Book picks similar to
Microsoft Word 2013 Step by Step by Joan Lambert
computers
office-software
reference
computers-and-software
Blockchain Basics: A Non-Technical Introduction in 25 Steps
Daniel Drescher - 2017
No mathematical formulas, program code, or computer science jargon are used.No previous knowledge in computer science, mathematics, programming, or cryptography is required. Terminology is explained through pictures, analogies, and metaphors.This book bridges the gap that exists between purely technical books about the blockchain and purely business-focused books. It does so by explaining both the technical concepts that make up the blockchain and their role in business-relevant applications.What You Will Learn: • What the blockchain is• Why it is needed and what problem it solves• Why there is so much excitement about the blockchain and its potential• Major components and their purpose• How various components of the blockchain work and interact• Limitations, why they exist, and what has been done to overcome them• Major application scenariosWho This Book Is For: Everyone who wants to get a general idea of what blockchain technology is, how it works, and how it will potentially change the financial system as we know it.
The Amazon Echo Dot User Guide: Newbie to Expert in 1 Hour!: The Echo Dot User Manual That Should Have Come In The Box
Tom Edwards - 2016
From the Number 1 Best Selling authors in Computers and Technology, this clear and concise guide will show you how to get the very best from your new Amazon Echo Dot. Step by step instructions will take you from newbie to expert in just one hour! About the Authors: Tom and Jenna Edwards are the Amazon Tech authors behind the Number 1 Best-selling e-books 250+ Best Kindle Fire & Fire HD Apps and All-New Fire 7 User Guide: Newbie to Expert in 2 Hours!
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
What Would Google Do?
Jeff Jarvis - 2009
By “reverse engineering the fastest growing company in the history of the world,” author Jeff Jarvis, proprietor of Buzzmachine.com, one of the Web’s most widely respected media blogs, offers indispensible strategies for solving the toughest new problems facing businesses today. With a new afterword from the author, What Would Google Do? is the business book that every leader or potential leader in every industry must read.
Fatal Flight: The True Story of Britain's Last Great Airship
Bill Hammack - 2017
The British expected R.101 to spearhead a fleet of imperial airships that would dominate the skies as British naval ships, a century earlier, had ruled the seas. The dream ended when, on its demonstration flight to India, R.101 crashed in France, tragically killing nearly all aboard.Combining meticulous research with superb storytelling, Fatal Flight guides us from the moment the great airship emerged from its giant shed—nearly the largest building in the British Empire—to soar on its first flight, to its last fateful voyage. The full story behind R.101 shows that, although it was a failure, it was nevertheless a supremely imaginative human creation. The technical achievement of creating R.101 reveals the beauty, majesty, and, of course, the sorrow of the human experience.The narrative follows First Officer Noel Atherstone and his crew from the ship’s first test flight in 1929 to its fiery crash on October 5, 1930. It reveals in graphic detail the heroic actions of Atherstone as he battled tremendous obstacles. He fought political pressures to hurry the ship into the air, fended off Britain’s most feted airship pilot, who used his influence to take command of the ship and nearly crashed it, and, a scant two months before departing for India, guided the rebuilding of the ship to correct its faulty design. After this tragic accident, Britain abandoned airships, but R.101 flew again, its scrap melted down and sold to the Zeppelin Company, who used it to create LZ 129, an airship even more mighty than R.101—and better known as the Hindenburg. Set against the backdrop of the British Empire at the height of its power in the early twentieth century,Fatal Flight portrays an extraordinary age in technology, fueled by humankind’s obsession with flight.
Baseball Prospectus 2013
Baseball Prospectus - 2013
Baseball Prospectus 2013 brings together an elite group of analysts to provide the definitive look at the upcoming season in critical essays and commentary on the thirty teams, their managers, and more than sixty players and prospects from each team.Contains critical essays on each of the thirty teams and player comments for some sixty players for each of those teamsProjects each player's stats for the coming season using the groundbreaking PECOTA projection system, which has been called "perhaps the game's most accurate projection model" (Sports Illustrated)From Baseball Prospectus, America's leading provider of statistical analysis for baseballNow in its eighteenth edition, this New York Times bestselling insider's guide remains hands down the most authoritative and entertaining book of its kind.
