Black Code: Inside the Battle for Cyberspace


Robert J. Deibert - 2013
    We depend on it for everything we do. We have reengineered our business, governance, and social relations around a planetary network unlike any before it. But there are dangers looming, and malign forces are threatening to transform this extraordinary domain.In Black Code, Ronald J. Deibert, a leading expert on digital technology, security, and human rights, lifts the lid on cyberspace and shows what’s at stake for Internet users and citizens. As cyberspace develops in unprecedented ways, powerful agents are scrambling for control. Predatory cyber criminal gangs such as Koobface have made social media their stalking ground. The discovery of Stuxnet, a computer worm reportedly developed by Israel and the United States and aimed at Iran’s nuclear facilities, showed that state cyberwar is now a very real possibility. Governments and corporations are in collusion and are setting the rules of the road behind closed doors.This is not the way it was supposed to be. The Internet’s original promise of a global commons of shared knowledge and communications is now under threat. Drawing on the first-hand experiences of one of the most important protagonists in the battle — the Citizen Lab and its global network of frontline researchers, who have spent more than a decade cracking cyber espionage rings and uncovering attacks on citizens and NGOs worldwide — Black Code takes readers on a fascinating journey into the battle for cyberspace. Thought-provoking, compelling, and sometimes frightening, it is a wakeup call to citizens who have come to take the Internet for granted. Cyberspace is ours, it is what we make of it, Deibert argues, and we need to act now before it slips through our grasp.

The Best of 2600: A Hacker Odyssey


Emmanuel Goldstein - 2008
    Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

Clean Code: A Handbook of Agile Software Craftsmanship


Robert C. Martin - 2007
    But if code isn't clean, it can bring a development organization to its knees. Every year, countless hours and significant resources are lost because of poorly written code. But it doesn't have to be that way. Noted software expert Robert C. Martin presents a revolutionary paradigm with Clean Code: A Handbook of Agile Software Craftsmanship . Martin has teamed up with his colleagues from Object Mentor to distill their best agile practice of cleaning code on the fly into a book that will instill within you the values of a software craftsman and make you a better programmer but only if you work at it. What kind of work will you be doing? You'll be reading code - lots of code. And you will be challenged to think about what's right about that code, and what's wrong with it. More importantly, you will be challenged to reassess your professional values and your commitment to your craft. Clean Code is divided into three parts. The first describes the principles, patterns, and practices of writing clean code. The second part consists of several case studies of increasing complexity. Each case study is an exercise in cleaning up code - of transforming a code base that has some problems into one that is sound and efficient. The third part is the payoff: a single chapter containing a list of heuristics and "smells" gathered while creating the case studies. The result is a knowledge base that describes the way we think when we write, read, and clean code. Readers will come away from this book understanding ‣ How to tell the difference between good and bad code‣ How to write good code and how to transform bad code into good code‣ How to create good names, good functions, good objects, and good classes‣ How to format code for maximum readability ‣ How to implement complete error handling without obscuring code logic ‣ How to unit test and practice test-driven development This book is a must for any developer, software engineer, project manager, team lead, or systems analyst with an interest in producing better code.

Essential Scrum: A Practical Guide to the Most Popular Agile Process


Kenneth S. Rubin - 2012
    Leading Scrum coach and trainer Kenny Rubin illuminates the values, principles, and practices of Scrum, and describes flexible, proven approaches that can help you implement it far more effectively. Whether you are new to Scrum or years into your use, this book will introduce, clarify, and deepen your Scrum knowledge at the team, product, and portfolio levels. Drawing from Rubin's experience helping hundreds of organizations succeed with Scrum, this book provides easy-to-digest descriptions enhanced by more than two hundred illustrations based on an entirely new visual icon language for describing Scrum's roles, artifacts, and activities. Essential Scrum will provide every team member, manager, and executive with a common understanding of Scrum, a shared vocabulary they can use in applying it, and practical knowledge for deriving maximum value from it.

