Into the Darkness: The Harrowing True Story of the Titanic Disaster: Riveting First-Hand Accounts of Agony, Sacrifice and Survival


Alan J. Rockwell - 2017
    No human being who stood on her decks that fateful night was alive to commemorate the event on its 100th anniversary. Their stories are with us, however, and the lessons remain. From the moment the world learned the Titanic had sunk, we wanted to know, who had survived? Those answers didn’t come until the evening of Thursday, April 18, 1912―when the Cunard liner Carpathia finally reached New York with the 706 survivors who had been recovered from Titanic’s lifeboats. Harold Bride, “Titanic’s surviving wireless operator,” relayed the story of the ship’s band. “The way the band kept playing was a noble thing. I heard it first while still we were working wireless when there was a ragtime tune for us. The last I saw of the band, when I was floating out in the sea with my lifebelt on, it was still on deck playing ‘Autumn.’ How they ever did it I cannot imagine.” There were stories of heroism―such as that of Edith Evans, who was waiting to board collapsible Lifeboat D, the last boat to leave Titanic, when she turned to Caroline Brown and said, “You go first. You have children waiting at home.” The sacrifice cost Evans her life, but as Mrs. Brown said later, “It was a heroic sacrifice, and as long as I live I shall hold her memory dear as my preserver, who preferred to die so that I might live.” There was mystery. There was bravery. There was suspense. There was cowardice. Most men who survived found themselves trying to explain how they survived when women and children had died. But mostly, there was loss. On her return to New York after picking up Titanic’s survivors, Carpathia had become known as a ship of widows. Rene Harris, who lost her husband, Broadway producer Henry Harris, in the disaster, later spoke of her loss when she said, “It was not a night to remember. It was a night to forget.” Drawing on a wealth of previously unpublished letters, memoirs, and diaries as well as interviews with survivors and family members, veteran author and writer Alan Rockwell brings to life the colorful voices and the harrowing experiences of many of those who lived to tell their story. More than 100 years after the RMS Titanic met its fatal end, the story of the tragic wreck continues to fascinate people worldwide. Though many survivors and their family members disappeared into obscurity or were hesitant to talk about what they went through, others were willing to share their experiences during the wreck and in its aftermath. This book recounts many of these first-hand accounts in graphic, compelling detail.

The Internet Police: How Crime Went Online, and the Cops Followed


Nate Anderson - 2013
    It’s not just computer hackers and cyber crooks who lurk in the dark corners of the Web—the cops are there, too.In The Internet Police, Ars Technica deputy editor Nate Anderson takes readers on a behind-the-screens tour of landmark cybercrime cases, revealing how criminals continue to find digital and legal loopholes even as police hurry to cinch them closed. From the Cleveland man whose "natural male enhancement" pill inadvertently protected the privacy of your e-mail to the Russian spam king who ended up in a Milwaukee jail to the Australian arrest that ultimately led to the breakup of the largest child pornography ring in the United States, Anderson draws on interviews, court documents, and law-enforcement reports to reconstruct accounts of how online policing actually works. Questions of online crime are as complex and interconnected as the Internet itself. With each episode in The Internet Police, Anderson shows the dark side of online spaces—but also how dystopian a fully "ordered" alternative would be.Includes an afterword that details law enforcement's dramatic seizure of the online black market Silk Road.

James May's Magnificent Machines: How men in sheds have changed our lives


James May - 2008
    Throughout James May's Magnificent Machines, our Top Gear guide explores the iconic themes of the past hundred years: flight, space travel, television, mechanised war, medicine, computers, electronic music, skyscrapers, electronic espionage and much more. But he also reveals the hidden story behind why some inventions like the Zeppelin, the hovercraft or the Theremin struggled to make their mark. He examines the tipping points - when technologies such as the car or the internet became unstoppable - and gets up close by looking at the nuts and bolts of remarkable inventions. Packed with surprising statistics and intriguing facts, this is the ideal book for anyone who wants to know how stuff works and why some stuff didn't make it.

