Book picks similar to
Kerberos: A Network Authentication System by Brian Tung
computery
infosec
mybooks
non-fiction
Digital Computer Electronics
Albert Paul Malvino - 1977
The text relates the fundamentals to three real-world examples: Intel's 8085, Motorola's 6800, and the 6502 chip used by Apple Computers. This edition includes a student version of the TASM cross-assembler software program, experiments for Digital Computer Electronics and more.
A Pocketful of Holes and Dreams
Jeff Pearce - 2011
. . not just once but twice
Little Jeff Pearce grew up in a post-war Liverpool slum. His father lived the life of an affluent gentleman whilst his mother was forced to steal bread to feed her starving children. Life was tough and from the moment Jeff could walk he learned to go door to door, begging rags from the rich, which he sold down the markets. Leaving school at the age of fourteen, he embarked on an extraordinary journey, and found himself, before the age of thirty, a millionaire.Then, after a cruel twist of fate left him penniless, he, his wife and children were forced out of their beautiful home.With nothing but holes in his pockets, Jeff had no alternative but to go back down the markets and start all over again. Did he still have what it took? Could he really get back everything he had lost?A Pocketful of Holes and Dreams is the heartwarming true story of a little boy who had nothing but gained everything and proof that, sometimes, rags can be turned into riches . . .
Practical C++ Programming
Steve Oualline - 1995
But this high-level language is relatively difficult to master, even if you already know the C programming language.The 2nd edition of Practical C++ Programming is a complete introduction to the C++ language for programmers who are learning C++. Reflecting the latest changes to the C++ standard, this 2nd edition takes a useful down-to-earth approach, placing a strong emphasis on how to design clean, elegant code.In short, to-the-point chapters, all aspects of programming are covered including style, software engineering, programming design, object-oriented design, and debugging. It also covers common mistakes and how to find (and avoid) them. End of chapter exercises help you ensure you've mastered the material.Practical C++ Programming thoroughly covers: C++ Syntax Coding standards and style Creation and use of object classes Templates Debugging and optimization Use of the C++ preprocessor File input/output Steve Oualline's clear, easy-going writing style and hands-on approach to learning make Practical C++ Programming a nearly painless way to master this complex but powerful programming language.
Adobe Photoshop CC Classroom in a Book (2014 Release)
Andrew Faulkner - 2014
Adobe Photoshop CC Classroom in a Book contains 14 lessons that cover the basics, providing countless tips and techniques to help you become more productive with the program. You can follow the book from start to finish or choose only those lessons that interest you. In addition to learning the key elements of the Photoshop interface, this completely revised CC (2014 release) edition covers new features, including Generator, 3D printing, linked Smart Objects, Blur Gallery, smarter Smart Guides, Perspective Warp, and more. Purchasing this book gives you access to the downloadable lesson files you need to work through the projects in the book, and to electronic book updates covering new features that Adobe releases for Creative Cloud customers. For access, goto www.peachpit.com/redeem and redeem the unique code provided inside this book. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." Barbara Binder, Adobe Certified InstructorRocky Mountain Training
Saving Bletchley Park: How #socialmedia saved the home of the WWII codebreakers
Sue Black - 2015
It is a testament to the remarkable and mysterious work during World War II that made it a place worth saving. It is a book about campaigners, veterans, enthusiasts, computer geeks, technology, Twitter, trees and Stephen Fry stuck in a lift.And finally, it is a story about preserving the past for the generations of tomorrow.
UNIX in a Nutshell: A Desktop Quick Reference for System V Release 4 and Solaris 2.0
Daniel Gilly - 1992
For all but the thorniest UNIX problems, this one reference should be all the documentation you need.The second edition of "UNIX in a Nutshell" starts with thorough coverage of System V Release 3. To that, we've added the many new commands that were added to Release 4 and additional commands that were added to Solaris 2.0.Contents include: All user and programmer commands.New Korn shell documentation.Expanded text editing section, including GNU Emacs and "nawk."Shell syntax ("sh" and "csh").Pattern-matching syntax."vi" and "ex" commands."sed" and "awk" commands."troff" and related commands and macros."sdb" and "dbx" commands.If you currently use either SVR3 or SVR4 or are planning to in the future, or if you're a Sun user facing the transition to Solaris, you'll want this book. "UNIX in a Nutshell" is the most comprehensive quickref on the market, a must for any UNIX user.
