Steal This Computer Book 4.0 – What They Won′t Tell You About the Internet 4e


Wallace Wang - 2006
    It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances. Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected. He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work. Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hack

The World After, Book 2


Ryan Casey - 2017
    In the months since, the group have been getting by, slowly adapting to the ways of survival in the new world.But just when Scott's group are beginning to find their feet, they are attacked by a rival group, who kidnap several of Scott's friends. And this rival group are not playing around. They have their own morbid ideas of how the new world should be, and they aren't going to quit until their image becomes reality...With his friends abducted and facing foes in every direction, Scott is forced on a dangerous journey of rescue. But in a world without power and order, Scott soon realises that this journey may cost him his most treasured possession... his life.The World After: Book Two is the second book in a new post apocalyptic trilogy by Ryan Casey, author of Dead Days and Infection Z. It is sure to delight fans of the author's trademark complex characters, rapid pacing, and unexpected twists and turns.

Wikinomics: How Mass Collaboration Changes Everything


Don Tapscott - 2006
     Today, encyclopedias, jetliners, operating systems, mutual funds, and many other items are being created by teams numbering in the thousands or even millions. While some leaders fear the heaving growth of these massive online communities, Wikinomics proves this fear is folly. Smart firms can harness collective capability and genius to spur innovation, growth, and success. A brilliant guide to one of the most profound changes of our time, Wikinomics challenges our most deeply-rooted assumptions about business and will prove indispensable to anyone who wants to understand competitiveness in the twenty-first century. Based on a $9 million research project led by bestselling author Don Tapscott, Wikinomics shows how masses of people can participate in the economy like never before. They are creating TV news stories, sequencing the human genome, remixing their favorite music, designing software, finding a cure for disease, editing school texts, inventing new cosmetics, or even building motorcycles. You'll read about: • Rob McEwen, the Goldcorp, Inc. CEO who used open source tactics and an online competition to save his company and breathe new life into an old-fashioned industry. • Flickr, Second Life, YouTube, and other thriving online communities that transcend social networking to pioneer a new form of collaborative production. • Mature companies like Procter & Gamble that cultivate nimble, trust-based relationships with external collaborators to form vibrant business ecosystems. An important look into the future, Wikinomics will be your road map for doing business in the twenty-first century.

How to Start a Blog Today: A Free Step-by-Step Beginner’s Guide to Create a Blog in 20 minutes


Scott Chow - 2017
    The entire process is explained in simple, easy to understand terms, so you can create a great blog without any technical knowledge. First, you will learn the basic process of WordPress blogging, which is the free software your blog will be built with. Once that is done, you will move on to customization of your new blog. The book then ends with chapters on promoting your blog and blogging for profit. In addition, the author offers additional support and updates through his website, free of charge.

The Scrum Master Training Manual: A Guide to the Professional Scrum Master (PSM) Exam


Nader K. Rad - 2015
    It’s helpful for learning Agile and Scrum, and also for a basic preparation for the PSM I exam (Professional Scrum Master level 1). It can also act as a simple reference for Scrum practitioners.

Rule the Web: How to Do Anything and Everything on the Internet--Better, Faster, Easier


Mark Frauenfelder - 2007
    But aren't you curious about what else the Web can do for you? Or if there are better, faster, or easier ways to do what you're already doing? Let the world's foremost technology writer, Mark Frauenfelder, help you unlock the Internet's potential--and open up a richer, nimbler, and more useful trove of resources and services, including:EXPRESS YOURSELF, SAFELY. Create and share blogs, podcasts, and online video with friends, family, and millions of potential audience members, while protecting yourself from identity theft and fraud.DIVIDE AND CONQUER. Tackle even the most complex online tasks with ease, from whipping up a gorgeous Web site to doing all your work faster and more efficiently within your browser, from word processing to investing to planning a party.THE RIGHT WAY, EVERY TIME. Master state-of-the-art techniques for doing everything from selling your house to shopping for electronics, with hundreds of carefully researched tips and tricks.TIPS FROM THE INSIDERS. Mark has asked dozens of the best bloggers around to share their favorite tips on getting the most out of the Web.

