Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
The Doctor in the Victorian Novel

Buy
The Doctor in the Victorian Novel, 9780754668022 (0754668029), Ashgate, 2009

With the character of the doctor as her subject, Tabitha Sparks follows the decline of the marriage plot in the Victorian novel. As Victorians came to terms with the scientific revolution in medicine of the mid-to-late nineteenth century, the novel's progressive distance from the conventions of the marriage plot can be indexed through a rising identification of the doctor with scientific empiricism. A narrative's stance towards scientific reason, Sparks argues, is revealed by the fictional doctor's relationship to the marriage plot. Thus, novels that feature romantic doctors almost invariably deny the authority of empiricism, as is the case in George MacDonald's Adela Cathcart. In contrast, works such as Wilkie Collins's "Heart and Science", which highlight clinically minded or even sinister doctors, uphold the determining logic of science and, in turn, threaten the novel's romantic plot. By focusing on the figure of the doctor rather than on a scientific theme or medical field, Sparks emulates the Victorian novel's personalization of tropes and belief systems, using the realism associated with the doctor to chart the sustainability of the Victorian novel's central imaginative structure, the marriage plot. As the doctors Sparks examines increasingly stand in for the encroachment of empirical knowledge on a morally formulated artistic genre, their alienation from the marriage plot and its interrelated decline succinctly herald the end of the Victorian era and the beginning of Modernism.

(HTML tags aren't allowed.)

Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
Security and Cryptography for Networks: 6th International Conference, SCN 2008, Amalfi, Italy, September 10-12, 2008, Proceedings
The 6th Conference on Security and Cryptography for Networks (SCN 2008) was held in Amalfi, Italy, on September 10–12, 2008. The first four editions of the conference where held in Amalfi, while, two years ago, the fifth edition was held in the nearby Maiori. This year we moved back to the traditional location.

Security and privacy
...
CEH: Certified Ethical Hacker Version 8 Study Guide
CEH: Certified Ethical Hacker Version 8 Study Guide

Prepare for the new Certified Ethical Hacker version 8 exam with this Sybex guide

Security professionals remain in high demand. The Certified Ethical Hacker is a one-of-a-kind certification designed to give the candidate a look inside the mind of a hacker. This study guide provides a concise, easy-to-follow approach that...

Printed Circuits Handbook (McGraw Hill Handbooks)
Printed Circuits Handbook (McGraw Hill Handbooks)

The World's #1 Guide to Printed Circuit Boards_Now Completely Updated with the Latest Information on Lead-Free Manufacturing!

The best reference in the field for over 30 years, the Printed Circuits Handbook equips you with definitive coverage of every facet of printed circuit assemblies_from...


SSL and TLS: Theory and Practice (Information Security and Privacy)
SSL and TLS: Theory and Practice (Information Security and Privacy)

SSL (secure socket layer) and TLS (Transport Layer Security) are widely deployed security protocols that are used in all kinds of web-based e-commerce and e-business applications and are part of most contemporary security systems available today. This practical book provides a comprehensive introduction to these protocols, offering you a...

Inside Rhinoceros 5
Inside Rhinoceros 5

INSIDE RHINOCEROS 5, is the ideal introduction to using the latest version of Rhino. This well-designed book bridges the gap between theoretical and software-oriented approaches to computer modeling by providing a balanced presentation of theory, concepts, and hands-on tutorials. It begins with an overview of the Rhinoceros 5 interface and...

Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux : A Guide to Open Source Security
Hack Proofing Linux: A Guide to Open Source Security is designed to help you deploy a Linux system on the Internet in a variety of security roles.This book provides practical instructions and pointers concerning the open source security tools that we use every day.

First, we show you how to obtain
...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy