuses on Broken Access Control, Cryptographic Failures, and Injection in the top three positions.




english

WAS Executive Summary

From e-commerce to online banking, the world is interconnected with web applications. The internet provides a contactless method to conduct office meetings, engage with healthcare professionals, shop, attend classes, and more.  Protecting data has never been more important. Failure to secure web applications can lead to serious financial and reputational consequences. According to statistics published in Tenable's Threat Landscape Report, web application vulnerabilities continue to repeatedly pose a significant threat to organizations.

Web application security refers to the practices employed to detect and mitigate threats and vulnerabilities that may compromise the confidentiality, integrity, and availability of web applications. As the internet has evolved to become an integral part of how organizations conduct business, web applications have become increasing popular and essential to meet the requirements. This growing popularity of web applications and online transactions provides lucrative targets for cybercriminals. Data presented within this report highlights the top most vulnerable web applications and assets at risk for exploitation.

This report leverages data from Tenable Web App Scanning, a comprehensive and automated vulnerability scanning tool for modern web applications. Organizations can perform Dynamic Application Security Tests (DAST) on any application, anywhere, at any point in the application lifecycle. Of specific importance is the Tenable Web App Scanning ability to scan for vulnerabilities from the Open Web Application Security Project (OWASP) Top 10 risks, and provide comprehensive and accurate vulnerability data. 

The Open Web Application Security Project (OWASP) is a non-profit foundation that provides community-driven consensus insight into web application security concerns. The OWASP Top 10 list highlights several different aspects of web-based security, such as Cross-Site Scripting attacks, security misconfigurations, and sensitive data exposure. The focus of the OWASP Top 10 is to reduce risk across the most vulnerable aspects of web applications across the internet. Following these guidelines enables organizations to reduce risk of organizational and customer data theft. 

In addition, Common Vulnerability and Exposures (CVE), and other configuration tests provide insight into thousands of related vulnerabilities and misconfigurations. Vulnerability data presented in this report leverages all the gathered web application vulnerability information to provide organizations with a method to break the vulnerability cycle. The data provided in the report enables organizations to better communicate risk, prioritize patching efforts, and reduce the attack surface. 

This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are:

  • Tenable.sc 6.2.0
  • Tenable Web App Scanning

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture.

Chapters

New Web Application Vulnerabilities: This chapter provides a view of web application vulnerabilities which are newly discovered. The elements summarize the first stage of vulnerabilities in the risk life cycle.  The Web Application Vulnerabilities by State matrix tracks web application vulnerabilities through each state provides management information on the progress of risk mitigation efforts. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets.

New OWASP 2021 Vulnerabilities: This chapter provides a view of OWASP 2021 vulnerabilities which are newly discovered. The OWASP 2021 Categories (Last 14 days) matrix displays web application vulnerabilities identified using the 2021 OWASP categories. The following two tables provide the Top 100 Web URLs and newly discovered vulnerabilities. The OWASP 2021 Top 100 Most Vulnerable Web Applications (Last 14 Days) focuses on the Assets according to the URL scanned using the Tenable Web Application Scanner. While the OWASP 2021 Top 100 WAS Vulnerabilities and Affected Assets (Last 14 Days) table provides more detail showing the vulnerability and the associated assets.




english

Tenable Web App Scanning Overview

The prevalence of web applications makes them a prime target for cyber criminals. Failure to secure web applications can lead to serious financial and reputational consequences. This report provides details of vulnerability data discovered by Tenable Web App Scanning.

Tenable Web App Scanning provides comprehensive and accurate vulnerability scanning and risk analysis by leveraging OWASP Top 10 risks to vulnerable web application components. Tenable provides comprehensive and automated vulnerability scanning for modern web applications using Dynamic Application Security Tests (DAST). The security and development teams leverage these detailed vulnerability scans of the application at any point in the development lifecycle and are able understand the true security risks of the web application before deployment.

Tenable Security Center uses a comprehensive list of attributes to increase visibility into web application vulnerabilities. Risk managers are able to focus on security challenges that pose the greatest threat and most risk by leveraging Common Vulnerability Scoring System (CVSS) and OWASP references. The report provides a detailed view of the web application components and custom code vulnerabilities. Additionally, vulnerability details related to Log4J are provided, which displays any detected applications that are found to be vulnerable to Log4J exploits.

The report and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable Security Center Feed under the category Security Industry Trends.

