Creating Tomorrow's Schools Today: Education - Our Children - Their Futures


Richard Gerver - 2010
    Education is the platform for our success or failure, but is our system still fit for purpose? Will our children be equipped to face the challenges the future holds: the rapidly changing employment patterns and the global environmental, economic and social crises ahead of us? Or will our children grow up to resent their school years and blame them for their unfulfilled potential and achievement?Creating Tomorrow's Schools Today explores these questions in the context of early schooling and primary education, presents powerful arguments for change and highlights strategies that offer a solution.

Security in Computing


Charles P. Pfleeger - 1988
    In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv

UNIX and Linux System Administration Handbook


Evi Nemeth - 2010
    This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against." -From the Foreword by Tim O'Reilly, founder of O'Reilly Media "This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems' history but doesn't bloviate. It's just straightfoward information delivered in colorful and memorable fashion." -Jason A. Nunnelley"This is a comprehensive guide to the care and feeding of UNIX and Linux systems. The authors present the facts along with seasoned advice and real-world examples. Their perspective on the variations among systems is valuable for anyone who runs a heterogeneous computing facility." -Pat Parseghian The twentieth anniversary edition of the world's best-selling UNIX system administration book has been made even better by adding coverage of the leading Linux distributions: Ubuntu, openSUSE, and RHEL. This book approaches system administration in a practical way and is an invaluable reference for both new administrators and experienced professionals. It details best practices for every facet of system administration, including storage management, network design and administration, email, web hosting, scripting, software configuration management, performance analysis, Windows interoperability, virtualization, DNS, security, management of IT service organizations, and much more. UNIX(R) and Linux(R) System Administration Handbook, Fourth Edition, reflects the current versions of these operating systems: Ubuntu(R) LinuxopenSUSE(R) LinuxRed Hat(R) Enterprise Linux(R)Oracle America(R) Solaris(TM) (formerly Sun Solaris)HP HP-UX(R)IBM AIX(R)

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

Hacking Engagement: 50 Tips & Tools To Engage Teachers and Learners Daily (Hack Learning Series Book 7)


James Alan Sturtevant - 2016
    Many students are bored and disengaged Teachers are handcuffed by outdated textbooks, standardized curriculum, and disinterested students. What if you could solve these problems immediately and excite even your most reluctant learners daily? Read it Today and Engage tomorrow! 33-year veteran teacher, author, presenter, and engagement guru James Alan Sturtevant makes it easy, with incredible teacher tips and tools for both the veteran and student teacher--50 engagement tools that you can begin using right now, with no special training or boring professional development. Easily rebrand your class and connect with all students Are you the teacher students "hate"? Do kids groan when they walk into your classroom? Engaging learners is all about connecting and making education fun. With Sturtevant's education tips and creative teaching tools, students will rebrand you and your class as their favorites. Best of all, they'll engage with every lesson you teach, every single day! 50 Tips and Tools Unlike other education books that weigh you down with archaic research and impossible-to-implement strategies, Hacking Engagement, the 7th book in the popular Hack Learning Series, provides 50 unique, exciting, and actionable tips and tools that you can apply right now. And there's something here for every teacher--no matter what grade or subject you teach. Try one of these amazing engagement strategies tomorrow: Engage the Enraged Create Celebrity Couple Nicknames Hash out a Hashtag Empower Students to Help You Uncover Your Biases Avoid the Great War on Yoga Pants Let Your Freak Flag Fly Become a Proponent of the Exponent Trade Blah, Blah, Blah for Zen Transform Your Class into a Focus Group Commit to Engagement Try at least one tip or tool now and witness an amazing transformation in your classroom and school. Are you ready to engage? Scroll up and grab your copy of Hacking Engagement now.

