OS X 10.10 Yosemite: The Ars Technica Review


John Siracusa - 2014
    Siracusa's overview, wrap-up, and critique of everything new in OS X 10.10 Yosemite.

Walk With The Wind: The Endless Circle


Tom Savage - 2015
    Experience the incredible exploits of this young elk as he grows to become a great leader of his kind. His life is one of challenge and near tragedy as he struggles to survive the often violent life that is nature. Under the guidance of great bulls and mysterious spirit guides, this brave young bull grows to understand the never-ending circle of life and the oneness that he and all living things share. Enter the brutally honest world that is nature, and walk the journey of this courageous young bull as by his grandeur he brings all four-legged ones to a great oneness with their most feared enemy, man. You will laugh and cry as this young elk grows to become that which you an I hope someday to be.

Machine Learning: Fundamental Algorithms for Supervised and Unsupervised Learning With Real-World Applications


Joshua Chapmann - 2017
    Right?! Machine Learning is a branch of computer science that wants to stop programming computers using a detailed list of commands to follow blindly. Instead, their aim is to implement high-level routines that teach computers how to approach new and unknown problems – these are called algorithms. In practice, they want to give computers the ability to Learn and to Adapt. We can use these algorithms to obtain insights, recognize patterns and make predictions from data, images, sounds or videos we have never seen before – or even knew existed. Unfortunately, the true power and applications of today’s Machine Learning Algorithms remain deeply misunderstood by most people. Through this book I want fix this confusion, I want to shed light on the most relevant Machine Learning Algorithms used in the industry. I will show you exactly how each algorithm works, why it works and when you should use it. Supervised Learning Algorithms K-Nearest Neighbour Naïve Bayes Regressions Unsupervised Learning Algorithms: Support Vector Machines Neural Networks Decision Trees

The Ayrton Family: Amberwell / Summerhills


D.E. Stevenson - 2019
     Sweet and melancholy, the Ayrton family novels paint a vivid picture of one family torn apart by wider events in their world. See why D. E. Stevenson has amassed her own cult following with this moving collection.

Triassic


Julian Michael Carver - 2020
    They are unsure of what happened in space or how they crashed into an uncharted planet. Upon exploration of the new world, they soon realize their destination: The Triassic, the first chapter of the Mesozoic Era. A plan is formulated to escape this terrifying landscape plagued with dinosaurs and prehistoric beasts. The survivors soon discover that there may be an even larger threat looming under the trees than just the dinosaurs, threatening to cut their mission short and trap them all forever in the primitive depths of the Triassic.

Re:cyclists: 200 Years on Two Wheels


Michael Hutchinson - 2017
    The calls to ban it were more or less instant.Re:cyclists is the tale of what happened next, of how we have spent two centuries wheeling our way about town and country on bikes--or on two-wheeled things that vaguely resembled what we now call bikes. Michael Hutchinson picks his way through those 200 years, discovering how cycling became a kinky vaudeville act for Parisians, how it became an American business empire, and how it went on to find a unique home in the British Isles. He considers the penny-farthing riders exploring the abandoned and lonely coaching roads during the railway era, and the Victorian high-society cyclists of the 1890s bicycle craze--a time when no aristocratic house party was without bicycles and when the Prince of Wales used to give himself an illicit thrill on a weekday afternoon by watching the women's riding-school in the Royal Albert Hall.Re:cyclists looks at how cycling became the sport, the pastime and the social life of millions of ordinary people, how it grew and how it suffered through the 1960s and '70s, and how at the dawn of the twenty-first century it rose again, much changed but still ultimately just someone careering along on two wheels.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Jumping into C++


Alex Allain - 2013
    As a professional C++ developer and former Harvard teaching fellow, I know what you need to know to be a great C++ programmer, and I know how to teach it, one step at a time. I know where people struggle, and why, and how to make it clear. I cover every step of the programming process, including:Getting the tools you need to program and how to use them*Basic language feature like variables, loops and functions*How to go from an idea to code*A clear, understandable explanation of pointers*Strings, file IO, arrays, references*Classes and advanced class design*C++-specific programming patterns*Object oriented programming*Data structures and the standard template library (STL)Key concepts are reinforced with quizzes and over 75 practice problems.

