Programming with Java: A Primer
E. Balagurusamy - 2006
The language concepts are aptly explained in simple and easy-to-understand style, supported with examples, illustrations and programming and debugging exercises.
Nmap Cookbook: The Fat-free Guide to Network Scanning
Nicholas Marsh - 2010
Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.
LDAP System Administration
Gerald Carter - 2003
That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
SEAL of Protection, Collection 2
Susan Stoker - 2016
He's spent the past nineteen years looking for the serial killer who took his sister from him and ruined his family. Using his connections, and SEAL training, Mozart believes he's finally tracked the killer to the town of Big Bear, California. Summer Pack is working in a crappy motel up at Big Bear Lake until she can find something better, more meaningful, more real. But somewhere in Big Bear, a killer is waiting to strike again. Watching for the perfect victim Protecting Cheyenne- Cheyenne was used to seeing hot military men as she went about her daily business. An anonymous encounter at the grocery store cemented her crush on one such man. Always in control of any situation, Faulkner "Dude" Cooper knows explosives. Disfigured by a bomb while on a mission, he's used to being looked at with pity. When he's called to a local supermarket to assist the local PD, the last thing he expects to find is a generous act of kindness performed by a beautiful, amazing woman. Dude was able to save Cheyenne from the group of thugs trying to take her life, but when the past comes back to haunt them both, sometimes having the knowledge and the desire isn't enough to beat the countdown of the clock. Protecting Jessyka- Kason "Benny" Sawyer was the last single man on his Navy SEAL team, but seeing the love between his friends and their women made it tough to be the odd man out all the time. Jessyka Allen had a good life, until it wasn't anymore. Finding herself in an impossible situation, with no noticeable way out, her job was an escape. Being a SEAL, Benny thought he knew the true meaning of teamwork and friendship. But Jess would show him that everything he thought he knew about sacrifice, trust, and love, paled in comparison to what she brought into his world. Protecting Julie Julie Lytle is working hard to turn her life around. Being kidnapped by sex traffickers changed her drastically, but having grown up the spoiled daughter of a senator, Julie wishes she could've changed just a little sooner. Shamed by her behavior toward the woman rescued alongside her, and further embarrassed and guilt-racked over the way she treated the SEALs who risked their lives on her behalf, Julie is desperate to make amends.
With help from a D.C. acquaintance who'd endured her own harrowing experience, Julie connects with Patrick Hurt, Commander of the SEALs who'd saved her life. If she can prove she's not the same person who mistreated his team, he'll grant her request to meet them-but not before the protective, sexy man makes a surprising request of his own.
Surveillance Valley: The Rise of the Military-Digital Complex
Yasha Levine - 2018
This idea--using computers to spy on people and groups perceived as a threat, both at home and abroad--drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology.But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden.With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news--and the device on which you read it.
Code: Version 2.0
Lawrence Lessig - 1999
Harvard Professor Lawrence Lessig warns that, if we're not careful we'll wake up one day to discover that the character of cyberspace has changed from under us. Cyberspace will no longer be a world of relative freedom; instead it will be a world of perfect control where our identities, actions, and desires are monitored, tracked, and analyzed for the latest market research report. Commercial forces will dictate the change, and architecture—the very structure of cyberspace itself—will dictate the form our interactions can and cannot take. Code And Other Laws of Cyberspace is an exciting examination of how the core values of cyberspace as we know it—intellectual property, free speech, and privacy-—are being threatened and what we can do to protect them. Lessig shows how code—the architecture and law of cyberspace—can make a domain, site, or network free or restrictive; how technological architectures influence people's behavior and the values they adopt; and how changes in code can have damaging consequences for individual freedoms. Code is not just for lawyers and policymakers; it is a must-read for everyone concerned with survival of democratic values in the Information Age.
Graph Theory With Applications To Engineering And Computer Science
Narsingh Deo - 2004
GRAPH THEORY WITH APPLICATIONS TO ENGINEERING AND COMPUTER SCIENCE-PHI-DEO, NARSINGH-1979-EDN-1
Introduction to Artificial Intelligence and Expert Systems
Dan W. Patterson - 1990
Python: The Complete Reference
Martin C. Brown - 2001
This text is split into distinct sections, each concentrating on a core angle of the language. The book also contains sections for Web and application development, the two most popular uses for Python. It is designed to teach a programmer how to use Python by explaining the mechanics of Python. The appendixes offer a quick guide to the main features of the Python language, as well as additional guides to non-essential systems such as the IDLE development environment and general guidelines for migrating from another language.
Kissing the Protector : An Accidental Romance
Jillian Riley - 2019
Carlos: I certainly didn’t want to waste my time babysitting a wannabe actress. Especially, when in order to do my job well I would need to run everything by her stuck-up, pain in the ass cousin. But there was something about her cousin that struck a nerve with me. She seemed so smart and extremely sexy. What was the price I was going to pay for taking on the role of Falls Ranch Protector… Sam I hated working for my cousin. I loved her sure, but I had an education, more than one degree, and at almost thirty I should be using them for something more. But when family needs you, your wants and dreams take the back burner. I didn’t mean to want my sexy protector, but every time he came near me something inside me flared. He was too much. Too handsome, too intelligent, too strong, and too stubborn. I would go to Falls Ranch. I would play the part Chandra needed me to play, but when this job was over, that’s when I would leave it all behind. Start my real career, and my real life. The only problem? Would I be able to walk away with my heart intact?
