Book picks similar to
Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer by Jean-Philippe Aumasson
epub
have-ebook
programming
tb-cs
Understanding Air France 447
Bill Palmer - 2013
Written by A330 Captain, Bill Palmer, this book opens to understanding the actions of the crew, how they failed to understand and control the problem, and how the airplane works and the part it played. All in easy to understand terms.Addressed are the many contributing aspects of weather, human factors, and airplane system operation and design that the crew could not recover from. How each contributed is covered in detail along with what has been done, and needs to be done in the future to prevent this from happening again.Also see the book's companion website: UnderstandingAF447.com for supplemental materials referred to in the book or to contact the author.
Forgotten Emperor: The Complete Campaigns
Paul Bannister - 2018
His father was a respected warrior chief, a leader of men. As a centurion in the Empire’s mighty Army, he earns the respect of his men: soldiers who will fight, and die if necessary, at his command. But, just like his father before him, he is surrounded by enemies... Arthur Imperator The Roman fleet has been defeated and the threat of invasion removed. Arthur Britannicus has taken the throne as Imperator – Emperor of Britain. He is a symbol of hope, uniting the fractious tribes of Britain who have been oppressed and mistreated for so long. However, as the threat from Rome retreats, the intimidation from Saxon warlords intensifies. Arthur must draw his sword and muster his forces again if he is to keep his island under British rule. While Arthur builds his cavalry and trains up his army, his old enemy, Maximian, Augustus of the West, plots his downfall. Seething over Arthur’s execution of his general, Constantius, Maximian will look to take Arthur’s kingdom - and his life. Arthur Invictus Londinium. Britain has lost its battle with Rome and the city lies in ruins. But the Romans, under threat in their homeland from barbarian invaders, have retreated. The war is not over. As Emperor of Britain, Arthur Imperator must reunite the fractured British tribes to lead them back to victory - and reclaim the kingdom. The Roman emperor Maximian is bound to strike again. But instead of waiting passively for him to attack, Arthur resolves to risk everything by leading his men to the Roman border and confronting the enemy head on. A King’s Cavalry King Arthur, Britain’s triumphant ruler, is turning his cavalry into the finest war horses the world has ever known Though he is a pagan at heart, he has embraced the new Christian religion in the hope of uniting his country under one faith and one cause. Yet, when he receives a summons from Constantine, the Emperor of Rome, he is worried that the traditional Gods have abandoned him for publicly announcing his Christian beliefs. The Emperor appears to want peace. But Arthur killed Constantine’s father -- and he is wary that this summons might be his own death warrant. With Constantine growing ever more threatening, Arthur’s time is running out.
Band of Brothers: The Complete Campaigns
Richard Foreman - 2016
England stands on the brink of war with France. Henry V receives intelligence, through his agent Thomas Chaucer, that the French intend to re-forge their old alliance with Scotland. The King orders Chaucer and veteran archer Robert Cooper to travel across the border and intercept a French agent, Reynard of Troyes, before he can deliver the gold which will fund Scotland's war with England. Chaucer also learns of a plot to murder the man that England cannot afford to go to war without. He orders the man-at-arms, Edward Fordham, to remain in the capital, solve the mystery and stop the assassin. But all is not what it seems. Some wars are fought in the shadows as well as on the battlefield...
Harfleur
1415. Harfleur. The town stands defiant. Henry V and his army have been repulsed. If the English fail to break the siege then their campaign will be over. Men will die, from disease or starvation. The King instructs one of his agents, Thomas Chaucer, to negotiate a deal with a local French merchant to re-supply the army. But, instead of meeting an ally, Chaucer is about to come face to face with an old enemy. Henry, in a last throw of the dice, charges the archer Robert Cooper with ending the siege. The bowman forms a plan. The night attack will either save the English army – or damn it. Once more into the breach…
Agincourt
1415. Agincourt. Victory or death. Kill or be killed. The English are outnumbered. But Henry V is determined that his army won't be outfought. Robert Cooper and his company of archers must face a new threat, as well as do battle with the old enemy. And as the two sides prepare to engage each other the spy, Thomas Chaucer, and his man-at-arms, Edward Fordham, must travel through enemy-held territory, in order to hunt down Reynard de Troyes. The ruthless French agent will stop at nothing to defeat all his enemies, including Chaucer and Fordham... Richard Foreman’s books have been widely praised. Praise for Band of Brothers: The Game’s Afoot: 'A rattling good yarn, requiring only the minimum of suspension of belief, and leaves one eagerly anticipating the next instalment of the adventures of the team as they accompany the King to Harfleur' - Major Gordon Corrigan, author of A Great and Glorious Adventure: A Military History of the Hundred Years War. Praise for Augustus: Son of Rome: ‘Augustus: Son of Rome forges action and adventure with politics and philosophy. This superb story is drenched in both blood and wisdom - and puts Foreman on the map as the coming man of historical fiction’. - Saul David, Author of the Zulu Hart series. Praise for Raffles: The Complete Innings: ‘Classy, humorous and surprisingly touching tales of cricket, friendship and crime.’ - David Blackburn, The Spectator. Richard Foreman is the author of numerous best-selling books, including Augustus: Son of Rome and the Sword of Rome and Sword of Empire series of historical novellas. He is also the author of Warsaw, a literary novel set during the Second World War. He lives in London.
