Kali Linux Revealed: Mastering the Penetration Testing Distribution


Raphaël Hertzog - 2017
    They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

Killing Lincoln/Killing Kennedy Boxed Set


Bill O'Reilly - 2013
    Now you can experience both of the vivid and remarkable accounts of the assassinations that changed America's history in a dual hardcover boxed set. Relive the last days of Abraham Lincoln and John F. Kennedy—two presidents living in different eras, yet tied by their duty to their country and the legacies they so abruptly left behind.

The Sinatra Solution: Metabolic Cardiology


Stephen T. Sinatra - 2005
    Sinatra discusses the importance of energy metabolism on cardiovascular health and the positive impact these three energy-supplying nutrients, CoQ10, carnitine, ribose, have on the cardiovascular system. Readers will learn how these miraculous nutrients work throughout the body, essentially charging up every body cell to function at optimal capacity.

The Inquisition: A History From Beginning to End


Hourly History - 2017
     The Roman Catholic Inquisition was one of the most controversial organizations in human history. Although it has been painted in a negative light, the Inquisition was too broad in scope to define as simply good or bad. It was a period where conflict and bloodshed were inevitable. It was a time where war, famine, plague, and poverty were common factors of human life. From the 1180s to the 1830s, the Inquisition was the judicial arm of the Catholic Church. Created to root out and punish heretics within the Catholic faith, the Inquisition became an institution that would carve its name into history. Inside you will read about... ✓ The Conception of the Inquisition ✓ The Hammer of Witches ✓ The Spanish Inquisition ✓ The Portuguese Inquisition ✓ The Roman Inquisition ✓ Shades of the Inquisition in Modern Society And much more! Throughout its many variations, the Inquisition took hold in France, Spain, Portugal, and Italy and in the process, both hastened and stunted progress in Western society. The Inquisition was as multi-faceted in its failure as it was in its successes. Though it was responsible for the deaths of thousands, it was also responsible for the sparing of thousands more. The Inquisition put to death some of the brightest minds of the time, and yet their brutality quickened the pace of the Renaissance and the Enlightenment. In short, the Inquisition was many things—easy to define is not one of them. This concise, compressed guidebook reveals the history, failures, and successes of the Roman Catholic Inquisition from its birth to its final death rattle.

Programming the Raspberry Pi: Getting Started with Python


Simon Monk - 2012
    In this book, electronics guru Simon Monk explains the basics of Raspberry Pi application development, while providing hands-on examples and ready-to-use scripts. See how to set up hardware and software, write and debug applications, create user-friendly interfaces, and control external electronics. Do-it-yourself projects include a hangman game, an LED clock, and a software-controlled roving robot. Boot up and configure your Raspberry Pi Navigate files, folders, and menus Create Python programs using the IDLE editor Work with strings, lists, and functions Use and write your own libraries, modules, and classes Add Web features to your programs Develop interactive games with Pygame Interface with devices through the GPIO port Build a Raspberry Pi Robot and LED Clock Build professional-quality GUIs using Tkinter

The New Enemy: Episode 1 (Liam Scott series Book 3)


Andy McNab - 2014
    The LRCC training is designed to break him mentally and physically. Liam must prove that he’s tough enough – but things turn nasty in the interrogation room . . . Full story available in hardback on January 1st.

The Shores of Moses Lake Collection


Lisa Wingate - 2015
    In these contemporary romances from Lisa Wingate, four women find love, hope, and unexpected adventures on the shores of Moses Lake, Texas.Includes four novels in one volume:1 Larkspur Cove2 Blue Moon Bay3 Firefly Island4 Wildwood Creek

Python Algorithms: Mastering Basic Algorithms in the Python Language


Magnus Lie Hetland - 2010
    Written by Magnus Lie Hetland, author of Beginning Python, this book is sharply focused on classical algorithms, but it also gives a solid understanding of fundamental algorithmic problem-solving techniques.The book deals with some of the most important and challenging areas of programming and computer science, but in a highly pedagogic and readable manner. The book covers both algorithmic theory and programming practice, demonstrating how theory is reflected in real Python programs. Well-known algorithms and data structures that are built into the Python language are explained, and the user is shown how to implement and evaluate others himself.