Cockpit Confidential: Everything You Need to Know about Air Travel: Questions, Answers, & Reflections


Patrick Smith - 2013
    Patrick Smith, airline pilot and author of the web's popular Ask the Pilot feature, separates the fact from fallacy and tells you everything you need to know...-How planes fly, and a revealing look at the men and women who fly them-Straight talk on turbulence, pilot training, and safety-The real story on congestion, delays, and the dysfunction of the modern airport-The myths and misconceptions of cabin air and cockpit automation-Terrorism in perspective, and a provocative look at security-Airfares, seating woes, and the pitfalls of airline customer service-The colors and cultures of the airlines we love to hateCockpit Confidential covers not only the nuts and bolts of flying, but also the grand theater of air travel, from airport architecture to inflight service to the excitement of travel abroad. It's a thoughtful, funny, at times deeply personal look into the strange and misunderstood world of commercial flying.It's the ideal book for frequent flyers, nervous passengers, and global travelers.Refreshed and vastly expanded from the original Ask the Pilot, with approximately 75 percent new material.

VMware vSphere 5 Clustering Technical Deepdive


Frank Denneman - 2011
    It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it explains the concepts and mechanisms behind HA, DRS and Storage DRS which will enable you to make well educated decisions. This book will take you in to the trenches of HA, DRS and Storage DRS and will give you the tools to understand and implement e.g. HA admission control policies, DRS resource pools, Datastore Clusters and resource allocation settings. On top of that each section contains basic design principles that can be used for designing, implementing or improving VMware infrastructures and fundamental supporting features like (Storage) vMotion, Storage I/O Control and much more are described in detail for the very first time. This book is also the ultimate guide to be prepared for any HA, DRS or Storage DRS related question or case study that might be presented during VMware VCDX, VCP and or VCAP exams.Coverage includes: HA node types HA isolation detection and response HA admission control VM Monitoring HA and DRS integration DRS imbalance algorithm Resource Pools Impact of reservations and limits CPU Resource Scheduling Memory Scheduler DPM Datastore Clusters Storage DRS algorithm Influencing SDRS recommendationsBe prepared to dive deep!

The Linux Command Line


William E. Shotts Jr. - 2012
    Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction

Infinite Powers: How Calculus Reveals the Secrets of the Universe


Steven H. Strogatz - 2019
    We wouldn’t have unraveled DNA or discovered Neptune or figured out how to put 5,000 songs in your pocket. Though many of us were scared away from this essential, engrossing subject in high school and college, Steven Strogatz’s brilliantly creative, down‑to‑earth history shows that calculus is not about complexity; it’s about simplicity. It harnesses an unreal number—infinity—to tackle real‑world problems, breaking them down into easier ones and then reassembling the answers into solutions that feel miraculous. Infinite Powers recounts how calculus tantalized and thrilled its inventors, starting with its first glimmers in ancient Greece and bringing us right up to the discovery of gravitational waves (a phenomenon predicted by calculus). Strogatz reveals how this form of math rose to the challenges of each age: how to determine the area of a circle with only sand and a stick; how to explain why Mars goes “backwards” sometimes; how to make electricity with magnets; how to ensure your rocket doesn’t miss the moon; how to turn the tide in the fight against AIDS. As Strogatz proves, calculus is truly the language of the universe. By unveiling the principles of that language, Infinite Powers makes us marvel at the world anew.

