Book picks similar to
Attack and Interceptor Jets: 300 of the World's Greatest Aircraft by Mike Sharpe
it-wikipedia
planes-warcraft-vehicles
uncategorized
war-modern
The Complete Idiot's Guide to Celtic Wisdom: CIG to Celtic Wisdom
Carl McColman - 2003
It draws a map for today's Celtic quest, with the way of the pilgrim, honor of one's ancestors, and the language and culture. Exploring the Celtic universe-gods and goddesses, mythic heroes and warriors, wonderworkers, underworlds, and otherworlds-this manual also covers legends such as King Arthur, Merlin, and the Quest for the Holy Grail.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
The True INTJ (The True Guides to the Personality Types)
Truity - 2014
From Isaac Newton to Mark Zuckerberg, these visionary, determined INTJs have made an impact. But what drives these self-possessed, sometimes mysterious Masterminds? What makes them so uniquely equipped to improve the systems we live with every day?This book is for INTJs and those who live with them, work with them, or just want to know more about them. With an eye toward the INTJ's natural strengths, The True INTJ takes an in-depth look at the talents, motivations, values, and unique qualities of the INTJ. You'll discover what drives the INTJ, and how this innovative, dedicated personality type can use their gifts to change the world.
Fornication: The "Red Hot Chili Peppers" Story
Jeff Apter - 2004
Full description
A Bucket of Sunshine: Life on a Cold War Canberra Squadron
Mike Brooke - 2012
Brooke uses many amusing overtones to tell his story of what was an extremely serious business when the world was standing on the brink of nuclear conflict. The English-Electric Canberra was a first generation, jet-powered light bomber manufactured in large numbers in the 1950s. The Canberra could fly at a higher altitude than any other bomber through the 1950s and due to its ability to evade early interceptors was a popular export product and served with many nations.
Replay: The History of Video Games
Tristan Donovan - 2010
Based on extensive research and over 140 exclusive interviews with key movers and shakers from gaming's past, Replay tells the sensational story of how the creative vision of game designers gave rise to one of the world's most popular and dynamic art forms.
Speccy Nation
Dan Whitehead - 2012
The British games industry would go on to create such hits as Tomb Raider and Grand Theft Auto, our innovation and imagination the envy of the world, our programmers the most sought after talent in the fastest growing entertainment medium in history.And it all started here.Welcome to the Speccy Nation.Join veteran games journalist and author Dan Whitehead on a journey through fifty games that helped to define the golden age of British gaming. From the timeless classics to unlikely cult favourites, and even the games so eccentric they could only have come from Britain in the 1980s.Part nostalgic look at the past, and part critical eye on the present and future, Speccy Nation is essential reading for all retro gaming enthusiasts.Includes a foreword by Your Sinclair's Phil "Snouty" South.
Charlie Rangers
Don Ericson - 1988
For eighteen months, John L. Rotundo and Don Ericson braved the test of war at its most bloody and most raw, specializing in ambushing the enemy and fighting jungle guerillas using their own tactics. From the undiluted high of a "contact" with the enemy to the anguished mourning of a fallen comrade, they experienced nearly every emotion known to man--most of all, the power and the pride of being the finest on America's front lines.From the Paperback edition.
Pucker Factor 10: Memoir of a U.S. Army Helicopter Pilot in Vietnam
James Joyce - 2003
He flew both Huey "slicks" and Huey "gunships": the former on defense as he flew troops into battle, and the latter on offense as he took the battle to the enemy. Through this book, the author relives his experiences flying and fighting, with special attention given to the pilots' day-to-day lives - such as the prankish smoke bombing of Disneyland, the nickname for a United States Army-sponsored compound for prostitution. Some of the pilots Joyce served with survived the war and went on to have careers with commercial airlines, and many were killed.
VMware vSphere 5 Clustering Technical Deepdive
Frank Denneman - 2011
It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it explains the concepts and mechanisms behind HA, DRS and Storage DRS which will enable you to make well educated decisions. This book will take you in to the trenches of HA, DRS and Storage DRS and will give you the tools to understand and implement e.g. HA admission control policies, DRS resource pools, Datastore Clusters and resource allocation settings. On top of that each section contains basic design principles that can be used for designing, implementing or improving VMware infrastructures and fundamental supporting features like (Storage) vMotion, Storage I/O Control and much more are described in detail for the very first time. This book is also the ultimate guide to be prepared for any HA, DRS or Storage DRS related question or case study that might be presented during VMware VCDX, VCP and or VCAP exams.Coverage includes: HA node types HA isolation detection and response HA admission control VM Monitoring HA and DRS integration DRS imbalance algorithm Resource Pools Impact of reservations and limits CPU Resource Scheduling Memory Scheduler DPM Datastore Clusters Storage DRS algorithm Influencing SDRS recommendationsBe prepared to dive deep!
The Book Nobody Read: Chasing the Revolutions of Nicolaus Copernicus
Owen Gingerich - 2004
He traced the ownership of individual copies through the hands of saints, heretics, scalawags, and bibliomaniacs. He was called as the expert witness in the theft of one copy, witnessed the dramatic auction of another, and proves conclusively that "De revolutionibus" was as inspirational as it was revolutionary. Part biography of a book, part scientific exploration, part bibliographic detective story, "The Book Nobody Read" recolors the history of cosmology and offers new appreciation of the enduring power of an extraordinary book and its ideas.
Keith Richards: In His Own Words
Keith Richards - 1994
Rhythm guitarist with The Rolling Stones for over 30 years, he is also famous in his own right as a solo artist.
Guerrilla Home Recording: How to Get Great Sound from Any Studio {No Matter How Weird or Cheap Your Gear Is}
Karl Coryat - 2004
The revised edition is updated with a greater focus on digital recording techniques, the most powerful tools available to the home recordist. There are chapters devoted to instrument recording, humanizing drum patterns, mixing with plug-ins and virtual consoles, and a new section on using digital audio skills. And since, many true "Guerrillas" still record to analog tape, we have retained the best of that world. This edition features many more graphics than in the original edition, further enforcing Guerrilla Home Recording's reputation as the most readable, user-frienly recording title on the market.
Dragonlance Dragons of Winter (Dragonlance)
Clark Valentine - 2007
introduced some revolutionary concepts in the game industry. Never before had the D&D rules been used to tell an epic fantasy tale using full-realized pre-generated characters. It was also the first time that roleplaying adventures would match a story being told in fantasy novels on mass-market shelves. Since MWP began publishing DRAGONLANCE game produts for the revised d20 System, the most often-asked question from fans is "When do we get to see the original modules?" By popular demand, we are presenting all-new versions of the classic adventures. The second in the trilogy, Dragons of Winter, continues the epic War of the Lance. The heroes visit the haunted forests of Silvanesti, the landlocked port city of Tarsis, and the mighty stronghold known as the High Clerist's Tower. The adventures are being completely revised, drawing on twenty years of DRAGONLANCE history, incorporating material most recently featured in the Silver Anniversary edition of the adventures. They will include new character statistics featuring the popular Heroes of the Lance.