Book picks similar to
Practical Cryptography in Python: Learning Correct Cryptography by Example by Seth James Nielson
technical
00outof_mycomfort<br/>zone
cybersecurity
have-not-read
Valkyrie: The North American Xb-70: The Usa's Ill-Fated Supersonic Heavy Bomber
Graham M. Simons - 2011
. . [with] new information, photographs and first-hand accounts." --FlypastDuring the 1950s, plans were being drawn at North American Aviation in Southern California for an incredible Mach-3 strategic bomber. The concept was born as a result of General Curtis LeMay's desire for a heavy bomber with the weapon load and range of the subsonic B-52 and a top speed in excess of the supersonic medium bomber, the B-58 Hustler. However, in April 1961, Defense Secretary McNamara stopped the production go-ahead for the B-70 because of rapid cost escalation and the USSR's newfound ability to destroy aircraft at extremely high altitude using either missiles or the new Mig-25 fighter. Nevertheless, in 1963 plans for the production of three high-speed research aircraft were approved and construction proceeded. In September 1964 the first Valkyrie, now re-coded A/V-1, took to the air for the first time and in October went supersonic.This book is the most detailed description of the design, engineering and research that went into this astounding aircraft. It is full of unpublished details, photographs and firsthand accounts from those closely associated with the project. Although never put into full production, this giant six-engined aircraft became famous for its breakthrough technology, and the spectacular images captured on a fatal air-to-air photo shoot when an observing Starfighter collided with Valkyrie A/V-2 which crashed into the Mojave Desert."Well-illustrated with numerous diagrams and black and white photographs, the book provides an interesting insight into one of the so-called 'white elephant' projects of the 1960s." --Jets Monthly
Advanced Engineering Mathematics
Dennis G. Zill - 1992
A Key Strength Of This Text Is Zill'S Emphasis On Differential Equations As Mathematical Models, Discussing The Constructs And Pitfalls Of Each. The Third Edition Is Comprehensive, Yet Flexible, To Meet The Unique Needs Of Various Course Offerings Ranging From Ordinary Differential Equations To Vector Calculus. Numerous New Projects Contributed By Esteemed Mathematicians Have Been Added. Key Features O The Entire Text Has Been Modernized To Prepare Engineers And Scientists With The Mathematical Skills Required To Meet Current Technological Challenges. O The New Larger Trim Size And 2-Color Design Make The Text A Pleasure To Read And Learn From. O Numerous NEW Engineering And Science Projects Contributed By Top Mathematicians Have Been Added, And Are Tied To Key Mathematical Topics In The Text. O Divided Into Five Major Parts, The Text'S Flexibility Allows Instructors To Customize The Text To Fit Their Needs. The First Eight Chapters Are Ideal For A Complete Short Course In Ordinary Differential Equations. O The Gram-Schmidt Orthogonalization Process Has Been Added In Chapter 7 And Is Used In Subsequent Chapters. O All Figures Now Have Explanatory Captions. Supplements O Complete Instructor'S Solutions: Includes All Solutions To The Exercises Found In The Text. Powerpoint Lecture Slides And Additional Instructor'S Resources Are Available Online. O Student Solutions To Accompany Advanced Engineering Mathematics, Third Edition: This Student Supplement Contains The Answers To Every Third Problem In The Textbook, Allowing Students To Assess Their Progress And Review Key Ideas And Concepts Discussed Throughout The Text. ISBN: 0-7637-4095-0
The Perfectionists: How Precision Engineers Created the Modern World
Simon Winchester - 2018
At the dawn of the Industrial Revolution in eighteenth-century England, standards of measurement were established, giving way to the development of machine tools—machines that make machines. Eventually, the application of precision tools and methods resulted in the creation and mass production of items from guns and glass to mirrors, lenses, and cameras—and eventually gave way to further breakthroughs, including gene splicing, microchips, and the Hadron Collider.Simon Winchester takes us back to origins of the Industrial Age, to England where he introduces the scientific minds that helped usher in modern production: John Wilkinson, Henry Maudslay, Joseph Bramah, Jesse Ramsden, and Joseph Whitworth. It was Thomas Jefferson who later exported their discoveries to the fledgling United States, setting the nation on its course to become a manufacturing titan. Winchester moves forward through time, to today’s cutting-edge developments occurring around the world, from America to Western Europe to Asia.As he introduces the minds and methods that have changed the modern world, Winchester explores fundamental questions. Why is precision important? What are the different tools we use to measure it? Who has invented and perfected it? Has the pursuit of the ultra-precise in so many facets of human life blinded us to other things of equal value, such as an appreciation for the age-old traditions of craftsmanship, art, and high culture? Are we missing something that reflects the world as it is, rather than the world as we think we would wish it to be? And can the precise and the natural co-exist in society?