Carbo and the Thief: And Other Tales of Ancient Rome
Alex Gough - 2014
On the way he encounters many adventures, strives to solve a mysterious theft, and meets an old friend getting ready for gladiatorial combat.
In other stories we visit Elissa, the evil priestess, and Vespillo, the trusty watchman, and discover more about their colourful histories. We see a young boy’s first battle, and travel all the way to the barbaric Hadrian’s Wall.
These are vivid tales of ancient Rome, perfect for fans of Wallace Breem, Simon Scarrow and Ben Kane.
The Little Go Book
Karl Seguin - 2014
It's aimed at developers who might not be quite comfortable with the idea of pointers and static typing.http://openmymind.net/The-Little-Go-B...
Handbook of Applied Cryptography
Alfred J. Menezes - 1996
Standards are emerging to meet the demands for cryptographic protection in most areas of data communications. Public-key cryptographic techniques are now in widespread use, especially in the financial services industry, in the public sector, and by individuals for their personal privacy, such as in electronic mail. This Handbook will serve as a valuable reference for the novice as well as for the expert who needs a wider scope of coverage within the area of cryptography. It is a necessary and timely guide for professionals who practice the art of cryptography. The Handbook of Applied Cryptography provides a treatment that is multifunctional: It serves as an introduction to the more practical aspects of both conventional and public-key cryptographyIt is a valuable source of the latest techniques and algorithms for the serious practitionerIt provides an integrated treatment of the field, while still presenting each major topic as a self-contained unitIt provides a mathematical treatment to accompany practical discussionsIt contains enough abstraction to be a valuable reference for theoreticians while containing enough detail to actually allow implementation of the algorithms discussedNow in its third printing, this is the definitive cryptography reference that the novice as well as experienced developers, designers, researchers, engineers, computer scientists, and mathematicians alike will use.
Windows 7 Inside Out
Ed Bott - 2009
It's all muscle and no fluff. Discover how the experts tackle Windows 7--and challenge yourself to new levels of mastery! Compare features and capabilities in each edition of Windows 7.Configure and customize your system with advanced setup options.Manage files, folders, and media libraries.Set up a wired or wireless network and manage shared resources.Administer accounts, passwords, and logons--and help control access to resources.Configure Internet Explorer 8 settings and security zones.Master security essentials to help protect against viruses, worms, and spyware.Troubleshoot errors and fine-tune performance.Automate routine maintenance with scripts and other tools. CD includes: Fully searchable eBookDownloadable gadgets and other tools for customizing Windows 7Insights direct from the product team on the official Windows 7 blogLinks to the latest security updates and products, demos, blogs, and user communities For customers who purchase an ebook version of this title, instructions for downloading the CD files can be found in the ebook.
The Practice of Cloud System Administration: Devops and Sre Practices for Web Services, Volume 2
Thomas A. Limoncelli - 2014
Unsatisfied with books that cover either design or operations in isolation, the authors created this authoritative reference centered on a comprehensive approach. Case studies and examples from Google, Etsy, Twitter, Facebook, Netflix, Amazon, and other industry giants are explained in practical ways that are useful to all enterprises. The new companion to the best-selling first volume, The Practice of System and Network Administration, Second Edition, this guide offers expert coverage of the following and many other crucial topics: Designing and building modern web and distributed systemsFundamentals of large system design Understand the new software engineering implications of cloud administration Make systems that are resilient to failure and grow and scale dynamically Implement DevOps principles and cultural changes IaaS/PaaS/SaaS and virtual platform selection Operating and running systems using the latest DevOps/SRE strategiesUpgrade production systems with zero down-time What and how to automate; how to decide what not to automate On-call best practices that improve uptime Why distributed systems require fundamentally different system administration techniques Identify and resolve resiliency problems before they surprise you Assessing and evaluating your team's operational effectivenessManage the scientific process of continuous improvement A forty-page, pain-free assessment system you can start using today
Restful Java with Jax-RS
Bill Burke - 2009
With this hands-on reference, you'll focus on implementation rather than theory, and discover why the RESTful method is far better than technologies like CORBA and SOAP. It's easy to get started with services based on the REST architecture. RESTful Java with JAX-RS includes a technical guide that explains REST and JAX-RS, how they work, and when to use them. With the RESTEasy workbook that follows, you get step-by-step instructions for installing, configuring, and running several working JAX-RS examples using the JBoss RESTEasy implementation of JAX-RS.Work on the design of a distributed RESTful interface, and develop it in Java as a JAX-RS serviceDispatch HTTP requests in JAX-RS, and learn how to extract information from themDeploy your web services within Java Enterprise Edition using the Application class, Default Component Model, EJB Integration, Spring Integration, and JPADiscover several options for securing your web servicesLearn how to implement RESTful design patterns using JAX-RSWrite RESTful clients in Java using libraries and frameworks such as java.net.URL, Apache HTTP Client, and RESTEasy Proxy
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
Essential Speed Reading Techniques: How to Become a Better, Faster Reader
Katya Seberson - 2019
Learn the most effective speed reading techniques for your personal strengths and challenges, and make visible progress through a series of engaging exercises.Choose from a variety of strategies and practices proven to advance speed and improve reading comprehension. The integrated exercises help develop your skills, allowing you to read quickly—and still enjoy every word. Whether you’re reading an entertaining novel or a challenging textbook, this speed reading guide will help you sail right through.In Essential Speed Reading Techniques, you’ll find:
Achievable goals—Improve your speed by setting realistic goals based on your own individual baseline.