Adobe Photoshop Lightroom 4 Book: The Complete Guide for Photographers
Martin Evening - 2012
This completely updated bestseller was also written with photographers in mind. Author Martin Evening describes features in Lightroom 4 in detail from a photographer’s perspective. As an established commercial and fashion photographer, Martin knows firsthand what photographers need for an efficient workflow. He has also been working with Lightroom from the beginning, monitoring the product’s development and providing valued feedback to Adobe. As a result, Martin knows the software inside and out, from image selection to image editing to image management. In this book you’ll learn how to:• Work efficiently with images shot in the raw or JPEG format • Import photographs with ease and sort them according to your workflow• Create and manage a personal image library• Apply tonal adjustments to multiple images quickly• Integrate Lightroom with Adobe Photoshop• Export images for print or Web as digital contact sheets or personal portfolios• Make the most of new features in Lightroom 4, such as the Camera Raw Process 2012 Basic panel tone controlsPhotographers will find Lightroom 4–and The Adobe Photoshop Lightroom 4 Book–indispensable tools in their digital darkrooms.This book’s companion site, www.thelightroombook.com, offers video tutorials, articles, sample images, and updates from author Martin Evening.“With Martin’s expert guidance, you’ll soon find that you have precisely the tools you need to turn your concentration back where it belongs–on making better pictures!”–George Jardine, digital photography consultant “As a photographer himself, Martin Evening knows what tools photographers need to realize their creative vision. In this book, he shows not only how Adobe Photoshop Lightroom works but also why it will become an essential part of any photographer’s workflow.”–Greg Gorman, photographer
Laravel: Code Bright
Dayle Rees - 2013
At $29 and cheaper than a good pizza, you will get the book in its current partial form, along with all future chapters, updates, and fixes for free. As of the day I wrote this description, Code Bright had 130 pages and was just getting started. To give you some perspective on how detailed it is, Code Happy was 127 pages in its complete state. Want to know more? Carry on reading.Welcome back to Laravel. Last year I wrote a book about the Laravel PHP framework. It started as a collection of tutorials on my blog, and eventually became a full book. I definitely didn’t expect it to be as popular as it was. Code Happy has sold almost 3000 copies, and is considered to be one of the most valuable resourcesfor learning the Laravel framework.Code Bright is the spiritual successor to Code Happy. The framework has grown a lot in the past year, and has changed enough to merit a new title. With Code Bright I hope to improve on Code Happy with every way, my goal is, to once again, build the most comprehensive learning experience for the framework. Oh, and to still be funny. That’s very important to me.Laravel Code Bright will contain a complete learning experience for all of the framework’s features. The style of writing will make it approachable for beginners, and a wonderful reference resource for experienced developers alike.You see, people have told me that they enjoyed reading Code Happy, not only for its educational content, but for its humour, and for my down to earth writing style. This is very important to me. I like to write my books as if we were having a conversation in a bar.When I wrote Code Happy last year, I was simply a framework enthusiast. One of the first to share information about the framework. However, since then I have become a committed member of the core development team. Working directly with the framework author to make Laravel a wonderful experience for the developers of the world.One other important feature of both books, is that they are published while in progress. This means that the book is available in an incomplete state, but will grow over time into a complete title. All future updates will be provided for free.What this means is that I don’t have to worry about deadlines, or a fixed point of completion. It leads to less stress and better writing. If I think of a better way to explain something, I can go back and change it. In a sense, the book will never be completed. I can constantly add more information to it, until it becomes the perfect resource.Given that this time I am using the majority of my spare time to write the title (yes, I have a full time job too!), I have raised the price a little to justify my invested time. I was told by many of my past readers that they found the previous title very cheap for the resource that it grew into, so if you are worried about the new price, then let me remind you what you will get for your 29 bucks.The successor to Code Happy, seen by many as the #1 learning resource for the Laravel PHP framework.An unending source of information, chapters will be constantly added as needed until the book becomes a giant vault of framework knowledge.Comedy, and a little cheesy, but very friendly writing.
Obfuscation: A User's Guide for Privacy and Protest
Finn Brunton - 2015
They are calling us not to the barricades but to our computers, offering us ways to fight today’s pervasive digital surveillance—the collection of our data by governments, corporations, advertisers, and hackers. To the toolkit of privacy protecting techniques and projects, they propose adding obfuscation: the deliberate use of ambiguous, confusing, or misleading information to interfere with surveillance and data collection projects. Brunton and Nissenbaum provide tools and a rationale for evasion, noncompliance, refusal, even sabotage—especially for average users, those of us not in a position to opt out or exert control over data about ourselves. Obfuscation will teach users to push back, software developers to keep their user data safe, and policy makers to gather data without misusing it.Brunton and Nissenbaum present a guide to the forms and formats that obfuscation has taken and explain how to craft its implementation to suit the goal and the adversary. They describe a series of historical and contemporary examples, including radar chaff deployed by World War II pilots, Twitter bots that hobbled the social media strategy of popular protest movements, and software that can camouflage users’ search queries and stymie online advertising. They go on to consider obfuscation in more general terms, discussing why obfuscation is necessary, whether it is justified, how it works, and how it can be integrated with other privacy practices and technologies.
NSHipster: Obscure Topics in Cocoa & Objective C
Mattt Thompson - 2013
In cultivating a deep understanding and appreciation of Objective-C, its frameworks and ecosystem, one is able to create apps that delight and inspire users. Combining articles from NSHipster.com with new essays, this book is the essential guide for modern iOS and Mac OS X developers.