Book picks similar to
Threat Level Red: Cybersecurity Research Programs of the U.S. Government by Michael Erbschloe
ebooks-from-bundles
it-books
software
taylor-and-francis
Simple Acts to Save Our Planet: 500 Ways to Make a Difference
Michelle Neff - 2018
You’ll learn simple techniques to help protect the planet every day, like starting a compost pile to reduce food waste, utilizing travel mugs and reusable containers, and choosing eco-friendly products. By working to implement these simple strategies into your everyday life, you can take an active stand to protect the environment now— and make a real difference for the future.
Faucian Booster: Covid Vaccine Mandates Violate the Nuremberg Code and Therefore Should Be Opposed and Resisted by Any Peaceable Means Necessary
Steve Deace - 2021
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Forensics: The Science Behind the Deaths of Famous People
Harry A. Milman - 2020
A more plausible explanation would have been that she died from a drug overdose. A review of the medical examiner's report revealed that the Fisher family refused to give permission for an autopsy and toxicology tests to be done. Constrained by these limitations, the coroner labeled the manner of death "undetermined".FORENSICS: The Science behind the Deaths of Famous People is an analysis and description of how coroners determine the cause and manner of death. An investigation of twenty-three deaths of famous people was conducted based on a review of publicly available autopsy and toxicology reports, as well as published scientific and lay articles. Drug use was implicated in 70 percent of the deaths. Four celebrity deaths were the result of suicide or homicide. Four others were from natural causes.
OCP: Oracle Certified Professional Java Se 8 Programmer II Study Guide: Exam 1Z0-809
Jeanne Boyarsky - 2015
With full coverage of 100% of exam objectives, this invaluable guide reinforces what you know, teaches you what you don't know, and gives you the hands-on practice you need to boost your skills. Written by expert Java developers, this book goes beyond mere exam prep with the insight, explanations and perspectives that come from years of experience. You'll review the basics of object-oriented programming, understand functional programming, apply your knowledge to database work, and much more. From the basic to the advanced, this guide walks you through everything you need to know to confidently take the OCP 1Z0-809 Exam and upgrade exams 1Z0-810 and 1Z0-813.Java 8 represents the biggest changes to the language to date, and the latest exam now requires that you demonstrate functional programming competence in order to pass. This guide has you covered, with clear explanations and expert advice.Understand abstract classes, interfaces, and class design Learn object-oriented design principles and patterns Delve into functional programming, advanced strings, and localization Master IO, NIO, and JDBC with expert-led database practice If you're ready to take the next step in your IT career, OCP: Oracle Certified Professional Java SE 8 Programmer II Study Guide is your ideal companion on the road to certification.
Anatomy & Physiology
Boundless - 2013
Boundless works with subject matter experts to select the best open educational resources available on the web, review the content for quality, and create introductory, college-level textbooks designed to meet the study needs of university students.<br><br>This textbook covers:<br><br><b>Human Anatomy and Physiology Introduction</b> -- Anatomy and Physiology Overview, Life, Homeostasis, Anatomical Terms, Clinical Cases<br><br><b>General Chemistry</b> -- Matter and Energy, Element Properties: Atomic structure, Chemical Bonds, Chemical Reactions, Inorganic Compounds, Organic Compounds<br><br><b>Cellular Structure and Function</b> -- the study of cells, Cell membranes and the fluid mosaic model, Transport across membranes, How reception works in cell signaling, Nucleus and Ribosomes, Organelles, The Cytoskeleton, External cellular components, Cell division: process and importance, The cell cycle, Transcription and translation, RNA processing, Translation to a polypeptide, Transcription, Apoptosis signals an orderly cell death<br><br><b>Tissues</b> -- Epithelial Tissue, Cell Junctions, Clinical