Robot Building for Beginners


David Cook - 2002
    Not only does author David Cook assist you in understanding the component parts of robot development, but he also presents valuable techniques that prepare you to make new discoveries on your own.Cook begins with the anatomy of a homemade robot and gives you the best advice on how to proceed successfully. General sources for tools and parts are provided in a consolidated list, and specific parts are recommended throughout the book. Also, basic safety precautions and essential measuring and numbering systems are promoted throughout.Specific tools and parts covered include digital multimeters, motors, wheels, resistors, LEDs, photoresistors, transistors, chips, gears, nut drivers, batteries, and more. "Robot Building for Beginners" is an inspiring book that provides an essential base of practical knowledge for anyone getting started in amateur robotics.

Top 300 Free Apps for the Kindle Fire: The complete guide to the best free Kindle apps


Edward C. Jones - 2012
    As far as apps go, what do you put on your new Fire? With tens of thousands of apps out there and more appearing on a daily basis, how do you choose what's useful, as opposed to what may be a waste of your download time? Here is the answer, newly updated with over 300 of the best FREE apps for your Fire. Top 300 Free Apps for the Kindle Fire is your guide to 300 of the top rated apps that you'll find useful for your Kindle Fire. Jones has taken the time to research and compile this extensive list of apps for your Kindle Fire, and best of all, each of these apps are FREE. You'll find apps for the home office, for entertainment, for news, weather, and sports, for your health, for managing your finances, for playing games, and more. A new local news apps section provides news, weather, and traffic apps for over 50 major US cities, and a new travel section gives you an insight to the best apps that will help you find great deals on flights, hotel rooms, cruises, dining, and even the best gas prices around your hometown or when on the road.We’ve also taken the time to create each listing beginning with a clickable link back to the Amazon catalog. So as you read this book on your Kindle, if any particular app sounds like what you’ve been looking for, just tap the image or heading name. You’ll be taken directly to the Amazon page for the app, where you can click the button to install that app. (Active wi-fi connection required.)And this isn't just a list of names with little helpful information, like some guides out there that we'd prefer not to mention. In this book, you'll find detailed write-ups for each app, with specifics as to what the app can (and cannot) do for you. Let Top 300 Free Apps for the Kindle Fire be your guide to the best free apps for your new tablet!Top 300 Free Apps for the Kindle Fire comes from the pen of Edward Jones, the principal technology writer behind the "Get-it-Done" series of computer books. Jones is an experienced computer and technology writer, database applications development analyst, consultant, and trainer who understands the issues faced by people dealing with technology, day in and day out. His career spans years of technology training, database development, and consulting services for major law firms and government agencies in the Washington, DC area, and he currently resides in Charlotte, NC where he is concentrating on providing publications to the rapidly growing digital marketplace. Jones is also a best-selling author whose printed titles have sold over one million copies, and he has served as a technical editor on numerous computer books.

Computer Security: Principles and Practice


William Stallings - 2007
    This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory


Michael Hale Ligh - 2014
    As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Cyberspies: The Secret History of Surveillance, Hacking, and Digital Espionage


Gordon Corera - 2015
    The book is rich with historical detail and characters, as well as astonishing revelations about espionage carried out in recent times by the UK, US, and China. Using unique access to the National Security Agency, GCHQ, Chinese officials, and senior executives from some of the most powerful global technology companies, Gordon Corera has gathered compelling stories from heads of state, hackers and spies of all stripes.Cyberspies is a ground-breaking exploration of the new space in which the worlds of espionage, diplomacy, international business, science, and technology collide.

Life with an Autistic Son


B's Dad - 2013
    He did not crave my company, cling to and cuddle me endlessly. He showed no need to bond with me, his father, and we did not. He exhausted me, he frustrated me and he scared me. I came to dread coming home from work sometimes, or those moments when it was my turn to wrestle him into bed and begin the long struggle to settle him. I said things that will forever haunt me, like “What is wrong with that child?” and “Is he always going to be this annoying?” What I didn't know then was that he was autistic.When that realisation came, so did the beginning of my mission to understand my son, and to understand autism. This book chronicles that search for understanding and answers. It documents one parent’s attempts to come to terms with, and accept, his child. It is raw and real, sometimes confused and frightened but also, I’d like to think, written with warmth and love and an ability to smile through difficult times.This book is for anyone starting out on a pathway with their child that they did not expect. It’s also for people who, like me, are a little further down that road but still learning, still asking questions and still getting it wrong sometimes. You are not alone.