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Principles of Product Management: How to Land a PM Job and Launch Your Product Career


Peter Yang - 2019
    The book has three parts: Principles: Part one covers the leadership principles that PMs use to lead their team to overcome adversity. When your product fails to gain traction, when your team falls apart, or when your manager gives you tough feedback—these are all opportunities to learn principles that will help you succeed. Product development: Part two covers how PMs at Facebook, Amazon, and other top companies build products. We'll walk through the end-to-end product development process— from understanding the customer problem to identifying the right product to build to executing with your team to bring the product to market. Getting the job: Part three covers how you can land a PM job and reach the interview stage at the right company. We'll prep you for the three most common types of PM interviews— product sense, execution, and behavioral—with detailed frameworks and examples for each. Hear directly from product leaders at Airbnb, Amazon, Google, and more on: How to overcome challenging situations from a VP of Product at Amazon. How to build a great product roadmap from product leaders at LinkedIn and Airbnb. How Google, Airbnb, and other top companies evaluate PM candidates from leaders at those companies. How PMs can grow their career from a Director at Instagram and Twitter. Table of Contents1. PrinciplesTake OwnershipPrioritize and ExecuteStart with WhyFind the TruthBe Radically TransparentBe Honest with Yourself2. Product DevelopmentProduct Development LoopUnderstanding the Customer ProblemSelecting a Goal MetricMission, Vision, and StrategyBuilding a Product RoadmapDefining Product RequirementsGreat Project ManagementEffective CommunicationMaking Good Decisions3. Getting the JobPreparing for the TransitionMaking the TransitionFinding the Right CompanyAcing your PM InterviewsProduct Sense InterviewExecution InterviewBehavioral InterviewYour First 30 Days4. Product Leader Interviews

T-Minus AI: Humanity’s Countdown to Artificial Intelligence and the New Pursuit of Global Power


Michael Kanaan - 2020
    China delivered a bold message when it released a national plan to dominate all aspects of AI across the planet. Within weeks, Russia's Vladimir Putin raised the stakes by declaring AI the future for all humankind, and proclaiming that, "Whoever becomes the leader in this sphere will become the ruler of the world."The race was on. Consistent with their unique national agendas, countries throughout the world began plotting their paths and hurrying their pace. Now, not long after, the race has become a sprint.Despite everything at risk, for most of us AI remains shrouded by a cloud of mystery and misunderstanding. Hidden behind complex technical terms and confused even further by extravagant depictions in science fiction, the realities of AI and its profound implications are hard to decipher, but no less crucial to understand.In T-Minus AI: Humanity's Countdown to Artificial Intelligence and the New Pursuit of Global Power, author Michael Kanaan explains the realities of AI from a human-oriented perspective that's easy to comprehend. A recognized national expert and the U.S. Air Force's first Chairperson for Artificial Intelligence, Kanaan weaves a compelling new view on our history of innovation and technology to masterfully explain what each of us should know about modern computing, AI, and machine learning.Kanaan also illuminates the global implications of AI by highlighting the cultural and national vulnerabilities already exposed and the pressing issues now squarely on the table. AI has already become China's all-purpose tool to impose authoritarian influence around the world. Russia, playing catch up, is weaponizing AI through its military systems and now infamous, aggressive efforts to disrupt democracy by whatever disinformation means possible.America and like-minded nations are awakening to these new realities, and the paths they're electing to follow echo loudly, in most cases, the political foundations and moral imperatives upon which they were formed.As we march toward a future far different than ever imagined, T-Minus AI is fascinating and critically well-timed. It leaves the fiction behind, paints the alarming implications of AI for what they actually are, and calls for unified action to protect fundamental human rights and dignities for all.

The Dirtbag's Guide to Life: Eternal Truth for Hiker Trash, Ski Bums, and Vagabonds


