The Book of PoC||GTFO


Manul Laphroaig - 2017
    Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.

Wastewater Treatment Plants: Planning, Design, and Operation


Syed R. Qasim - 1985
    The design should incorporate flexibility for dealing with seasonal changes, as well as long-term changes in wastewater quality and future regulations. Good planning and design, therefore, must be based on five major steps:characterization of the raw wastewater quality and effluent, pre-design studies to develop alternative processes and selection of final process train, detailed design of the selected alternative, contraction, and operation and maintenance of the completed facility. Engineers, scientists, and financial analysts must utilize principles from a wide range of disciplines: engineering, chemistry, microbiology, geology, architecture, and economics to carry out the responsibilities of designing a wastewater treatment plant. The objective of this book is to present the technical and nontechnical issues that are most commonly addressed in the planning and design reports for wastewater treatment facilities prepared by practicing engineers. Topics discussed include facility planning, process description, process selection logic, mass balance calculations, design calculations, and concepts for equipment sizing. Theory, design, operation and maintenance, trouble shooting, equipment selection and specifications are integrated for each treatment process. Thus delineation of such information for use by students and practicing engineers is the main purpose of this book.

Truth Hurts, Lies Kill


Raymond Francis - 2013
    After committing a crime that forces him out of his home state of South Carolina, he finds himself all alone in the streets of Philadelphia. Without a familiar face to turn to, SK is forced to learn to survive. Miraculously, with all the odds against him, SK manages to make ends meets. Life is good, until a regrettable incident changes everything. Drama and suspense filled, SK’s journey proves the harsh reality that the Truth Hurts, but Lies Kill.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World


Bruce Schneier - 2015
    Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Elements Of Electrical And Mechanical Engineering


B.L. Theraja - 1999
    

Defensive Security Handbook: Best Practices for Securing Infrastructure


Lee Brotherston - 2017
    For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family


Theresa M. Payton - 2014
    The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.

Icons: My Inspiration. My Motivation. My Obsession.


Bradley Wiggins - 2018
    Among them is Sir Bradley Wiggins – a man uniquely placed to reflect on the history of this remarkable sport and its unforgettable titans.In Icons, Wiggins takes the reader on an extraordinarily intimate journey through the sport, presenting key pieces from his never-before-seen collection of memorabilia. Over the course of his illustrious career, he amassed hundreds of items – often gifts from its greatest and most controversial figures. Each reflects an icon, a race or a moment that fundamentally influenced Wiggins on both a personal and professional level.By exploring the lives and achievements of 21 of the sport’s key figures – among them Fausto Coppi, Jacques Anquetil, Miguel Induráin and Tom Simpson – Wiggins sheds new light on what professional cycling demands of its best competitors. Icons lauds their triumphs, elucidates their demons and sheds light on the philosophy and psychology that comprise the unique mindset of a cycling champion.

The Guru's Guide to Transact-Sql


Ken Henderson - 2000
    Beginners and intermediate developers will appreciate the comprehensive tutorial that walks step-by-step through building a real client/server database, from concept to deployment and beyond -- and points out key pitfalls to avoid throughout the process. Experienced users will appreciate the book's comprehensive coverage of the Transact-SQL language, from basic to advanced level; detailed ODBC database access information; expert coverage of concurrency control, and more. The book includes thorough, up-to-the-minute guidance on building multi-tier applications; SQL Server performance tuning; and other crucial issues for advanced developers. For all database developers, system administrators, and Web application developers who interact with databases in Microsoft-centric environments.

Data Science For Dummies


Lillian Pierson - 2014
    Data Science For Dummies is the perfect starting point for IT professionals and students interested in making sense of their organization’s massive data sets and applying their findings to real-world business scenarios. From uncovering rich data sources to managing large amounts of data within hardware and software limitations, ensuring consistency in reporting, merging various data sources, and beyond, you’ll develop the know-how you need to effectively interpret data and tell a story that can be understood by anyone in your organization. Provides a background in data science fundamentals before moving on to working with relational databases and unstructured data and preparing your data for analysis Details different data visualization techniques that can be used to showcase and summarize your data Explains both supervised and unsupervised machine learning, including regression, model validation, and clustering techniques Includes coverage of big data processing tools like MapReduce, Hadoop, Dremel, Storm, and Spark It’s a big, big data world out there – let Data Science For Dummies help you harness its power and gain a competitive edge for your organization.

