Confessions of a Public Speaker


Scott Berkun - 2009
    For managers and teachers -- and anyone else who talks and expects someone to listen -- Confessions of a Public Speaker provides an insider's perspective on how to effectively present ideas to anyone. It's a unique, entertaining, and instructional romp through the embarrassments and triumphs Scott has experienced over 15 years of speaking to crowds of all sizes.With lively lessons and surprising confessions, you'll get new insights into the art of persuasion -- as well as teaching, learning, and performance -- directly from a master of the trade.Highlights include:Berkun's hard-won and simple philosophy, culled from years of lectures, teaching courses, and hours of appearances on NPR, MSNBC, and CNBCPractical advice, including how to work a tough room, the science of not boring people, how to survive the attack of the butterflies, and what to do when things go wrongThe inside scoop on who earns $30,000 for a one-hour lecture and whyThe worst -- and funniest -- disaster stories you've ever heard (plus countermoves you can use)Filled with humorous and illuminating stories of thrilling performances and real-life disasters, Confessions of a Public Speaker is inspirational, devastatingly honest, and a blast to read.

The Master Algorithm: How the Quest for the Ultimate Learning Machine Will Remake Our World


Pedro Domingos - 2015
    In The Master Algorithm, Pedro Domingos lifts the veil to give us a peek inside the learning machines that power Google, Amazon, and your smartphone. He assembles a blueprint for the future universal learner--the Master Algorithm--and discusses what it will mean for business, science, and society. If data-ism is today's philosophy, this book is its bible.

The Food Lab: Better Home Cooking Through Science


J. Kenji López-Alt - 2015
    Kenji López-Alt has pondered all these questions and more. In The Food Lab, Kenji focuses on the science behind beloved American dishes, delving into the interactions between heat, energy, and molecules that create great food. Kenji shows that often, conventional methods don’t work that well, and home cooks can achieve far better results using new—but simple—techniques. In hundreds of easy-to-make recipes with over 1,000 full-color images, you will find out how to make foolproof Hollandaise sauce in just two minutes, how to transform one simple tomato sauce into a half dozen dishes, how to make the crispiest, creamiest potato casserole ever conceived, and much more.

The Complete Book of Origami: Step-by-Step Instructions in Over 1000 Diagrams


Robert J. Lang - 1989
    Features simple to advanced objects: cube, parrot, rabbit, seagull, cuckoo clock, rocket, mouse, elephant, violinist, Viking ship, and many more.

How to Diagnose and Fix Everything Electronic


Michael Jay Geier - 2010
    How to Diagnose and Fix Everything Electronic shows you how to repair and extend the life of all kinds of solid-state devices, from modern digital gadgetry to cherished analog products of yesteryear.You'll start by selecting the tools and test equipment you'll need and setting up your workbench. Then, you'll get familiar with components and how they form circuits, stages, and sections of a device. Next, you'll learn how to take a product apart, figure out what's wrong with it, replace components, and reassemble it. Real-world case studies help clarify the topics covered. Tips and tricks for specific devices, such as optical disc players, computers, and video recorders, are also included in this practical resource.

How to Become a Straight-A Student


Cal Newport - 2006
    But Cal Newport knows that real straight-A students don't study harder--they study smarter. A breakthrough approach to acing academic assignments, from quizzes and exams to essays and papers, "How to Become a Straight-A Student" reveals for the first time the proven study secrets of real straight-A students across the country and weaves them into a simple, practical system that anyone can master. You will learn how to: Streamline and maximize your study time Conquer procrastinationAbsorb the material quickly and effectivelyKnow which reading assignments are critical--and which are notTarget the paper topics that wow professorsProvide A+ answers on examsWrite stellar prose without the agony A strategic blueprint for success that promises more free time, more fun, and top-tier results, "How to Become a Straight-A Student" is the only study guide written by students for students--with the insider knowledge and real-world methods to help you master the college system and rise to the top of the class.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Blue Team Field Manual (BTFM)


Alan J. White - 2017
    Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.

The Pig That Wants to Be Eaten: 100 Experiments for the Armchair Philosopher


Julian Baggini - 2005
    Taking examples from sources as diverse as Plato and Steven Spielberg, author Julian Baggini presents abstract philosophical issues in concrete terms, suggesting possible solutions while encouraging readers to draw their own conclusions: Lively, clever, and thought-provoking, The Pig That Wants to Be Eaten is a portable feast for the mind that is sure to satisfy any intellectual appetite.

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

Spy Secrets That Can Save Your Life: A Former CIA Officer Reveals Safety and Survival Techniques to Keep You and Your Family Protected


Jason Hanson - 2015
    In addition to escaping handcuffs, picking locks, and spotting when someone is telling a lie, he can improvise a self-defense weapon, pack a perfect emergency kit, and disappear off the grid if necessary. He has also honed his “positive awareness”—a heightened sense of his surroundings that allows him to spot suspicious and potentially dangerous behavior—on the street, in a taxi, at the airport, when dining out, or in any other situation. In his engaging and empowering book Spy Secrets That Can Save Your Life, Jason shares this know-how with readers, revealing how to:   •  prevent home invasions, carjackings, muggings, and other violent crimes    •  run counter-surveillance and avoid becoming a soft target    •  recognize common scams at home and abroad    •  become a human lie detector in any setting, including business negotiations    •  gain peace of mind by being prepared for anything instead of uninformed or afraid With the skill of a trained operative and the relatability of a suburban dad, Jason Hanson brings his top-level training to everyday Americans in this must-have guide to staying safe in an increasingly dangerous world.

Getting Started with Arduino


Massimo Banzi - 2008
    Getting Started with Arduino gives you lots of ideas for Arduino projects and helps you get going on them right away. From getting organized to putting the final touches on your prototype, all the information you need is right in the book. Inside, you'll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED. Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.

The Sociology Book: Big Ideas Simply Explained


Sam Atkinson - 2015
    The Sociology Book takes on some of humankind's biggest questions: What is society? What makes it tick? Why do we interact in the way that we do with our friends, coworkers, and rivals? The Sociology Book profiles the world's most renowned sociologists and more than 100 of their biggest ideas, including issues of equality, diversity, identity, and human rights; the effects of globalization; the role of institutions; and the rise of urban living in modern societyEasy to navigate and chock-full of key concepts, profiles of major sociological thinkers, and conversation starters galore, this is a must-have, in-a-nutshell guide to some of the most fascinating questions on earth.The Sociology Book is part of the award-winning Big Ideas Simply Explained series, designed to distill big ideas and elusive theories into graspable, memorable concepts, using an approachable graphic treatment and creative typography.

Algorithms


Sanjoy Dasgupta - 2006
    Emphasis is placed on understanding the crisp mathematical idea behind each algorithm, in a manner that is intuitive and rigorous without being unduly formal. Features include: The use of boxes to strengthen the narrative: pieces that provide historical context, descriptions of how the algorithms are used in practice, and excursions for the mathematically sophisticated.Carefully chosen advanced topics that can be skipped in a standard one-semester course, but can be covered in an advanced algorithms course or in a more leisurely two-semester sequence.An accessible treatment of linear programming introduces students to one of the greatest achievements in algorithms. An optional chapter on the quantum algorithm for factoring provides a unique peephole into this exciting topic. In addition to the text, DasGupta also offers a Solutions Manual, which is available on the Online Learning Center.Algorithms is an outstanding undergraduate text, equally informed by the historical roots and contemporary applications of its subject. Like a captivating novel, it is a joy to read. Tim Roughgarden Stanford University

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio