Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell


Lee Holmes - 2007
    Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem

Ctrl+Shift+Enter Mastering Excel Array Formulas: Do the Impossible with Excel Formulas Thanks to Array Formula Magic


Mike Girvin - 2013
    Beginning with an introduction to array formulas, this manual examines topics such as how they differ from ordinary formulas, the benefits and drawbacks of their use, functions that can and cannot handle array calculations, and array constants and functions. Among the practical applications surveyed include how to extract data from tables and unique lists, how to get results that match any criteria, and how to utilize various methods for unique counts. This book contains 529 screen shots.

Cyberpunk: Outlaws and Hackers on the Computer Frontier


Katie Hafner - 1991
    In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.

Frontiers of Electronic Commerce


Ravi Kalakota - 1996
    This work is aimed at the business person who wants to understand the revolution taking place in electronic commerce. It explains the emerging technology and network infra-structure, and emphasizes the business applications and mercantile strategies, challenges and opportunities of conducting business on the information superhighway. The study also describes pertinent standards and protocols.

The Beginning After The End: Transcendence, Book 6


TurtleMe - 2021
    

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Stuff Every Geek Should Know


Quirk Books - 2014
    Featuring content from Quirk's nerdiest titles plus all-new, never-before-seen good stuff from the geekiest bloggers in the known universe. Chapters include: GEEK SKILLS FROM POP CULTURE: How to survive a haunted house, perform the Vulcan nerve pinch, decode ciphers, and master other survival skills. GEEKS IN ACTION: How to make amazing YouTube vids, create comic books, handle yourself in an online multiplayer game, and generally get your geek on. THE GEEK GATHERING: How to have the best convention experience of your life. GEEK LOVE: How to craft an online dating profile, plan a geeky marriage proposal, pass on geek wisdom to your kids, and otherwise enjoy the human emotion of "love."

Introduction to Geographic Information Systems [With CDROM]


Kang-Tsung Chang - 2001
    Now in its 12th edition, it is still the market leader and is known for its scientific research base and its currency, comprehensiveness, and accuracy.

PHP 6 and MySQL 5 for Dynamic Web Sites: Visual Quickpro Guide


Larry Ullman - 2007
    With step-by-step instructions, complete scripts, and expert tips to guide readers, this work gets right down to business - after grounding readers with separate discussions of first the scripting language (PHP) and then the database program (MySQL), it goes on to cover security, sessions and cookies, and using additional Web tools.

Practical UNIX & Internet Security


Simson Garfinkel - 1991
    Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.

Google Adwords - An Introduction: The Ultimate Guide To The Many Opportunities for the Pay Per Click Professional: For Your Business & For Your Career!


James Lynch - 2015
    Whether you aspire to become a Search Engine Marketing PPC Professional or just want to learn more about Google AdWords Pay Per Click advertising to use it in your own business. PPC advertising can drive some really great - really targeted traffic to practically any website AND you can do it fairly inexpensively if you learn how to do it right. Google AdWords is most certainly the best place to start, as practically every other pay per click platform has in some form or another modeled its foundation around the basic AdWords type PPC concepts. What this book is about: Google AdWords - An Introduction, is a guide for you to run through and see if you think that Google AdWords is something you want to learn more about… This book is for you if: You would like to see at a very high level, how you can use PPC / Google AdWords to drive highly targeted traffic to ANY website. or You're thinking about maybe becoming a Certified Google AdWords Professional and taking on clients of your own, and running their pay-per-click campaigns for them and GET PAID. or You may be thinking about working directly for a business or advertising agency and running PPC campaigns for them as a Search Engine Marketing – PPC Professional. Becoming a Certified Google AdWords Professional opens many, many doors in the world of online marketing. I'll show you how to become Google Certified and get on the fast track to becoming a Search Engine Marketing - PPC Professional that is in extremely high demand in the digital marketing space today. This book may also be for you if: You find yourself at a crossroads and: 1 - You’re stuck in a dead-end job: customer service, sales or otherwise and you’re wanting to improve your job status, career choices and your PAY. 2 - You’re thinking about becoming an AdWords Certified Consultant serving your own clients as a consultant or at an agency. 3 - You’re an entrepreneur, coach or business owner and you want to learn more about paid media buying to market yourself and your business online. This book is intended to help you to get a high level vision and overview of the Google AdWords & Pay Per Click Advertising. Whatever your current situation, this book will give you a taste of what it’s like inside the world of Pay Per Click Advertising. After reading through once or twice… YOU WILL KNOW IF PPC is right for you at this point and time in your business/career/life. What this book is NOT about. This book is not about the latest and greatest tips and tricks for using Google AdWords… I do offer extensive AdWords PPC training through my web site: http://ppcequation.com - Both free and paid training can be found there. I just want to be 100% transparent with you and let you know that this book is not going to make you a PPC expert in one read. It's simply an introduction to the industry, either for the business owner / entrepreneur wanting to drive more traffic to his offerings or for someone thinking about becoming a Pay Per Click Professional as a career. Take a look inside at the table of contents before you order to see all that's covered... I guarantee you will find some great takeaways... gold nuggets and bonuses within. So please: Read, Relax and Enjoy!