Scott Kelby's 7-Point System for Adobe Photoshop Cs3


Scott Kelby - 2004
    Then, and perhaps most importantly, the text determines exactly when and in which order to apply these seven techniques.

Cypherpunks: Freedom and the Future of the Internet


Julian Assange - 2012
    Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.

Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World


Joseph Menn - 2019
    Though until now it has remained mostly anonymous, its members invented the concept of hacktivism, released the top tool for testing password security, and created what was for years the best technique for controlling computers from afar, forcing giant companies to work harder to protect customers. They contributed to the development of Tor, the most important privacy tool on the net, and helped build cyberweapons that advanced US security without injuring anyone. With its origins in the earliest days of the Internet, the cDc is full of oddball characters -- activists, artists, even future politicians. Many of these hackers have become top executives and advisors walking the corridors of power in Washington and Silicon Valley. The most famous is former Texas Congressman and current presidential candidate Beto O'Rourke, whose time in the cDc set him up to found a tech business, launch an alternative publication in El Paso, and make long-shot bets on unconventional campaigns.Today, the group and its followers are battling electoral misinformation, making personal data safer, and battling to keep technology a force for good instead of for surveillance and oppression. Cult of the Dead Cow shows how governments, corporations, and criminals came to hold immense power over individuals and how we can fight back against them.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Passport to World Band Radio


Lawrence Magne - 1955
    Only world band radio delivers this no matter what, and quick-access Passport to World Band Radio is the #1 seller to this market-over a million copies sold to date. Each edition is welcomed by established and emerging readers alike, as Passport delivers in nearly 600 pages what world band listeners seek: * Three-way guide to what's on from stations in dozens of countries: news, entertainment and opinion in English and other languages. All three formats: country-by-country, channel-by-channel, hour-by-hour. * Award-winning reviews of world band radios and accessories, with ratings of dozens of models from Sony, Grundig and others. Radios for emergencies, too. * Wealth of helpful how-to articles, along with a directory of station contacts, webcasts and a glossary. This annual title keeps readers coming back year after year, making it what one chain buyer hails as a quiet bestseller.

Grouped: How Small Groups of Friends Are the Key to Influence on the Social Web


Paul Adams - 2011
    It is moving away from its current structure of documents and pages linked together, and towards a new structure that is built around people. This is a profound change that will affect how we create business strategy, design, marketing, and advertising. The reason for this shift is simple. For tens of thousands of years we've been social animals. The web, which is only 20 years old, is simply catching up with offline life.From travel to news to commerce, smart businesses are reorienting their efforts around people-around the social behavior of their customers and potential customers. In order to be successful, businesses will need to understand how people are connected, how their social network influences them, how the people closest to them influence them the most, and how it's more important for marketers to focus on small, connected groups of friends rather than looking for overly influential individuals.This book pulls together the latest research from leading universities and technology companies to describe how people are connected, and how ideas and brand messages spread through social networks. It shows readers how to rebuild their business around social behavior, and create products that people tell their friends about.

The Book of Useless Information


Noel Botham - 2006
    Then again, maybe not. But to The Useless Information Society, any fact that passes its gasp-inducing, not-a-lot-of-people-know-that test merits inclusion in this fascinating but ultimately useless book... Did you know (or do you care)...- That fish scales are used to make lipstick?- Why organized crime accounts for ten percent of the United States's annual income?- The name of the first CD pressed in the United States?- The last year that can be written upside-down or right side-up and appear the same?- The shortest performance ever nominated for an Oscar(R)?- How much Elvis weighed at the time of his death?- What the suits in a deck of cards represent?- How many Quarter Pounders can be made from one cow?- How interesting useless information can be?The Book of Useless Information answers these teasers and is packed with facts and figures that will captivate you--and anyone who shares your joy in the pursuit of pointless knowledge.

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Strategic Marketing


David W. Cravens - 1982
    The new edition of "Strategic Marketing" uses a decision-making process to examine the key concepts and issues involved in analyzing and selecting strategies. Marketing strategy is considered from a total business perspective, examining marketing strategy beyond the traditional emphasis on marketing functions. The length and design of the book offer flexibility in the use of the text material and cases. New features and updated cases have made this text the most relevant text in the market today.