Book picks similar to
Break the Code: Cryptography for Beginners by Bud Johnson
codeing
format_hardcopy
kids
ljc_sd_to_sort
Computer Science: An Overview
J. Glenn Brookshear - 1985
This bookpresents an introductory survey of computer science. It explores thebreadth of the subject while including enough depth to convey anhonest appreciation for the topics involved. The new edition includesreorganization of some key material for enhanced clarity (SoftwareEngineering and Artificial Intelligence chapters), new and expandedmaterial on Security and Data Abstractions, more on ethics anddifferent ethical theories in Chapter 0. Anyone interested in gaining athorough introduction to Computer Science.
How to Grow a Friend
Sara Gillingham - 2013
Soon your little gardeners will have their very own green thumbs for this most important of life skills.
User Interface Design for Programmers
Joel Spolsky - 2001
They think that UI design is like graphic design--the mysterious process by which creative, latte-drinking, all-black-wearing people produce cool-looking, artistic pieces. Most programmers see themselves as analytic, logical thinkers instead--strong at reasoning, weak on artistic judgment, and incapable of doing UI design.In this brilliantly readable book, author Joel Spolsky proposes simple, logical rules that can be applied without any artistic talent to improve any user interface, from traditional GUI applications to websites to consumer electronics. Spolsky's primary axiom, the importance of bringing the program model in line with the user model, is both rational and simple.In a fun and entertaining way, Spolky makesuser interfacedesign easy for programmers to grasp. After reading User Interface Design for Programmers, you'll know how to design interfaces with the user in mind. You'll learn the important principles that underlie all good UI design, and you'll learn how to perform usability testing that works."
Wild Sea Creatures: Sharks, Whales and Dolphins! (Wild Kratts)
Chris Kratt - 2014
Along the way, they encounter incredible creatures while combining science education and fun. Boys and girls ages 4 to 6 will dive into this Step 2 Reader with the Kratt brothers as they activate their Creature Power Suits to swim with sharks, whales, and other wild sea creatures! Step 2 Readers use basic vocabulary and short sentences to tell simple stories. For children who recognize familiar words and can sound out new words with help.From the Trade Paperback edition.
Code Breaker, Spy Hunter: How Elizebeth Friedman Changed the Course of Two World Wars
Laurie Wallmark - 2021
Her story came to light when her secret papers were finally declassified in 2015. From thwarting notorious rumrunners with only paper and pencil to “counter-spying into the minds and activities of” Nazis, Elizebeth held a pivotal role in the early days of US cryptology. No code was too challenging for her to crack, and Elizebeth’s work undoubtedly saved thousands of lives. Extensive back matter includes explanations of codes and ciphers, further information on cryptology, a bibliography, a timeline of Elizebeth’s life, plus secret messages for young readers to decode.
Networking for Systems Administrators (IT Mastery Book 5)
Michael W. Lucas - 2015
Servers give sysadmins a incredible visibility into the network—once they know how to unlock it. Most sysadmins don’t need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you:•How modern networks really work•The essentials of TCP/IP•The next-generation protocol, IPv6•The right tools to diagnose network problems, and how to use them•Troubleshooting everything from the physical wire to DNS•How to see the traffic you send and receive•Connectivity testing•How to communicate with your network team to quickly resolve problemsA systems administrator doesn’t need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one.
Darknet: A Beginner's Guide to Staying Anonymous
Lance Henderson - 2012
This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!
Stealing the Network: How to Own a Continent
Ryan Russell - 2004
While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world
Princess Diadora: Just an Ordinary Ballerina
Eddie Bee - 2013
She is a regular young girl that any kid would be able to relate to. This children's book is the second book in the Princess Diadora series. In this book, the princess who loves learning ballet must deal with her mother's decision for her to take privileged ballet lessons. Look out for more books from this continuing series.
The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics
John Sammons - 2011
This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.
The New Hacker's Dictionary
Eric S. Raymond - 1991
Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value.Sample definitionhacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term is {cracker}.The term 'hacker' also tends to connote membership in the global community defined by the net (see {network, the} and {Internet address}). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see {hacker ethic, the}).It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled {bogus}). See also {wannabee}.
Flying Machines: How the Wright Brothers Soared
Alison Wilgus - 2017
In an era of dirigibles and hot air balloons, the Wright Brothers were among the first innovators of heavier than air flight. But in the hotly competitive international race toward flight, Orville and Wilbur were up against a lot more than bad weather. Mechanical failures, lack of information, and even other aviators complicated the Wright Brothers’ journey. Though they weren’t as wealthy as their European counterparts, their impressive achievements demanded attention on the international stage. Thanks to their carefully recorded experiments and a healthy dash of bravery, the Wright Brothers’ flying machines took off.
Professional PHP Programming
Sascha Schumann - 1999
PHP is a server-side, HTML-embedded scripting language. It is an open source technology, rapidly gaining popularity as a scripting language for people running dynamic websites. One of its major attractions over Perl, JavaScript and other scripting languages is that PHP has a built-in database integration layer and seamless IP connectivity, with LDAP and TCP as well as the IMAP mail interface. Features; Real world, practical experience and techniques From installation and configuration of the PHP engine to advanced dynamic application design Definitive coverage of core PHP language and database addressing: MySQL is covered in depth. Practical e-commerce and business scripting including database application development, together with PHP and XML applications. LDAP connectivity addressed.
Barcode Booty: How I found and sold $2 million of 'junk' on eBay and Amazon, And you can, too, using your phone
Steve Weber - 2011
Find out which apps are the best, and how to use them. Check prices instantly, and know your potential profits before risking a dime. Learn to resell on eBay and Amazon, and rake in the profits. Find bargain inventory virtually anywhere--yard sales, retail stores, outlet malls, warehouse clubs, wholesale dealers, bargain basements, and online bulk suppliers. Learn to specialize in books, videos, games, toys, electronics, grocery, fashion, health and beauty, auto parts, niche regional products--or take them all! Many books promise to teach you how to start an online business. Look closely, though, and you'll see that very few are written by someone who's really done it. Author Steve Weber has been a full-time, five-star seller on Amazon.com and eBay for 10 years! * Feed your e-commerce business with a continual stream of hot products. * Learn how to leverage the "Long Tail" of retail for low-risk, high-return profits. * Uncover niche products online shoppers want to buy. * Diversify your product line. * Learn to minimize sales taxes and write off the business use of your home office and car. * Find new and hard-to-find products from real wholesalers. * Know exactly how much potential inventory is worth, and how quickly it sells. * Get dirt-cheap warehouse space. * Get the best product research tools available for your phone. * Outsource your fulfillment and customer service tasks. * Benefit from advice from the most experienced, profitable online sellers. The Internet Gold Rush is just getting started. In this insider's guide to online selling, you'll learn the secrets to profitable trading. You can profit from price differences in local and global markets. This book teaches you how, every step of the way.
Real-Time Big Data Analytics: Emerging Architecture
Mike Barlow - 2013
The data world was revolutionized a few years ago when Hadoop and other tools made it possible to getthe results from queries in minutes. But the revolution continues. Analysts now demand sub-second, near real-time query results. Fortunately, we have the tools to deliver them. This report examines tools and technologies that are driving real-time big data analytics.