Catching a Cowboy: Roped into Love


Melissa Keir - 2017
     Dreamed of roping your own sexy cowboy? How about Six stories by award winning and best-selling Western Romance authors? These tales delight with romance, Wranglers and Stetsons. The Heartsong Cowboy by Melissa Keir- Can two people, one horse and the power of love cure a little girl? Ride of his Life by Deb Julienne-Battling your own demons is easier than fighting family. Clayton and Andie learn this the hard way... Radio Rose by Stephanie Berget- Cowboys and aliens … on a dark, deserted highway, it can be hard to tell the difference. 119 Days by RaeAnne Hadley- Divorced for five years, Celeste Howard was happy with her life. The only thing she missed was a man's touch. Sean Mison fit her ideal of a perfect one-night stand, but what began as a simple stress reliever grew into more than what Celeste signed on for. Promise Me Eden by D’Ann Lindun- She’s buried in grief. He doesn’t know how to help. Can they find their way back together before it’s too late? Cowboy in Waiting by Leslie P. Garcia- She’d buried a hero. She wasn’t looking for another. But her cowboy in waiting was far from a hero… Climb on board for the ride of your life!

Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."

Chaos Monkeys: Obscene Fortune and Random Failure in Silicon Valley


Antonio García Martínez - 2016
    Infrastructure engineers use a software version of this “chaos monkey” to test online services’ robustness—their ability to survive random failure and correct mistakes before they actually occur. Tech entrepreneurs are society’s chaos monkeys, disruptors testing and transforming every aspect of our lives, from transportation (Uber) and lodging (AirBnB) to television (Netflix) and dating (Tinder). One of Silicon Valley’s most audacious chaos monkeys is Antonio García Martínez.After stints on Wall Street and as CEO of his own startup, García Martínez joined Facebook’s nascent advertising team, turning its users’ data into profit for COO Sheryl Sandberg and chairman and CEO Mark “Zuck” Zuckerberg. Forced out in the wake of an internal product war over the future of the company’s monetization strategy, García Martínez eventually landed at rival Twitter. He also fathered two children with a woman he barely knew, committed lewd acts and brewed illegal beer on the Facebook campus (accidentally flooding Zuckerberg's desk), lived on a sailboat, raced sport cars on the 101, and enthusiastically pursued the life of an overpaid Silicon Valley wastrel.Now, this gleeful contrarian unravels the chaotic evolution of social media and online marketing and reveals how it is invading our lives and shaping our future. Weighing in on everything from startups and credit derivatives to Big Brother and data tracking, social media monetization and digital “privacy,” García Martínez shares his scathing observations and outrageous antics, taking us on a humorous, subversive tour of the fascinatingly insular tech industry. Chaos Monkeys lays bare the hijinks, trade secrets, and power plays of the visionaries, grunts, sociopaths, opportunists, accidental tourists, and money cowboys who are revolutionizing our world. The question is, will we survive?

How to Rescue a Dead Princess


Jeff Strand - 2000
    It's a tale filled with so much adventure, so much excitement, so much vocabulary, that all who read it will suffer a fit of giddiness that will freak out everyone in their general vicinity. It's the saga of Randall, a squire assigned to escort the lovely Princess Janice on a diplomatic journey of utmost importance. Then she gets killed. Now Randall must overcome desperate odds and ridiculous dangers in his quest to bring her back to life...before the entire Generic Fantasy Land falls into the evil clutches of The Dark One! Packed to the bursting point with unrestrained silliness (so be sure to hold it a safe distance from your face when reading), How to Rescue a Dead Princess is the novel all the really cool people are reading this year, an epic fantasy for your family to cherish approximately forever.

Core Memory: A Visual Survey of Vintage Computers


John Alderman - 2007
    Vivid photos capture these historically important machinesincluding the Eniac, Crays 13, Apple I and IIwhile authoritative text profiles each, telling the stories of their innovations and peculiarities. Thirty-five machines are profiled in over 100 extraordinary color photographs, making Core Memory a surprising addition to the library of photography collectors and the ultimate geek-chic gift.

Learning With Big Data (Kindle Single): The Future of Education


Viktor Mayer-Schönberger - 2014
    Courses tailored to fit individual pupils. Textbooks that talk back. This is tomorrow’s education landscape, thanks to the power of big data. These advances go beyond the much-discussed rise of online courses. As the New York Times-bestselling authors of Big Data explain, the truly fascinating changes are actually occurring in how we measure students’ progress and how we can use that data to improve education for everyone, in real time, both on- and offline. Learning with Big Data offers an eye-opening, insight-packed tour through these new trends, for educators, administrators, and readers interested in the latest developments in business and technology.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.