Sinatra: Up and Running


Alan Harris - 2011
    With this concise book, you will quickly gain working knowledge of Sinatra and its minimalist approach to building both standalone and modular web applications. Sinatra serves as a lightweight wrapper around Rack middleware, with syntax that maps closely to functions exposed by HTTP verbs, which makes it ideal for web services and APIs. If you have experience building applications with Ruby, you’ll quickly learn language fundamentals and see under-the-hood techniques, with the help of several practical examples. Then you’ll get hands-on experience with Sinatra by building your own blog engine. Learn Sinatra’s core concepts, and get started by building a simple application Create views, manage sessions, and work with Sinatra route definitions Become familiar with the language’s internals, and take a closer look at Rack Use different subclass methods for building flexible and robust architectures Put Sinatra to work: build a blog that takes advantage of service hooks provided by the GitHub API

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

Faucian Booster: Covid Vaccine Mandates Violate the Nuremberg Code and Therefore Should Be Opposed and Resisted by Any Peaceable Means Necessary


Steve Deace - 2021
    

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World


Joel Brenner - 2011
    He saw at close range the battleground on which adversaries are attacking us: cyberspace.Like the rest of us, governments and corporations inhabit “glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can—and cannot—do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.

Penetration Testing: A Hands-On Introduction to Hacking


Georgia Weidman - 2014
    This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.

The Decline and Fall of IBM: End of an American Icon?


Robert Cringely - 2014
    Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.

Bumper to Bumper


Doug DeMuro - 2016
    Bumper to Bumper is newer, longer, and better, touting mostly original stories that include the time Doug crashed his brand-new Porsche company car into a tree, the real story behind the time Doug crushed a Chrysler PT Cruiser, the time Doug bribed a government official in South Africa, the time Doug got detained at the Canadian border on an automotive press trip, and the story of Doug’s relationship with automakers. Also, Doug wrote this description himself in the third person.

Hacking For Dummies


Kevin Beaver - 2004
    In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

DOS For Dummies 3e


Dan Gookin - 1991
    His clear explanations and down-to-earth style make exploring this operating system painless -- even fun! With complete coverage of all versions of DOS, as well as DOS under Windows 98, DOS For Dummies, 3rd Edition (the latest edition of this best-selling guide), offers frustrated DOS users more help than ever before. Inside, find helpful advice on how to Graps the facts and features of MS-DOS in Windows 98 Share data between DOS programs and Windows -- easily Find that lost file and retrieve your program if it crashes Handle error messages in DOS -- without panicking Work with all versions of DOS Discover more about modems and DOS utilities Understand complex terminology with clear explanations in a glossary of terms Run programs directly from the DOS prompt

Not Broken: An Approachable Guide to Miscarriage and Recurrent Pregnancy Loss


Lora Shahine - 2017
    Whether you are a patient struggling with miscarriages or a medical provider caring for patients with recurrent pregnancy loss, you will learn something from this resource. Dr. Shahine explains not only a typical Western medicine approach to evaluation and treatment for miscarriage but also includes Eastern approaches to care, lifestyle factors that will decrease your risk of miscarriage, and the emotional impact of recurrent pregnancy loss. You will finish this book feeling more empowered to be an advocate for your care and more hopeful than ever to continue towards your family goals. “I have one word to describe this fabulous book: FINALLY. Women with recurrent pregnancy loss have been needing this book for years.” – Dr. Alice Domar, associate professor of obstetrics, gynecology, and reproductive biology at Harvard Medical School and author of Conquering Infertility and Finding Calm for the Expectant Mom

The Baby Chase: An Adventure in Fertility


Holly Finn - 2011
    “I smoked in my twenties. I preferred red wine to sparkling water. I ate too much milk chocolate. I liked limericks. I know all the wrong I’ve done. But also, more than any of that, I’ve always longed for children.” Yet there she was: successful, social, mostly happy, and not a mother. Knowing that her chances of becoming pregnant naturally were quickly fading, Finn decided to gamble: she—like some 85,000 other women in the U.S. each year—would attempt in vitro fertilization. Almost three years later, she’s still trying, and in the process has become an accidental pioneer (and, at times, a guinea pig) in the ever-evolving science of IVF.“The Baby Chase” is a primer for anyone contemplating or undergoing IVF. More than that, it’s a story of longing, hope—and hormones—that will appeal to all parents, present and future.Finn’s engaging and honest account sheds light on a subject that few people who undergo IFV are willing to talk about: what happens when the science doesn’t work. “Usually, it’s only the people who come out on the other side, beaming, with a baby on one hip, who speak up about IVF,” she writes. “We never hear from those IVF has failed - it’s too crushing to talk about. We don’t hear from men and women in the middle of treatment, either.... People like me.”

Changing the Game: How Video Games Are Transforming the Future of Business


David Edery - 2008
    Microsoft has used games to painlessly and cost-effectively quadruple voluntary employee participation in important tasks. Medical schools have used game-like simulators to train surgeons, reducing their error rate in practice by a factor of six. A recruiting game developed by the U.S. Army, for just 0.25% of the Army’s total advertising budget, has had more impact on new recruits than all other forms of Army advertising combined. And Google is using video games to turn its visitors into a giant, voluntary labor force—encouraging them to manually label the millions of images found on the Web that Google’s computers cannot identify on their own.Changing the Game reveals how leading-edge organizations are using video games to reach new customers more cost-effectively; to build brands; to recruit, develop, and retain great employees; to drive more effective experimentation and innovation; to supercharge productivity…in short, to make it fun to do business. This book is packed with case studies, best practices, and pitfalls to avoid. It is essential reading for any forward-thinking executive, marketer, strategist, and entrepreneur, as well as anyone interested in video games in general. In-game advertising, advergames, adverworlds, and beyondChoose your best marketing opportunities—and avoid the pitfalls Use gaming to recruit and develop better employeesLearn practical lessons from America’s Army and other innovative case studies Channel the passion of your user communitiesHelp your customers improve your products and services—and have fun doing it What gamers do better than computers, scientists, or governmentsUse games to solve problems that can’t be solved any other way

@War: The Rise of the Military-Internet Complex


Shane Harris - 2014
    In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.

Laravel: Up and Running: A Framework for Building Modern PHP Apps


Matt Stauffer - 2016
    This rapid application development framework and its vast ecosystem of tools let you quickly build new sites and applications with clean, readable code. With this practical guide, Matt Stauffer--a leading teacher and developer in the Laravel community--provides the definitive introduction to one of today's most popular web frameworks.The book's high-level overview and concrete examples will help experienced PHP web developers get started with Laravel right away. By the time you reach the last page, you should feel comfortable writing an entire application in Laravel from scratch.Dive into several features of this framework, including:Blade, Laravel's powerful, custom templating toolTools for gathering, validating, normalizing, and filtering user-provided dataLaravel's Eloquent ORM for working with the application's databasesThe Illuminate request object, and its role in the application lifecyclePHPUnit, Mockery, and PHPSpec for testing your PHP codeLaravel's tools for writing JSON and RESTful APIsInterfaces for file system access, sessions, cookies, caches, and searchTools for implementing queues, jobs, events, and WebSocket event publishingLaravel's specialty packages: Scout, Passport, Cashier, Echo, Elixir, Valet, and Socialite

Metasploit: The Penetration Tester's Guide


David Kennedy - 2011
    But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.