The Computational Beauty of Nature: Computer Explorations of Fractals, Chaos, Complex Systems, and Adaptation


Gary William Flake - 1998
    Distinguishing agents (e.g., molecules, cells, animals, and species) from their interactions (e.g., chemical reactions, immune system responses, sexual reproduction, and evolution), Flake argues that it is the computational properties of interactions that account for much of what we think of as beautiful and interesting. From this basic thesis, Flake explores what he considers to be today's four most interesting computational topics: fractals, chaos, complex systems, and adaptation.Each of the book's parts can be read independently, enabling even the casual reader to understand and work with the basic equations and programs. Yet the parts are bound together by the theme of the computer as a laboratory and a metaphor for understanding the universe. The inspired reader will experiment further with the ideas presented to create fractal landscapes, chaotic systems, artificial life forms, genetic algorithms, and artificial neural networks.

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

Schaum's Outline of Programming with C


Byron S. Gottfried - 1989
    Includes some discussion of the Turbo C++ operating environment, as well as useful information on operators and expressions, data input and output, control sttements, functions, program structure, and arrays.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Async in C# 5.0


Alex Davies - 2012
    Along with a clear introduction to asynchronous programming, you get an in-depth look at how the async feature works and why you might want to use it in your application.Written for experienced C# programmers—yet approachable for beginners—this book is packed with code examples that you can extend for your own projects.Write your own asynchronous code, and learn how async saves you from this messy choreDiscover new performance possibilities in ASP.NET web server codeExplore how async and WinRT work together in Windows 8 applicationsLearn the importance of the await keyword in async methodsUnderstand which .NET thread is running your code—and at what points in the programUse the Task-based Asynchronous Pattern (TAP) to write asynchronous APIs in .NETTake advantage of parallel computing in modern machinesMeasure async code performance by comparing it with alternatives

Practices of an Agile Developer: Working in the Real World


Venkat Subramaniam - 2006
    You'll learn pragmatic ways of approaching the development process and your personal coding techniques. You'll learn about your own attitudes, issues with working on a team, and how to best manage your learning, all in an iterative, incremental, agile style. You'll see how to apply each practice, and what benefits you can expect. Bottom line: This book will make you a better developer.

Slanted


H.L. Wegley - 2019
    When she finds an orphaned girl, Sam, hidden in some bushes along the Rogue River, in an instant, a bond is formed. AJ quickly learns that Sam's and her guardian's lives are in danger from a team of hired killers. But AJ commits to helping eight-year-old Sam. A competitive athlete, AJ Scott isn't one to quit, give up, or do anything halfway, not even when she and Sam end up in a road race with killers in pursuit.When Hunter Jones's cousin dies, he becomes eight-year-old Samantha Wilson's guardian and sets aside any pursuit of personal happiness. Sam becomes his lot in life, and he loves her dearly. But Hunter, a big data analyst, will soon release a research report proving that the largest Internet search engine in the world is being used by its owners to influence American political thought with the intent of controlling elections. He hints at his findings in a radio interview and the news goes viral. Within hours, a team of hired killers attacks Hunter and Sam, intending to eliminate them and steal his research findings. Hunter hides Sam and eludes the killers. But when he returns, Sam is gone. Enraged, Hunter Jones will storm the gates of Hades to get her back, and whoever took her will pay a steep price.Set in Southern Oregon, Seattle, Washington DC, and Eastern Oregon, near Paulina Lake, Slanted is a gritty, high-action, romantic suspense adventure about commitment, sacrifice, love and faith.

The Haunting of the Hadleigh Estate: Book 0


Conner Donnelly - 2018
    But when she gets terrible news that takes her back her uncle’s home there she finds that the town isn’t as innocent as her childhood memories would have her believe. Strange things start to happen in the old house and soon enough Cassie is forced to deal with some hard truths.

Creepy Teacher


Mackie Malone - 2014
    She confronts a dark and disturbing man who engages in kidnapping and murder. Underlying everything is the protagonist's budding new romance. If you read or watch psychological thrillers, this free book will start you off in my series of creepy people novels.