Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell


Lee Holmes - 2007
    Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem

Worm: The First Digital World War


Mark Bowden - 2011
    Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

Data Analysis with Open Source Tools: A Hands-On Guide for Programmers and Data Scientists


Philipp K. Janert - 2010
    With this insightful book, intermediate to experienced programmers interested in data analysis will learn techniques for working with data in a business environment. You'll learn how to look at data to discover what it contains, how to capture those ideas in conceptual models, and then feed your understanding back into the organization through business plans, metrics dashboards, and other applications.Along the way, you'll experiment with concepts through hands-on workshops at the end of each chapter. Above all, you'll learn how to think about the results you want to achieve -- rather than rely on tools to think for you.Use graphics to describe data with one, two, or dozens of variablesDevelop conceptual models using back-of-the-envelope calculations, as well asscaling and probability argumentsMine data with computationally intensive methods such as simulation and clusteringMake your conclusions understandable through reports, dashboards, and other metrics programsUnderstand financial calculations, including the time-value of moneyUse dimensionality reduction techniques or predictive analytics to conquer challenging data analysis situationsBecome familiar with different open source programming environments for data analysisFinally, a concise reference for understanding how to conquer piles of data.--Austin King, Senior Web Developer, MozillaAn indispensable text for aspiring data scientists.--Michael E. Driscoll, CEO/Founder, Dataspora

SSH, The Secure Shell: The Definitive Guide


Daniel J. Barrett - 2001
    It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.

Home Recording For Musicians For Dummies


Jeff Strong - 2002
    This guide covers everything from microphone placement to multitracking and mastering, helping you choose the right tools and use them like a pro. Discover how to: Create a studio around your budget Direct signal flow to maximize your sound Apply the best microphone techniques Use compressors and limiters properly Build a space for optimum mixing

DNS and BIND


Cricket Liu - 1996
    This book brings you up-to-date with the latest changes in this crucial service.The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.Topics include:What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module

Designing Bots: Creating Conversational Experiences


Amir Shevat - 2017
    In this practical guide, author Amir Shevat shows you how to design and build great conversational experiences and delightful bots that makes people s life more fun and productive.You ll explore several real-world bot examples to understand what works and what doesn t, and learn practical design patterns for your own bot-building toolbox. This book is ideal for beginners and intermediate designers, as well as senior professionals exploring the conversational user experience paradigm. No coding experience or prior knowledge of conversational UI is required.Learn what bots are, and understand bot types and major components that compose a botExplore different use-cases of bots and best practices around these use casesExamine real-life examples and learn from their experienceUnderstand the bot anatomy (Onboarding, Notifications, Conversations, Advance UI controls) and their associated design patternsPrototype your own first bot and experiment with user feedback"

Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine


Clinton Gormley - 2014
    This practical guide not only shows you how to search, analyze, and explore data with Elasticsearch, but also helps you deal with the complexities of human language, geolocation, and relationships.If you're a newcomer to both search and distributed systems, you'll quickly learn how to integrate Elasticsearch into your application. More experienced users will pick up lots of advanced techniques. Throughout the book, you'll follow a problem-based approach to learn why, when, and how to use Elasticsearch features.Understand how Elasticsearch interprets data in your documentsIndex and query your data to take advantage of search concepts such as relevance and word proximityHandle human language through the effective use of analyzers and queriesSummarize and group data to show overall trends, with aggregations and analyticsUse geo-points and geo-shapes--Elasticsearch's approaches to geolocationModel your data to take advantage of Elasticsearch's horizontal scalabilityLearn how to configure and monitor your cluster in production

Designing Web APIs: Building APIs That Developers Love


Brenda Jin - 2018
    But building a popular API with a thriving developer ecosystem is also one of the most challenging. With this practical guide, developers, architects, and tech leads will learn how to navigate complex decisions for designing, scaling, marketing, and evolving interoperable APIs.Authors Brenda Jin, Saurabh Sahni, and Amir Shevat explain API design theory and provide hands-on exercises for building your web API and managing its operation in production. You'll also learn how to build and maintain a following of app developers. This book includes expert advice, worksheets, checklists, and case studies from companies including Slack, Stripe, Facebook, Microsoft, Cloudinary, Oracle, and GitHub.Get an overview of request-response and event-driven API design paradigmsLearn best practices for designing an API that meets the needs of your usersUse a template to create an API design processScale your web API to support a growing number of API calls and use casesRegularly adapt the API to reflect changes to your product or businessProvide developer resources that include API documentation, samples, and tools

Being Mortal by Atul Gawande - A 20-minute Summary: Medicine and What Matters in the End


