Book picks similar to
Wardriving & Wireless Penetration Testing by Chris Hurley
security
unsorted
0000000
0computer-security
Mindstorms: Children, Computers, And Powerful Ideas
Seymour Papert - 1980
We have Mindstorms to thank for that. In this book, pioneering computer scientist Seymour Papert uses the invention of LOGO, the first child-friendly programming language, to make the case for the value of teaching children with computers. Papert argues that children are more than capable of mastering computers, and that teaching computational processes like de-bugging in the classroom can change the way we learn everything else. He also shows that schools saturated with technology can actually improve socialization and interaction among students and between students and teachers.
CCNA Portable Command Guide
Scott D. Empson - 2005
The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.
Free Culture: The Nature and Future of Creativity
Lawrence Lessig - 2004
Never before have the cultural powers- that-be been able to exert such control over what we can and can't do with the culture around us. Our society defends free markets and free speech; why then does it permit such top-down control? To lose our long tradition of free culture, Lawrence Lessig shows us, is to lose our freedom to create, our freedom to build, and, ultimately, our freedom to imagine.
The Measure of All Things: The Seven-Year Odyssey and Hidden Error That Transformed the World
Ken Alder - 2002
Starting in Paris, Jean-Baptiste-Joseph Delambre would make his way north to Dunkirk, while Pierre-François-André Méchain voyaged south to Barcelona. Their mission was to measure the world, and their findings would help define the meter as one ten-millionth of the distance between the pole and the equator-- a standard that would be used for all people, for all time. "The Measure of All Things" is the astonishing tale of one of history's greatest scientific adventures. Yet behind the public triumph of the metric system lies a secret error, one that is perpetuated in every subsequent definition of the meter. As acclaimed historian and novelist Ken Alder discovered through his research, there were only two people on the planet who knew the full extent of this error: Delambre and Méchain themselves. By turns a science history, detective tale, and human drama, "The Measure of All Things" describes a quest that succeeded as it failed, and continues to enlighten and inspire to this day.
Community Building on the Web: Secret Strategies for Successful Online Communities
Amy Jo Kim - 1999
She discusses important design strategies, interviews influential Web community-builders, and provides the reader with templates and questionnaires to use in building their own communities.
The Watchman: The Twisted Life and Crimes of Serial Hacker Kevin Poulsen
Jonathan Littman - 1997
Busted as a teenager for hacking into Pac Bell phone networks, Kevin Poulsen would find his punishment was a job with a Silicon Valley defense contractor. By day he seemed to have gone straight, toiling on systems for computer-aided war. But by night he burglarized telephone switching offices, adopting the personae and aliases of his favorite comic-book anti heroes - the Watchmen. When authorities found a locker crammed with swiped telecommunications equipment, Poulsen became a fugitive from the FBI, living the life of a cyberpunk in a neon Hollywood underground. Soon he made the front pages of the New York Times and became the first hacker charged with espionage. Littman takes us behind the headlines and into the world of Poulsen and his rogues' gallery of cyberthieves. Drawing on hundreds of hours of interviews with Poulsen, his confederates, and the authorities, he spins a thrilling chase story on the electronic frontier. The nation's phone network was Poulsen's playground. On Los Angeles's lucrative radio giveaways, Poulsen worked his magic, winning Porsches and tens of thousands of dollars. He secretly switched on the numbers of defunct Yellow Pages escort ads and took his cut of the profits. And he could wiretap or electronically stalk whomever he pleased, his childhood love or movie stars. The FBI seemed no match for Poulsen. But as Unsolved Mysteries prepared a broadcast on the hacker's crimes, LAPD vice stumbled onto his trail, and an undercover operation began on Sunset Strip.
The Book of PoC||GTFO
Manul Laphroaig - 2017
Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.
Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family
Theresa M. Payton - 2014
The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
Lifehacker: 88 Tech Tricks to Turbocharge Your Day
Gina Trapani - 2006
The 88 "life hacks" -- clever shortcuts and lesser-known, faster ways to complete a task -- in this book are some of the best in Lifehacker.com's online archive. Every chapter describes an overarching lifehacker principle, then segues into several concrete applications. Each hack includes a step-by-step how-to for setting up and using the solution with cross-platform software, detailed screen shots, and sidebars with additional tips. Order your copy today and increase your productivity!