The requirements for this dashboard are:

  • Tenable Security Center 6.2.0
  • Tenable Web Application Scanner

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture.

Chapters

Executive Summary: The Tenable Web App Scanning Overview report provides details of vulnerability data discovered by Tenable Web App Scanning, beginning with summary dashboard style view for leadership team. 

Web Application Vulnerability Statistics: This chapter combines the data collected from Nessus and Tenable Web App Scanner, providing a holistic view of vulnerabilities based on scanning the physical asset as well as the web application asset.  

OWASP 2021 Vulnerability Summary: Security and compliance frameworks, such as the Open Web Application Security Project (OWASP) Top 10, provides risk managers insight into methods used by adversaries to exploit common flaws and misconfigurations. 

Log4Shell: This chapter provides trending analysis along with vulnerability details related to log4shell vulnerabilities detected by both Nessus and Tenable Web App Scanning. Tenable recommends prioritizing these applications immediately for remediation efforts.
 




english

Web Services

Web applications often have the ability to interface with system functions and critical databases to add or modify data. By design, web applications need to enable customers and users access to this data.  This capability means that attackers are often able to leverage the same forms or other data entry methods to exploit flaws in web frameworks or other related software to bypass access controls. Web applications exist on remote servers or in cloud environments, and data is transmitted over public networks, presenting a very real and present attack path in the organization’s global attack vector. Web application security is a critical aspect to ensure the confidentiality, integrity, and availability of web applications. This report provides a combined view of data collected using the Tenable Web App Scanner and Tenable Vulnerability Management using Nessus.

Organizations need to know what web services are operating in the environment to ensure these web services are analyzed for current known vulnerabilities and attacks. Tenable Security Center along with Tenable Web App Scanning provides a thorough view of risks related to web services.  Leveraging both scan methods enables the security operations team and application developers to see risk and threat vectors from application frameworks and vulnerabilities on the host servers themselves.

Security and compliance frameworks, such as the Open Web Application Security Project (OWASP) Top 10, provides risk managers insight into methods used by adversaries to exploit common flaws and misconfigurations. Tenable Web App Scanner attributes vulnerabilities using the Cross Reference field to link to all published OWASP versions. Upon completion of the web application scan, the vulnerabilities detected and linked to OWASP 2021 provide an industry best practice approach to mitigating vulnerabilities.  

The report and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable Security Center Feed under the category Threat Detection & Vulnerability Assessments. The requirements for this report are:

  • Tenable Security Center 6.2.0
  • Tenable Nessus 10.5.4
  • Tenable Web Application Scanner

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable Security Center discovers and analyzes assets continuously to provide an accurate and unified view of an organization's security posture.

Chapters

Executive Summary: The chapter provides a high-level view of web related vulnerabilities collected by Tenable Web App Scanner and Tenable Nessus. Through trending and comparative charts, security managers are able to view current and past health of web applications and the associated server assets.  

SSL Related Vulnerabilities: This chapter provides the development team with information related to SSL, TLS and other encryption related vulnerabilities. The trending charts and tables enables risk migration teams to identify the affected assets and begin the remediation process.  

Most Critical OWASP 2021 Vulnerabilities: This chapter combines the OWASP 2021 categories along with CVSSv3 categories to identify the top vulnerably that needs to be mitigated first. A series of tables and charts provide the vulnerability details and affected URL assets. 

Web Application Vulnerabilities by Collection Method: This chapter provides a summarized list of all web application vulnerabilities from both Nessus and Tenable Web App Scanner.  A series of tables and trend charts helps security operations teams and risk managers to track progress and focus efforts as needed. 




english

Maintaining Data Protection Controls

Many data protection regulations, such as PCI DSS and HIPAA, levy heavy fines for data breaches of sensitive information. Effective data protection controls are necessary to avoid breaches of regulatory, statutory, or contractual obligations related to sensitive data.

Organizations that handle sensitive data, such as healthcare and credit card information, are required to audit data protection controls on an annual basis. Leveraging Tenable reports enables organizations to protect data in accordance with business risk posture for Confidentiality, Integrity and Availability (CIA).

The National Institute of Standards (NIST) Special Publication 800-53 provides comprehensive guidance for a secure infrastructure, including guidance on data protection and encryption. The information provided in Tenable dashboards and reports enables Risk Managers and Chief Privacy Officers to demonstrate to third parties and regulatory bodies that sensitive data is protected in accordance with Data Loss Prevention requirements.

