Book picks similar to
Foundations of Information Security by Jason Andress
infosec
hacking
tech
security
High Performance MySQL: Optimization, Backups, and Replication
Baron Schwartz - 2008
This guide also teaches you safe and practical ways to scale applications through replication, load balancing, high availability, and failover.
Updated to reflect recent advances in MySQL and InnoDB performance, features, and tools, this third edition not only offers specific examples of how MySQL works, it also teaches you why this system works as it does, with illustrative stories and case studies that demonstrate MySQL’s principles in action. With this book, you’ll learn how to think in MySQL.
Learn the effects of new features in MySQL 5.5, including stored procedures, partitioned databases, triggers, and views
Implement improvements in replication, high availability, and clustering
Achieve high performance when running MySQL in the cloud
Optimize advanced querying features, such as full-text searches
Take advantage of modern multi-core CPUs and solid-state disks
Explore backup and recovery strategies—including new tools for hot online backups
UNIX Power Tools
Jerry Peek - 1993
It also covers add-on utilities and how to take advantage of clever features in the most popular UNIX utilities.Loaded with even more practical advice about almost every aspect of UNIX, this edition addresses the technology that UNIX users face today, differing from the first edition in a number of important ways.First, it slants the blend of options and commands more toward the POSIX utilities, including the GNU versions; the bash and tcsh shells have greater coverage, but we've kept the first edition's emphasis on the core concepts of sh and csh that will help you use all UNIX shells; and, Perl is more important than awk these days, so we've de-emphasized awk in this edition.This is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. The book is structured so that it bursts at the seams with cross references. Interesting "sidebars" explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. You'll find articles abstracted from other O'Reilly books, new information that highlights program "tricks" and "gotchas," tips posted to the Net over the years, and other accumulated wisdom.The 53 chapters in this book discuss topics like file management, text editors, shell programming -- even office automation. Overall, there's plenty of material here to satisfy even the most voracious appetites. The bottom line? UNIX Power Tools is loaded with practical advice about almost every aspect of UNIX. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.The CD-ROM includes all of the scripts and aliases from the book, plus perl, GNU emacs, netpbm (graphics manipulation utilities), ispell,screen, the sc spreadsheet, and about 60 other freeware programs. In addition to the source code, all the software is precompiled for Sun4, Digital UNIX, IBM AIX, HP/UX, Red Hat Linux, Solaris, and SCO UNIX.
The Tiny MBA: 100 Very Short Lessons about the Long Game of Business
Alex Hillman - 2020
Please find the Paperback or Kindle-compatible Ebook at stackingthebricks.com/tinymba/You don't need an MBA or fancy investors to succeed in business. Use the 100 ideas in this tiny book to evaluate your current situation: your advantages, your relationships, your potential choices, and the most likely outcomes.BONUS! If you enjoy The Tiny MBA and want to go deeper on the topics lessons and themes in the book, check out the Tiny MBA Podcast Tour with the author! In each episode, Alex visits with the host of a different podcast or livestream to dig deeper into that hosts favorite pages of the book, and explore specific examples or stories rooted in these lessons.Check it out now at stackingthebricks.com/podcast/ and subscribe to get new episodes every week.
The Comfortable Kitchen: 105 Laid-Back, Healthy, and Wholesome Recipes
Alex Snodgrass - 2021
Her eagerly awaited new book will make that goal a reality.What does comfort mean in The Comfortable Kitchen? These are recipes you’ll feel comfortable making and comfortable feeding your family—and although these meals may fit the bill when it comes to “comfort food,” Alex’s eager audience expects a healthy angle from her cooking. Though many of her meals are fully Whole30, or at the very least Whole30-ish, they are recipes with simple ingredient swaps for a cleaner meal everyone will love and perfect for people who are on the “food freedom” stage of their Whole30 health journey as well. She provides food for every occasion, from one-pot meals to not-so-junky junk food, even including cocktails and desserts, with recipes including:Cajun Chicken and Wild Rice SoupGreen Curry Poached Halibut with HerbsSpicy Chicken Dan Dan NoodlesTexas Style Brisket TacosSheet Pan Honey-Sesame CauliflowerClayton’s Margarita7-Ingredient Almond Butter Cookies With 105 approachable and nutritious recipes for real, busy life, The Comfortable Kitchen is a must-have cookbook for everyone who cares about what they eat and what they make.