Writing A Novel with Ulysses III


David Hewson - 2014
    Best-selling novelist David Hewson, author of the ever-popular Writing A Novel with Scrivener, offers a professional insight into how to use this unique app for writing fiction. This ebook covers all the aspects of Ulysses a writer needs to master in order to produce a finished book, from initial planning through to completed ebook, Word file or PDFs for publication, reading and revision. You will learn how to use Ulysses to structure a book into parts and scenes, ways to manage research and ideas and how to develop a novel from a bare outline through to first draft and revisions. Hewson also describes how Ulysses stores work uniquely in its own library, enabling you to work on the same draft manuscript across different machines while on the move. For budding screenwriters there is a section on how to use Ulysses to produce scripts to professional formats that can be edited later in movie apps such as Final Draft. And this release will also include a free upgrade to an updated edition covering the next release of Ulysses and the forthcoming iPad app. David Hewson (www.davidhewson.com) is the author of more than 25 novels published around the world. He adapted the award-winning TV series The Killing into acclaimed novel and recently launched a new crime series set in Amsterdam with The House of Dolls which has been optioned for Dutch TV.

Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It


Tsutomu Shimomura - 1996
    Reprint. NYT.

Managing the Testing Process: Practical Tools and Techniques for Managing Hardware and Software Testing


Rex Black - 1999
    The preeminent expert in his field, Mr.Black draws upon years of experience as president of both theInternational and American Software Testing Qualifications boardsto offer this extensive resource of all the standards, methods, andtools you'll need.The book covers core testing concepts and thoroughly examinesthe best test management practices and tools of leading hardwareand software vendors. Step-by-step guidelines and real-worldscenarios help you follow all necessary processes and avoidmistakes.Producing high-quality computer hardware and software requirescareful, professional testing; Managing the Testing Process, Third Edition explains how to achieve that by following adisciplined set of carefully managed and monitored practices andprocessesThe book covers all standards, methods, and tools you need forprojects large and smallPresents the business case for testing products and reviews theauthor's latest test assessmentsTopics include agile testing methods, risk-based testing, IEEEstandards, ISTQB certification, distributed and outsourced testing, and moreOver 100 pages of new material and case studies have been addedto this new editionIf you're responsible for managing testing in the real world, Managing the Testing Process, Third Edition is the valuablereference and guide you need.

Arduino For Dummies


John Nussey - 2013
    Arduino allows anyone, whether you're an artist, designer, programmer or hobbyist, tolearn about and play with electronics. Through this book you learnhow to build a variety of circuits that can sense or control thingsin the real world. Maybe you'll prototype your own product orcreate a piece of interactive artwork? This book equips you witheverything you'll need to build your own Arduino project, but whatyou make is up to you! If you're ready to bring your ideas into thereal world or are curious about the possibilities, this book is foryou. ? Learn by doing ? start building circuits and programmingyour Arduino with a few easy to follow examples - rightaway!? Easy does it ? work through Arduino sketches line by linein plain English, to learn of how a they work and how to write yourown? Solder on! ? Only ever used a breadboard in the kitchen?Don't know your soldering iron from a curling iron? No problem, you'll be prototyping in no time? Kitted out ? discover new and interesting hardware to makeyour Arduino into anything from a mobile phone to a geigercounter!? Become an Arduino savant ? learn all about functions, arrays, libraries, shields and other tools of the trade to takeyour Arduino project to the next level.? Get social ? teach your Arduino to communicate withsoftware running on a computer to link the physical world with thevirtual worldIt's hardware, it's software, it's fun! Start building the nextcool gizmo with Arduino and Arduino For Dummies.

My Kindle Fire (My...)


