Book picks similar to
How to Cheat at Configuring Exchange Server 2007: Including Outlook Web, Mobile, and Voice Access by Henrik Walther
computers
computers-tech
hackerdojo
internet
Lex & Yacc
John R. Levine - 1990
These tools help programmers build compilers and interpreters, but they also have a wider range of applications.The second edition contains completely revised tutorial sections for novice users and reference sections for advanced users. This edition is twice the size of the first and has an expanded index.The following material has been added:Each utility is explained in a chapter that covers basic usage and simple, stand-alone applications How to implement a full SQL grammar, with full sample code Major MS-DOS and Unix versions of lex and yacc are explored in depth, including AT&T lex and yacc, Berkeley yacc, Berkeley/GNU Flex, GNU Bison, MKS lex and yacc, and Abraxas PCYACC
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
The Naked Future: What Happens in a World That Anticipates Your Every Move?
Patrick Tucker - 2014
. . But in fact, your data is your best defense against coercive marketing and intrusive government practices. Your data is nothing less than a superpower waiting to be harnessed.” —FROM THE INTRODUCTION In the past, the future was opaque—the territory of fortune-tellers, gurus, and dubious local TV weathermen. But thanks to recent advances in computing and the reams of data we create through smartphone and Internet use, prediction models for individual behavior grow smarter and more sophisticated by the day. Whom you should marry, whether you’ll commit a crime or fall victim to one, if you’ll contract a specific strain of flu—even your precise location at any given moment years into the future—are becoming easily accessible facts. The naked future is upon us, and the implications are staggering.Patrick Tucker draws on stories from health care to urban planning to online dating to reveal the shape of a future that’s ever more certain. In these pages you’ll meet scientists and inventors who can predict your behavior based on your friends’ Twitter updates. They are also hacking the New York City sewer system to predict environmental conditions, anticipating how much the weather a year from now will cost an individual farmer, figuring out the time of day you’re most likely to slip back into a bad habit, and guessing how well you’ll do on a test before you take it. You’ll learn how social networks like Facebook are using your data to turn you into an advertisement and why the winning formula for a blockbuster movie is more predictable than ever.The rise of big data and predictive analytics means that governments and corporations are becoming much more effective at accomplishing their goals and at much less cost. Tucker knows that’s not always a good thing. But he also shows how we’ve gained tremendous benefits that we have yet to fully realize.Thanks to the increased power of predictive science, we’ll be better able to stay healthy, invest our savings more wisely, learn faster and more efficiently, buy a house in the right neighborhood at the right time, avoid crime, thwart terrorists, and mitigate the consequences of natural disasters. What happens in a future that anticipates your every move? The surprising answer: we’ll live better as a result.
What is HTML 5?
Brett McLaughlin - 2011
I realize that sounds more like a line out of an existential movie — maybe Waiting for Godot or a screenplay by Sartre — than a statement about HTML5. But it’s really the truth: most of the people using HTML5 are treating it as HTML4+, or even worse, HTML4 (and some stuff they don’t use). The result? A real delay in the paradigm shift that HTML5 is almost certain to bring. It’s certainly not time to look away, because by the time you look back, you may have missed something really important: a subtle but important transition centered around HTML5.
Networking for Dummies
Doug Lowe - 2000
You'll discover the hottest topics for setting up a network at home or in the office.Popular For Dummies author Doug Lowe knows what the networking beginner is looking for, so to that end, he offers you networking fundamentals written in his easy-to-understand style and discusses topics such as Windows 7 and Windows Server 2008.Walks you through networking basics with valuable updates of the latest networking tools and trends Explains exactly what a network is and how to use it Demonstrates how to build a wired or wireless network Addresses securing, optimizing, and troubleshooting a network Discusses networking with all major operating systems Networking For Dummies, 9th Edition is the guide you need to start sharing resources and exchanging data today.
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.
33 Million People in the Room: How to Create, Influence, and Run a Successful Business with Social Networking
Juliette Powell - 2008
They're a permanent reality: one that offers immense opportunities to smart, innovative businesses. Now, top social networking consultant Juliette Powell reveals how dozens of innovators are driving real ROI through social networks--and how you can, too. Powell's wide-ranging research, including coverage on Barack Obama's successful online strategy in his bid for the presidency, focuses on technology, media and gaming companies, leaders in fashion, beauty, publishing, finance, retail, event planning, and beyond. These powerful narratives illuminate the reality of doing business on today's social networks as never before. Through them, Powell introduces new best practices, shows how to avoid crucial pitfalls, and helps you prepare for the newest trends in online social networking. Drawing on the latest research, Powell connects the dots, uncovering the human dynamics and patterns that consistently underlie successful social networking initiatives. Along the way, she offers practical tools and advice for optimizing every stage of your own social networking initiative--from planning through measurement, and beyond. Getting on, getting started, and making social networks work for youDefining and implementing your optimal social networking strategyLeveraging the amazing power of the microcelebrityAchieving worldwide impact in the niche that matters to youTransforming social and cultural capital into financial capitalBe generous, build your trusted personal network--and discover all you get in returnProfiting from the knowledge you never knew you hadOpening your organization's own social networking channels-- inside and out
Testable JavaScript
Mark Ethan Trostler - 2012
This book shows you what writing and maintaining testable JavaScript for the client- or server-side actually entails, whether you’re creating a new application or rewriting legacy code.From methods to reduce code complexity to unit testing, code coverage, debugging, and automation, you’ll learn a holistic approach for writing JavaScript code that you and your colleagues can easily fix and maintain going forward. Testing JavaScript code is complicated. This book helps you simply the process considerably.Get an overview of Agile, test-driven development, and behavior-driven developmentUse patterns from static languages and standards-based JavaScript to reduce code complexityLearn the advantages of event-based architectures, including modularity, loose coupling, and reusabilityExplore tools for writing and running unit tests at the functional and application levelGenerate code coverage to measure the scope and effectiveness of your testsConduct integration, performance, and load testing, using Selenium or CasperJSUse tools for in-browser, Node.js, mobile, and production debuggingUnderstand what, when, and how to automate your development processes
Accidental Empires
Robert X. Cringely - 1992
Accidental Empires is the trenchant, vastly readable history of that industry, focusing as much on the astoundingly odd personalities at its core—Steve Jobs, Bill Gates, Mitch Kapor, etc. and the hacker culture they spawned as it does on the remarkable technology they created. Cringely reveals the manias and foibles of these men (they are always men) with deadpan hilarity and cogently demonstrates how their neuroses have shaped the computer business. But Cringely gives us much more than high-tech voyeurism and insider gossip. From the birth of the transistor to the mid-life crisis of the computer industry, he spins a sweeping, uniquely American saga of creativity and ego that is at once uproarious, shocking and inspiring.