The NIST Cybersecurity Framework (CSF) is a control framework, which has high level controls that align with
ISO 27001, NIST SP 800-53, and others. The Cybersecurity Framework’s prioritized, flexible, and cost-effective approach helps to promote the protection and resilience of critical infrastructure and other sectors important to the economy and national security. Many regulating bodies accept evidence documentation of compliance with the NIST CSF as assurance that the organization has effective controls in place to meet their security requirements. The HIPAA Security Rule Crosswalk to NIST Cybersecurity Framework is an example of a regulation aligning with NIST.

The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report is located in the Tenable.sc Feed under the category Threat Detection & Vulnerability Assessments.

The report requirements are:

Tenable.sc 5.9.0
Nessus 10.2.0

Leveraging Tenable reports enables operations teams to verify that appropriate protections are in place for data at rest, data in transit, and removable media. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives.

Chapters

Executive Summary: This chapter provides a summary view on the state of protections controls relating to Certificates, Encryption, and Confidentiality and Protected Information.

Data Protection Details – This chapter provides details on the state of protection controls in the environment for Certificates, Encryption, and Confidentiality and Protected Information, which are described below.

  • Certificates – This section displays findings for hosts with expired certificates, certificates that are expiring soon, untrusted certificates and self-signed certificates.  Expired certificates and other certificate problems cause a denial of service, man-in-the-middle, and trust-related concerns for organizations.  
  • SSL/TLS Vulnerability Summary – This section provides an overview of systems and vulnerabilities related to SSL/TLS.  The SSL/TLS Vulnerabilities by Type element displays a count of systems and vulnerabilities related to SSLv2 and SSLv3 in the first two rows. From the third row down, information is provided on all the systems running any version of TLSv1 and higher.
  • Encryption – This section provides an overview of systems and vulnerabilities related to SSL/TLS and Encryption/Cryptographic Compliance. Information presented in this section highlights issues such as weak hashing algorithms and keys as well as the use of insecure encryption ciphers. Many of these issues are the result of misconfigurations or use of outdated encryption methods. This detailed information also highlights vulnerabilities that can be exploited by attackers. Tenable recommends that security teams review the data to determine the risk to the organization.
  • Confidentiality of Protected Information – This section provides an overview of systems and vulnerabilities related to Security Requirement 3.13.16 in the NIST Special Publication 800-171. Revision 2 provides guidance to protect the confidentiality of Controlled Unclassified Information (CUI) at rest and maps to Security Control SC-28 of NIST Special Publication 800-53.  
  • File Content Audit Results – The following section displays File Content Audit Results. The first two rows of the File Contents Audit Results Compliance Checks provide the total count of Passed checks, Failed checks, and checks requiring a manual review. The first row, ‘Check Count’, provides a count of the current checks per check status. The second row, ‘Check Ratio’, provides a ratio view of check status. The three columns together total 100%. The last two rows provide a system count analysis. The third row, ‘System Count’, provides the number of systems with at least one audit check in the applicable state. The last row, ‘System Ratio’, provides a percentage of systems with at least one audit check in the applicable state.




english

Ransomware Ecosystem

Ransomware has evolved into an ecosystem with multiple players and an expanded threat model. Ransomware groups now deploy a double extortion technique, where they both encrypt and exfiltrate their victims’ data. The Tenable Security Research Team has released a report that enumerates common vulnerabilities exploited by ransomware affiliates and groups. The Ransomware Ecosystem report enables organizations to quickly scan for the vulnerabilities commonly exploited by ransomware groups.

Organizations with effective Business Continuity and Disaster Recovery plans are protected against threats to availability of data, which can come in many forms, such as natural disasters, hardware failures, or malicious attacks. These organizations could recover operations from a traditional ransomware attack without paying the ransom. However, the vulnerabilities that gave ransomware groups the opportunity to successfully penetrate the infrastructure may still leave organizations open to significant risk. Like any good business, ransomware players discovered the advantage of threatening data confidentiality by publishing samples of their targets’ sensitive data and threatening to expose all the data unless they are paid.

Threat actors understand the economic advantage of investing in the ransomware ecosystem, becoming more sophisticated and efficient over time. Organizations often struggle to secure a budget for resources needed to protect their infrastructure and prevent attacks from succeeding.

