Sinatra: Up and Running


Alan Harris - 2011
    With this concise book, you will quickly gain working knowledge of Sinatra and its minimalist approach to building both standalone and modular web applications. Sinatra serves as a lightweight wrapper around Rack middleware, with syntax that maps closely to functions exposed by HTTP verbs, which makes it ideal for web services and APIs. If you have experience building applications with Ruby, you’ll quickly learn language fundamentals and see under-the-hood techniques, with the help of several practical examples. Then you’ll get hands-on experience with Sinatra by building your own blog engine. Learn Sinatra’s core concepts, and get started by building a simple application Create views, manage sessions, and work with Sinatra route definitions Become familiar with the language’s internals, and take a closer look at Rack Use different subclass methods for building flexible and robust architectures Put Sinatra to work: build a blog that takes advantage of service hooks provided by the GitHub API

Adventures In Raspberry Pi (Adventures In ...)


Carrie Anne Philbin - 2013
    Written for 11- to 15-year-olds and assuming no prior computing knowledge, this book uses the wildly successful, low-cost, credit-card-sized Raspberry Pi computer to explain fundamental computing concepts. Young people will enjoy going through the book's nine fun projects while they learn basic programming and system administration skills, starting with the very basics of how to plug in the board and turn it on. Each project includes a lively and informative video to reinforce the lessons. It's perfect for young, eager self-learners—your kids can jump in, set up their Raspberry Pi, and go through the lessons on their own. Written by Carrie Anne Philbin, a high school teacher of computing who advises the U.K. government on the revised ICT Curriculum Teaches 11- to 15-year-olds programming and system administration skills using Raspberry Pi Features 9 fun projects accompanied by lively and helpful videos Raspberry Pi is a $35/£25 credit-card-sized computer created by the non-profit Raspberry Pi Foundation; over a million have been sold Help your children have fun and learn computing skills at the same time with Adventures in Raspberry Pi.

Metasploit: The Penetration Tester's Guide


David Kennedy - 2011
    But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

McDougalls' All-You-Can-Eat Vegetarian Cookbook


John A. McDougall - 2011
    John McDougall, bestselling author and creator of the nationally renowned diet and exercise McDougall Plan, presents a cookbook that turns the popular thinking about carbs and weight control upside down. Filled with some of John and Mary McDougall’s favorite vegetarian recipes from their very own kitchen, this book is a great addition to your personal library if you are considering becoming a vegetarian or want a refresher course on the must-have nutrients your body needs to run like a lean, clean machine.Dr. John McDougall is a certified internist who has been studying and writing about the effect of nutrition on disease for more than 30 years. Mary McDougall has contributed her nutritional expertise and recipes as co-author on many of the bestselling McDougall books.

Banjo for Dummies [With CD-ROM]


Bill Evans - 2007
     Packed with over 120 how-to photos and 130 musical examples. 94 track CD included - hear and play along with every exercise and song. The only book to offer instruction in clawhammer, bluegrass, melodic, single-string, minstrel and classic styles. From Earl Scruggs’ driving bluegrass picking to the genre-busting jazz fusion of Béla Fleck and the multi-million selling movie soundtrack  O Brother Where Are Thou?, the five-string banjo can be heard just about everywhere in American music these days. Banjo For Dummies is the most complete guide to the five-string banjo ever written. It covers everything you need to get into the banjo: including how to choose, tune and care for your instrument, developing a good playing posture, fretting your first chords and getting comfortable with the left and right hand picking patterns used for clawhammer and bluegrass playing techniques. You’ll then add the left hand, spicing up your playing with slides, hammer-ons, pull-offs, and chokes for an authentic five-string banjo sound. From there, you’ll move on the play 19th century minstrel style, early 20th century classic style as well as try your hand at more advanced examples of bluegrass style. An in-depth chapter on bluegrass music explores Scruggs licks and techniques as well as melodic and single-string styles, with song examples. Also included is a banjo buyer’s guide, a section on music theory as applied to bluegrass and old-time music, an accessories guide (advice on cases, picks, straps,metronomes, computer aids and much more), information on how to find a good teacher, banjo camp or festival, chord charts, bios of twelve influential players, practice tips and much, much more! Banjo For Dummies is accessible and fun to read and it’s easy to locate just what you’re interested in playing. Included are 20 songs including several new compositions written by the author just for this book, including Reno Rag (single-string style), “Winston’s Jig” (Irish three-finger), and “Everyday Breakdown” (Scruggs style). All musical examples are played slowly on the accompanying CD, many with guitar and mandolin accompaniment. Bill Evans is one of the world’s most celebrated banjo players and teachers. He has taught thousands of people to play the five-string banjo in private lessons and group workshops literally all over the world. In addition to leading the Bill Evans String Summit, Bill has performed with Dry Branch Fire Squad, David Grisman, Peter Rowan, Tony Trischka and many others and he hosts his own acclaimed banjo camp, the NashCamp Fall Banjo Retreat in the Nashville area. As an American music historian, he has taught at San Francisco State University, the University Virginia and Duke University. He has written a popular instructional column for Banjo Newsletter magazine for the last fifteen years and hosts three popular instructional DVDs for AcuTab Publications. To learn more about Bill, visit his homepage at www.nativeandfine.com.

