Herman Melville - an Introduction
- Offers a brief introduction to Melville, covering all his major works
- Showcases Melville's writing process through his correspondence with Nathaniel Hawthorne
- Provides a clear sense of Melville's major themes and preoccupations
- Focuses on Typee, Moby-Dick, and Billy Budd in individual chapters
- Includes a biography, summary of key works, interpretation, commentary, and an extensive bibliography.
Table of Contents
List of Illustrations.
Part I: Introduction.
1 Melville's Life.
2 "Agatha" and the Invention of Narrative.
Part II: Melville's Early Yarns.
3 "Making Literary Use of the Story": Typee and Omoo.
4 "A Regular Story Founded on Striking Incidents": Mardi, Redburn, and White-Jacket.
Part III: Writing New Gospel in Moby-Dick and Pierre.
5 "So Much of Pathos & So Much of Depth": Moby-Dick.
6 "All Tender Obligations": Pierre.
Part IV: Turning a New Leaf: Short Fiction, Israel Potter, and The Confidence-Man.
7 "A Leaf from Professional Experience": Short Fiction of the 1850s.
8 "Peculiarly Latitudinarian Notions": Israel Potter and The Confidence-Man.
Part V: Melville's Later Career.
9 "Fulness & Veins & Beauty": Battle-Pieces and Clarel.
10 "Different Considerations": Late Poetry.
11 "Instinct with Significance": Billy Budd.
Afterword: "Restoring to You Your Own Property": Owning Melville.
Appendix: "Agatha" Correspondence.
Sign up now »
Both a challenge and solution are presented here for deploying equipment offsite in co-location sites or the cloud.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
- AusCERT 2013: Police urge banks to install ATM chip technology
- Twitter aims to become safer with two-step sign-in
- Prevent a hack attack with Twitter's new two-factor authentication
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- AusCERT 2013: Users, cats more likely hack culprits than cyber-espionage: Trustwave