Things a Computer Scientist Rarely Talks About
Donald Ervin Knuth - 2001
Knuth, whose massive contributions to computing have led others to nickname him "The Father of Computer Science"—and whose religious faith led him to understand a fascinating analysis of the Bible called the 3:16 project. In this series of six spirited, informal lectures, Knuth explores the relationships between his vocation and his faith, revealing the unique perspective that his work with computing has lent to his understanding of God.His starting point is the 3:16 project, an application of mathematical "random sampling" to the books of the Bible. The first lectures tell the story of the project's conception and execution, exploring its many dimensions of language translation, aesthetics, and theological history. Along the way, Knuth explains the many insights he gained from such interdisciplinary work. These theological musings culminate in a surprising final lecture tackling the ideas of infinity, free will, and some of the other big questions that lie at the juncture of theology and computation.Things a Computer Scientist Rarely Talks About, with its charming and user-friendly format—each lecture ends with a question and answer exchange, and the book itself contains more than 100 illustrations—is a readable and intriguing approach to a crucial topic, certain to edify both those who are serious and curious about their faiths and those who look at the science of computation and wonder what it might teach them about their spiritual world.Includes "Creativity, Spirituality, and Computer Science," a panel discussion featuring Harry Lewis, Guy L. Steele, Jr., Manuela Veloso, Donald E. Knuth, and Mitch Kapor.
Meal Prep for Weight Loss: Weekly Plans and Recipes to Lose Weight the Healthy Way
Kelli Shallal - 2019
Eat for a week. Lose weight for the long term.
Losing weight can be as easy as cooking one day per week. Meal Prep for Weight Loss equips you with the knowledge to properly prepare balanced meals ahead of time, so you can lose weight and keep it off. No crash diets, no spending hours in the kitchen.Balanced meals lead to better energy levels and fewer cravings, which lays the foundation for sustainable weight loss. And it’s easier to make these meals consistently if you plan ahead. Meal Prep for Weight Loss shows you how, with 3-recipe and 6-recipe weekly meal plans, accessible ingredients, and a wide range of fun, flavorful, batch-friendly recipes.Meal Prep for Weight Loss offers:
Take back control—With meal prep, you are always in control of what you eat, how much you eat, and when you eat.
Everything you need—Get started right away with detailed shopping lists, and instructions for cooking, portioning, storing, and reheating.
Customizable plans—Switch up the different plans with a variety of tasty, meal prep ready recipes.
Shed weight the healthy way—with full meal prep plans for well-portioned meals every day of the week.
Working with UNIX Processes
Jesse Storimer - 2011
Want to impress your coworkers and write the fastest, most efficient, stable code you ever have? Don't reinvent the wheel. Reuse decades of research into battle-tested, highly optimized, and proven techniques available on any Unix system.This book will teach you what you need to know so that you can write your own servers, debug your entire stack when things go awry, and understand how things are working under the hood.http://www.jstorimer.com/products/wor...
Murach's PHP and MySQL
Joel Murach - 2010
Teaches developers how to build database-driven web applications using two of today's most popular open-source software tools, PHP and MySQL.
Ruby on Rails 3 Tutorial: Learn Rails by Example
Michael Hartl - 2010
Although its remarkable capabilities have made Ruby on Rails one of the world’s most popular web development frameworks, it can be challenging to learn and use. Ruby on Rails™ 3 Tutorial is the solution. Leading Rails developer Michael Hartl teaches Rails 3 by guiding you through the development of your own complete sample application using the latest techniques in Rails web development.Drawing on his experience building RailsSpace, Insoshi, and other sophisticated Rails applications, Hartl illuminates all facets of design and implementation—including powerful new techniques that simplify and accelerate development.You’ll find integrated tutorials not only for Rails, but also for the essential Ruby, HTML, CSS, JavaScript, and SQL skills you’ll need when developing web applications. Hartl explains how each new technique solves a real-world problem, and he demonstrates this with bite-sized code that’s simple enough to understand, yet novel enough to be useful. Whatever your previous web development experience, this book will guide you to true Rails mastery.This book will help you
Install and set up your Rails development environment
Go beyond generated code to truly understand how to build Rails applications from scratch
Learn Test Driven Development (TDD) with RSpec
Effectively use the Model-View-Controller (MVC) pattern
Structure applications using the REST architecture
Build static pages and transform them into dynamic ones
Master the Ruby programming skills all Rails developers need
Define high-quality site layouts and data models
Implement registration and authentication systems, including validation and secure passwords
Update, display, and delete users
Add social features and microblogging, including an introduction to Ajax
Record version changes with Git and share code at GitHub
Simplify application deployment with Heroku
Exploding Data: Reclaiming Our Cybersecurity in the Digital Age
Michael Chertoff - 2018
And yet, as daily events underscore, we are ever more vulnerable to cyber-attack.In this bracing book, Michael Chertoff makes clear that our laws and policies surrounding the protection of personal information, written for an earlier time, need to be completely overhauled in the Internet era. On the one hand, the collection of data--more widespread by business than by government, and impossible to stop--should be facilitated as an ultimate protection for society. On the other, standards under which information can be inspected, analyzed, or used must be significantly tightened. In offering his compelling call for action, Chertoff argues that what is at stake is not so much the simple loss of privacy, which is almost impossible to protect, but of individual autonomy--the ability to make personal choices free of manipulation or coercion. Offering colorful stories over many decades that illuminate the three periods of data gathering we have experienced, Chertoff explains the complex legalities surrounding issues of data collection and dissemination today, and charts a path that balances the needs of government, business, and individuals alike.