Principles of Information Security
Michael E. Whitman - 2002
Principles of Information Security, Third Edition builds on internationally recognized standards and bodies of knowledge to provide the knowledge and skills that information systems students need for their future roles as business decision-makers. Coverage includes key knowledge areas of the CISSP (Certified Information Systems Security Professional), as well as risk management, cryptography, physical security, and more. The third edition has retained the real-world examples and scenarios that made previous editions so successful, but has updated the content to reflect technology's latest capabilities and trends. With this emphasis on currency and comprehensive coverage, readers can feel confident that they are using a standards-based, content-driven resource to prepare them for their work in the field.
Operations Research: Applications and Algorithms (with CD-ROM and InfoTrac)
Wayne L. Winston - 1987
It moves beyond a mere study of algorithms without sacrificing the rigor that faculty desire. As in every edition, Winston reinforces the book's successful features and coverage with the most recent developments in the field. The Student Suite CD-ROM, which now accompanies every new copy of the text, contains the latest versions of commercial software for optimization, simulation, and decision analysis.
Kali Linux Revealed: Mastering the Penetration Testing Distribution
Raphaël Hertzog - 2017
They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.
Mechanics of Materials, SI Edition
James M. Gere - 2002
They are converted to metric units using realistic data to help students grasp what is feasible in engineering practice.
The ARRL Extra Class License Manual for Ham Radio
H. Ward Silver - 2002
Whenyou upgrade to Extra Class, you gain access to the entire Amateur Radio frequency spectrum. Ues this book to ace the top-level ham radio licensing exam. Our expert instruction will lead you through all of the knowledge you need to pass the exam: rules, specific operating skills and more advanced electronics theory.
Three Feet of Sky
Stephen Ayres - 2012
with a peculiar talent.After years of destitution, Adam Eden's life is finally on the up. But, whilst out celebrating his recent good fortune, Adam unwittingly chooses death over embarrassment.Awaking in a future of leisure, luxury, and immortality, Adam suffers serious shrinkage and is branded an 'undesirable'. Shunned by family and neighbours for his first-life sins, can he find respect and redemption in this tightly controlled world? Facing a grim eternity, Adam wants out.A randomly chosen day trip changes everything.Though cruel and heartless, they always let you choose your weapon.
Linux Administration Handbook
Evi Nemeth - 2006
Several things make this one stand out. Here's the most important: Linux Administration Handbook is designed for administrators working in industrial-strength production environments. It never glosses over the "subtleties" that can get you in big trouble. It doesn't stint on technical detail. It's never satisfied with restating the man pages. And it's full of war stories from folks who've been there. Evi Nemeth and her coauthors: Boy, have they ever been there. (Just ask any gray-bearded Unix sysadmin about their earlier, legendary Unix System Administration Handbook.) There's only been one downside to Linux Administration Handbook: It's been nearly five years since it was written. Well, that flaw's just been remedied. The new Second Edition has been systematically revised for the latest administration tools (think Nagios and LVM). It's carefully targeted at today's five most widely used distributions: Red Hat Enterprise Linux 4.3, Fedora Core 5, SUSE Linux 10.2, Debian 3.2 "Etch," and Ubuntu 6.06. The result: a book you can rely on for the next five years. Rely on to do what? Just about everything. You'll find chapters on booting and shutting down; "rootly" powers; controlling processes; the Linux filesystem; on adding new users. You'll learn the most efficient ways to perform backups. How to make sense of syslogs and log files. Everything you need to know about drivers, the kernel, networking, NFS -- and Internet services, from web hosting to email. Nemeth & Company bring their experience to bear on troubleshooting, performance optimization, print management, security, Windows interoperability, even "policies and politics." Whatever Linux books you already own, if you depend on Linux to run efficiently and reliably, you need this one, too. Bill Camarda, from the December 2006 href="http://www.barnesandnoble.com/newslet... Only
Android Hacker's Handbook
Joshua J. Drake - 2013
Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Kevin D. Mitnick - 2011
While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is the most comprehensive to date.)
Air Disaster 2: The Jet Age
Macarthur Job - 2014
Planes could fly faster, further and at higher altitude; opening the door to foreign holidays to the masses. But, it came at a price. In the early days this new advanced era of aviation faced multiple unforeseen problems, resulting in catastrophic accidents and inevitably the loss of human lives. From the first jetliner, the ill-fated Comet, to an horrific Boeing 747 mid-air collision at Tenerife, award-winning Macarthur Job – one of the world’s foremost aviation writers, and himself a pilot - tells the stories and unpicks the causes of eighteen fateful air disasters. Based on accident reports and extensive research he reveals how these calamities led to the development of the safest and most reliable form of transport in the world. Illustrated with photographs and technical drawings by aviation artist Matthew Tesch, 'Air Disaster 2: The Jet Age' covers the period between 1952 and 1977. Other books in the series: Air Disaster 1: The Propeller Era Air Disaster 3: Terror In The Sky
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Off Menu: The Secret Science of Food & Dining
Nell McShane Wulfhart - 2020
It’s the perfect listen to devour as you’re strolling through the farmer’s market, washing the dishes, or planning your next dinner party.