A remarkable & entertaining account of the bigfoot phenomenon. Ohio is among the top five states in reported bigfoot incidents because of the state's vast farmlands (easy food), extensive forest areas, and abundant water resources. Numerous reports of a strange apelike creature continue to emanate from Ohio's vast rural and forested areas. Now commonly known as bigfoot, the creature is mainly seen in farming communities as it obviously searches for easy food. Large humanlike footprints in cornfields, pasture lands and woodland trails provide tangible evidence of its passage. Joedy Cook and George Clappison have spent almost twenty years investigating the bigfoot phenomenon in Ohio and other eastern states. The information they have gathered on Ohio incidents is presented in this thought-provoking book by Chris Murphy, an author and bigfoot researcher in British Columbia, Canada. While most scientists still reject the possible existence of bigfoot, this book will leave you in awe as to why more is not being done to resolve what is surely North America's greatest mystery. Originally published in 1997 under a different title, the Murphy, Cook, Clappison team has completely revised and updated the work. Many new sightings have been documented and numerous photographs and illustrations have been added. The book has had a complete makeover, with the provision of more and better information on all aspects of the remarkable bigfoot phenomenon in the State of Ohio. Ohio ranks sixth in North America in the number of bigfoot-related incidents by state or province. The details provided in this book give a clear understanding of just how widespread the phenomenon is in Ohio. The astounding eye-witness accounts will convince even the most ardent skeptics that the bigfoot issue has gone far beyond legend and willful fabrications. About the title: Use of the Ohio term Grassman to identify an unusual ape-man creature appears to go back to at least the turn of the last century. Apparently, sightings of the creature in tall grass (including the young of the species) on Ohio's plains resulted in the name. As the creature was somewhat terrifying in appearance, it appears the term was used in a foreboding sense with children (i.e., the Grassman will get you!). Descriptions of the Grassman are identical to those of bigfoot or the sasquatch; however, the Grassman appears to have some different habits or ways of life.
Runyan's mission to secure a parcel of emeralds takes him gallivanting all over the world. He meets an array of people but doesn't know if they are friends or enemies. In London, he stashes secret papers exposing a plot to sabotage Persian Gulf oil fields. On his way to Rio, he connects with three very different women who each play a significant role in his struggle to collect the emeralds. While flying over the Caribbean Sea, he must foil a midair hijacking, and in Tel Aviv, Runyan has to face a deadly showdown with Arab leaders terrified that their reign of wealth is at an end.
As he evolves from scoundrel to philanthropist, Runyan retains his reckless courage and wry humor. If only he could find a definitive answer to his one, burning question: just how much can be achieved with benevolent deceit?
A thrilling ride through some of the world's most exotic locales, Emerald Passage explores the gray area between right and wrong through the eyes of a new kind of hero: Rollo Runyan.
A new voice in the LGBTQ fiction genre...
5 STAR REVIEW: Shatters expectations... Murphy delivers a pulse-pounding novel full of suspense and sharp wit. A roller-coaster pace barrels dynamic characters across the page with unwavering finesse. It's the sexiest thriller of the year, with a dynamite final act that stays with you long after the last page. - Sam Smith
ABOUT THE BOOK: What if your reflection was not your own? For Jace Lannister, it's not always easy being black and gay in the weird world of Portland. It doesn't help that he's the son of the Brooklyn Butcher, the notorious serial killer who claimed nineteen lives in the early '90s before escaping justice. With buried secrets and a new identity, Jace has created a new life for himself far from his blood-stained roots. But all is shattered when a gruesome murder surfaces echoing the past, fueled by his father's dark legacy. Has the Brooklyn Butcher returned? Is history destined to repeat itself in the image of his son? Or is something far more sinister emerging from the other side of the mirror?
In Burning All the Time, Chris Murphy illuminates the life within characters, the rough fusions between characters and more than anything a place, Northeastern Oklahoma, with the power to claim characters and work them into its weave. The result is fiction that becomes a place unto itself, with its own air, own distances, own loneliness, mystery and threat. Reading Murphy's stories, you'll find yourself inhabiting this singular place and caring for it mightily. In other words: you'll find that it's claimed you as well. -Ben Nickol, author of Sun River: Stories
Motivational Interviewing has becoming increasingly widespread among counselors and therapists, but no book to date has focused exclusively on applying Motivational Interviewing to domestic and partner violence.
Written by established authorities in the field, the chapters in this volume represent important applications of motivational enhancement strategies to intimate partner violence with both victims and batterers. These studies include descriptive research on victims and perpetrators of abuse, measurement issues in assessing stages of change, and real-world applications of motivational interviewing. Murphy and Maiuro illustrate both the benefits and challenges inherent in this growing area of research.
Beginning HTML5 and CSS3 is your introduction to the new features and elements of HTML5--as a web developer you'll learn about all the leaner, cleaner, and more efficient code available now with HTML5, along with some new tools that will allow you to create more meaningful and richer content. For everyone involved in web design, this book also introduces the new structural integrity and styling flexibility of CSS 3--which means better-looking pages and smarter content in your website projects.
For all forward-looking web professionals who want to start enjoying and deploying the new HTML5 and CSS3 features right away, this book provides you with an in-depth look at the new capabilities--including audio and video--that are new to web standards. You'll learn about the new HTML5 structural sections, plus HTML5 and CSS3 layouts. You'll also discover why some people think HTML5 is going to be a Flash killer, when you see how to create transitions and animations with these new technologies. So get ahead in your web development through the practical, step-by-step approaches offered to you in Beginning HTML5 and CSS3.