How to Count (Programming for Mere Mortals, #1)
Steven Frank - 2011
unsigned numbers- Floating point and fixed point arithmeticThis short, easily understood book will quickly get you thinking like a programmer.
How to Build an Android: The True Story of Philip K. Dick's Robotic Resurrection
David F. Dufty - 2012
DickIn late January 2006, a young robotocist on the way to Google headquarters lost an overnight bag on a flight somewhere between Dallas and Las Vegas. In it was a fully functional head of the android replica of Philip K. Dick, cult science-fiction writer and counterculture guru. It has never been recovered.In a story that echoes some of the most paranoid fantasies of a Dick novel, readers get a fascinating inside look at the scientists and technology that made this amazing android possible. The author, who was a fellow researcher at the University of Memphis Institute of Intelligent Systems while the android was being built, introduces readers to the cutting-edge technology in robotics, artificial intelligence, and sculpture that came together in this remarkable machine and captured the imagination of scientists, artists, and science-fiction fans alike. And there are great stories about Dick himself his inspired yet deeply pessimistic worldview, his bizarre lifestyle, and his enduring creative legacy. In the tradition of popular science classics like "Packing for Mars" and "The Disappearing Spoon," "How to Build an Android" is entertaining and informative popular science at its best."
Rebirth Online
Michael James Ploof - 2018
Unable to afford the state of the art surgery needed to repair his spinal cord, Sam has lost all hope. But when the first fully immersive virtual reality game goes live, Sam is given a second chance at life. Rebirth Online offers players action, adventure, and a chance at real world riches. If Sam can rise through the ranks and claim his kingdom, he just might be able to earn enough money to afford the surgery he so badly needs. Sam enters Rebirth Online excited to begin his adventure, but within fifteen minutes of spawning in the game, he is robbed, beaten, and left for dead. He wakes to find himself in the care of Anna, a beautiful elf healer. Together they discover that he has an unbelievable special ability, one that allows him to instantly level. To use it, he must grind - literally - with the girls in his guild. The only problem - A twelve hour cool down. As Sam’s guild grows, he and Anna are joined by a beautiful human warrior, a feisty drow assassin, and a flighty female Furry. But when a run-in with a high level player named Kincaid ends with Anna’s kidnapping, Sam and his girls must pull all the punches to get their guild mate back. In the process, they uncover a secret with the potential to bring the entire game crashing down. ***Content Warning*** Rebirth Online is a litRPG Harem fantasy adventure with adult themes. Not intended for children.
Lifehacker: The Guide to Working Smarter, Faster, and Better
Adam Pash - 2011
This new edition of a perennial bestseller boasts new and exciting tips, tricks, and methods that strike a perfect balance between current technology and common sense solutions for getting things done. Exploring the many ways technology has changed since the previous edition, this new edition has been updated to reflect the latest and greatest in technological and personal productivity.The new "hacks" run the gamut of working with the latest Windows and Mac operating systems for both Windows and Apple, getting more done with smartphones and their operating systems, and dealing with the evolution of the web. Even the most tried-and-true hacks have been updated to reflect the contemporary tech world and the tools it provides us.Technology is supposed to make our lives easier by helping us work more efficiently. Lifehacker: The Guide to Working Smarter, Faster, and Better, Third Edition is your guide to making that happen!
Working with UNIX Processes
Jesse Storimer - 2011
Want to impress your coworkers and write the fastest, most efficient, stable code you ever have? Don't reinvent the wheel. Reuse decades of research into battle-tested, highly optimized, and proven techniques available on any Unix system.This book will teach you what you need to know so that you can write your own servers, debug your entire stack when things go awry, and understand how things are working under the hood.http://www.jstorimer.com/products/wor...
Scalable Internet Architectures
Theo Schlossnagle - 2006
Scalable Internet Architectures addresses these concerns by teaching you both good and bad design methodologies for building new sites and how to scale existing websites to robust, high-availability websites. Primarily example-based, the book discusses major topics in web architectural design, presenting existing solutions and how they work. Technology budget tight? This book will work for you, too, as it introduces new and innovative concepts to solving traditionally expensive problems without a large technology budget. Using open source and proprietary examples, you will be engaged in best practice design methodologies for building new sites, as well as appropriately scaling both growing and shrinking sites. Website development help has arrived in the form of Scalable Internet Architectures.