The Hitchhiker's Guide to Python: Best Practices for Development


Kenneth Reitz - 2016
    More than any other language, Python was created with the philosophy of simplicity and parsimony. Now 25 years old, Python has become the primary or secondary language (after SQL) for many business users. With popularity comes diversity--and possibly dilution.This guide, collaboratively written by over a hundred members of the Python community, describes best practices currently used by package and application developers. Unlike other books for this audience, The Hitchhiker's Guide is light on reusable code and heavier on design philosophy, directing the reader to excellent sources that already exist.

Bash Cookbook: Solutions and Examples for Bash Users


Carl Albing - 2007
    Scripting is a way to harness and customize the power of any Unix system, and it's an essential skill for any Unix users, including system administrators and professional OS X developers. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards.bash Cookbook teaches shell scripting the way Unix masters practice the craft. It presents a variety of recipes and tricks for all levels of shell programmers so that anyone can become a proficient user of the most common Unix shell -- the bash shell -- and cygwin or other popular Unix emulation packages. Packed full of useful scripts, along with examples that explain how to create better scripts, this new cookbook gives professionals and power users everything they need to automate routine tasks and enable them to truly manage their systems -- rather than have their systems manage them.

Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users


Christopher Negus - 2007
    Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

Restful Java with Jax-RS


Bill Burke - 2009
    With this hands-on reference, you'll focus on implementation rather than theory, and discover why the RESTful method is far better than technologies like CORBA and SOAP. It's easy to get started with services based on the REST architecture. RESTful Java with JAX-RS includes a technical guide that explains REST and JAX-RS, how they work, and when to use them. With the RESTEasy workbook that follows, you get step-by-step instructions for installing, configuring, and running several working JAX-RS examples using the JBoss RESTEasy implementation of JAX-RS.Work on the design of a distributed RESTful interface, and develop it in Java as a JAX-RS serviceDispatch HTTP requests in JAX-RS, and learn how to extract information from themDeploy your web services within Java Enterprise Edition using the Application class, Default Component Model, EJB Integration, Spring Integration, and JPADiscover several options for securing your web servicesLearn how to implement RESTful design patterns using JAX-RSWrite RESTful clients in Java using libraries and frameworks such as java.net.URL, Apache HTTP Client, and RESTEasy Proxy

Reversing: Secrets of Reverse Engineering


Eldad Eilam - 2005
    The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language

Spark: The Definitive Guide: Big Data Processing Made Simple


Bill Chambers - 2018
    With an emphasis on improvements and new features in Spark 2.0, authors Bill Chambers and Matei Zaharia break down Spark topics into distinct sections, each with unique goals. You’ll explore the basic operations and common functions of Spark’s structured APIs, as well as Structured Streaming, a new high-level API for building end-to-end streaming applications. Developers and system administrators will learn the fundamentals of monitoring, tuning, and debugging Spark, and explore machine learning techniques and scenarios for employing MLlib, Spark’s scalable machine-learning library. Get a gentle overview of big data and Spark Learn about DataFrames, SQL, and Datasets—Spark’s core APIs—through worked examples Dive into Spark’s low-level APIs, RDDs, and execution of SQL and DataFrames Understand how Spark runs on a cluster Debug, monitor, and tune Spark clusters and applications Learn the power of Structured Streaming, Spark’s stream-processing engine Learn how you can apply MLlib to a variety of problems, including classification or recommendation

Zero Day: The Threat In Cyberspace


Robert O'Harrow Jr. - 2013
    For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.

Mandolin for Dummies


Don Julin - 2012
    Following the time-tested Dummies format, Mandolin For Dummies provides a level of content and instruction greater than anything currently available.Mandolin For Dummies breaks down the fundamentals of this instrument and provides the resources you need to practice and improve your ability over time.Packed with individualized instruction on key mandolin-friendly musical styles, including Irish and Celtic, "old time" American music, blues, bluegrass, swing, and jazz Files available via download provide audio tracks from the book and exercises so you can play along and build your skills -- almost 2 hours of music! Clear and useful photos and diagrams ensure you fret, strum, and pick with precision Includes a mandolin buying guide to help ensure you make the right purchases Tips on restringing mandolins and other DIY care and maintenance topics If you're an aspiring mandolin player, don't fret! Mandolin For Dummies has you covered.