The Ransomware Ecosystem report displays assets by plugin family along with associated vulnerabilities. Operations teams use this information to evaluate risk based on the organization’s business priorities. The ability to rapidly mitigate vulnerabilities requires data to be presented in a concise manner focused on findings that pose the greatest risk to the organization. Risk managers leverage risk-based vulnerability management platforms to prioritize mitigation efforts.

This report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Compliance & Configuration Assessments. The report requirements are:

  • Tenable.sc 5.18.0
  • Nessus 8.14.0

Tenable.sc enables organizations to quickly identify and locate vulnerabilities in their infrastructure.This report displays the most common vulnerabilities sorted by platform type that are commonly exploited by ransomware groups. Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives.

Chapters

Executive Summary Chapter – Contains information from the Ransomware Ecosystem Dashboard that uses the CVE and Plugin Family filters to display counts of the vulnerabilities and assets that have been affected by ransomware.

Linux Chapter  – Contains charts and tables that group together Ransomware Ecosystem related CVEs for all Linux Operating Systems and includes an IP Detail for the hosts identified.

Windows Chapter  – Contains charts and tables that group together Ransomware Ecosystem related CVEs for all Windows Operating Systems and includes an IP Detail for the hosts identified.

Other Chapter  – Contains charts and tables that group together Ransomware Ecosystem related CVEs for all "Other" Operating Systems and includes an IP Detail for the hosts identified.




english

Establishing a Software Inventory

In the event of a security breach, a software inventory is essential to determine what was breached, and who needs to be notified.  First responders require a software inventory to perform forensic analysis and determine breach notification requirements for vendors, business partners, and regulatory bodies. Organizations that have a clear understanding of software in their environment can quickly assess a breach impact and identify affected areas. If legal proceedings are involved, an organized software inventory greatly assists in limiting data handed over to Law Enforcement and assists technical staff in depositions or testimony. 

Business Continuity and Disaster Recovery plans specify requirements for restoration of critical assets and services, but these need to be identified to establish a Recovery Time Objective (the amount of time to recover a service to an acceptable level of operation) and Recovery Point Objective (the last point of known good data.)  Developing and maintaining a software inventory is a critical first step in implementing an effective cyber security program.

A software inventory helps demonstrate compliance with regulatory controls and Service Level Agreements (SLA) for software used in the environment. From the perspective of “less is more,” a software inventory also identifies unnecessary software running in the environment, which increases the attack surface without providing a business advantage.

Security operations perform scans to identify operating system and application versions, including unsupported software and unpatched systems. This information is used to establish a secure baseline and measure drift from that baseline. A software inventory is necessary to determine if the software is authorized, appropriately licensed, supported, and has the most recent security fixes applied.
Identifying the authorized software assets is an important step to ensure critical assets are protected. The larger the organization, the more difficult the inventory process becomes. Tenable.io and Tenable.sc help organizations build a software inventory. There are several software discovery plugins that run by default in the following scan templates:

  • Basic and Advanced Agent Scans
  • Advanced (Network) Scan
  • Basic (Network) Scan
  • Credentialed Patch Audit
  • Internal PCI Network Scan

Maintaining a software inventory aids in cyber hygiene and minimizes unauthorized software installation. Many organizations perform an annual audit by an external third party, where they are required to enumerate authorized software that is running in the environment. Organizations that maintain a current software inventory throughout the year can produce information required by auditors and vendors with minimal effort. 

The report and its chapters are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Discovery and Detection.

The report requirements are: 

  • Tenable.sc 5.19.1
  • Nessus 10.0.1

Security leaders need to SEE everything, PREDICT what matters most and ACT to address cyber risk and effectively align cybersecurity initiatives with business objectives. Tenable.io discovers and analyzes assets continuously to provide an accurate and unified view of an organization’s security posture.

Chapters


Executive Summary This chapter presents data for detected operating systems, browsers, unsupported software, and other software installations on systems within a network.

Installed Software Iteration This chapter displays software detected across the organizations systems. Software enumeration is utilized to detect Installed software.

Issues Gating Remediation This chapter displays known/identified roadblocks to completing remediation efforts.




english

Mitigation Summary Report

Identifying both the current vulnerabilities and the vulnerabilities that have been mitigated provides IT managers an accurate picture of the health of their organization's network. Tenable.sc Continuous View has the ability to track mitigated vulnerabilities, enabling management to track and measure progress. This report provides technical managers with a clear method to communicate progress to executive management.