Edmund Hillary - A Biography: The extraordinary life of the beekeeper who climbed Everest
Michael Gill - 2017
A man who against expedition orders drove his tractor to the South Pole; a man honoured around the world for his pioneering climbs yet who collapsed on more than one occasion on a mountain, and a man who gave so much to Nepal yet lost his family to its mountains.The author, Michael Gill, was a close friend of Hillary’s for nearly 50 years, accompanying him on many expeditions and becoming heavily involved in Hillary’s aid work building schools and hospitals in the Himalaya. During the writing of this book, Gill was granted access to a large archive of private papers and photos that were deposited in the Auckland museum after Hillary’s death in 2008. Building on this unpublished material, as well as his extensive personal experience, Michael Gill profiles a man whose life was shaped by both triumph and tragedy.Gill describes the uncertainties of the first 33 years of Hillary’s life, during which time he served in the New Zealand air force during the Second World War, as well as the background to the first ascent of Mount Everest in 1953, when Hillary and Tenzing Norgay became the first climbers to reach the summit – a feat that brought the pair instant worldwide fame. He reveals the loving relationship Hillary had with his wife Louise, in part through their touching letters to each other. Her importance to him during their 22 years of marriage only underlines the horror of her death, along with that of their youngest daughter, Belinda, in a plane crash in 1975. Hillary eventually pulled out of his subsequent depression to continue his life’s work in the Himalaya.Affectionate, but scrupulously fair, in Edmund Hillary – A Biography Michael Gill has gone further than anyone before to reveal the humanity of this remarkable man.
HTTP: The Definitive Guide
David Gourley - 2002
Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the black arts and tricks of the trade -- in a concise and readable manner.In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection.Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume.There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the why and the how of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.
The Ethical Algorithm: The Science of Socially Aware Algorithm Design
Michael Kearns - 2019
Algorithms have made our lives more efficient, more entertaining, and, sometimes, better informed. At the same time, complex algorithms are increasingly violating the basic rights of individual citizens. Allegedly anonymized datasets routinely leak our most sensitive personal information; statistical models for everything from mortgages to college admissions reflect racial and gender bias. Meanwhile, users manipulate algorithms to "game" search engines, spam filters, online reviewing services, and navigation apps.Understanding and improving the science behind the algorithms that run our lives is rapidly becoming one of the most pressing issues of this century. Traditional fixes, such as laws, regulations and watchdog groups, have proven woefully inadequate. Reporting from the cutting edge of scientific research, The Ethical Algorithm offers a new approach: a set of principled solutions based on the emerging and exciting science of socially aware algorithm design. Michael Kearns and Aaron Roth explain how we can better embed human principles into machine code - without halting the advance of data-driven scientific exploration. Weaving together innovative research with stories of citizens, scientists, and activists on the front lines, The Ethical Algorithm offers a compelling vision for a future, one in which we can better protect humans from the unintended impacts of algorithms while continuing to inspire wondrous advances in technology.
The Undercover Edge: Find Your Hidden Strengths, Learn to Adapt, and Build the Confidence to Win Life’s Game
Derrick Levasseur - 2018
The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online
Violet Blue - 2014
For every trustworthy website, there are countless jerks, bullies, and scam artists who would harvest your personal information for their own purposes. But you can fight back, right now.In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will show you how to:•Delete personal content from websites•Use website and browser privacy controls effectively•Recover from and prevent identity theft•Figure out where the law protects you—and where it doesn’t•Set up safe online profiles•Remove yourself from people finder websitesEven if your privacy has already been compromised, don’t panic. It’s not too late to take control. Let The Smart Girl’s Guide to Privacy help you cut through the confusion and start protecting your online life.