The Last Resort Pdf Book

The Last Resort

  • Author : Norma Watkins
  • ISBN : 9781604739787
  • Category : Biography & Autobiography
  • Publisher : Univ. Press of Mississippi
  • Pages : 240
  • Release Date : 2011-05-09

Raised under the racial segregation that kept her family's southern country hotel afloat, Norma Watkins grows up listening at doors, trying to penetrate the secrets and silences of the black help and of her parents' marriage. Groomed to be an ornament to white patriarchy, she sees herself failing at the ideal of becoming a southern lady. The Last Resort, her compelling memoir, begins in childhood at Allison's Wells, a popular Mississippi spa for proper white people, run by her aunt. Life at the rambling hotel seems like paradise. Yet young Norma wonders at a caste system that has colored people cooking every meal while forbidding their sitting with whites to eat. Once integration is court-mandated, her beloved father becomes a stalwart captain in defense of Jim Crow as a counselor to fiery, segregationist Governor Ross Barnett. His daughter flounders, looking for escape. A fine house, wonderful children, and a successful husband do not compensate for the shock of Mississippi's brutal response to change, daily made manifest by the men in her home. A sexually bleak marriage only emphasizes a growing emotional emptiness. When a civil rights lawyer offers love and escape, does a good southern lady dare leave her home state and closed society behind? With humor and heartbreak, The Last Resort conveys at once the idyllic charm and the impossible compromises of a lost way of life.

Raised under the racial segregation that kept her family's southern country hotel afloat, Norma Watkins grows up listening at doors, trying to penetrate the secrets and silences of the black help and of her parents' marriage. ... ...

GET BOOK

Information Security: Principles and Practices, Second Edition Everything You Need to Know About Modern Computer Security, in One Book Clearly explains all facets of information security in all 10 domains of the latest Inform ... ...

GET BOOK

This is the eBook version of the print title. Note that the eBook may not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CISA exam success with this Cert Guide f ... ...

GET BOOK

IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support c ... ...

GET BOOK

All of today’s help desk support skills, in one easy-to-understand book The perfect beginner’s guide: No help desk or support experience necessary Covers both “soft” personal skills and “hard” technical skills Exp ... ...

GET BOOK

This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CISSP exam success with the CISSP Cert ... ...

GET BOOK

This book captures and communicates the wealth of architecture experience Capgemini has gathered as a member of The Open Group – a vendor- and technology-neutral consortium formed by major industry players – in developing ... ...

GET BOOK

AIX Version 6.1 provides many significant new security technologies and security enhancements. The purpose of this IBM Redbooks publication is to highlight and explain the security features at the conceptual level, as well as ... ...

GET BOOK

This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the digital edition of the Cram Sheet is available through pro ... ...

GET BOOK

The Only Complete Technical Primer for MDM Planners, Architects, and Implementers Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they ... ...

GET BOOK

IT Manager’s Handbook, Third Edition, provides a practical reference that you will return to again and again in an ever-changing corporate environment where the demands on IT continue to increase. Make your first 100 days r ... ...

GET BOOK

The Sarbanes-Oxley Act (officially titled the Public Company Accounting Reform and Investor Protection Act of 2002), signed into law on 30 July 2002 by President Bush, is considered the most significant change to federal secu ... ...

GET BOOK

Actionable guidance and expert perspective for real-world cybersecurity The Cyber Risk Handbook is the practitioner's guide to implementing, measuring and improving the counter-cyber capabilities of the modern enterprise. The ... ...

GET BOOK

Organizations that rely on computing technology for survival understand the critical importance of managing projects that meet strategic goals and objectives. The diversity of business globalization and electronic commerce co ... ...

GET BOOK

This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the digital edition of the Cram Sheet is available through pro ... ...

GET BOOK

Praise for COSO Enterprise Risk Management "COSO ERM is a thoughtful introduction to the challenges of risk management at the enterprise level and contains a wealth of information on dealing with it through the use of the COS ... ...

GET BOOK

This reference book shows how the Zero Outage method leads to more stability in operations, more reliability in projects and, ultimately, to greater customer satisfaction. It explains why clear standards for platforms, proces ... ...

GET BOOK

Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to match marketability and credibility to your cloud security skill set. The Official (ISC)2 Guide to the ... ...

GET BOOK

This IBM® Redbooks® publication describes how the IBM Big Data Platform provides the integrated capabilities that are required for the adoption of Information Governance in the big data landscape. As organizations embark on ... ...

GET BOOK

The IBM® i operation system (formerly IBM i5/OS®) is considered one of the most secure systems in the industry. From the beginning, security was designed as an integral part of the system. The System i® platform provides a ... ...

GET BOOK

This book provides a comprehensive overview of the field of software processes, covering in particular the following essential topics: software process modelling, software process and lifecycle models, software process manage ... ...

GET BOOK

The Practical, Comprehensive Guide to Applying Cybersecurity Best Practices and Standards in Real Environments In Effective Cybersecurity, William Stallings introduces the technology, operational procedures, and management pr ... ...

GET BOOK

This book establishes and explores existing and emerging theories on Small and Medium-sized Enterprises (SMEs) and the adoption of IT/IS. It presents the latest empirical research findings in that area of IS research and expl ... ...

GET BOOK

This report provides an overview of the financial impact of cyber incidents, the coverage of cyber risk available in the insurance market, the challenges to market development and initiatives to address those challenges. ... ...

GET BOOK

CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managi ... ...

GET BOOK

Practical advice for redesigning “big, old” companies for digital success, with examples from Amazon, BNY Mellon, LEGO, Philips, USAA, and many other global organizations. Most established companies have deployed such dig ... ...

GET BOOK

Know how to mitigate and handle ransomware attacks via the essential cybersecurity training in this book so you can stop attacks before they happen. Learn the types of ransomware, distribution methods, internal structure, fam ... ...

GET BOOK

The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography! Adam Shostack is responsible for security development lifecycle threat modeling at Micro ... ...

GET BOOK

The first edition of The Internal Auditing Handbook received wide acclaim from readers and became established as one of the definitive publications on internal auditing. The second edition was released soon after to reflect t ... ...

GET BOOK

This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. A strong business focus through a solid technical presentation of sec ... ...

GET BOOK