Throughout the report there is a continued comparison of mitigated vulnerabilities to unmitigated vulnerabilities. The first chapter provides a 3-month trend of vulnerabilities and other related charts focusing on vulnerability counts per subnet.  The second chapter provides a series of matrices with an in-depth look at vulnerabilities by severity, by CVSS score, by CVE identifier, and by Nessus and Nessus Network Manager (NNM) plugin groupings.
The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The report can be easily located in the Tenable.sc Feed under the category Executive. The report requirements are:

  • Tenable.sc 5.0.1
  • Nessus 8.5.1
  • LCE 6.0.0
  • NNM 5.9.0

Tenable provides continuous network monitoring to identify vulnerabilities, reduce risk, and ensure compliance. Tenable.sc Continuous View (CV) provides the ability to report on both current and mitigated vulnerabilities. With more supported technologies than any other vendor, including operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure, Tenable.sc CV scales to meet future vulnerability management demands for virtualized systems, cloud services, and the proliferation of devices.
teams.

  Chapters

Executive Summary - This chapter provides executives with high-level understanding of vulnerability history, and which network segments are at the most risk. The first component is a 3-month trend of vulnerabilities followed by two bar charts. The bar charts provide a side-by-side comparison of vulnerability mitigation by subnet. The vulnerabilities that have been mitigated are in the top bar chart and current vulnerabilities are shown in the following chart.

Vulnerability Summaries - This chapter provides a series of matrices showing the relationship between mitigated vulnerabilities and unmitigated. The matrices are created using different criteria. The components provide an analysis using CVSS, CVE, and operating systems.
 




english

ContiLeaks Vulnerabilities

A security researcher posted private chat messages between members of the Conti ransomware group, providing valuable insight into which vulnerabilities are leveraged by the group and affiliates in their cyber attacks. The Conti ransomware group has earned a reported $180 million in profits by leasing their Ransomware-as-a-Service (RaaS) model to cripple cyber-infrastructure in vulnerable organizations. Tenable has published a variety of content to assist customers with identifying the vulnerabilities leveraged by the Conti ransomware group and its affiliates.

Conti and their affiliates have had a particularly devastating impact on healthcare services, including at least 16 U.S. health and emergency networks. Conti attacked Ireland’s Health Service Executive (HSE), demanding a $20 million dollar ransom, which the HSE refused to pay, opting instead to shut down IT services for mitigation efforts.

Tenable’s 2021 Threat Landscape Retrospective report revealed that 24.7% of healthcare data breaches were the result of ransomware attacks, and ransomware itself was responsible for 38% of all breaches last year. The leaked data revealed that Conti and its affiliates have been exploiting a number of vulnerabilities. There are also reports that Conti and its affiliates have targeted vulnerabilities in the Fortinet FortiOS found in Fortinet’s SSL VPN devices to gain initial access to target environments. 

Organizations are often breached from legacy vulnerabilities present in the IT infrastructure of small companies they have recently acquired. The analysis of the ContiLeaks data identifies the vulnerabilities that are being actively exploited, enabling security managers to prioritize mitigation. 

The Security Response Team (SRT) of Tenable Research has analyzed the ContiLeaks data to ensure customers are fully informed of their vulnerability to Conti RaaS attacks. The SRT also provides breakdowns for the latest vulnerabilities in the Tenable Blog. Tenable Research has released over 165,000 plugins and leads the industry on CVE coverage. Tenable's SRT team continuously works to help organizations prioritize and create remediation plans for the new threats, which often leave very little time for reflection.

This report contains the following chapters:

Executive Summary Chapter - Contains information from the ContiLeaks Dashboard that uses the CVE and Plugin Family filters to display counts of the vulnerabilities and assets that have been affected by ContiLeaks.

Linux Chapter - Contains charts and tables that group together ContiLeaks related CVEs for all Linux Operating Systems and includes an IP Detail for the hosts identified.

Windows Chapter - Contains charts and tables that group together ContiLeaks related CVEs for all Windows Operating Systems and includes an IP Detail for the hosts identified.

Other Chapter - Contains charts and tables that group together ContiLeaks related CVEs for all "Other" Operating Systems and includes an IP Detail for the hosts identified.




english

Mr. putter & tabby drop the ball / Cynthia Rylant.