Located just north of Boston, Nashua, New Hampshire, is known as a quiet city--until a series of violent murders makes front page news just before Memorial Day weekend. The brutal killings leave citizens terrified, and the NH State Police respond by bringing in an experienced investigator.
Detective Sergeant John Osborne is an abrasive but competent state trooper from the major crimes unit. Osborne immediately butts heads with Detective David Boyle, his liaison to the Nashua police department.
Both men begin investigating the grisly murders, which seemingly happened with absolutely no apparent connection except for the killer placing a white pillowcase over the victim's head and tying the end of it off in a knot around the neck.
As if the killer didn't want to see the victims face, the skull is pummeled rendering them unrecognizable. Nothing is as it seems as both investigators clash every step of the way. Their own personal dislike and inter-departmental hostility for each other threatens to jeopardize the investigation. Ironically, both of them might actually be closer to the truth than they realize upon learning of an eerily similar crime committed in Maryland the year before. In fact, the killer has already decided that one of them must become the next victim.
Located just north of Boston, Nashua, New Hampshire, is known as a quiet city--until a series of violent murders makes front page news just before Memorial Day weekend. The brutal killings leave citizens terrified, and the NH State Police respond by bringing in an experienced investigator.
Detective Sergeant John Osborne is an abrasive but competent state trooper from the major crimes unit. Osborne immediately butts heads with Detective David Boyle, his liaison to the Nashua police department.
Both men begin investigating the grisly murders, which seemingly happened with absolutely no apparent connection except for the killer placing a white pillowcase over the victim's head and tying the end of it off in a knot around the neck.
As if the killer didn't want to see the victims face, the skull is pummeled rendering them unrecognizable. Nothing is as it seems as both investigators clash every step of the way. Their own personal dislike and inter-departmental hostility for each other threatens to jeopardize the investigation. Ironically, both of them might actually be closer to the truth than they realize upon learning of an eerily similar crime committed in Maryland the year before. In fact, the killer has already decided that one of them must become the next victim.
Runyan's mission to secure a parcel of emeralds takes him gallivanting all over the world. He meets an array of people but doesn't know if they are friends or enemies. In London, he stashes secret papers exposing a plot to sabotage Persian Gulf oil fields. On his way to Rio, he connects with three very different women who each play a significant role in his struggle to collect the emeralds. While flying over the Caribbean Sea, he must foil a midair hijacking, and in Tel Aviv, Runyan has to face a deadly showdown with Arab leaders terrified that their reign of wealth is at an end.
As he evolves from scoundrel to philanthropist, Runyan retains his reckless courage and wry humor. If only he could find a definitive answer to his one, burning question: just how much can be achieved with benevolent deceit?
A thrilling ride through some of the world's most exotic locales, Emerald Passage explores the gray area between right and wrong through the eyes of a new kind of hero: Rollo Runyan.
A critical examination of the foundational flaws that have led to the current cybersecurity crisis. This book takes a historical approach to understanding how short-term decision-making, driven by convenience and profit, compromised the long-term security of the internet. From the introduction of public access to secure networks to the widespread deception associated with Multi-Factor Authentication (MFA), this book uncovers the decisions, both intentional and negligent, that have allowed cybersecurity vulnerabilities to proliferate.
Divided into well-structured chapters that trace the evolution of these issues, Digital Deception provides a clear and fact-based narrative that highlights where the system went wrong and why. It also shines a light on the complicity of various actors (vendors, auditors, corporate leaders, and even educational institutions) in perpetuating a broken system. More than just a critique, Digital Deception offers a path forward, rooted in real computer science, to restore trust and security in our digital world.
The book is especially relevant now, as cyber threats continue to grow in scale and sophistication. The facts presented here are not only essential for cybersecurity professionals but also for corporate leaders, policymakers, and anyone interested in the integrity of the digital economy.
What You Will Learn:
Who This Book Is for:
This book is primarily written for cybersecurity professionals, corporate leaders, lawyers and policymakers. It is also relevant to educators in the field of cybersecurity, and anyone interested in the integrity of the internet.
The typical reader will have a basic understanding of cybersecurity but will be introduced to new concepts and facts that challenge conventional wisdom and encourage a rethinking of current practices.
In a world where cybersecurity threats evolve daily, it's time to leave traditional, flawed security models behind. This book introduces a groundbreaking approach that applies the quantum principle of superposition to user authentication. Just as a particle exists in multiple states until observed, a user's presence on a network remains undefined until their Digital ID is verified. Once verified, their identity collapses into a single truth--eliminating any risk of impersonation or fraud.
This book demonstrates how Digital IDs transform the very foundation of network security. Unlike conventional methods, where user identity is indirectly represented through data, this model ties a user's existence directly to their Digital ID. By securing user presence--and absence--this new authentication model offers unparalleled protection from unauthorized access and common cyber threats like stolen credentials or malicious impersonation.
It equips cybersecurity professionals, C-suite executives, and decision-makers with practical, actionable steps for seamlessly integrating this new technology into existing infrastructures. Readers will explore how Digital IDs create a secure, private interface when connected to the network, and how they prevent unauthorized actions when the user is absent. This innovative shift moves security from reactive mitigation strategies to proactive solutions that ensure both trust and control.
What You Will Learn:
Who This Book is for:
This book is written primarily for cybersecurity professionals such as CISOs, CTOs, CIOs, network architects, and IT security managers. These readers have a deep understanding of current cybersecurity challenges but are seeking innovative, more effective solutions to overcome systemic flaws in today's network security models.
Secondary audiences include business leaders and decision-makers in organizations, who need to understand the strategic importance of cybersecurity innovations like Digital IDs and Direct User Interaction. Tertiary audiences might include students or researchers in cybersecurity who want to explore alternative security models.