You Don't Know JS: Up & Going
Kyle Simpson - 2015
With the "You Don’t Know JS" book series, you’ll get a more complete understanding of JavaScript, including trickier parts of the language that many experienced JavaScript programmers simply avoid.The series’ first book, Up & Going, provides the necessary background for those of you with limited programming experience. By learning the basic building blocks of programming, as well as JavaScript’s core mechanisms, you’ll be prepared to dive into the other, more in-depth books in the series—and be well on your way toward true JavaScript.With this book you will:
Learn the essential programming building blocks, including operators, types, variables, conditionals, loops, and functions
Become familiar with JavaScript's core mechanisms such as values, function closures, this, and prototypes
Get an overview of other books in the series—and learn why it’s important to understand all parts of JavaScript
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston - 2017
For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring
Can You Make This Thing Go Faster?
Jeremy Clarkson - 2020
. .Back in the day Jeremy was far more likely to be found gunning around the world in a haze of burnt rubber and petrol fumes. But life as a globe-trotting petrol-head also meant he was forced endure more than his fair share of foolishness, frustration and downright bafflement. And, while Jeremy may not a patient man, you have to ask why anyone should have to consider issues as diverse and perplexing as:-The downsides of relaxing in a bath of crude oil-Why fishing is for people who hate their kids-Whether there are noise-cancelling headphones with the power to silence James May-Why saving the planet means soggy paper straws and no more children-What to do about the rambler who stole his marrowBut as puzzling and exasperating as life on the road often seemed to be, you could always count on Jeremy to set the world to rights with a rare wit and unique understanding. And at full throttle. Just don't expect it to all go smoothly . . .Praise for Clarkson: 'Brilliant . . . laugh-out-loud' Daily Telegraph'Outrageously funny . . . will have you in stitches' Time Out'Very funny . . . I cracked up laughing on the tube' Evening Standard
The Book of PoC||GTFO
Manul Laphroaig - 2017
Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.
Dark Territory: The Secret History of Cyber War
Fred Kaplan - 2016
The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.
The Whistler Advanced Reader Sampler
John Grisham
A young investigator with a secret informant. The electrifying new thriller.Lacy Stoltz never expected to be in the firing line. Investigating judicial misconduct by Florida's one thousand judges, her cases so far have been relatively unexciting. That's until she meets Greg Myers, an indicted lawyer with an assumed name, who has an extraordinary tale to tell.Myers is representing a whistle blower who knows of a judge involved in organised crime. Along with her gangster associates this judge has facilitated the building of a casino on an Indian reservation. At least two people who opposed the scheme are dead. Since the casino was built, the judge has made several fortunes off undeclared winnings. She owns property around the world, hires private jets to take her where she wishes, and her secret vaults are overflowing with rare books, art and jewels.No one has a clue what she's been doing - until now.Under Florida law, those who help the state recover illegally acquired assets stand to gain a large percentage of them. Myers and his whistle blower friend could make millions.But first they need Lacy to start an investigation. Is she ready to pit herself against the most corrupt judge in American history, a judge whose associates think nothing of murder?
Site Reliability Engineering: How Google Runs Production Systems
Betsy Beyer - 2016
So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google's Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You'll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficient--lessons directly applicable to your organization.This book is divided into four sections: Introduction--Learn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciples--Examine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)Practices--Understand the theory and practice of an SRE's day-to-day work: building and operating large distributed computing systemsManagement--Explore Google's best practices for training, communication, and meetings that your organization can use
How Linux Works: What Every Superuser Should Know
Brian Ward - 2004
Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson - 2012
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Fluent Python: Clear, Concise, and Effective Programming
Luciano Ramalho - 2015
With this hands-on guide, you'll learn how to write effective, idiomatic Python code by leveraging its best and possibly most neglected features. Author Luciano Ramalho takes you through Python's core language features and libraries, and shows you how to make your code shorter, faster, and more readable at the same time.Many experienced programmers try to bend Python to fit patterns they learned from other languages, and never discover Python features outside of their experience. With this book, those Python programmers will thoroughly learn how to become proficient in Python 3.This book covers:Python data model: understand how special methods are the key to the consistent behavior of objectsData structures: take full advantage of built-in types, and understand the text vs bytes duality in the Unicode ageFunctions as objects: view Python functions as first-class objects, and understand how this affects popular design patternsObject-oriented idioms: build classes by learning about references, mutability, interfaces, operator overloading, and multiple inheritanceControl flow: leverage context managers, generators, coroutines, and concurrency with the concurrent.futures and asyncio packagesMetaprogramming: understand how properties, attribute descriptors, class decorators, and metaclasses work"
Don't Scream 2: 30 More Tales to Terrify
Blair Daniels - 2019
A sequel to a #1 bestselling horror anthology Don't Scream, featuring hideous doppelgangers, terrifying apps, lurking monsters, and more. Read... if you dare.
Amber Earns Her Ears: My Secret Walt Disney World Cast Member Diary
Amber Michelle Sewell - 2013
What’s it like to work at Walt Disney World?Amber Sewell spent two semesters “earning her ears” at the Happiest Place on Earth, first in the CareerStart Program and then in the better known Disney College Program.During her time backstage, as the Cast Member areas of the theme park are called, Amber kept a diary of her successes and her failures, her moments of delight and her moments of despair, and most of all, her discoveries about what happens when the pixie dust settles and the guests have gone home.Amber will never feel the same about Walt Disney World again.After you’ve read her book, neither will you.
