What Does This Look Like in the Classroom?: Bridging the Gap Between Research and Practice


Carl Hendrick - 2017
    But every year thousands of research papers are published, some of which contradict each other. How can busy teachers know which research is worth investing time in reading and understanding? And how easily is that academic research translated into excellent practice in the classroom?In this thorough, enlightening and comprehensive book, Carl Hendrick and Robin Macpherson ask 18 of today's leading educational thinkers to distill the most up-to-date research into effective classroom practice in 10 of the most important areas of teaching. The result is a fascinating manual that will benefit every single teacher in every single school, in all four corners of the globe.Contributors: Assessment, marking & feedback: Dylan Wiliam & Daisy Christodoulou; Behaviour: Tom Bennett & Jill Berry; Classroom talk and questioning: Martin Robinson & Doug Lemov; Learning myths: David Didau & Pedro de Bruyckere; Motivation: Nick Rose & Lucy Crehan; Psychology and memory: Paul Kirschner & Yana Weinstein; SEN: Jarlath O Brien & Maggie Snowling; Technology: Jose Picardo & Neelam Parmar; Reading and literacy: Alex Quigley & Dianne Murphy

The Hardware Hacker: Adventures in Making and Breaking Hardware


Andrew Huang - 2017
    In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

Minimalist Budget: Simple Strategies On How To Save More, Spend Less, And Curb Spending Temptation (Without Living On Ramen)


Zoe McKey - 2017
    Minimalist Budget will help you to turn your bloated expenses into a well-toned budget, spending on exactly what you need and nothing else. This book presents solutions for two major problems in our consumer society: (1) how to downsize your cravings without having to sacrifice the fun stuff, and (2) how to whip your finances into shape and follow a personalized budget. This is not a get rich quick book. But I can promise day-by-day, month-by-month, you’ll budget better and become richer as a consequence. Regardless of how much your income is we’ll find a way to budget, save, and increase your net worth. Since my youth, I’ve had to live on a budget that ranged from $100 to $200 a month if I was lucky. Even though I never knew how much I would have the next month, I was always able to have enough for my essential expenses, personal pleasures, and savings. If you’re tired of the false and impossible-to-follow promises of “finance gurus,” try out my simple, straightforward, easy-to-stick-to methods. Improve your spending habits: • Incorporate minimalism into your finances • How to avoid becoming a minimalist consumerist • Learn the psychological traps that make you overspend • Control your compulsive spending habits Feel financially secure every day: • Learn about two A-Z budgeting methods and how to make them work for you • Learn ratio-based budgeting and fixed-amount budgeting • Discover the best budgeting software programs • Design a bulletproof savings strategy to get out of debt, be prepared for emergencies, and set yourself up for retirement Stop hating your financial life: • Learn how to set SMART financial goals • Increase your self-confidence with budgeting • 50 small budgeting tips Financial education is not part of our educational system. It is normal that we don’t know how to budget when we step into the craziness we call adulthood. But it is not normal to stay ignorant about a field of life that (like it or not) guarantees our material survival. Money management is an essential skill for everybody who earns, shops or consumes. If you follow the budgeting tips in this book, you’ll be able to keep track of your finances. You’ll clearly know where your money goes, where it comes from and where can you save. You won’t feel stressed of running out of money unexpectedly, you’ll clear yourself out of debts and have savings for bigger expenses like a vacation, new car or unexpected events. Leave money struggles for yesterday. Grab a copy of Minimalist Budget by hitting buy now in the top right corner of this page.

Messi, Neymar, Ronaldo: Head to Head with the World's Greatest Players


Luca Caioli - 2014
    With exclusive insights from their friends, families, teammates and managers – including interviews with managers Luiz Felipe Scolari and Vicente del Bosque – Caioli presents a unique insight into what makes a modern player not just successful, but truly great.

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Introduction to Algorithms


Thomas H. Cormen - 1989
    Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.

Cryptography Engineering: Design Principles and Practical Applications


Niels Ferguson - 2010
    Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.

Network Warrior


Gary A. Donahue - 2007
    What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

Fuel for Life: Achieve maximum health with amazing dairy, wheat and sugar-free recipes and my ultimate 8-week eating plan


Bear Grylls - 2015
    The action hero as domestic god - swoon!' The LadyPacked with comprehensive advice on ingredients, Fuel for Life includes over 70 simple, mouth-watering recipes. Bear's encouraging and practical guidance will motivate you to try new foods and show you healthy versions of your favourite meals. Free from wheat, gluten, dairy and refined sugar, this is delicious, natural and wholesome food that you and your body will love. Fuel for Life will help you feel healthier, happier, stronger and more energised, and will your nourish your body for maximum success and long-term health.Readers are loving cooking Bear's recipes:***** 'Even the kids are loving these super healthy recipes.'***** 'Packed with amazingly tasty recipes . . . my whole family loved them.'***** 'Love the easy recipes and practical advice. Great book!'

HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications


Juan Diego Gauchat
    

The Shellcoder's Handbook: Discovering and Exploiting Security Holes


Jack Koziol - 2004
    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files

Darknet: A Beginner's Guide to Staying Anonymous


Lance Henderson - 2012
    This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!

TEAM Textbook


Chris Brady - 2007
    This book walks through every aspect of Community Building and the MonaVie opportunity. Includes the DVD "Textbook Talks".

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.