Modern CTO: Everything you need to know, to be a Modern CTO.


Joel Beasley - 2018
    ―Jacob Boudreau CTO of Stord | Forbes 30 Under 30 Joel's book and show provide incredible insights for young startup developers and fellow CTOs alike. Joel offers a human perspective and real practical advice on the challenges and opportunities facing every Modern CTO. ― Christian Saucier | Entrepreneur and P2P Systems Architect I've really come to respect what Joel is doing in the community. His podcast and book are filling a much needed hole and I'm excited to see what else the future has in store. ― Don Pawlowski Chief Technology Officer at University Tees Modern CTO Everything you need to know to be a Modern CTO. Developers are not CTOs, but developers can learn how to be CTOs. In Modern CTO, Joel Beasley provides readers with an in-depth road map on how to successfully navigate the unexplored and jagged transition between these two roles. Drawing from personal experience, Joel gives a refreshing take on the challenges, lessons, and things to avoid on this journey.Readers will learn how Modern CTOs: Manage deadlines Speak up Know when to abandon ship and build a better one Deal with poor code Avoid getting lost in the product and know what UX mistakes to watch out for Manage people and create momentum … plus much more Modern CTO is the ultimate book when making the leap from developer to CTO. Update: Kindle Formatting issues resolved 5/13/18. Thank you for the feedback.

8 Things We Hate About IT: How to Move Beyond the Frustrations to Form a New Partnership with IT


Susan Cramm - 2010
    Instead, you get endless rules and regulations, not to mention processes, projects, and technologies that deliver too little, too late, for too much. It's frustrating!How to build a relationship that puts you firmly in control and produces the business results you need? In The 8 Things We Hate About IT, Susan Cramm provides the answers.Start by understanding differences between operational and IT managers - in backgrounds, personality, pressures, and incentives. Cramm explains how differences prevent operational managers and IT from communicating what, why, and how they do what they do.Citing case studies and stories, the author then presents practical strategies for overcoming the difficulty. These include seeing things from your IT partners' perspective, developing a single version of 'truth,' and assuming accountability for IT just as you've done for management of your firm's financial and human resources.Brutally honest, provocative, and filled with sound advice, this book reveals that the key to solving the IT problem is decidedly un-IT: it's a deeper understanding of human behavior, including how to apply your leadership skills to the world of IT.

The Case of the Missing Moon Rocks


Joe Kloc - 2012
    Decades ago, astronauts brought back 850 pounds of rocks from their lunar journeys; the U.S. gave some away as “goodwill” gifts to the world’s nations. Over time, many of them disappeared, stolen or lost in the aftermath of political turmoil, and offered for millions on the black market. Gutheinz, first as a NASA investigator and then the leader of a intrepid group of students, has dedicated his life to getting them back. Author Joe Kloc tells a wild story of geopolitics, crime, science, and one man’s obsession with keeping the moon out of the wrong hands.

Cryptanalysis: A Study of Ciphers and Their Solution


Helen Fouche Gaines - 1939
    Nihilist, grille, U. S. Army, key-phrase, multiple-alphabet, Gronsfeld, Porta, Beaufort, periodic ciphers, and more. Simple and advanced methods. 166 specimens to solve — with solutions.

CompTIA Network+ Study Guide: Exam N10-004


Todd Lammle - 2009
    Using his one-of-a-kind conversational style, Todd gives you clear and concise information on crucial networking topics through practical examples and insights drawn from his real-world experience. This Study Guide thoroughly covers all exam objectives for the CompTIA Network+ exam (N10-004), including key topics such as network technologies, media and topologies, devices, management, tools, and security. Along with the book you get a CD-ROM featuring a custom test engine with chapter review questions, two practice exams, flashcards, and the book as a searchable PDF.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.For Instructors: Teaching supplements are available for this title.