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Brian Krebs - 2014
Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting."
Bloomberg Businessweek
Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts
David Gerard - 2017
A young physics student starts a revolutionary new marketplace immune to State coercion; he ends up ordering hits on people because they might threaten his great experiment, and is jailed for life without parole. Fully automated contractual systems are proposed to make business and the law work better; the contracts people actually write are unregulated penny stock offerings whose fine print literally states that you are buying nothing of any value. The biggest crowdfunding in history attracts $150 million on the promise that it will embody “the steadfast iron will of unstoppable code”; upon release it is immediately hacked, and $50 million is stolen. How did we get here? David Gerard covers the origins and history of Bitcoin to the present day, the other cryptocurrencies it spawned including Ethereum, the ICO craze and the 2017 crypto bubble, and the attempts to apply blockchains and smart contracts to business. Plus a case study on blockchains in the music industry. Bitcoin and blockchains are not a technology story, but a psychology story. Remember: if it sounds too good to be true, it almost certainly is.
The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski - 2011
Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.
The Darkening Web: The War for Cyberspace
Alexander Klimburg - 2017
Alexander Klimburg was a member of the generation for whom it was a utopian ideal turned reality: a place where ideas, information, and knowledge could be shared and new freedoms found and enjoyed. Two decades later, the future isn't so bright any more: increasingly, the Internet is used as a weapon and a means of domination by states eager to exploit or curtail global connectivity in order to further their national interests. Klimburg is a leading voice in the conversation on the implications of this dangerous shift, and in The Darkening Web, he explains why we underestimate the consequences of states' ambitions to project power in cyberspace at our peril: Not only have hacking and cyber operations fundamentally changed the nature of political conflict--ensnaring states in a struggle to maintain a precarious peace that could rapidly collapse into all-out war--but the rise of covert influencing and information warfare has enabled these same global powers to create and disseminate their own distorted versions of reality in which anything is possible. At stake are not only our personal data or the electrical grid, but the Internet as we know it today--and with it the very existence of open and democratic societies. Blending anecdote with argument, Klimburg brings us face-to-face with the range of threats the struggle for cyberspace presents, from an apocalyptic scenario of debilitated civilian infrastructure to a 1984-like erosion of privacy and freedom of expression. Focusing on different approaches to cyber-conflict in the US, Russia and China, he reveals the extent to which the battle for control of the Internet is as complex and perilous as the one surrounding nuclear weapons during the Cold War--and quite possibly as dangerous for humanity as a whole. Authoritative, thought-provoking, and compellingly argued, The Darkening Web makes clear that the debate about the different aspirations for cyberspace is nothing short of a war over our global values.
To Save Everything, Click Here: The Folly of Technological Solutionism
Evgeny Morozov - 2013
But how will these be affected once we delegate much of the responsibility for them to technology? The temptation of the digital age is to fix everything—from crime to corruption to pollution to obesity—by digitally quantifying, tracking, or gamifiying behavior. But when we change the motivations for our moral, ethical, and civic behavior, we may also change the very nature of that behavior itself. Technology, Evgeny Morozov proposes, can be a force for improvement—but only if we abandon the idea that it is necessarily revolutionary and instead genuinely interrogate what we are doing with it and what it is doing to us.From urging us to abandon monolithic ideas of “the Internet” to showing how to design more humane and democratic technological solutions, To Save Everything, Click Here is a dazzling tour of our technological future, and a searching investigation into the digital version of an enduring struggle: between man and his machines.
Hadoop in Action
Chuck Lam - 2010
The intended readers are programmers, architects, and project managers who have to process large amounts of data offline. Hadoop in Action will lead the reader from obtaining a copy of Hadoop to setting it up in a cluster and writing data analytic programs.The book begins by making the basic idea of Hadoop and MapReduce easier to grasp by applying the default Hadoop installation to a few easy-to-follow tasks, such as analyzing changes in word frequency across a body of documents. The book continues through the basic concepts of MapReduce applications developed using Hadoop, including a close look at framework components, use of Hadoop for a variety of data analysis tasks, and numerous examples of Hadoop in action.Hadoop in Action will explain how to use Hadoop and present design patterns and practices of programming MapReduce. MapReduce is a complex idea both conceptually and in its implementation, and Hadoop users are challenged to learn all the knobs and levers for running Hadoop. This book takes you beyond the mechanics of running Hadoop, teaching you to write meaningful programs in a MapReduce framework.This book assumes the reader will have a basic familiarity with Java, as most code examples will be written in Java. Familiarity with basic statistical concepts (e.g. histogram, correlation) will help the reader appreciate the more advanced data processing examples. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.