Ejb 3 in Action


Debu Panda - 2007
    This book builds on the contributions and strengths of seminal technologies like Spring, Hibernate, and TopLink.EJB 3 is the most important innovation introduced in Java EE 5.0. EJB 3 simplifies enterprise development, abandoning the complex EJB 2.x model in favor of a lightweight POJO framework. The new API represents a fresh perspective on EJB without sacrificing the mission of enabling business application developers to create robust, scalable, standards-based solutions.EJB 3 in Action is a fast-paced tutorial, geared toward helping you learn EJB 3 and the Java Persistence API quickly and easily. For newcomers to EJB, this book provides a solid foundation in EJB. For the developer moving to EJB 3 from EJB 2, this book addresses the changes both in the EJB API and in the way the developer should approach EJB and persistence.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

HTML5 for Publishers


Sanders Kleinfeld - 2011
    Learn how to: Intersperse audio/video with textual content Create a graphing calculator to display algebraic equations on the Canvas Use geolocation to customize a work of fiction with details from the reader's locale Use Canvas to add interactivity to a children's picture book

Python for Informatics: Exploring Information: Exploring Information


Charles Severance - 2002
    You can think of Python as your tool to solve problems that are far beyond the capability of a spreadsheet. It is an easy-to-use and easy-to learn programming language that is freely available on Windows, Macintosh, and Linux computers. There are free downloadable copies of this book in various electronic formats and a self-paced free online course where you can explore the course materials. All the supporting materials for the book are available under open and remixable licenses. This book is designed to teach people to program even if they have no prior experience.

How Not to Network a Nation: The Uneasy History of the Soviet Internet


Benjamin Peters - 2016
    None of these attempts succeeded, and the enterprise had been abandoned by the time the Soviet Union fell apart. Meanwhile, ARPANET, the American precursor to the Internet, went online in 1969. Why did the Soviet network, with top-level scientists and patriotic incentives, fail while the American network succeeded? In How Not to Network a Nation, Benjamin Peters reverses the usual cold war dualities and argues that the American ARPANET took shape thanks to well-managed state subsidies and collaborative research environments and the Soviet network projects stumbled because of unregulated competition among self-interested institutions, bureaucrats, and others. The capitalists behaved like socialists while the socialists behaved like capitalists.After examining the midcentury rise of cybernetics, the science of self-governing systems, and the emergence in the Soviet Union of economic cybernetics, Peters complicates this uneasy role reversal while chronicling the various Soviet attempts to build a “unified information network.” Drawing on previously unknown archival and historical materials, he focuses on the final, and most ambitious of these projects, the All-State Automated System of Management (OGAS), and its principal promoter, Viktor M. Glushkov. Peters describes the rise and fall of OGAS—its theoretical and practical reach, its vision of a national economy managed by network, the bureaucratic obstacles it encountered, and the institutional stalemate that killed it. Finally, he considers the implications of the Soviet experience for today's networked world.

Algorithms


Robert Sedgewick - 1983
    This book surveys the most important computer algorithms currently in use and provides a full treatment of data structures and algorithms for sorting, searching, graph processing, and string processing -- including fifty algorithms every programmer should know. In this edition, new Java implementations are written in an accessible modular programming style, where all of the code is exposed to the reader and ready to use.The algorithms in this book represent a body of knowledge developed over the last 50 years that has become indispensable, not just for professional programmers and computer science students but for any student with interests in science, mathematics, and engineering, not to mention students who use computation in the liberal arts.The companion web site, algs4.cs.princeton.edu contains An online synopsis Full Java implementations Test data Exercises and answers Dynamic visualizations Lecture slides Programming assignments with checklists Links to related material The MOOC related to this book is accessible via the "Online Course" link at algs4.cs.princeton.edu. The course offers more than 100 video lecture segments that are integrated with the text, extensive online assessments, and the large-scale discussion forums that have proven so valuable. Offered each fall and spring, this course regularly attracts tens of thousands of registrants.Robert Sedgewick and Kevin Wayne are developing a modern approach to disseminating knowledge that fully embraces technology, enabling people all around the world to discover new ways of learning and teaching. By integrating their textbook, online content, and MOOC, all at the state of the art, they have built a unique resource that greatly expands the breadth and depth of the educational experience.