Jim Cheshire - 2011
    With this book you will learn how to tap into every Kindle Fire feature, including many of the hidden ones not discussed in other books. From setting up your Kindle Page, managing your music, watching movies, and downloading content - this book covers everything. The task based full-color format allows you to quickly and easily find the exact task you want to accomplish and walks you through it in a delightfully concise and visual manner. My Kindle Fire makes it easy for you to:• Master all the basics, fast: reading, playing, watching, browsing, and more• Tweak your Kindle Fire for quicker access and longer battery life• Sample best-seller book chapters for free• Mark up any eBook with highlights, notes, and bookmarks• Convert your personal documents for use on Kindle Fire• Discover Calibre, a powerful eBook management tool• Control even the largest music libraries• Get instant answers from Wikipedia, and from Kindle Fire’s built-in dictionary• Listen to personalized Internet radio stations created just for you• Use your Kindle Fire as a digital photo frame• Prevent unwanted subscription charges• Set up any email account to work on your Kindle Fire• Explore any web content with Amazon’s innovative Silk browser• Use Amazon Cloud to get your stuff anywhere—even if you left your Kindle at home• And much much more…Unlike many other guides which might only briefly mention or skip over some very import Kindle Fire features My Kindle Fire covers everything. Here are just a few of the things you'll find in My Kindle Fire that aren't covered in other guides: • Full coverage of Calibre, a free application for Mac or PC that helps manage your eBook library• A large number of walkthroughs for managing music playlists, including how to use cloud playlists. • How to reinstall multiple apps at once in case you reset your Kindle Fire. • Step-by-step walkthroughs on configuring all types of email accounts. • Coverage on handling attachments in your email application. • Importing contacts from your existing email application or cloud service and how you can export your contacts in order to back them up. • How to use Copy and Paste on the Kindle Fire. • How to use social networking integration with Facebook and others. • Walkthroughs on using the Gallery app, Pandora, Audible, and other popular apps. • Shows you how to access files on other computers in your house right from your Kindle Fire.

Stealing the Network: How to Own a Shadow


Johnny Long - 2007
    Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

The Decline and Fall of IBM: End of an American Icon?


Robert Cringely - 2014
    Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.

Where Wizards Stay Up Late: The Origins of the Internet


Katie Hafner - 1996
    Today, twenty million people worldwide are surfing the Net. Where Wizards Stay Up Late is the exciting story of the pioneers responsible for creating the most talked about, most influential, and most far-reaching communications breakthrough since the invention of the telephone. In the 1960's, when computers where regarded as mere giant calculators, J.C.R. Licklider at MIT saw them as the ultimate communications devices. With Defense Department funds, he and a band of visionary computer whizzes began work on a nationwide, interlocking network of computers. Taking readers behind the scenes, Where Wizards Stay Up Late captures the hard work, genius, and happy accidents of their daring, stunningly successful venture.

Rule the Web: How to Do Anything and Everything on the Internet--Better, Faster, Easier


Mark Frauenfelder - 2007
    But aren't you curious about what else the Web can do for you? Or if there are better, faster, or easier ways to do what you're already doing? Let the world's foremost technology writer, Mark Frauenfelder, help you unlock the Internet's potential--and open up a richer, nimbler, and more useful trove of resources and services, including:EXPRESS YOURSELF, SAFELY. Create and share blogs, podcasts, and online video with friends, family, and millions of potential audience members, while protecting yourself from identity theft and fraud.DIVIDE AND CONQUER. Tackle even the most complex online tasks with ease, from whipping up a gorgeous Web site to doing all your work faster and more efficiently within your browser, from word processing to investing to planning a party.THE RIGHT WAY, EVERY TIME. Master state-of-the-art techniques for doing everything from selling your house to shopping for electronics, with hundreds of carefully researched tips and tricks.TIPS FROM THE INSIDERS. Mark has asked dozens of the best bloggers around to share their favorite tips on getting the most out of the Web.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Introduction to Data Communications and Networking


Wayne Tomasi - 2004
    KEY TOPICS: Topics explored include wireless and wireline telecommunications systems, basic data communications networks and systems, local area networks, internetworks, and the Internet including TCP/IP protocol suite. MARKET: For professionals with a career or interest in electronic communications, data communications, and/or networking, as well as ECT, EET, and CET technologists.