யூதர்கள்-வரலாறும் வாழ்க்கையும்
Mugil - 2007
Apart from their achievements, they have suffered all through the history right from the days of Moses till the Israel-Palestine issue. This book clearly brings out the life of jews and their battles, sufferings, customs, beliefs, strategies etc.
Ethics in Information Technology
George W. Reynolds - 2002
This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.
Stealing the Network: How to Own the Box
Ryan Russell - 2003
So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the -street fighting- tactics used to attack networks and systems. Not just another -hacker- book, it plays on -edgy- market success of Steal this Computer Book with first hand, eyewitness accountsA highly provocative expose of advanced security exploitsWritten by some of the most high profile -White Hats-, -Black Hats- and -Gray Hats-Gives readers a -first ever- look inside some of the most notorious network intrusions
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.
Code Breaking: A History and Exploration
Rudolf Kippenhahn - 1999
In Code Breaking , Rudolf Kippenhahn offers readers both an exciting chronicle of cryptography and a lively exploration of the cryptographer’s craft. Rich with vivid anecdotes from a history of coding and decoding and featuring three new chapters, this revised and expanded edition makes the often abstruse art of deciphering coded messages accessible to the general reader and reveals the relevance of codes to our everyday high-tech society. A stylishly written, meticulously researched adventure, Code Breaking explores the ways in which communication can be obscured and, like magic, made clear again.
The Decline and Fall of IBM: End of an American Icon?
Robert Cringely - 2014
Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.
Adobe Photoshop CS4 Classroom in a Book
Adobe Creative Team - 2000
Learn how to retouch digital photos, work with layers and masks, navigate the workspace, prepare images print, and explore the latest features. Tips, extra-credit exercises, and step-by-step lessons help you become more productive using Photoshop. Learn to correct and enhance digital photos, create image composites, transform images in perspective, and prepare images for print and the web. Combine images for extended depth of field, and try out the new 3D features in Adobe Photoshop CS4 Extended. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." --Barbara Binder, Adobe Certified Instructor, Rocky Mountain Training Classroom in a Book(R), the best-selling series of hands-on software training workbooks, helps you learn the features of Adobe software quickly and easily. Classroom in a Book offers what no other book or training program does--an official training series from Adobe Systems Incorporated, developed with the support of Adobe product experts.
CISSP for Dummies [With CDROM]
Lawrence C. Miller - 2002
The topics covered in the exam include: network security, security management, systems development, cryptography, disaster recovery, law, and physical security. CISSP For Dummies, 3rd Edition is the bestselling guide that covers the CISSP exam and helps prepare those wanting to take this security exam. The 3rd Edition features 200 additional pages of new content to provide thorough coverage and reflect changes to the exam. Written by security experts and well-known Dummies authors, Peter Gregory and Larry Miller, this book is the perfect, no-nonsense guide to the CISSP certification, offering test-taking tips, resources, and self-assessment tools.Fully updated with 200 pages of new content for more thorough coverage and to reflect all exam changesSecurity experts Peter Gregory and Larry Miller bring practical real-world security expertiseCD-ROM includes hundreds of randomly generated test questions for readers to practice taking the test with both timed and untimed versions"CISSP For Dummies, 3rd Edition" can lead you down the rough road to certification successNote: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
The Time-Crunched Cyclist: Fit, Fast, and Powerful in 6 Hours a Week
Chris Carmichael - 2009
In The Time-Crunched Cyclist, Chris Carmichael presents that new approach to cycling training. Using elements from the same program he designed for Tour de France winner Armstrong, this guide shows how to build competitive cycling fitness on a realistic schedule -- a schedule that fits into the busy lives of today's active middle-agers. Complete with training plans, case studies, nutritional guidelines, and success stories, "The Time-Crunched Cyclist" shows cyclists how to push the pace in the local group ride, have fun, and perform well in local races, or tackle a challenging 100-mile fundraiser ride without committing to a high-volume training program.