Book picks similar to
Kerberos: A Network Authentication System by Brian Tung
computing
dead-tree
mybooks
office
Colossus: Bletchley Park's Greatest Secret
Paul Gannon - 2006
Using science, math, innovation, and improvisation, Bletchley Park code breakers worked furiously to invent a machine to decipher what turned out to be the secrets of Nazi high command. It was called Colossus. What these code breakers didn't realize was that they had fashioned the world's first true computer. When the war ended, this incredible invention was dismantled and hidden away for almost 50 years. Paul Gannon has pieced together the tremendous story of what is now recognized as the greatest secret of Bletchley Park.
Audition Success
Don Greene - 1998
Combining specially designed self-tests and real-life examples from the careers of two performers, Audition Success will help performers understand what prevents them from nailing an audition and give them the tools to reach their goals.
Apache: The Definitive Guide: Vital Information for Apache Programmers and Administrators
Ben Laurie - 1997
Apache: The Definitive Guide, written and reviewed by key members of the Apache Group, is the only complete guide on the market today that describes how to obtain, set up, and secure the Apache software.Apache was originally based on code and ideas found in the most popular HTTP server of the time: NCSA httpd 1.3 (early 1995). It has since evolved into a far superior system that can rival (and probably surpass) almost any other Unix-based HTTP server in terms of functionality, efficiency, and speed. The new version now includes support for Win32 systems. This new second edition of Apache: The Definitive Guide fully describes Windows support and all the other Apache 1.3 features. Contents include:The history of the Apache Group Obtaining and compiling the server Configuring and running Apache on Unix and Windows, including such topics as directory structures, virtual hosts, and CGI programming The Apache 1.3 Module API Apache security A complete list of configuration directives With Apache: The Definitive Guide, web administrators new to Apache can get up to speed more quickly than ever before by working through the tutorial demo. Experienced administrators and CGI programmers, and web administrators moving from Unix to Windows, will find the reference sections indispensable. Apache: The Definitive Guide is the definitive documentation for the world's most popular web server. Includes CD-ROM with Apache manuals and demo sites discussed in the book.
Dissecting The Hack: The F0rb1dd3n Network
Jayson E. Street - 2009
One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book! Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack
Knock-Out Blackjack: The Easiest Card-Counting System Ever Devised
Olaf Vancura - 1998
The scientifically devised unbalanced K-O count can be used profitably anywhere blackjack is played: Las Vegas, Atlantic City, Mississippi, riverboat casinos, Native American casinos, the Bahamas, and on cruise ships.This second edition, revised and expanded, is now easier to use than ever. Step into the ring and learn to:Implement an abbreviated system—the “K-O Rookie”— that’s powerful enough to yield a player advantage and simple enough to be mastered in a few hours.Advance to a profession-level system—the “K-O Preferred”—which performs on par with the most sophisticated systems on the market.Win the cat-and-mouse game between the casinos and the players.
Adventures In Raspberry Pi (Adventures In ...)
Carrie Anne Philbin - 2013
Written for 11- to 15-year-olds and assuming no prior computing knowledge, this book uses the wildly successful, low-cost, credit-card-sized Raspberry Pi computer to explain fundamental computing concepts. Young people will enjoy going through the book's nine fun projects while they learn basic programming and system administration skills, starting with the very basics of how to plug in the board and turn it on. Each project includes a lively and informative video to reinforce the lessons. It's perfect for young, eager self-learners—your kids can jump in, set up their Raspberry Pi, and go through the lessons on their own. Written by Carrie Anne Philbin, a high school teacher of computing who advises the U.K. government on the revised ICT Curriculum Teaches 11- to 15-year-olds programming and system administration skills using Raspberry Pi Features 9 fun projects accompanied by lively and helpful videos Raspberry Pi is a $35/£25 credit-card-sized computer created by the non-profit Raspberry Pi Foundation; over a million have been sold Help your children have fun and learn computing skills at the same time with Adventures in Raspberry Pi.