Hidden in Plain Sight 8: How to Make an Atomic Bomb


Andrew H. Thomas - 2017
    It's a great way to learn about nuclear physics!

All His Own Hair


Susan Alison - 2011
    Now that Sparrow, her ward, has reached nine years of age, she reckons he needs a male role model in his life. With typical efficiency she sets about finding a father-figure by drawing up a series of checklists for each candidate, and following a strict protocol for interviewing them.So far, all the contenders have failed miserably to get enough ticks in the right boxes. But Ferne is focused and nothing is going to stop her from fulfilling her responsibilities…...except maybe a saboteur out to wreck her business; drunken neighbours; her unfortunate past from which it is so difficult to escape; her estranged mother; long-lost sister; and her Jack Russell, Merrie, who is not above galloping over and nipping any prospective role models she thinks Will Not Do.Katie Fforde (best-selling rom com author and President of the Romantic Novelists' Association) said of 'All His Own Hair': 'Susan Alison handles difficult issues with quirky humour and uplifting results.'(To give you some idea of length - 'White Lies and Custard Creams' is 83,700 words long and 'All His Own Hair' is 87,300 words long.)Susan Alison is the Katie Fforde Bursary Award winner for 2011. She has won competition awards for short fiction and sold numerous stories to commercial publications. Her fiction concentrates on the relationships humans forge with each other (and quite often with their dogs). She is a freelance artist.Jill Mansell (best-selling rom com author) said of 'White Lies and Custard Creams': "Susan Alison has written a lovely, quirky romp packed with off-the-wall characters - original, intriguing and great fun!"

The Mortarmen


Michael Connelly - 2005
    The book details the fighting history of the men of the 87th Chemical Mortar Battalion. The battalion was armed with the powerful 4.2 mortars and following its landing on Utah Beach on D-Day fought in every major engagement in France, Belgium, and Germany. The 4.2 mortar battalions were the most sought after fire support units in Europe. The 87th was in combat for 326 days and the book follows each of the four companies as they participate in the Battle for Normandy, the fight for Cherbourg, the battles of Aachen and the Hurtgen Forest, the Battle of the Bulge, and finally the crossing of the Rhine and the final victory in Germany. The book contains excepts of diaries and quotations from the men who fought in the unit and from some of the German soldiers who opposed them. It is a story of heroism, tragedy, and the triumph of soldiers fighting for freedom.

The Villa in Sicily


Elise Darcy - 2020
    Her mother, who never travelled abroad, was going to Sicily without telling a soul. Why was she keeping her trip to Sicily a secret and who is the mysterious woman who wrote the journal? Josie travels to Sicily and follows in the footsteps of two young women in the journal, sisters who visited the Italian island in the nineteen sixties. What secrets will Josie uncover and why does she feel she is being followed at every turn?Josie soon discovers there was more to their trip than a just a holiday. Amongst the stunning sites and scenery of Sicily, an unimaginable tale of love, loss and tragedy unfolds. The tentacles of their story reach down the generations.Josie and Michael, a young American on the tour, soon realise their part in this story is only just beginning…Can they right the wrongs of the past before

Hands-On Machine Learning with Scikit-Learn and TensorFlow


Aurélien Géron - 2017
    Now that machine learning is thriving, even programmers who know close to nothing about this technology can use simple, efficient tools to implement programs capable of learning from data. This practical book shows you how.By using concrete examples, minimal theory, and two production-ready Python frameworks—Scikit-Learn and TensorFlow—author Aurélien Géron helps you gain an intuitive understanding of the concepts and tools for building intelligent systems. You’ll learn how to use a range of techniques, starting with simple Linear Regression and progressing to Deep Neural Networks. If you have some programming experience and you’re ready to code a machine learning project, this guide is for you.This hands-on book shows you how to use:Scikit-Learn, an accessible framework that implements many algorithms efficiently and serves as a great machine learning entry pointTensorFlow, a more complex library for distributed numerical computation, ideal for training and running very large neural networksPractical code examples that you can apply without learning excessive machine learning theory or algorithm details