Book picks similar to
How To Unblock Everything On The Internet by Ankit Fadia
hacking
handbook
z
sami
The Geography of Genius: A Search for the World's Most Creative Places from Ancient Athens to Silicon Valley
Eric Weiner - 2016
He explores the history of places, like Vienna of 1900, Renaissance Florence, ancient Athens, Song Dynasty Hangzhou, and Silicon Valley, to show how certain urban settings are conducive to ingenuity. And, with his trademark insightful humor, he walks the same paths as the geniuses who flourished in these settings to see if the spirit of what inspired figures like Socrates, Michelangelo, and Leonardo remains. In these places, Weiner asks, “What was in the air, and can we bottle it?”
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Programming Entity Framework: DbContext
Julia Lerman - 2011
This concise book shows you how to use the API to perform set operations with the DbSet class, handle change tracking and resolve concurrency conflicts with the Change Tracker API, and validate changes to your data with the Validation API.With DbContext, you’ll be able to query and update data, whether you’re working with individual objects or graphs of objects and their related data. You’ll find numerous C# code samples to help you get started. All you need is experience with Visual Studio and database management basics.Use EF’s query capabilities to retrieve data, and use LINQ to sort and filter dataLearn how to add new data, and change and delete existing dataUse the Change Tracker API to access information EF keeps about the state of entity instancesControl change tracking information of entities in disconnected scenarios, including NTier applicationsValidate data changes before they’re sent to the database, and set up validation rulesBypass EF’s query pipeline and interact directly with the database
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kevin Poulsen - 2011
Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.
How to Reassess Your Chess: The Complete Chess Mastery Course
Jeremy Silman - 1997
In clear, direct language, Silman shows how to dissect a position, recognize its individual parts and ultimately find the move that conforms to the needs of that particular situation. By explaining the thought processes that go into a master's choice of move, the author presents a system of thought that makes advanced strategies seem clear, logical and at times even obvious. How the Reassess Your Chess offers invaluable knowledge and insight that cannot be found in any other book.
How to Stage a Military Coup: From Planning to Execution
David Hebditch - 2005
David Hebditch and Ken Connor examine, with a critical eye, successful as well as failed coup attempts throughout the twentieth century with the aim of showing their readers just what it takes to swiftly and soundly overthrow a government. Exploring coups from Nigeria, to Cuba, to Iraq, and with true stories of SAS combat written by Ken Connor, the book gives an insightful glimpse into this violent and rarely-seen world of shifting power.How to Stage a Military Coup is a unique textbook for the armchair revolutionary, as well as a practical guide for the idealist with a soft spot for the sound of artillery fire. From evaluation of the political climate and investigation of potential allies, to recruiting and training personnel, to strategies for ensuring timely transfer of power, the book leaves no aspect of the coup d'etat unexamined. The book also includes appendixes, notes, and a world map of coups d'etat.
Fundamentals of Computer Algorithms
Ellis Horowitz - 1978
The book comprises chapters on elementary data structures, dynamic programming, backtracking, algebraic problems, lower bound theory, pram algorithms, mesh algorithms, and hypercube algorithms. In addition, the book consists of several real-world examples to understand the concepts better. This book is indispensable for computer engineers preparing for competitive examinations like GATE and IES.
Fundamentals of Electrical Drives
G.K. Dubey - 2001
Suitable for undergraduate and postgraduate courses in electrical drives, this book covers topics on: Dynamics and control of electrical drives; Selection of motor power rating; DC, induction and synchronous motor drives; Stepper motor and switched reluctance motor drives; Permanent magnet ac and brushless dc motor drives; and more.
What Every Web Developer Should Know About HTTP (OdeToCode, #1)
K. Scott Allen - 2012
We'll cover resources, messages, cookies, and authentication protocols. We'll look at how HTTP clients can use persistent and parallel connections to improve performance,and see how the web scales to meet demand using cache headers andproxy servers. By the end of the book you will have the knowledge tobuild better web applications and web services.
Dear Data
Giorgia Lupi - 2016
The result is described as “a thought-provoking visual feast”.
Ray Tracing in One Weekend (Ray Tracing Minibooks Book 1)
Peter Shirley - 2016
Each mini-chapter adds one feature to the ray tracer, and by the end the reader can produce the image on the book cover. Details of basic ray tracing code architecture and C++ classes are given.
Database in Depth: Relational Theory for Practitioners
C.J. Date - 2005
Database in Depth: The Relational Model for Practitioners goes beyond the hype and gets to the heart of how relational databases actually work.Ideal for experienced database developers and designers, this concise guide gives you a clear view of the technology--a view that's not influenced by any vendor or product. Featuring an extensive set of exercises, it will help you:understand why and how the relational model is still directly relevant to modern database technology (and will remain so for the foreseeable future)see why and how the SQL standard is seriously deficientuse the best current theoretical knowledge in the design of their databases and database applicationsmake informed decisions in their daily database professional activitiesDatabase in Depth will appeal not only to database developers and designers, but also to a diverse field of professionals and academics, including database administrators (DBAs), information modelers, database consultants, and more. Virtually everyone who deals with relational databases should have at least a passing understanding of the fundamentals of working with relational models.Author C.J. Date has been involved with the relational model from its earliest days. An exceptionally clear-thinking writer, Date lays out principle and theory in a manner that is easily understood. Few others can speak as authoritatively the topic of relational databases as Date can.
Bobby Fischer Teaches Chess
Bobby Fischer - 1966
The way a teaching machine works is: It asks you a question. If you give the right answer, it goes on to the next question. If you give the wrong answer, it tells you why the answer is wrong and tells you to go back and try again. This is called "programmed learning". The real authors were experts and authorities in the field of programmed learning. Bobby Fischer lent his name to the project. Stuart Margulies is a chess master and also a recognized authority on programmed learning. He is a widely published author of more than 40 books, all in the field of programmed learning, especially in learning how to read. For example, one of his books is "Critical reading for proficiency 1 : introductory level". Donn Mosenfelder is not a known or recognized chess player, but he was the owner of the company that developed and designed this book. He has written more than 25 books, almost all on basic reading, writing and math.
The Elements of Typographic Style
Robert Bringhurst - 1992
Combining practical, theoretical, and historical, this book is a must for graphic artists, editors, or anyone working with the printed page using digital or traditional methods.Having established itself as a standard in its field The Elements of Typographic Style is house manual at most American university presses, a standard university text, and a reference work in studios of designers around the world. It has been translated into italian and greek, and dutch.