Programming C#
Jesse Liberty - 2001
Pursuing that vision, C#'s designers succeeded in creating a safe, simple, component-based, high-performance language that works effectively with Microsoft's .NET Framework. Now the favored language among those programming for the Microsoft platform, C# continues to grow in popularity as more developers discover its strength and flexibility. And, from the start, C# developers have relied on Programming C# both as an introduction to the language and a means of further building their skills. The fourth edition of Programming C#--the top-selling C# book on the market--has been updated to the C# ISO standard as well as changes to Microsoft's implementation of the language. It also provides notes and warnings on C# 1.1 and C# 2.0. Aimed at experienced programmers and web developers, Programming C#, 4th Edition, doesn't waste too much time on the basics. Rather, it focuses on the features and programming patterns unique to the C# language. New C# 2005 features covered in-depth include:Visual Studio 2005GenericsCollection interfaces and iteratorsAnonymous methodsNew ADO.NET data controlsFundamentals of Object-Oriented ProgrammingAuthor Jesse Liberty, an acclaimed web programming expert and entrepreneur, teaches C# in a way that experienced programmers will appreciate by grounding its applications firmly in the context of Microsoft's .NET platform and the development of desktop and Internet applications. Liberty also incorporates reader suggestions from previous editions to help create the most consumer-friendly guide possible.
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"
Jeremy N. Smith - 2019
When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.
Electronic Dreams: How 1980s Britain Learned to Love the Computer
Tom Lean - 2016
In those heady early days of computing, Britannia very much ruled the digital waves.Electronic Dreams looks back at how Britain embraced the home computer, and at the people who drove the boom: entrepreneurs such as Clive Sinclair and Alan Sugar seeking new markets; politicians proclaiming economic miracles; bedroom programmers with an unhealthy fascination with technology; and millions of everyday folk who bought into the electronic dream and let the computer into their lives. It is a history of home computers such as the Commodore VIC20, BBC Micro, and ZX Spectrum; classic computer games like Manic Miner and Elite; the early information networks that first put the home online; and the transformation of the computer into an everyday object in the British home.Based on interviews with key individuals, archive sources, and study of vintage hardware and software, and with a particular focus on the computer's place in social history, Electronic Dreams is a nostalgic look at how a depressed 1980s Britain got over its fear of microchips and embraced the computer as a “passport to the future.”
My Rebbe
Adin Even-Israel Steinsaltz - 2014
During his forty years of leadership, Rabbi Schneerson transformed Chabad into a global movement marked by extensive outreach activities and a closeknit network of emissaries stationed around the world. His passionate devotion to education, social change, and acts of charity and kindness inspired countless people to embrace spirituality in their daily lives.In My Rebbe, celebrated author and thinker Rabbi Adin Even-Israel Steinsaltz shares his firsthand account of this extraordinary individual who shaped the landscape of twentieth-century religious life. Written with the admiration of a close disciple and the nuanced perceptiveness of a scholar, this biography-memoir inspires us to think about our own missions and aspirations for a better world.
Backtrack 5 Wireless Penetration Testing Beginner's Guide
Vivek Ramachandran - 2011
Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
Winning Poker Tournaments One Hand at a Time, Volume I
Eric 'Rizen' Lynch - 2008
These top guns of tournament poker are frequent winners in today's highly competitive online scene, as well as in live tourneys. Their collective experience and track record is staggering: more than 35,000 tournaments played, more than 1,000 final tables made, over 200 major wins, and more than $6,000,000 in cashes. They regularly outplay fields consisting of other top professionals victories that are documented by detailed online hand histories.Are you ready to learn winning ways from today's true tournament experts?The authors are not only consistent winners, but powerful teachers as well. Step-by-step, they reveal their decision-making processes, using hands drawn from actual play not examples contrived to fit a particular poker theory.Reading this book is like attending a master class in tournament poker.You'll see the way cutting-edge pros use their wisdom and incredibly extensive experience to analyze almost every poker situation imaginable. Deep-stacked or short-stacked, against single or multiple opponents, you'll learn the skills that will make you a winner, including: - When and how to play aggressively or tightly- When to make moves- When to make continuation bets and when to hold back- How to induce and pick off bluffs- How to accumulate chips without constantly risking your tournament life.Poker is a fun game, but it's even more fun when you win.If you want to become a great tournament player, shouldn't you be learning from the best? NOW You can!
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Microsoft Azure Essentials - Fundamentals of Azure
Michael S. Collier - 2015
The first ebook in the series, Microsoft Azure Essentials: Fundamentals of Azure, introduces developers and IT professionals to the wide range of capabilities in Azure. The authors - both Microsoft MVPs in Azure - present both conceptual and how-to content for key areas, including: Azure Websites and Azure Cloud Services Azure Virtual Machines Azure Storage Azure Virtual Networks Databases Azure Active Directory Management tools Business scenarios Watch Microsoft Press’s blog and Twitter (@MicrosoftPress) to learn about other free ebooks in the “Microsoft Azure Essentials” series.
Perfect Phrases for Performance Reviews
Douglas Max - 2002
This title provides hundreds of ready-made phrases that you can use to describe any employee's performance in 74 different skill areas.