Book picks similar to
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms by Rohit Tamma
cybersecurity
reference
have-book
cyber-security
Quilter's Precut Companion: Handy Reference Guide + 25 Precut-Friendly Blocks
C & T Publishing - 2015
You’ll cover all the basics, including precut options, standard quilt sizes and needle types. Plus, finish your quilt like a pro with yardage and cutting info for borders, backings, and bindings! Easy-to-use charts, tables, and illustrations are at your fingertips in this handy, spiral-bound guide that’s easy to take with you.
Introduction to Geographic Information Systems [With CDROM]
Kang-Tsung Chang - 2001
Now in its 12th edition, it is still the market leader and is known for its scientific research base and its currency, comprehensiveness, and accuracy.
Teach Yourself Turkish Complete Course
Asuman Çelen Pollard - 1996
Its usage is common in such current political hot spots as the Balkans, Central Asia, and the Near East.Among the highlights of" Teach Yourself Turkish are: An in-depth study of how the language was formedA phonetic approach to the spoken languageThe grammar and rules of written TurkishVocabulary exercises to make learning easier
A Whirlwind Tour of Python
Jake Vanderplas - 2016
This report provides a brief yet comprehensive introduction to Python for engineers, researchers, and data scientists who are already familiar with another programming language.Author Jake VanderPlas, an interdisciplinary research director at the University of Washington, explains Python’s essential syntax and semantics, built-in data types and structures, function definitions, control flow statements, and more, using Python 3 syntax.You’ll explore:- Python syntax basics and running Python codeBasic semantics of Python variables, objects, and operators- Built-in simple types and data structures- Control flow statements for executing code blocks conditionally- Methods for creating and using reusable functionsIterators, list comprehensions, and generators- String manipulation and regular expressions- Python’s standard library and third-party modules- Python’s core data science tools- Recommended resources to help you learn more
Hacker's Delight
Henry S. Warren Jr. - 2002
Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.
CISSP for Dummies [With CDROM]
Lawrence C. Miller - 2002
The topics covered in the exam include: network security, security management, systems development, cryptography, disaster recovery, law, and physical security. CISSP For Dummies, 3rd Edition is the bestselling guide that covers the CISSP exam and helps prepare those wanting to take this security exam. The 3rd Edition features 200 additional pages of new content to provide thorough coverage and reflect changes to the exam. Written by security experts and well-known Dummies authors, Peter Gregory and Larry Miller, this book is the perfect, no-nonsense guide to the CISSP certification, offering test-taking tips, resources, and self-assessment tools.Fully updated with 200 pages of new content for more thorough coverage and to reflect all exam changesSecurity experts Peter Gregory and Larry Miller bring practical real-world security expertiseCD-ROM includes hundreds of randomly generated test questions for readers to practice taking the test with both timed and untimed versions"CISSP For Dummies, 3rd Edition" can lead you down the rough road to certification successNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
Bash Command Line Pro Tips
Jason Cannon - 2014
As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of 10 techniques that you can put to use right away to increase your efficiency at the command line. Here is what you will learn by reading Bash Command Line Pro Tips: Tip 1: Tab Completion Tip 2: Change to the Previous Directory Tip 3: Reuse the Last Item from the Previous Command Line Tip 4: Rerun a Command That Starts with a given String Tip 5: Command Substitution Tip 6: Use a for Loop at the Command Line Tip 7: Rerun the Previous Command with Root Privileges Tip 8: Rerun the Previous Command While Substituting a String Tip 9: Reuse a Word on the Same Command Line Tip 10: Fix Typos and Shorten Lengthy Commands with Aliases Scroll up, click the "Buy Now With 1-Click" button to start leaning these powerful Linux Command Line Tips.
The Advanced Professional Pastry Chef
Bo Friberg - 2003
Like its sister volume on the basics (The Professional Pastry Chef: Fundamentals of Baking and Pastry, 2002, 0-471-35925-4), this book, which covers such subjects as modernistic desserts, chocolate work, and sugar and marzipan creations, is designed to meet the needs of today's pastry kitchen. This definitive reference features clear explanations, step-by-step how-to photos, and meticulous recipes - all presented in a lively, reader-friendly style.
Chainmail Made Easy: Beginner's Guide in 7 Easy Steps!
