Book picks similar to
FreeBSD Mastery: Specialty Filesystems (IT Mastery Book 8) by Michael W. Lucas
x-ipad-technical
audio_wanted
books-wantex
computers
Athelon - War of the Three Planets
Justin Bell - 2019
A young girl submerged into a galactic conflict. A single chance to help win the war. The daughter of a royal family, Brie Northstar believes she knows what to expect from life. She's wrong. During a routine shuttle trip to one of the outer planets, Brie's transport is destroyed and she finds herself thrust into a centuries old conflict between three warring planets, a conflict she is suddenly in the middle of. Yet somehow this young teenager from Athelon has skills and abilities she shouldn't have - she can't have. Now separated from her family with only her wits - and her newfound abilities - to help she travels from planet to planet, risking her life to prevent galactic destruction and unite a rebellion to save the galaxy. For the first time ever - the complete nine book War of the Three Planets series is available in a single omnibus for a ridiculously low price. If you love Ender's Game you will love War of the Three Planets.
Bourbon Street Shorts
Deanna Chase - 2020
The tree is decorated, the mistletoe is in place, and the crab puffs are to die for. Nothing can spoil this celebration…except for some wayward magic and a pesky ghost who crashes the party.SPIRITS OF BOURBON STREETIt’s Halloween on Bourbon Street, and white witch Jade Calhoun is ready to party. But when a sexy spirit traps everyone in the past, she’s forced to forgo the cocktails in order to save those she loves...again.A MIRACLE ON BOURBON STREETIt’s Christmas Eve and Jade Calhoun’s ready for a quiet, magical night with her husband Kane. But when Santa demons and energy-stealing elves start wreaking havoc, it’s going to take a miracle on Bourbon Street to save Christmas.A BOURBON STREET VALENTINEIt’s Valentine’s Day and magic’s in the air. Only Kat Hart never expected her handmade jewelry to be at the center of everything. So when her night out at Cupid’s Ball turns into a competition to be a handsome stranger’s wife, it’s up to her to break the spell…or she might get more than she bargained for.SPIRITS, HURRICANES, AND THE KREWE OF GHOULIt’s Halloween and Pyper Rayne’s all vamped up, ready to play the vampire bride. And so is Ida May, her resident ghost. But when the “vampires” they're partying with start to appear to be real, there’s more at stake than just a little bite.KISSED BY TEMPTATIONThe last place sex-witch Mati Ballintine wants to be is at a holiday sorority party. But when the high angel from the council orders her to protect a new angel recruit, she has no choice but to go and grit her teeth through the frat boys’ advances.
The night turns from bad to worse when a demon appears and is hell-bent on taking the angel to Hell. Mati and her incubus boyfriend Vaughn will need to combine forces to not only save the angel, but everyone else the demon leaves in his wake.
Terry Goodkind
Jesse Russell - 2012
Before his success as an author Goodkind worked primarily as a painter, as well as doing carpentry and woodworking. Goodkind is a proponent of Ayn Rand's philosophical approach of Objectivism, with references to Rand's ideas and novels referenced in his works.The Sword of Truth series sold twenty-five million copies worldwide and was translated into more than twenty languages. It was adapted into a television series called Legend of the Seeker, premiering November 1, 2008 but canceled after two seasons in May, 2010.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Lee Holmes - 2007
Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem
Gai-Jin Part 3 Of 3
James Clavell - 2000
Sweeping us back to the enigmatic and elusive land of his best-selling Shogun, he weaves an extraordinary tale of Japan, now newly open to gai-jin - foreigners - and teeming with contradictions as the ancient and the modern meet in a clash of cultures, of nations, of generations. It is 1862, and in Japan's Foreign Settlement of Yokohama, reverberations from an explosive act of violence will forever alter - and connect - the lives of the major characters. Malcolm Struan, at twenty, is heir to the title of tai-pan of the most powerful and bitterly contested English trading company in the Orient, the Noble House. Malcolm's fate, and that of his family's legacy, become inextricably intertwined with that of a beautiful young French woman, Angelique Richaud. Desired by many, loved purely and passionately by Malcolm, Angelique will hold the future of the Noble House in her hands. Intricately interwoven into the story of the struggle for control of the Noble House is a powerful parallel story of the Land of the Gods, Japan, a country ripped apart by greed, idealism, and terrorism as groups of young xenophobic revolutionaries, ronin, attempt to seize the Shogunate and expel the hated gai-jin from Japan. One man, Lord Toranaga Yoshi, a direct descendant of the first Toranaga Shogun, attempts not only to protect the Shogunate, but to usher it, and Japan, into the modern age. Amid the brutality and heroism, the betrayals and the stunning romance, a multilayered, complex story unfolds. Here the dark and erotic world of the pleasure houses - the Ladies of the Willow World, spies, and terrorists - meets the world of pageantry and power - monarchs and diplomats. And here East meets West in an inevitable collision of two equally powerful cultures as James Clavell creates a vibrant and authentic
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz - 2014
But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."
Practical C++ Programming
Steve Oualline - 1995
But this high-level language is relatively difficult to master, even if you already know the C programming language.The 2nd edition of Practical C++ Programming is a complete introduction to the C++ language for programmers who are learning C++. Reflecting the latest changes to the C++ standard, this 2nd edition takes a useful down-to-earth approach, placing a strong emphasis on how to design clean, elegant code.In short, to-the-point chapters, all aspects of programming are covered including style, software engineering, programming design, object-oriented design, and debugging. It also covers common mistakes and how to find (and avoid) them. End of chapter exercises help you ensure you've mastered the material.Practical C++ Programming thoroughly covers: C++ Syntax Coding standards and style Creation and use of object classes Templates Debugging and optimization Use of the C++ preprocessor File input/output Steve Oualline's clear, easy-going writing style and hands-on approach to learning make Practical C++ Programming a nearly painless way to master this complex but powerful programming language.