Track your improvement—Assess your progress with self-tests for knowledge retention, smooth eye movement, and more.
Tips and tricks—Discover speed reading strategies to minimize rereading, focus your attention, and reduce eyestrain from screens.
With the personalized strategies in Essential Speed Reading Techniques, boosting your speed and reading comprehension will be a breeze.
Summer's French Kiss: 4 hot and humorous beach reads set in France
Alix Nichols - 2017
She is his son's nanny, a 23-year-old virgin, and a guileless ingenue to boot...WHAT IF IT'S LOVE (Dante Rossetti Winner)When the hottest man in Paris - Rob Dumont - shows interest in geeky, introverted heiress Lena, she suspects something fishy... And so she should.AMANDA'S GUIDE TO LOVE (Kindle Scout Winner)One snooty career girl who worships Perfection. One handsome gambler who worships Freedom. One wild night that changes everything... ~ PRAISE FOR ALIX NICHOLS"Written in the spirit of pure pleasure, and it delivers just that." -- Kirkus Reviews"Exceptionally entertaining."-- Readers' Favorite"The numerous twists and turns will keep you hanging off the edge of your seat, and the magical setting in France will reel you in all the way up till the magnificent finish." -- RT Book Reviews"No one does contemporary romance like this, with the warmth and love of family and friends as well as the naughty sexy romance, all steeped in the inimitable charm of Paris." -- Melanie S."Engaging, witty, romantic ... kept me involved and wanting more." -- A Wonderful World of Words"Sexy and humorous - highly recommended." -- Perri Stephens~ Grab this bundle now because you'll save 50% -- or 3 Kindle Unlimited borrows -- over downloading each book individually!
Shadows in the Valley
Elizabeth Haran - 2018
Beautiful but destitute Abigail is forced to marry an old landowner who desperately needs heirs. But on their wedding night something terrible happens ... Abbey flees Martindale Hall. She has no memory of the previous night, but no one believes her. With no one to trust, she seeks refuge in the neighbouring town of Clare. There, her luck seems to change. She meets Jack Hawker, who is looking for someone to tend to his mother on the remote farm Bungaree Station. Jack hires Abbey for the job. But Abbey's respite is short-lived. Days later, a visitor from Martindale Hall turns up on the farm, accusing Abbey of a horrible crime ... Will Jack believe her? Or is she doomed to a life of penance? With an eye for detail, Elizabeth Haran is the author of numerous other romantic adventures including Island of Whispering Winds, Under a Flaming Sky, Dreams beneath a Red Sun, and River of Fortune, Staircase to the Moon, and Beyond the Red Horizon, all available as eBooks. For fans of sagas set against a backdrop of beautiful landscapes, like Sarah Lark's, Island of a Thousand Springs or Kate Morton's, The Forgotten Garden. About the author Elizabeth Haran was born in Bulawayo, Rhodesia and migrated to Australia as a child. She lives with her family in Adelaide and has written fourteen novels set in Australia. Her heart-warming and carefully crafted books have been published in ten countries and are bestsellers in Germany.
HTML 5 Black Book : Covers Css3, Javascript,XML, XHTML, Ajax, PHP And Jquery
Kogent Learning Solutions Inc - 2011
It will help you to master various Web technologies, other than HTML5, including CSS3, JavaScript, XML, and AJAX. If you are a Web designer or developer, then this book is your introduction to new features and elements of HTML5, including audio and video media elements, the canvas element for drawing, and many others. In this book, you will learn how to use HTML5 and other Web technologies in the latest versions of modern browsers to develop Web applications.