Data Structures Using C and C++


Yedidyah Langsam - 1995
     Covers the C++ language, featuring a wealth of tested and debugged working programs in C and C++. Explains and analyzes algorithms -- showing step- by-step solutions to real problems. Presents algorithms as intermediaries between English language descriptions and C programs. Covers classes in C++, including function members, inheritance and object orientation, an example of implementing abstract data types in C++, as well as polymorphism.

An Introduction to Formal Language and Automata


Peter Linz - 1990
    The Text Was Designed To Familiarize Students With The Foundations And Principles Of Computer Science And To Strengthen The Students' Ability To Carry Out Formal And Rigorous Mathematical Arguments. In The New Fourth Edition, Author Peter Linz Has Offered A Straightforward, Uncomplicated Treatment Of Formal Languages And Automata And Avoids Excessive Mathematical Detail So That Students May Focus On And Understand The Underlying Principles. In An Effort To Further The Accessibility And Comprehension Of The Text, The Author Has Added New Illustrative Examples Throughout.

The Psychology of Computer Programming


Gerald M. Weinberg - 1971
    Weinberg adds new insights and highlights the similarities and differences between now and then. Using a conversational style that invites the reader to join him, Weinberg reunites with some of his most insightful writings on the human side of software engineering.Topics include egoless programming, intelligence, psychological measurement, personality factors, motivation, training, social problems on large projects, problem-solving ability, programming language design, team formation, the programming environment, and much more.Dorset House Publishing is proud to make this important text available to new generations of programmers -- and to encourage readers of the first edition to return to its valuable lessons.

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

Outnumbered: Exploring the Algorithms That Control Our Lives


David Sumpter - 2018
    Using the data they are constantly collecting about where we travel, where we shop, what we buy, and what interests us, they can begin to predict our daily habits, and increasingly we are relinquishing our decision-making to algorithms. Are we giving this up too easily?Without understanding what mathematics can and can't do it is impossible to get a handle on how it is changing our lives. Outnumbered is a journey to the dark side of mathematics, from how it dictates our social media activities to our travel routes. David Sumpter investigates whether mathematics is crossing dangerous lines when it comes to what we can make decisions about.This book will show how math impacts all parts of our lives: from the algorithms that decide whom we interact with to the statistical methods that categorize us as potential criminals. It tests financial algorithms that purport to generate money from nothing, and reveals that we are constantly manipulated by the math used by others, from algorithms choosing the news we hear to automated hospital waiting lists deciding whether we receive treatment.Using interviews with those people working at the cutting edge of mathematical and data research, Outnumbered will explain how math and stats work in the real world, and what we should and shouldn't worry about.

Godel: A Life Of Logic, The Mind, And Mathematics


John L. Casti - 2000
    His Incompleteness Theorem turned not only mathematics but also the whole world of science and philosophy on its head. Equally legendary were Gö's eccentricities, his close friendship with Albert Einstein, and his paranoid fear of germs that eventually led to his death from self-starvation. Now, in the first popular biography of this strange and brilliant thinker, John Casti and Werner DePauli bring the legend to life. After describing his childhood in the Moravian capital of Brno, the authors trace the arc of Gö's remarkable career, from the famed Vienna Circle, where philosophers and scientists debated notions of truth, to the Institute for Advanced Study in Princeton, New Jersey, where he lived and worked until his death in 1978. In the process, they shed light on Gö's contributions to mathematics, philosophy, computer science, artificial intelligence -- even cosmology -- in an entertaining and accessible way.