Mr. Putter and his fine cat, Tabby, love to take naps -- too many naps. What they need is a sport! Luckily Mrs.Teaberry and her good dog, Zeke, know of a baseball team they can join. It's not long before Mr. Putter is ready to play ball, but will his creaky knees cooperate? And can Zeke avoid wreaking havoc on the field? Win or lose, this baseball team will never be the same!




english

Mr. Putter & Tabby dance the dance / Cynthia Rylant.

Newbery Medalist Cynthia Rylant weaves tales with tremendous appeal to young readers, and her popular Mr. Putter and Tabby series stars two of Rylant's most memorable characters. It's no secret that Mr. Putter does not like to dance. But when his neighbor Mrs. Teaberry develops a fondness for ballroom dancing, she is able to convince the reluctant Mr. Putter to join her for a night at the Crystal Ballroom- with beloved pets Tabby and Zeke in tow, of course!




english

Mr. putter & tabby clear the decks / Cynthia Rylant.

Cynthia Rylant's 19th Mr. Putter & Tabby book has all the sly, sweet humor that has made the series a huge success. In Mr. Putter & Tabby Clear the Decks, Mr. Putter and his fine cat Tabby are itchy. Not because of fleas, but because it's hot, they're bored, and they're out of orangesicles. So when their neighbor Mrs. Teaberry suggests a sightseeing cruise, they're excited about an adventure. The boat makes them feel free! Plus they get orangesicles! But when it's time to go home, there's a little problem with Mrs. Teaberry's good dog Zeke.




english

Mr. putter & tabby catch the cold / Cynthia Rylant.

Newbery medal-winner and recipient of the Theodor Seuss Geisel Award, Cynthia Rylant instills gentle humor into this cozy read. When Mr. Putter goes outside without a hat on, he catches a cold. Tabby tries to make Mr. Putter feel better, but "colds aren't so much fun when you're old." Yet his neighbor Mrs. Teaberry and her dog Zeke know just the thing to help Mr. Putter recover. "... will resonate with kids who know what it's like to feel dispirited when felled by a cold."-Booklist




english

Mr. putter & tabby bake the cake / Cynthia Rylant.

Christmas is Mr. Putter's favorite time of the year. He starts thinking about Christmas presents in July. It's easy to buy gifts for the postman, the grocer, and the librarian. But he has to think very hard about a gift for his neighbor, Mrs. Teaberry. Mrs. Teaberry likes strange things. She likes coconuts that look like monkey heads and tiny dresses that fit her teapots. She even likes fruitcake. That's it! He'll make her a good cake for Christmas, a light and airy one that won't break her toe if she drops it. He's never baked a cake before, but it should be a cinch. Among the delightful creations of this popular Newbery Medal honoree, Mr. Putter is perhaps the most comical and endearing. Narrator John McDonough is charming in the title role. Young readers will beg to hear all the Mr. Putter series again and again.




english

Mr. palomar / Italo Calvino.

Mr. Palomar, whose name purposely evokes that of the famous telescope, is a seeker after knowledge, a visionary in a world sublime and ridiculous. Whether contemplating a cheese, a woman's breasts, or a gorilla's behavior, he brings us a vision of a world familiar by consensus, fragmented by the burden of individual perception. Translated by William Weaver. A Helen and Kurt Wolff Book




english

Mr. Macky is wacky / Dan Gutman.

Mr. Macky dresses up as Abraham Lincoln to get the students at Ella Mentry School excited about their Presidents' Day oral reports.




english

Mr. mac and me / Esther Freud.

Named one of Granta's Best Young British Novelists, Esther Freud made her debut with the much-buzzed-about Hideous Kinky and has since delivered one brilliant novel after the next. Set in 1914 along the Suffolk coast, Mr. Mac and Me is the story of Thomas Maggs, whose quiet life is shaken first by the appearance of the decidedly curious Mr. Mac and then by the ravages of World War I.




english

Mr. louie is screwy! / Dan Gutman.

Valentines Day is just around the corner, and Mr. Louie, the hippie crossing guard, wants everyone to fall in love. So he puts a secret love potion in the water fountain. Will A.J. have to kiss Andrea?




english

Mr. littlejohn / Cameron Judd.