The Book of PoC||GTFO


Manul Laphroaig - 2017
    Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks


Michal Zalewski - 2005
    Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Night Shift: Short Stories from the Life of an ER Doc


Mark Plaster - 2014
    Mark Plaster takes readers beyond the ambulance bay doors into the stranger-than-fiction world of the Emergency Department. By turns heart-warming and gut-wrenching, "Night Shift" chronicles the ebb and flow of human life, in all of its unvarnished glory, as it passes through the doors of the ED.

Amazon Alexa: Ultimate User Guide 2017 for Amazon Echo, Echo Dot & Amazon Tap +500 Secret Easter Eggs included.


Quentin Delaoutre - 2016
    Thanks to it, you will be able to UNLEASH the full power of your Amazon Echo, Echo Dot and Amazon Tap. AND you will find my email address at the end of the book, so feel free to ask me any questions you might have about Alexa. What is Amazon Echo Dot and Alexa Let me help you figure out what this this exciting technology is all about, so you can enjoy it too! Amazon Echo is a speaker connected to the internet that you can control with your voice. Alexa is the built-in vocal assistant of Amazon Echo. Alexa lets you play music, control your lights, ask for the weather and more. What you will learn: Step-by-step instructions on how to set up your device Get to know about all the things that Amazon Echo can do Get customized News, Traffic and Weather updates Connect your Google Calendar to your device Everything you need to know about Alexa in a single HIGH-QUALITY book Stream music from your favorite audio sources: iPhone, Android, Spotify, Amazon Music, Pandora, iHeartRadio, TuneIn Get ACTIONABLE ADVICE on how to build your smart home Control your lights, TV and room temperature with your voice Explore the complete list of Alexa-enabled devices organized per category Have fun by playing with 500 Easter Eggs Learn How IFTTT and Yonomi help you to better control your home Get to know the 20 most useful Alexa Skills Learn how Amazon Echo was created Written By An Alexa Lover For (future) Alexa Lovers How to troubleshoot your Echo Learn how Alexa works behind the scenes Explore the future of Alexa And much, much more! This is the only Amazon Echo book you will ever need Get your copy today! This book will save you hours figuring out how Echo works. I am sharing all my hacks so you can go from Beginner to Expert in an hour. I wish that upon reading this book, you will realise this exciting times that we live in. That you will see all the possibilities that the Amazon Echo has to offer. The time for innovation is now, and it is up to you to enjoy it now. Through the book, you will come to see Echo for what it is and what it can be. I am exploring in depth numerous topics such as Playing Music, Building your Smart Home, Using Alexa Skills and more. This book will help save you many hours trying to figure out what the Echo can do. Bonus Sign up to my free weekly newsletter to get the best new Alexa Skills in your inbox. Table of Contents 1. Preface 2. The Genesis of Amazon Echo 3. How Does Alexa Work? 4.

The Game Maker's Apprentice: Game Development for Beginners


Jacob Habgood - 2006
    This book covers a range of genres, including action, adventure, and puzzle games complete with professional quality sound effects and visuals. It discusses game design theory and features practical examples of how this can be applied to making games that are more fun to play. Game Maker allows games to be created using a simple drag-and-drop interface, so you don't need to have any prior coding experience. It includes an optional programming language for adding advanced features to your games, when you feel ready to do so. You can obtain more information by visiting book.gamemaker.nl. The authors include the creator of the Game Maker tool and a former professional game programmer, so you'll glean understanding from their expertise. The book also includes a DVD containing Game Maker software and all of the game projects that are created in the book—plus a host of professional-quality graphics and sound effects that you can use in your own games.

Deathworld and Deathworld 2


Harry Harrison - 2009
    For outsiders, Pyrrus usually means a quick and painful death, but DinAlt is fleeing the crooked casino masters of Cassylia - where he just broke the bank. But DinAlt is not prepared for the hellish Pyrrus, where every living thing seems bent on exterminating mankind.In DEATHWORLD 2 (originally published as THE ETHICAL ENGINEER), Jason DinAlt finds himself on a hostile, barbarian planet where technology and civilization have almost disappeared. Using his skills, DinAlt literally reinvents the wheel in his quest to escape and return to his friends on Pyrrus.