The Man Who Saved the V-8: The Untold Stories of Some of the Most Important Product Decisions in the History of Ford Motor Company


Chase Morsey Jr. - 2014
    joins Ford Motor Co. in 1948, he has no idea the part he'll play in automotive history. Morsey's arrival comes as Henry Ford II and other titans in the industry are about to kill the vaunted V-8 engine. He sees it as his sole mission to talk them out of it. In The Man Who Saved the V-8, he shares the never-before-told story of how his crusade saved the engine that would go on to power iconic cars like the Ford Thunderbird and Mustang. "To this day, I have no idea how a young, newly hired manager like myself...had the nerve to challenge the most powerful men inside Ford Motor Company and tell them they were wrong," Morsey says. "But that is exactly what I did." The twenty-nine-year-old executive embarks on massive market research. He works with manufacturing experts to find ways to produce the V-8 engine more efficiently. After finding success, he goes on to continue playing a central role in some of the most pivotal decisions that would ensure Ford remains one of the powerhouses in the automotive industry. The Man Who Saved the V-8 tells the story of his successes and lessons learned.

Climate Change Reality Check: Basic Facts that Quickly Prove the Climate Change Crusade is Wrong and Dangerous


Calvin Fray - 2016
    Just the right amount of science. Common sense and rational.” -- Wayne R. The greenhouse effect is always quoted—but that is a METAPHOR. What is the fundamental physical process that drives it? And how exactly does human activity play such a powerful role with it? How did we go from worrying about global warming to climate change…to carbon dioxide (CO2) emissions? "Great book - should me mandatory reading for anyone that uses the term 'Climate Change' " - Amazon purchaser Macsugar Are there gases more powerful and influential in the greenhouse effect than CO2? Yes, by a lot! As you will learn in this book… Why aren’t we spending more time, money, and attention focusing on those? Smart people want to get to the point of a problem and solve it as quickly, inexpensively, and effortlessly as possible. They know about the Pareto Principle, and you will too after you read this book. It is also called the 80/20 rule. What happens when we apply that principle to the global climate change “consensus”? “Thank You! I always thought the numbers were small, but I never took the time to do the math.” -- Mike S. There are many books that are long, technical, and—frankly, irrelevant—on the topic of climate change. Here are the most important questions that nobody has bothered to answer in straightforward, simple and short language, until now: * What are basic facts about our planet’s atmosphere? And what do they tell us about the fundamental physics of climate change? * What are the basic physics and assumptions behind the anthropogenic global warming (AGW) hypothesis or belief? Are they valid? * What element or compound is the single greatest factor in temperature control in our atmosphere? Hint—it isn’t carbon dioxide. How does carbon dioxide compare with this other chemical? "Takes less than an hour to read... A must-read for every official policy-maker at every level... This deserves 6 stars out of 5!" -- Terry Dunleavy (Amazon reviewer) “Brilliant, what a refreshing approach.” -- Christopher K. Before we spend more time, money, and emotional energy on the presumed EFFECTS and CONSEQUENCES of global warming and climate change (things like rising temperatures, rising sea levels, etc., etc.), shouldn’t we all have a BASIC UNDERSTANDING of the FUNDAMENTAL PROCESSES AND PHYSICS of our planet’s atmosphere? If you have any questions, or doubts about that, this book is for you. “Very good. I am a geophysicist.” -- Ben B. Even better, you’ll learn (or re-learn) a very simple and indisputable fact about our atmosphere that makes the entire controversy look ridiculous. Use this information as a test (or a bet) the next time you talk with someone on the “other side” of the climate change debate. “A very useful contribution to bringing sanity and reason back to the analysis of AGW.” – Tom P. The climate change threat is consuming more of our precious time, energy, and resources. So is the debate about what to do about it. Don’t allow yourself be a part of the problem—get this book so that you can be a part of the solution! If you are convinced that AGW is the biggest threat facing our planet, this book has facts and