Top 0 g harms auth PDF Book Page 11