iPhone: The Missing Manual


David Pogue - 2007
    iPhone: The Missing Manual is a book as breathtaking as its subject. Teeming with high-quality color graphics, each custom designed page helps you accomplish specific tasks -- everything from Web browsing to watching videos. Written by New York Times columnist and Missing Manual series creator David Pogue, this book shows you how to get the most out of your new Apple iPhone.The name iPhone may be doing Apple a disservice. This machine is so packed with possibilities that the cellphone may actually be the least interesting part. The iPhone is at least three products merged into one: a phone, a wide-screen iPod and a wireless, touch-screen Internet communicator. The iPhone's beauty alone may be enough for you to dig for your credit cards, but its Mac OS X-based software makes it not so much a smartphone as something out of the film "Minority Report."The real magic, however, awaits when you browse the Web. You get to see the entire Web page on the iPhone's screen. All of this is cooked up with Apple's traditional secret sauce of simplicity, intelligence and whimsy.Written by New York Times columnist and Missing Manual series creator David Pogue, iPhone: The Missing Manual shows you everything they need to know to get the most out of your new Apple iPhone. Full of humor, tips, tricks, and surprises, this book teaches you how to extend iPhone's usefulness by exploiting its links to the Web as well as its connection to Macs or PCs; how to save money using Internet-based messages instead of phone calls; and how to fill the iPhone with TV shows and DVDs for free.

The Nostalgia Nerd's Retro Tech: Computer, Consoles & Games


Peter Leigh - 2018
    Remember what a wild frontier the early days of home gaming were? Manufacturers releasing new consoles at a breakneck pace; developers creating games that kept us up all night, then going bankrupt the next day; and what self-respecting kid didn't beg their parents for an Atari or a Nintendo? This explosion of computers, consoles, and games was genuinely unlike anything the tech world has seen before or since.This thoroughly researched and geeky trip down memory lane pulls together the most entertaining stories from this dynamic era, and brings you the classic tech that should never be forgotten.

Cypherpunks: Freedom and the Future of the Internet


Julian Assange - 2012
    Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.

Geekonomics: The Real Cost of Insecure Software


David Rice - 2007
    It explains why low-quality software is continually distributed, why consumers willingly purchase unreliable software, why governments leave the industry alone, and what can be done to improve matters.

Serious Cryptography: A Practical Introduction to Modern Encryption


Jean-Philippe Aumasson - 2017
    You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.

The Right Fights Back: Playbook 2012 (POLITICO Inside Election 2012)


Mike Allen - 2011
    The first edition, The Right Fights Back, follows the campaign for the Republican presidential nomination.   The battle for the 2012 Republican presidential nomination promises to be one of the most hotly contested and closely fought in recent memory, as establishment Republicans, Tea Party favorites, and dark horse insurgents vie to take on President Obama in the November election. In The Right Fights Back, Mike Allen, chief White House correspondent for POLITICO, and Evan Thomas, the award-winning journalist and author of Robert F. Kennedy and The War Lovers, chronicle the dramatic events of this historic campaign as it unfolds.   With exclusive real-time reporting from the campaign trail, The Right Fights Back provides detail, color, and in-depth analysis that take readers beyond the hourly headlines and commentary. From the role of Super PACS and conservative interest groups to the clashes of personality and policy that will define the race to capture the GOP nomination, this is a history-as-it-happens account of the resurgent American right at the crossroads.

Beyond Buds: Marijuana Extracts—Hash, Vaping, Dabbing, Edibles and Medicines


Ed Rosenthal - 2014
    Prohibition’s end has led to a technological revolution that’s generated powerful medicines and products containing almost zero carcinogens and little smoke. Marijuana icon Ed Rosenthal and leading cannabis reporter David Downs guide readers through the best new consumer products, and demonstrate how to make and use the safest, cleanest extracts. Beyond Buds details how award-winning artisans make hash and concentrates, and includes modern techniques utilizing dry ice and CO2. The book is a primer on making kief, water hash, tinctures, topicals, edibles, and other extracts from cannabis leaves, trim, and bud bits, and it goes on to explore and simplify the more exotic and trendy marijuana-infused products, such as butane hash oil (BHO), shatter, wax, and budder. More complex than lighting a joint, these innovative products call for new accessories — special pipes, dabbing tools, and vaporizers — all of which are reviewed and pictured in the book. Beyond Buds expands on Rosenthal’s previous book Ask Ed: Marijuana Gold: Trash to Stash. Completely updated with full-color photographs that are both “how-to” guides and eye candy, this book enables not only the health-conscious toker but also the bottom line–driven cultivator.

Kali Linux Revealed: Mastering the Penetration Testing Distribution


Raphaël Hertzog - 2017
    They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.