The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.
Lessons Learned in Software Testing: A Context-Driven Approach
Cem Kaner - 2001
Along the way, there is an abundance of traps that one can fall into, which can derail the best-laid plans and put your projects behind schedule.Cem Kaner, James Bach, and Bret Pettichord know this all too well. Between them, they have over fifty years of testing experience, and know what it takes for successful testing. In this groundbreaking new book, they have compiled 293 pieces of experience-tested advice for you to put to work in your testing projects. They reveal insights on how to do the job well, how to manage it, and how to steer clear of common misunderstandings in software testing. Each lesson is an assertion related to software testing, followed by an explanation or example that shows you the how, when, and why of the testing lesson.The ultimate resource for software testers, developers, and managers at every level of expertise, this guidebook also features:- Useful practices and helpful ways of evaluating situations gleaned from over fifty years of combined testing experience from the world's leading software testing experts- Lessons for all key topic areas including test design, test automation, test management, testing strategies, and bug reporting- Advice on how to match the selection of practices to the circumstances of your project
Mac OS X Internals: A Systems Approach
Amit Singh - 2006
Understanding the design, implementation, and workings of Mac OS X requires examination of several technologies that differ in their age, origins, philosophies, and roles. Mac OS X Internals: A Systems Approach is the first book that dissects the internals of the system, presenting a detailed picture that grows incrementally as you read. For example, you will learn the roles of the firmware, the bootloader, the Mach and BSD kernel components (including the process, virtual memory, IPC, and file system layers), the object-oriented I/O Kit driver framework, user libraries, and other core pieces of software. You will learn how these pieces connect and work internally, where they originated, and how they evolved. The book also covers several key areas of the Intel-based Macintosh computers.A solid understanding of system internals is immensely useful in design, development, and debugging for programmers of various skill levels. System programmers can use the book as a reference and to construct a better picture of how the core system works. Application programmers can gain a deeper understanding of how their applications interact with the system. System administrators and power users can use the book to harness the power of the rich environment offered by Mac OS X. Finally, members of the Windows, Linux, BSD, and other Unix communities will find the book valuable in comparing and contrasting Mac OS X with their respective systems. Mac OS X Internals focuses on the technical aspects of OS X and is so full of extremely useful information and programming examples that it will definitely become a mandatory tool for every Mac OS X programmer.
Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications
Ivan Ristic - 2014
Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.
Linkers and Loaders
John R. Levine - 1999
But do you know how to use them to their greatest possible advantage? Only now, with the publication of Linkers & Loaders, is there an authoritative book devoted entirely to these deep-seated compile-time and run-time processes. The book begins with a detailed and comparative account of linking and loading that illustrates the differences among various compilers and operating systems. On top of this foundation, the author presents clear practical advice to help you create faster, cleaner code. You'll learn to avoid the pitfalls associated with Windows DLLs, take advantage of the space-saving, performance-improving techniques supported by many modern linkers, make the best use of the UNIX ELF library scheme, and much more. If you're serious about programming, you'll devour this unique guide to one of the field's least understood topics. Linkers & Loaders is also an ideal supplementary text for compiler and operating systems courses.
Probability Theory: The Logic of Science
E.T. Jaynes - 1999
It discusses new results, along with applications of probability theory to a variety of problems. The book contains many exercises and is suitable for use as a textbook on graduate-level courses involving data analysis. Aimed at readers already familiar with applied mathematics at an advanced undergraduate level or higher, it is of interest to scientists concerned with inference from incomplete information.
How to Measure Anything in Cybersecurity Risk
Douglas W. Hubbard - 2016
In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely.Discover the shortcomings of cybersecurity's best practices Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing--as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.
The Essential Writings of B. R. Ambedkar
B.R. Ambedkar - 1915
An untouchable himself, he led a resolute and adroit struggle against untouchability andattempted to reformulate the terms of nationalist discourse in India. This selection draws from his major works, speeches, letters and memoranda.These writings span across forty years (1915-1956) and are organised into eleven sections: reminiscences, concepts, methodology, ideology, religion, caste, untouchability, identity, economics, nationalism, constitutionalism and law. The introduction by the editor Valerian Rodrigues provides aglimpse of his momentous life,the framework and content of his writings, and the reasons for his growing stature in India over the years. Every section and excerpts included within it are introduced and endnotes support citations and incomplete references in the excerpts. Suggestions for furtherreadings are offered through a classification of all his writings and speeches and writings on him and his work. The chronology of events anchors the context of the writings.The work is the first of its kind on Ambedkar and is a representative collection of the whole range of issues that engaged his attention. as the most comprehensive compilation on him and his works, this volume is going to be an indispensable reference for concerned students, scholars and activists.