Cases, Tissue Repair, Tissue Development, Cancer, Connective Tissue, Membranes, Nervous Tissue<br><br><b>The Integumentary System</b> -- The Skin, Accessory Structures of the Skin, Functions of the Integumentary System, Wound Healing, Integumentary System Development, Skin Disorders, Imbalances, Diseases, and Clinical Cases<br><br><b>Skeletal Tissue</b> -- Cartilage, Bone Classification, Bone Formation, Bone and Calcium, Bone Development, Bone Diseases, Disorders, Imbalances, and Clinical Cases<br><br><b>The Skeletal System</b> -- Overview of the Musculoskeletal system, Divisions of the Skeletal System, The Axial Skeleton, Skull, Hyoid Bone, Vertebral Column, Thorax, Clinical Cases of the Axial Skeleton, The Appendicular Skeleton, The Pectoral (Shoulder) Girdle, Upper Limb, The Pelvic (Hip) Girdle, Lower Limb, Skeletal System Development, Clinical Cases of the Appendicular Skeleton<br><br><b>Joints</b> -- Classification of Joints, Synovial Joints, Joint Development, Clinical Cases<br><br><b>Muscle Tissue</b> -- Overview of Muscle Tissue, Skeletal Muscle, Control of Muscle Tension, Muscle Metabolism, Exercise and Skeletal Muscle Tissue, Smooth Muscle, Clinical Cases: Muscle Disorders, Development of Muscle<br><br><b>The Muscular System</b> -- Overview of the Muscular System, Head And Neck Muscles, Trunk Muscles, Muscles of the Upper Limb, Muscles of the Lower Limb, Clinical Cases and Muscular System Disorders<br><br><b>Nervous Tissue</b> -- Overview of the Nervous System, Neuroglia, Neurons, Collections of Nervous Tissue, Neurophysiology<br><br><b>Central Nervous System (CNS)</b> -- The Brain, Consciousness, Sleep, Language, and Memory, Protection of the Brain, Parts of The Brain Stem, The Cerebellum, The Diencephalon, Cerebral Cortex (or Cerebral Hemispheres), Functional Systems of the Cerebral Cortex, Development of the CNS, Brain Disorders and Clinical Cases, The Spinal Cord, Spinal Cord Anatomy, Disorders and Clinical Cases of the Spinal Cord<br><br><b>Peripheral Nervous System (PNS)</b> -- Sensation, Sensory Receptors, Somatosensory System, Nerves, Cranial Nerves, Spinal Nerves, Distribution of Spinal Nerves, Motor Activity, Motor Pathways, Reflexes, Pain, Development of the Nervous System, Disorders of Spinal Nerves and Clinical Cases<br><br><b>Autonomic Nervous System (ANS)</b> -- Autonomic Nervous System, ANS Anatomy, Physiology of ANS,
Prometheus: Up & Running: Infrastructure and Application Performance Monitoring
Brian Brazil - 2018
This practical guide provides application developers, sysadmins, and DevOps practitioners with a hands-on introduction to the most important aspects of Prometheus, including dashboarding and alerting, direct code instrumentation, and metric collection from third-party systems with exporters.This open source system has gained popularity over the past few years for good reason. With its simple yet powerful data model and query language, Prometheus does one thing, and it does it well. Author and Prometheus developer Brian Brazil guides you through Prometheus setup, the Node exporter, and the Alertmanager, then demonstrates how to use them for application and infrastructure monitoring.Know where and how much to apply instrumentation to your application codeIdentify metrics with labels using unique key-value pairsGet an introduction to Grafana, a popular tool for building dashboardsLearn how to use the Node Exporter to monitor your infrastructureUse service discovery to provide different views of your machines and servicesUse Prometheus with Kubernetes and examine exporters you can use with containersConvert data from other monitoring systems into the Prometheus format
Microsoft Azure Essentials - Fundamentals of Azure
Michael S. Collier - 2015
The first ebook in the series, Microsoft Azure Essentials: Fundamentals of Azure, introduces developers and IT professionals to the wide range of capabilities in Azure. The authors - both Microsoft MVPs in Azure - present both conceptual and how-to content for key areas, including: Azure Websites and Azure Cloud Services Azure Virtual Machines Azure Storage Azure Virtual Networks Databases Azure Active Directory Management tools Business scenarios Watch Microsoft Press’s blog and Twitter (@MicrosoftPress) to learn about other free ebooks in the “Microsoft Azure Essentials” series.