Unauthorised Access: Physical Penetration Testing for IT Security Teams
Wil Allsopp - 2009
IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.
The AWK Programming Language
Alfred V. Aho - 1988
In 1985, a new version of the language was developed, incorporating additional features such as multiple input files, dynamic regular expressions, and user-defined functions. This new version is available for both Unix and MS-DOS. This is the first book on AWK. It begins with a tutorial that shows how easy AWK is to use. The tutorial is followed by a comprehensive manual for the new version of AWK. Subsequent chapters illustrate the language by a range of useful applications, such as: Retrieving, transforming, reducing, and validating data Managing small, personal databases Text processing Little languages Experimenting with algorithms The examples illustrates the books three themes: showing how to use AWK well, demonstrating AWKs versatility, and explaining how common computing operations are done. In addition, the book contains two appendixes: summary of the language, and answers to selected exercises.
The Sam Prichard Series
David Archer - 2016
** Over 2,000 five star reviews across the series! **
FROM USA TODAY & AMAZON #1 BESTSELLING AUTHOR. Box set comprising: The Kill List, Drifter Part I, Drifter Part II, & Drifter Part III. ***SPOILERS AHEAD***
Meet retired cop, Sam Prichard.
THE KILL LIST (Book 5) “Mr. Prichard, it said, the people you see in the photos will be killed within the next forty-eight hours, unless you stop me. I have been following your exploits closely, and I think that you are the one I need to make sure I stop doing this. I've been trying for more than fifteen years to kick this habit, but I can't. Normally, I don't strike so many times so close together, but in order to get you interested, I'm going to up the odds. I need you to do only two things: discover who each of my victims is, and then do all you can to stop me before I can kill each one. The first one will die exactly twenty-four hours after you receive this note. The second will die twelve hours after that... ...and the third twelve hours after that. If you cannot stop me before I can kill the third one, then no one can. Then there will be a fourth victim, but you get no clues for that one. Good luck." DRIFTER: PART I (Book 6) Sam takes on an odd case: he's hired to track down a man who has been thought to be dead for more than forty years, but recently showed up alive to visit his dying mother. Now his daughter, who never even met him, wants to ask him where he's been all this time, and why she grew up without him in her life. When that man turns out to be a former government assassin who's gone rogue, however, Sam decides it's time for him to bow out of the case--but then he learns that the one you think is the bad guy isn't always right. The supposedly rogue agent, it turns out, may actually be trying to save America from global Jihad. With everything from his family's safety to the future of America's Sovereignty on the line, Sam has to figure out who to trust and what to do, before it all blows up in his face. DRIFTER: PART II (Book 7) Sam Prichard is on his way to the most unbelievable mission any PI could ever blunder into--to stop a madman who thinks he is the Antichrist! The only problem is that this madman is smart, smart enough that he's been working toward this goal for many years, and never gotten caught. To make matters worse, there's no one to whom Sam can turn, because everyone in politics owes this man favors, and fears the day he reveals what he knows. With just a former CIA assassin at his side and a determination to save his country and the thousands that the madman is prepared to sacrifice to his false gods, Sam Prichard must go to the ends of the earth to try to stop the end of the world! DRIFTER: PART III (Book 8) When he was asked to locate a man who seemed to have disappeared in Vietnam but then turned up alive in Denver forty years later, he thought he was simply taking on a case to help bring closure to a daughter who felt abandoned. Unfortunately, there's a lot more to the story, and now Sam must ally himself to one of the most deadly, cold-blooded killers he's ever known. A rogue agent of the CIA has decided that a number of ancient prophecies, including those in the Bible, name him as the new world leader, and he will literally stop at nothing to achieve his goals.
The Sara Gruen Collection: Water for Elephants - At the Water's Edge - Ape House
Sara Gruen - 2016
He meets Marlena, the beautiful young star of the equestrian act, married to August, the charismatic but twisted animal trainer. He also meets Rosie, an elephant who seems untrainable until he discovers a way to reach her...2 - AT THE WATER'S EDGEA gripping and poignant love story set in a remote village in the Scottish Highlands at the end of the Second World War.'The only fault I can find with this book is that I've already finished it' Jodi Picoult'Truly enthralling' Scotsman'Breathtaking' Harper's Bazaar1945. After disgracing themselves at a high society party, spoilt young Philadelphia socialites Maddie and Ellis Hyde are cut off from the family without a penny. Ellis decides their salvation will be to hunt down the Loch Ness Monster, a venture his father very publicly failed at. So, oblivious to WW2 raging around them, they make their way to the Scottish Highlands, where Maddie has to face reality and decide just who the real monsters are.3 - APE HOUSE The New York Times bestseller.'If you love animals like I do, it's a must read' Ellen DeGeneres'Had me instantly enraptured' Dallas Morning News'Wildly entertaining' Booklist (starred review)These bonobos are no ordinary apes. Like others of their species, they are capable of reason and carrying on deep relationships - but, unlike most bonobos, they also know American Sign Language.Isabel Duncan, a scientist at the Great Ape Language Lab, doesn't understand people, but animals she gets, especially the bonobos. Isabel feels more comfortable in their world than she's ever felt among humans . . . until she meets John Thigpen, a very married reporter who braves the ever-present animal rights protesters outside the lab to see what's really going on inside.When an explosion tears apart the lab, severly injuring Isabel and 'liberating' the apes to an unknown destination, John's human interest piece turns into the story of a lifetime.
The Last Song and A Walk to Remember
Nicholas Sparks - 2017
The Art of UNIX Programming
Eric S. Raymond - 2003
This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of hackers the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.