A Hesitant Bride To Soothe His Shattered Heart
Ember Pierce - 2020
But, nothing good lasts forever...With the sudden increase of outlaws and new settlers during the last few years, her lovely town has become now a shadow of the place her childhood memories.Jenny would do anything to protect her family and their ranch. She never thought that she would answer to a mail-order bride ad. But, when her father is trying to force her marrying a despicable businessman just to pay his debts, she decides to take her chances and run away.Jim survived the horrors of the Civil War, only to find that his fiancée has left him for another man. Deeply heartbroken and betrayed, he promised himself he would never open himself up to the possibility of finding love again.For the past six years, he has been working day and night to make his ranch a success. After finding out that his fiancée is dead, he decides it's time to move on.Will Jenny be able to break through Jim's defenses and help him find love again? She needs all of his courage and help in order to protect herself and her family from the upcoming dangerous of the corrupted town.If you like fast-paced clean romance and action-packed stories, you won't be able to put down this addictive Novel by Ember Pierce."A Hesitant Bride To Soothe His Shattered Heart" is a stand-alone Western Historical Romance Novel of approximately 500 pages.
The Art and Craft of Problem Solving
Paul Zeitz - 1999
Readers are encouraged to do math rather than just study it. The author draws upon his experience as a coach for the International Mathematics Olympiad to give students an enhanced sense of mathematics and the ability to investigate and solve problems.
The Software Architect Elevator: Transforming Enterprises with Technology and Business Architecture
Gregor Hohpe - 2020
In addition to making technical decisions, architects can help change the organization's structure and processes to support this transition. To do that, architects need to take the express elevator from the engine room to the penthouse, where business strategy resides.Brimming with anecdotes from actual IT transformations, this book prepares software architects, senior developers, and other IT professionals for a more complex but rewarding role in the enterprise.This book is ideal for:Architects and senior developers looking to shape the company's technology direction or assist in an organizational transformationEnterprise architects and senior technologists looking for practical advice on how to navigate technical and organizational topicsCTOs and senior technical architects who want to learn what's worked and what hasn't in large-scale architecture and transformationIT managers seeking to understand how architecture can support their technical transformation agenda
Programming Clojure
Stuart Halloway - 2009
Clojure's clean, careful design lets you write programs that get right to the essence of a problem, without a lot of clutter and ceremony. Clojure is Lisp reloaded. Clojure has the power inherent in Lisp, but is not constrained by the history of Lisp. Clojure is a functional language. Data structures are immutable, and functions tend to be side-effect free. This makes it easier to write correct programs, and to compose large programs from smaller ones. Clojure is concurrent. Rather than error-prone locking, Clojure provides software transactional memory. Clojure embraces Java. Calling from Clojure to Java is direct, and goes through no translation layer. Clojure is fast. Wherever you need it, you can get the exact same performance that you could get from hand-written Java code. Many other languages offer some of these features, but the combination of them all makes Clojure sparkle. Programming Clojure shows you why these features are so important, and how you can use Clojure to build powerful programs quickly.
Java SE 6: The Complete Reference
Herbert Schildt - 2006
He includes information on Java Platform Standard Edition 6 (Java SE 6) and offers complete coverage of the Java language, its syntax, keywords, and fundamental programming principles.
Rhythms of the Brain
György Buzsáki - 2006
This book provides eloquent support for the idea that spontaneous neuron activity, far from being mere noise, is actually the source of our cognitive abilities. It takes a fresh look at the co-evolution of structure and function in the mammalian brain, illustrating how self-emerged oscillatory timing is the brains fundamental organizer of neuronal information. The small world-like connectivity of the cerebral cortex allows for global computation on multiple spatial and temporal scales. The perpetual interactions among the multiple network oscillators keep cortical systems in a highly sensitive metastable state and provide energy-efficient synchronizing mechanisms via weak links.In a sequence of cycles, Gy�rgy Buzs�ki guides the reader from the physics of oscillations through neuronal assembly organization to complex cognitive processing and memory storage. His clear, fluid writing accessible to any reader with some scientific knowledge is supplemented by extensive footnotes and references that make it just as gratifying and instructive a read for the specialist. The coherent view of a single author who has been at the forefront of research in this exciting field, this volume is essential reading for anyone interested in our rapidly evolving understanding of the brain.