Tim Mathis - 2019
    I'd love to just get this guide out there in response!” - Heather "Anish" Anderson. 2019 National Geographic Adventurer of the Year, and author of Thirst: 2600 Miles to Home“Have you read Rolf Potts' Vagabonding? It feels a bit like the American Vagabonding.” - Six2 - Pacific Crest and Appalachian Trail Alum.“Gosh I love your book! I'm trying to read it, but for some reason I can't stop crying!!! It resonates so much and I feel so emotional about it.” - Kathy Vaughan, Team UltraPedestrian and co-author of 98 Days of Wind: The Greatest Fail of Our Life“You’re going to have to change the name if you want anyone to pick up your book who doesn’t consider themselves a “dirtbag,” “trash,” or a “bum.”” - Random stranger on Facebook who is not impressed with the title.Screw picket fences. Live your best life. Sleep in the dirt. While a life of adventure has traditionally been reserved for the rich and the sponsored, to the dirtbag, it's a birthright for the masses. Partly a celebration of an underappreciated subculture of hiker trash, ski bums, and vagabonds, and partly a "how to" guide for adventure on the cheap, The Dirtbag's Guide to Life is the first solid attempt to define an outdoor movement that has taken root in backpacker hostels, long trails, and climbing crags around the world.Distilling personal wisdom and practical lessons from dozens of the world’s most dedicated dirtbags, this book is for anyone who dreams of hitchhiking trips through Patagonia and summers spent trail running in Montana, but who can’t be bothered by mainstream frivolities like expensive clothes and basic hygiene.The book answers important logistical questions about the major barriers to a life centered on adventure, and covers practical topics like financial planning and career strategies. It also digs into the big philosophical questions that long-term dirtbags all eventually wrestle with - like how to manage your most important relationships, how to live as a responsible human being, and how to find meaning when you develop a life centered on playing outside.

The Simple Six: The Easy Way to Get in Shape and Stay in Shape for the Rest of your Life


Clinton Dobbins - 2018
    Free of all the usual filler and hype, The Simple Six is a real program, for real people, offering real results. The unique programming method found only in The Simple Six is based on the idea that repeating a small amount of work consistently can lead to great changes in the way you look, the way you feel, and the way you think about fitness and exercise.  If you're looking for a simple, straightforward way to build a strong, balanced, and capable physique, then The Simple Six is for you. The Simple Six truly is the easy way to get in shape and stay in shape for the rest of your life!

A Fresh Look at Phonics, Grades K-2: Common Causes of Failure and 7 Ingredients for Success (Corwin Literacy)


Wiley Blevins - 2016
    Rather, a combination of causes can create a perfect storm of failure.” —Wiley BlevinsPicture a class of kindergarteners singing the alphabet song, and teaching phonics  seems as easy as one-two, three, A, B, C, right? In a Fresh Look at Phonics, Wiley Blevins explains why it can get tricky, and then delivers a plan so geared for success, that teachers, coaches, and administrators will come to see owning this book as a before and after moment in their professional lives. In this amazing follow up to his renowned resource Phonics From A-Z, Wiley uses the data he has collected over two decades to share which approaches truly work, which have failed, and how teachers can fine-tune their daily instruction for success. You will learn to focus on the seven critical ingredients of phonics teaching that produce the greatest student learning gains— readiness skills, scope and sequence, blending, dictation, word awareness, high frequency words, and reading connected texts. Then, for each ingredient, Wiley shares:   Activities, routines, word lists, and lessons that develop solid foundations for reading Ideas for differentiation, ELL, and advanced learners to ensure adequate progress for all learners Help on decodable texts, what not to over-do, and what you can’t do enough of for your students’ achievement Interactive “Day Clinic” activities that facilitate teacher self-reflection and school wide professional learning In a final section, Wiley details the ten common reasons instruction fails and shows teachers how to correct these missteps regarding lesson pacing, transitions, decodable texts, writing activities, assessment and more. A Fresh Look at Phonics is the evidence-based solution you have been seeking. Wiley Blevins, Ph.D., is a world-renowned expert on early reading, and author of the seminal book Phonics From A-Z among many other works. He has taught in both the United States and South America, and regularly trains teachers throughout Asia. He holds a Doctorate in Education from Harvard University, and has worked with numerous educational scholars, including Jeanne Chall, Isabel Beck, Marilyn Adams, Louisa Moats, and Dianne August, and others.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

One Hundred Dogs and Counting: One Woman, Ten Thousand Miles, and A Journey into the Heart of Shelters and Rescues


Cara Sue Achterberg - 2020
    The dogs, the people and their inspiring stories draw her south again and again in search of answers and maybe a dog of her own.One Hundred Dogs and Counting will introduce the reader to many wonderful dogs—from sweet Oreo to quirky Flannery—but also to inspirational people sacrificing personal lives and fortunes to save deserving animals.Join Cara on the rescue road as she follows her heart into the places where too many dogs are forgotten and discovers glimmers of hope that the day is coming when every dog will have a home.

Worm: The First Digital World War


Mark Bowden - 2011
    Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.