WordPress All-In-One for Dummies
Lisa Sabin-Wilson - 2011
Eight minibooks provide you with expanded coverage of the most important topics to the WordPress community, such as WordPress basics, theme designs, plug-in development, social media integration, SEO, customization, and running multiple sites. Veteran author Lisa Sabin-Wilson leads an authoritative team of authors who offer their unique knowledge and skillset while sharing invaluable advice for maximizing your site's potential and visitor experience.Presents straightforward and easy-to-understand coverage of the basics of WordPress, the most popular blog software in use today Delves into the topics that matter most to the WordPress community, such as theme design, plug-in development, and social media integration Addresses ways to handle a variety of WordPress security issues Examines the WordPress network The word on the street is that WordPress All-in-One For Dummies presents everything you need to know about WordPress in one convenient book!
Song Without Words: Discovering My Deafness Halfway through Life
Gerald Shea - 2013
Song without Words tells the astonishing story of a man who, at the age of thirty-four, discovered that he had been deaf since childhood, yet somehow managed to navigate his way through Andover, Yale, and Columbia Law School, and to establish a prestigious international legal career. Gerald Shea's witty and candid memoir of how he compensated for his deafness -- through sheer determination and an amazing ability to translate the melody of vowels. His experience gives fascinating new insight into the nature and significance of language, the meaning of deafness, the fierce controversy between advocates of signing and of oral education, and the longing for full communication that unites us all.
8 Things We Hate About IT: How to Move Beyond the Frustrations to Form a New Partnership with IT
Susan Cramm - 2010
Instead, you get endless rules and regulations, not to mention processes, projects, and technologies that deliver too little, too late, for too much. It's frustrating!How to build a relationship that puts you firmly in control and produces the business results you need? In The 8 Things We Hate About IT, Susan Cramm provides the answers.Start by understanding differences between operational and IT managers - in backgrounds, personality, pressures, and incentives. Cramm explains how differences prevent operational managers and IT from communicating what, why, and how they do what they do.Citing case studies and stories, the author then presents practical strategies for overcoming the difficulty. These include seeing things from your IT partners' perspective, developing a single version of 'truth,' and assuming accountability for IT just as you've done for management of your firm's financial and human resources.Brutally honest, provocative, and filled with sound advice, this book reveals that the key to solving the IT problem is decidedly un-IT: it's a deeper understanding of human behavior, including how to apply your leadership skills to the world of IT.
Nmap Cookbook: The Fat-free Guide to Network Scanning
Nicholas Marsh - 2010
Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.
Rick Steves Pocket Barcelona
Rick Steves - 2013
Everything a busy traveler needs is easy to access: a neighborhood overview, city walks and tours, sights, handy food and accommodations charts, an appendix packed with information on trip planning and practicalities, and a fold-out city map.Rick Steves Pocket Barcelona includes the following walks and tours:• Ramblas Ramble• Barri Gotic and Cathedral Tour• Picasso Museum Tour• Eixample Walk• Sagrada Familia Tour
Just My Type: A Book about Fonts
Simon Garfield - 2010
Whether you’re enraged by Ikea’s Verdanagate, want to know what the Beach Boys have in common with easy Jet or why it’s okay to like Comic Sans, Just My Type will have the answer. Learn why using upper case got a New Zealand health worker sacked. Refer to Prince in the Tafkap years as a Dingbat (that works on many levels). Spot where movies get their time periods wrong and don’t be duped by fake posters on eBay. Simon Garfield meets the people behind the typefaces and along the way learns why some fonts – like men – are from Mars and some are from Venus. From type on the high street and album covers, to the print in our homes and offices, Garfield is the font of all types of knowledge.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Must Have AR-15 Upgrades
Vitaly Pedchenko - 2013
Ebook about the best and the most popular AR-15 upgrades.