Ubuntu: The Beginner's Guide
Jonathan Moeller - 2011
In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.
Java Generics and Collections: Speed Up the Java Development Process
Maurice Naftalin - 2006
Generics and the greatly expanded collection libraries have tremendously increased the power of Java 5 and Java 6. But they have also confused many developers who haven't known how to take advantage of these new features.Java Generics and Collections covers everything from the most basic uses of generics to the strangest corner cases. It teaches you everything you need to know about the collections libraries, so you'll always know which collection is appropriate for any given task, and how to use it.Topics covered include:• Fundamentals of generics: type parameters and generic methods• Other new features: boxing and unboxing, foreach loops, varargs• Subtyping and wildcards• Evolution not revolution: generic libraries with legacy clients and generic clients with legacy libraries• Generics and reflection• Design patterns for generics• Sets, Queues, Lists, Maps, and their implementations• Concurrent programming and thread safety with collections• Performance implications of different collectionsGenerics and the new collection libraries they inspired take Java to a new level. If you want to take your software development practice to a new level, this book is essential reading.Philip Wadler is Professor of Theoretical Computer Science at the University of Edinburgh, where his research focuses on the design of programming languages. He is a co-designer of GJ, work that became the basis for generics in Sun's Java 5.0.Maurice Naftalin is Technical Director at Morningside Light Ltd., a software consultancy in the United Kingdom. He has most recently served as an architect and mentor at NSB Retail Systems plc, and as the leader of the client development team of a major UK government social service system."A brilliant exposition of generics. By far the best book on the topic, it provides a crystal clear tutorial that starts with the basics and ends leaving the reader with a deep understanding of both the use and design of generics." Gilad Bracha, Java Generics Lead, Sun Microsystems
Programming Entity Framework: Code First
Julia Lerman - 2011
With this concise book, you’ll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration.Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you’re working with an existing database or building one from scratch. If you work with Visual Studio and understand database management basics, this book is for you.Learn exactly what Code First does—and does not—enable you to doUnderstand how property attributes, relationships, and database mappings are inferred from your classes by Code FirstUse Data Annotations and the Fluent API to configure the Code First data modelPerform advanced techniques, such as controlling the database schema and overriding the default model cachingThis book is a continuation of author Julia Lerman’s Programming Entity Framework, widely recognized as the leading book on the topic.
A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security
Tobias Klein - 2011
In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.
Data Science at the Command Line: Facing the Future with Time-Tested Tools
Jeroen Janssens - 2014
You'll learn how to combine small, yet powerful, command-line tools to quickly obtain, scrub, explore, and model your data.To get you started--whether you're on Windows, OS X, or Linux--author Jeroen Janssens introduces the Data Science Toolbox, an easy-to-install virtual environment packed with over 80 command-line tools.Discover why the command line is an agile, scalable, and extensible technology. Even if you're already comfortable processing data with, say, Python or R, you'll greatly improve your data science workflow by also leveraging the power of the command line.Obtain data from websites, APIs, databases, and spreadsheetsPerform scrub operations on plain text, CSV, HTML/XML, and JSONExplore data, compute descriptive statistics, and create visualizationsManage your data science workflow using DrakeCreate reusable tools from one-liners and existing Python or R codeParallelize and distribute data-intensive pipelines using GNU ParallelModel data with dimensionality reduction, clustering, regression, and classification algorithms
Head First C#
Andrew Stellman - 2007
Built for your brain, this book covers C# 3.0 and Visual Studio 2008, and teaches everything from language fundamentals to advanced topics including garbage collection, extension methods, and double-buffered animation. You'll also master C#'s hottest and newest syntax, LINQ, for querying SQL databases, .NET collections, and XML documents. By the time you're through, you'll be a proficient C# programmer, designing and coding large-scale applications. Every few chapters you will come across a lab that lets you apply what you've learned up to that point. Each lab is designed to simulate a professional programming task, increasing in complexity until-at last-you build a working Invaders game, complete with shooting ships, aliens descending while firing, and an animated death sequence for unlucky starfighters. This remarkably engaging book will have you going from zero to 60 with C# in no time flat.
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
Chris Eagle - 2008
With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.