Jeff Baker - 2012
Chain mail, also known as chainmail, maille, or chainmaille is a great hobby for any age that doesn't involve just making armor.You can make almost anything from chainmail. Below are just a few examples of what you can make:• Jewerly (Bracelets, Necklaces, Anklets, Earrings, Rings)• Clothing (Bikini tops, Belts, Shirts, Ties)• Art• Armor• Inlays (pictures in your maille)• And much, much more!In this beginner's book you'll learn the following:• A short history of chain mail• Different rings used and the kinds of metals• How to open and close rings correctly• Tools used like pliers and different kinds• An overview of the family of chainmail weaves• How to weave 7 of the more common, simpler weaves shown in 3D graphics• Resources for purchasing rings and tools3 Starter Projects:• Women's Choker Necklace• Men's Flat Bracelet• Pouch or Dice Bag Chainmail is neither difficult to learn nor expensive. All it takes is a willingness to try something new no matter your age, education, or income! Scoll up and click the "Look Inside" feature on the top left hand side of this page to see what's included in this book.A Personal Note From The Author:This beginner's guide blends 10 years of my personal experience chainmailling. When I first started chainmailling, I knew nothing about it except what I'd seen online or in movies; chainmail armor. Not very exciting for the average person but the idea of weaving metal rings into something I could create without any special skills appealed to me. I stumbled across The Ring Lord, a site that sells all kinds of rings in all kinds of sizes, colors, and metals, and I was hooked!Now ten years later after creating all sorts of projects from maille, some things I wouldn't have thought possible, I wanted to share what I've learned with someone just starting out. This first volume is not meant to cover everything about chainmailling nor does it include dozens of projects. It's meant for someone who's never mailled before or who's only dabbled a little but now wants a simple-to-follow guide with clear instructions and pictures on how to get started mailling immediately with the most common weaves applied to a couple starter projects.
Hidden In Plain Sight 2: The Equation of the Universe
Andrew H. Thomas - 2013
Enjoy a thrilling intergalactic tour as Andrew Thomas redefines the force of gravity and introduces a brave new view of the universe!
Regular Expressions Cookbook
Jan Goyvaerts - 2009
Every programmer can find uses for regular expressions, but their power doesn't come worry-free. Even seasoned users often suffer from poor performance, false positives, false negatives, or perplexing bugs. Regular Expressions Cookbook offers step-by-step instructions for some of the most common tasks involving this tool, with recipes for C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET.With this book, you will:Understand the basics of regular expressions through a concise tutorial Use regular expressions effectively in several programming and scripting languages Learn how to validate and format input Manage words, lines, special characters, and numerical values Find solutions for using regular expressions in URLs, paths, markup, and data exchange Learn the nuances of more advanced regex features Understand how regular expressions' APIs, syntax, and behavior differ from language to language Write better regular expressions for custom needs Whether you're a novice or an experienced user, Regular Expressions Cookbook will help deepen your knowledge of this unique and irreplaceable tool. You'll learn powerful new tricks, avoid language-specific gotchas, and save valuable time with this huge library of proven solutions to difficult, real-world problems.
Inevitable: Mass Customized Learning: Learning in the Age of Empowerment
Charles Schwahn - 2010
Marriages & Families: Changes, Choices, and Constraints
Nijole V. Benokraitis - 1993
The text's major theme "Changes, Choices, and Constraints" explores: Contemporary "changes "in families and their structure Impacts on the "choices "that are available to family members ""Constraints ""that often limit our choices Through this approach, students are better able to understand what the research and statistics mean "for themselves"! Marriages and Families balances theoretical and empirical discussions with practical examples and applications. It highlights important contemporary changes in society and the family. This text is written from a sociological perspective and incorporates material from other disciplines: history, economics, social work, psychology, law, biology, medicine, family studies, women's studies, and anthropology. "More about the themes: " "Changes"Examines how recent profound structural and attitudinal changes affect family forms, interpersonal relationships, and raising children. It reaches beyond the traditional discussions to explore racial-ethnic families, single-parent families and gay families as well as the recent scholarship by and about men, fathers, and grandfathers. Contemporary American marriages and families vary greatly in structure, dynamics, and cultural heritage. Thus, discussions of gender roles, social class, race, ethnicity, age, and sexual orientation are integrated throughout this book. To further strengthen students understanding of the growing diversity among today's families, the author included a series of boxes that focus on families from many cultures. "Choices"On the individual level, family members have many more choices today than ever before. People feel freer to postpone marriage, to cohabit, or to raise children as single parents. As a result, household forms vary greatly, ranging from commuter marriages to those in which several generations live together under the same roof. "Constraints"Although family members choices are more varied today, we also face greater macro- level constraints. Our options are increasingly limited, for example, by government policies. Economic changes often shape family life and not vice versa. Political and legal institutions also have a major impact on most families in tax laws, welfare reform, and even in defining what a family is. Because laws, public policies, and religious groups affect our everyday lives, the author has framed many discussions of individual choices within the larger picture of the institutional constraints that limit our choices.To learn more about the new edition, click here to visit the showcase site.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Weight Loss Surgery Cookbook for Dummies
Brian K. Davidson - 2010
It helps you solidify new eating habits and enjoy some new recipes, as well as better understand nutrition and your food intake so that you can maintain your weight long after surgery.Features simple, delicious meals that conform to post-weight loss surgery requirements Offers easy-to-prepare recipes that are high in flavor and low in fat and calories, that you can eat immediately after your surgery and beyond Weight Loss Surgery Cookbook For Dummies makes it easy to shed the pounds and keep them off!