Two-time Spur Award nominee Cameron Judd spins Westerns that lasso listeners' attention. In this inspiring story of self-sacrifice, menacing dangers spur 17-year-old Pennington Malone to grow up quickly. With his father in Leavenworth Prison, Penn travels to Dodge City packing his dad's loaded sixgun. He soon meets Jonah Littlejohn, a lanky man gifted with incredible strength and boxing prowess-and haunted by painful secrets. But when Penn learns that three shadowy riders are trailing him-and framing him for murders they commited-he needs all the help he can get.




english

Mr. Lincoln's T-mails : the untold story of how Abraham Lincoln used the telegraph to win the Civil War / Tom Wheeler.

The Civil War was the first "modern war." Because of the rapid changes in American society, Abraham Lincoln became president of a divided United States during a period of technological and social revolution. Among the many modern marvels that gave the North an advantage was the telegraph, which Lincoln used to stay connected to the forces in the field in almost real time. No leader in history had ever possessed such a powerful tool to gain control over a fractious situation. An eager student of technology, Lincoln had to learn to use the power of electronic messages. Without precedent to guide him, Lincoln began by reading the telegraph traffic among his generals. Then he used the telegraph to supplement his preferred form of communication-meetings and letters. He did not replace those face-to-face interactions. Through this experience, Lincoln crafted the best way to guide, reprimand, praise, reward, and encourage his commanders in the field. By paying close attention to Lincoln's "lightning messages," we see a great leader adapt to a new medium. No listener of this work of history will be able to miss the contemporary parallels. Watching Lincoln carefully word his messages-and follow up on those words with the right actions-offers a striking example for those who spend their days tapping out notes on computers and BlackBerrys.




english

Mr. docker is off his rocker! / Dan Gutman.

Mr. Docker, a new science teacher, is a crazy inventor who blows things up, uses potatoes for power, and has A.J. and his friends wondering whether science is for nerds or is the coolest subject ever




english

Mr. bridge / Evan S. Connell.

A lawyer with a growing stockpile of securities in the bank, three beautiful children, a compliant and decorative wife, and a lovely house in the suburbs, Walter Bridge has achieved all that is expected of someone of his race and background. But try as he might to control the lives of those around him, they prove perversely independent. In Mr. Bridge and its companion, Mrs. Bridge, Evan S. Connell has brilliantly realized the lives of upper-middle-class Americans living in the years just before and during World War II.




english

Mozart's sister / Nancy Moser.

Christy Award winner Nancy Moser is the best-selling author of more than 16 popular books of faith and inspiration. In this compelling historical novel, Wolfgang Mozart's little-known sister Nannerl tells the tale of her own bittersweet life. Eleven-year-old Nannerl is arguably the best keyboard player in all of Europe. Yet because her six-year-old brother Wolfie can play almost as well as she, he receives virtually all the praise and adulation. Traveling far and wide with her family, she and her brother perform before the crowned heads of Europe. Social convention and public clamor relegate her to living life in the shadow of a prodigy. But when will Nannerl ever realize her own dreams and aspirations? "Moser's writing is smooth" and replete with "fascinating historical details" Publishers Weekly "Mozart's Sister is a masterpiece of lyrical prose; a deeply moving story that embodies a love for music and a fascination with history. Bravisima, Ms. Moser!"-Tamera Alexander, best-selling author of Rekindled.




english

Mozart. A Life / Paul Johnson.

As he' s done in Napoleon, Churchill, Jesus, and Darwin, acclaimed historian and author Paul Johnson here offers a concise, illuminating biography of Mozart. Johnson' s focus is on the music-- Mozart' s wondrous output of composition and his uncanny gift for instrumentation. Liszt once said that Mozart composed more bars than a trained copyist could write in a lifetime. Mozart' s gift and skill with instruments was also remarkable as he mastered all of them except the harp. For example, no sooner had the clarinet been invented and introduced than Mozart began playing and composing for it.




english

Moxie : Moxie girls fight back / Jennifer Mathieu.

Punk rock zines inspire a feminist revolution at a small town Texan high school in the new novel from Jennifer Matheiu, author of The Truth About Alice. MOXIE GIRLS FIGHT BACK! Vivian Carter's mom was a Riot Grrrl in the 1990s, but now she and Viv live a pretty quiet life in a small Texas town. When Viv witnesses a series of sexist incidents at her high school, she takes a page from her mom's past and makes a feminist zine that she distributes anonymously to her classmates. Viv is just blowing off steam, but before she knows it, she's started a revolution. The latest novel from Jennifer Mathieu offers everything fans love about her writing-a relatable protagonist with a distinct voice, a conflict relevant to current events, and ultimately a story that is both heartbreaking and hopeful.