Quinn Security: A Boxset


Dee Bridgnorth - 2018
    Their town is under attack by a rogue shifter, and this time, their werewolf senses might not be enough to restore the peace. TROY The eldest Quinn might look thirty-five, but he’s walked the Tetons, Great Plains, and now Yellowstone for a century. Having served his country in three separate wars, shifting both aliases and appearances, alike—Troy can turn wolf by the light of a full moon and shift back in the blink of an eye—this towering and tatted alpha has inherited the Quinn throne, the clan of which has been operating hidden in Devil’s Fist since the first Native American took his last breath. But when a shy, bookish woman by the name of Reece Gladstone becomes a target after her co-worker is brutally murdered, Troy must untangle his complicated feelings for the librarian, feelings that have been percolating, unrepressed yet denied for years, and use every shifting trick in the book to keep her safe. KALEB Kaleb Quinn, the second eldest of the Quinn clan, likes his women like he likes his meat—raw and juicy. But recently, his playboy approach has been stilted and much to his chagrin, but not because the rumors have caught up to him. In his dreams, an ethereal woman with flowing blonde hair and a distinct darkness behind her twinkling eyes has been creeping in and overpowering his subconscious. Kaleb knows what it means, and who she is—his one true mate who he’s never met in the flesh. But as danger closes in, it seems that all of his dreams are quickly turning into a nightmare he can’t escape. Lucy Cooper has a reputation, as well, but it’s far from flattering. The slender diner waitress has seen the dark, rogue shifter up close and personal, but the Sheriff’s take on the matter, which the residents have also adopted, is that she’s on drugs and not to be trusted. Nothing could be further from the truth, but when a body turns up dead in her apartment, there’s only one man in town who believes her innocence—Kaleb Quinn. SHANE The war might have ended overseas, but Shane Quinn never came back from it. Not mentally. A loner to the bone, with battle scars peppered across his ripped physique, Shane walks the streets like dry ice wafting over cold steel. A smile hasn’t cracked his hardened exterior in all the years his brothers have known him, the running joke being that he was born angry and ready to annihilate. But when the Sheriff’s daughter, Whitney Abernathy storms into his life, Shane finds himself disarmed by her fiery spirit. Given the bodyguard’s fighting nature, this poses a serious problem. CONOR Conor Quinn knows that everlasting immortality for any werewolf hinges upon their eternal union with their one true mate. Three of his four brothers have found safety in having bonded to their destined mates, now functioning with fearless presence and power. Conor finds himself compelled, on a mission to connect with his own. But just because the determined, former marine and secret werewolf has chosen Rachel Clancy to be his one true mate, doesn’t mean that’s their destiny. Or does it? DEAN The youngest of the Quinn clan, Dean puts his love of Devil’s Fist before all else. Rugged and handsome, the tall, brooding werewolf is heavily tatted and deeply scarred and there’s nothing he hates more than a spoiled rich girl.

10 Step Plan to Promote Your Book: Online Book Marketing on Any Budget


Scott Hughes - 2015
     The plan works on any budget. It works for the wealthy busy professional as well as for the struggling artist short on funding. About the Author ~ As the founder of Online Book Club, Scott Hughes has spent over a decade in this new industry, working with thousands of authors to advertise books online. Scott Hughes has worked in the ebook marketing industry before the Kindle ever existed!

Kindle Fire Tips & Tricks


Tim Sievers - 2011
    You'll get up to speed quickly with this straight forward guide, full of practical step-by-step visual instructions. Full color screen shots help you learn visually and quickly become productive. <br><br>From the best selling author of the Top 100 Tips for iPad.