Instaread Summaries - 2014
    Being Mortal by Atul Gawande - A 20-minute Summary Inside this Instaread Summary: • Overview of the entire book• Introduction to the important people in the book• Summary and analysis of all the chapters in the book• Key Takeaways of the book• A Reader's Perspective Preview of this summary: Chapter 1 Gawande grew up in Ohio. His parents were immigrants from India and both were doctors. His grandparents stayed in India, and there were few older people in his neighborhood, so he had little experience with aging or death until he met his wife’s grandmother, Alice Hobson. Hobson was seventy-seven and living on her own in Virginia. She was a spirited widow who fixed her own plumbing and volunteered with Meals On Wheels. However, Hobson was losing strength and height steadily each year as her arthritis worsened.Gawande’s father enthusiastically adopted the customs of his new country, but he could not understand the way in which seniors were treated in the US. In India, the elderly were treated with great respect and lived out their lives with family.In the United States, Sitaram Gawande, Gawande’s grandfather, likely would have been sent to a nursing home like most of the elderly who cannot handle the basics of daily living by themselves. However, in India, Sitaram Gawande was able to live in his own home and manage his own affairs, with family constantly around him. He died at the age of one hundred and ten when he fell off a bus during a business trip.Until recently, most elderly people stayed with their families. Even as the nuclear family unit became predominant, replacing the multi-generational family unit, people cared for their elderly relatives. Families were large and one child, usually a daughter, would not marry in order to take care of the parents.This has changed in much of the world, where elderly people end up struggling to live alone, like Hobson, rather than living with dignity amid family, like Sitaram Gawande.One cause of this change can be found in the nature of knowledge. When few people lived to be very old, elders were honored. Their store of knowledge was greatly useful. People often portrayed themselves as older to command respect. Modern society’s emphasis on youth is a complete reversal of this attitude. Technological advances are perceived as the territory of the young, and everyone wants to be younger. High-tech job opportunities are all over the world, and young people do not hesitate to leave their parents behind to pursue them.In developed countries, parents embrace the concept of a retirement filled with leisure activities. Parents are happy to begin living for themselves once children are grown. However, this system only works for young, healthy retirees, but not for those who cannot continue to be independent. Hobson, for example, was falling frequently and suffering memory lapses. Her doctor did tests and wrote prescriptions, but did not know what to do about her deteriorating condition. Neither did her family… About the Author With Instaread Summaries, you can get the summary of a book in 30 minutes or less. We read every chapter, summarize and analyze it for your convenience.

IoT Inc.: How Your Company Can Use the Internet of Things to Win in the Outcome Economy


Bruce Sinclair - 2017
    They’re in our companies, in our homes, in our pockets. People love these products. But what they love more is what these products do—and for anyone running a business today, outcomes are the key. The Internet of Things (IoT) is the point of connection between products and the results they deliver—it’s where products become software. IoT Inc. explains everything you need to know to position your company within this powerful new network. And once you do, you’ll leave the competition in the dust. Founder and president of today’s leading IoT business consulting firm, Bruce Sinclair has been helping companies develop IoT strategies for a decade—far longer than the term has even existed. This essential guide provides an in-depth look into IoT—how it works and how it is transforming business; methods for seeing your own business, customers, and competitors through the lens of IoT, and a deep dive into how to develop and implement a powerful IoT strategy. IoT isn’t a new business trend. It’s the new way of business. Period. The IoT wave is heading for your industry. You can either meet it head-on, and ride it to success, or you can turn your back and let it swamp you. This is your playbook for transforming your company into a major player in the IoT Outcome economy.

The LEGO MINDSTORMS EV3 Discovery Book: A Beginner's Guide to Building and Programming Robots


Laurens Valk - 2014
    This full color book teaches you fundamental programming and robotics skills as you build and program powerful robots that move, monitor sensors, and respond to their environments. You will build seven increasingly sophisticated robots like the BRICK SORT3R (a robot that sorts bricks by color and size), the THE SNATCH3R (an autonomous robotic arm), and LAVA R3X (a humanoid that walks and talks). Valk also covers more advanced programming techniques like data wires and variables, and shows you how to create custom remote control programs. More than 100 building and programming challenges throughout encourage you to think creatively and to apply what you've learned to invent your own robots.

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

802.11 Wireless Networks: The Definitive Guide


Matthew S. Gast - 2002
    Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.

Landing Eagle: Inside the Cockpit During the First Moon Landing


Michael Engle - 2019
    It was a sea in name only. It was actually a bone dry, ancient dusty basin pockmarked with craters and littered with rocks and boulders. Somewhere in that 500 mile diameter basin, the astronauts would attempt to make Mankind’s first landing on the Moon. Neil Armstrong would pilot the Lunar Module “Eagle” during its twelve minute descent from orbit down to a landing. Col. Edwin “Buzz” Aldrin would assist him. On the way down they would encounter a host of problems, any one of which could have potentially caused them to have to call off the landing, or, even worse, die making the attempt. The problems were all technical-communications problems, computer problems, guidance problems, sensor problems. Armstrong and Aldrin faced the very real risk of dying by the very same technical sword that they had to live by in order to accomplish the enormous task of landing on the Moon for the first time. Yet the human skills Armstrong and Aldrin employed would be more than equal to the task. Armstrong’s formidable skills as an aviator, honed from the time he was a young boy, would serve him well as he piloted Eagle down amidst a continuing series of systems problems that might have fatally distracted a lesser aviator. Armstrong’s brilliant piloting was complemented by Aldrin’s equally remarkable discipline and calmness as he stoically provided a running commentary on altitude and descent rate while handling systems problems that threatened the landing. Finally, after a harrowing twelve and a half minutes, Armstrong gently landed Eagle at “Tranquility Base”, a name he had personally chosen to denote the location of the first Moon landing. In “Landing Eagle-Inside the Cockpit During the First Moon Landing”, author Mike Engle gives a minute by minute account of the events that occurred throughout Eagle’s descent and landing on the Moon. Engle, a retired NASA engineer and Mission Control flight controller, uses NASA audio files of actual voice recordings made inside Eagle’s cockpit during landing to give the reader an “inside the cockpit” perspective on the first Moon landing. Engle’s transcripts of these recordings, along with background material on the history and technical details behind the enormous effort to accomplish the first Moon landing, give a new and fascinating insight into the events that occurred on that remarkable day fifty years ago.