Enigmas: Alan Turing and the Codebreakers of the World Wars


David Boyle - 2017
     Many of those most closely involved in cracking the Enigma code – Alistair Denniston, Frank Birch, Dilly Knox – had wrestled with German naval codes for most of the First World War. By the end of the war they had been successfully cracking a new code every day, from their secret Room 40 at the Old Admiralty Building, in a London blacked out for Zeppelin Raids. The techniques they developed then, the ideas that they came to rely on, the people they came to trust, had been developed the hard way, under intense pressure and absolute secrecy during the First World War. Operation Primrose Operation Primrose tells the story of the capture of U-110 – and with it a working Enigma machine. One of the biggest secrets of the war, the capture of that one machine turned the tide of the war. Turing and his colleagues at Bletchley Park worked tirelessly to crack the code, and with the working Enigma machine they finally had their break-through moment. This book sets the story, and the Enigma cryptographers, in context – at the heart of the Battle of the Atlantic, when it reached its crescendo in the pursuit of the battleship Bismarck the week after U110 was taken. It sets Bletchley Park in its wider context too, at the heart of an intricate and maverick network of naval intelligence, tracking signals and plotting them to divert convoys around waiting U-boats, involving officers like James Bond’s future creator, Ian Fleming. It also sets out the most important context of all, forgotten in so much of the Enigma history: that Britain’s own naval code had already been cracked, and its signals were being read, thanks to the efforts of Turing’s opposite number, the German naval cryptographer, Wilhelm Tranow. An exciting and enthralling true story ‘Operation Primrose’ is an excellently researched piece on the race for naval supremacy in the Second World War. Alan Turing Mathematician, philosopher, codebreaker. Turing was one of the most original thinkers of the last century - and the man whose work helped create the computer-driven world we now inhabit. But he was also an enigmatic figure, deeply reticent yet also strikingly naïve. Turing’s openness about his homosexuality at a time when it was an imprisonable offence ultimately led to his untimely death at the age of only forty-one. Alan Turing: Unlocking the Enigma seeks to find the man behind the science, illuminating the life of a person who is still a shadowy presence behind his brilliant achievements. Turing was instrumental in cracking the Nazi Enigma machines at the top secret code breaking establishment at Bletchley Park during the Second World War. But his achievements were to be tragically overshadowed by his supposedly subversive views and for his sexuality. Praise for David Boyle: ‘The tone of the book may be gloomy but there is plenty of entertainment value …’ - Anne Ashworth, The Times ‘Exhilarating’ - Daily Mail ‘He tells these stories, on the whole persuasively and with some startling asides.

You Don't Know JS: Up & Going


Kyle Simpson - 2015
    With the "You Don’t Know JS" book series, you’ll get a more complete understanding of JavaScript, including trickier parts of the language that many experienced JavaScript programmers simply avoid.The series’ first book, Up & Going, provides the necessary background for those of you with limited programming experience. By learning the basic building blocks of programming, as well as JavaScript’s core mechanisms, you’ll be prepared to dive into the other, more in-depth books in the series—and be well on your way toward true JavaScript.With this book you will: Learn the essential programming building blocks, including operators, types, variables, conditionals, loops, and functions Become familiar with JavaScript's core mechanisms such as values, function closures, this, and prototypes Get an overview of other books in the series—and learn why it’s important to understand all parts of JavaScript

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

Morgan & Mikhail's Clinical Anesthesiology


John F. Butterworth - 2013
    This trusted classic delivers comprehensive coverage of the field's must-know basic science and clinical topics in a clear, easy-to-understand presentation. Indispensable for coursework, exam review, and as a clinical refresher, this trusted text has been extensively updated to reflect the latest research and developments.Here's why Clinical Anesthesiology is the best anesthesiology resource:NEW full-color presentationNEW chapters on the most pertinent topics in anesthesiology, including anesthesia outside of the operating room and a revamped peripheral nerve blocks chapter that details ultrasound-guided regional anesthesiaUp-to-date discussion of all relevant areas within anesthesiology, including equipment, pharmacology, regional anesthesia, pathophysiology, pain management, and critical careCase discussions promote application of the concepts to real-world practiceNumerous tables and figures encapsulate important information and facilitate memorization