Agatha Christie Investigates Omnibus
Alison Joseph - 2018
“Wickedly clever - written with a sharp eye and elan. Guaranteed to make every Agatha Christie fan smile.” - Peter James
Murder Will Out (Agatha Christie Investigates Book 1): 1923. The Great War is over, but the ghosts of the dead still linger. Agatha Christie was one of the lucky ones - her husband returned from the conflict - and for her, and her local neighbours, life has resumed. Agatha is beginning to gain some notoriety for her crime writing and she is busy working on her latest novel. But then her neighbour tells her there has been a real ‘murder at the vicarage’ - a young man, Cecil Coates, has been poisoned, and due to Christie’s expertise, the neighbourhood wants her to investigate. What secrets and lies are lying beneath the village’s tranquil exterior? Can Agatha Christie use her imagination to draw the murderer out?
‘Christie herself is the fulcrum of this highly diverting piece, delivered with all the quirky skill that is Joseph’s trademark.’ - Barry Forshaw, Crime Time.
Hidden Sins (Agatha Christie Investigates Book 2):
Summer, 1925
Life is starting to go back to normal after the shock of the Great War.
Agatha Christie, now a successful crime author, is holidaying in Cornwall.
And when her husband, Archie, has to leave early, she decides to use her alone time to work on a romance novel.
But it isn’t long before she finds herself thrown back into the world of murder and intrigue.
A fellow guest at Agatha’s hotel is murdered in the early hours of the morning, and all guests become suspects.
Agatha soon discovers that there is far more going on in the sleepy Cornish town than first meets the eye. Her enquiries unearth tales of ghosts, secret affairs and mysterious ship wrecks.
Tension escalates amongst the residents of the hotel when they realise that the murderer is somewhere in their midst.
Can Agatha Christie unmask the identity of the killer before anyone else becomes a victim?
‘Christie herself is the fulcrum of this highly diverting piece, delivered with all the quirky skill that is Joseph’s trademark.’ - Barry Forshaw, Crime Time.
‘Clever and intriguing - a must for all Agatha Christie fans’ - Peter James
Death in Disguise (Agatha Christie Investigates Book 3):
Some people want to be fooled…
1920s, London
Agatha Christie, the famous detective writer, is struggling to come to terms with her divorce. So much so that she can barely bring herself to say the word.
Kindle Fire HD For Dummies
Nancy C. Muir - 2012
This full-color guide will have you blazing through the web, staying entertained with the latest apps and games, watching your favorite TV shows and movies, and, of course, reading magazines, newspapers, and books to indulge all your interests. Whether this is your first tablet or you're upgrading from another device, you'll get to know your Kindle Fire HD and rekindle your love of reading with "Kindle Fire HD For Dummies"!Covers the Kindle Fire HD and original Kindle FireHelps you navigate the interface, customize your settings, get connected, and take advantage of Amazon CloudShows you how to work with the built-in apps and find new ones to to try out from the Amazon AppstoreExplains how to fill your Kindle Fire with cool stuff - from movies and music to videos, photos, apps, e-books, and moreWalks you through using Amazon's incredibly smooth Amazon Silk web browser to find anything you need online and keep in touch with e-mail, Skype, Facebook, and TwitterLight 'er up and unleash the fun with "Kindle Fire HD For Dummies"!
Basic Economics for Students and Non-Students Alike
Jerry Wyant - 2013
Graphs are not included, but both the graphs and the concepts behind them are explained; only basic math is included, and you can even skim over the math and still come away with an understanding of the concepts; statistics is not included at all.BASIC ECONOMICS FOR STUDENTS AND NON-STUDENTS ALIKE is an easy way to learn concepts relating to economics and the economy. It is a product of thousands of hours spent online, teaching basic concepts in economics to hundreds of students worldwide over the course of the past several years. From back and forth communications, I have discovered the explanations for the concepts that students find easiest to understand, as well as the areas that most often get misunderstood and under-emphasized.I have worked with students located throughout the United States and from many different countries, on six different continents; students from many different school systems with different points of emphasis; students with different levels of knowledge, different backgrounds, and different levels of interest in the subject. I have received numerous comments and testimonials regarding the teaching methods that I incorporate in BASIC ECONOMICS FOR STUDENTS AND NON-STUDENTS ALIKE.The subject matter included in BASIC ECONOMICS FOR STUDENTS AND NON-STUDENTS ALIKE comes from a compilation of many different textbooks at the introductory and intermediate levels. My goal was to include every subject in economics that normally will be found in an introductory level textbook of economics, microeconomics, or macroeconomics. Since different school systems, different classroom instructors, and different textbooks cover a slightly different combination of topics, BASIC ECONOMICS FOR STUDENTS AND NON-STUDENTS ALIKE is a little more comprehensive than most single introductory textbooks of economics. Some of the topics will be found in introductory classes in some schools, but in intermediate-level classes in other schools.