When Grandma Gives You a Lemon Tree


Jamie L.B. Deenihan - 2019
       “When life gives you lemons, make lemonade.” In this imaginative take on that popular saying, a child is surprised (and disappointed) to receive a lemon tree from Grandma for her birthday. After all, she DID ask for a new gadget! But when she follows the narrator’s careful—and funny—instructions, she discovers that the tree might be exactly what she wanted after all. This clever story, complete with a recipe for lemonade, celebrates the pleasures of patience, hard work, nature, community . . . and putting down the electronic devices just for a while.

Little Miss Mary and The Big Monster Makeover


Gleb Toropov - 2007
    However, instead of being petrified by the apparition, Mary decides to help the hideous beast by giving him a makeover. In the process, it is Mary who undergoes the biggest transformation.

Counting on Frank


Rod Clement - 1991
    A boy and his dog present amusing counting, size comparison, and mathematical facts.

Kindness Wins


Galit Breen - 2015
    With compassion, humor, insight, and practical wisdom born of firsthand experience, Galit Breen makes a compelling case for online decency. What would happen if parents and kids everywhere could read these 10 simple rules of conduct, learn them by heart, and live by them each and every time they log in? The world would change dramatically--and for the good of us all."--Katrina Kenison, author of Mitten Strings for God and The Gift of an Ordinary DayIf kindness wins, accountability rules. The need for this mantra is never clearer than when scrolling through posts and comments online.Approximately four out of ten kids (42 percent) have experienced cyberbullying. When we were young, our bullies weren't usually strangers. They were the kids who passed mean notes about us in class, the ones who didn't let us sit at their table during lunch, and the ones who tripped us in the hallway or embarrassed us in gym class. Cyberbullying isn't all that different from the playground bullying of our youth and nightmares. But with social media, our bullies have nonstop access to us--and our kids. In fact, we're often "friends" with our bullies online.When freelance writer Galit Breen's kids hinted that they'd like to post, tweet, and share photos on Instagram, Breen took a look at social media as a mom and as a teacher and quickly realized that there's a ridiculous amount of kindness terrain to teach and explain to kids―and some adults―before letting them loose online. So she took to her pen and wrote a how-to book for parents who are tackling this issue with their kids.Kindness Wins covers ten habits to directly teach kids as they're learning how to be kind online. Each section is written in Breen's trademark parent-to-parent-over-coffee style and concludes with resources for further reading, discussion starters, and bulleted takeaways. She ends the book with two contracts―one to share with peers and one to share with kids. Just like we needed to teach our children how to walk, swim, and throw a ball, we need to teach them how to maneuver kindly online. This book will help you do just that.

Inside Cyber Warfare: Mapping the Cyber Underworld


Jeffrey Carr - 2009
    You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level

Practical UNIX & Internet Security


Simson Garfinkel - 1991
    Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.

Linux Network Administrator's Guide


Tony Bautts - 1994
    Along with some hardware considerations, this highly acclaimed guide takes an in-depth look at all of the essential networking software that comes with the operating system--including basic infrastructure (TCP/IP, wireless networking, firewalling) and the most popular services on Linux systems.But as the follow-up to a classic, the third edition of the Linux Network Administrator's Guide does more than just spruce up the basics. It also provides the very latest information on the following cutting-edge services:Wireless hubsOpenLDAPFreeS/WANIMAPSpam filteringOpenSSHBINDIPv6Featuring a litany of insider tips and techniques, the Linux Network Administrator's Guide, Third Edition is an invaluable companion for any network administrator interested in integrating Linux into their Windows environmentAuthored by Terry Dawson, Tony Bautts, and Gregor N. Purdy, the Linux Network Administrator's Guide, Third Edition emerged from the Linux Documentation Project (LDP). The LDP's goal is to centralize all of the issues of Linux documentation, ranging from online documentation topics such as installing, using, and running Linux.

Robot Building for Beginners


David Cook - 2002
    Not only does author David Cook assist you in understanding the component parts of robot development, but he also presents valuable techniques that prepare you to make new discoveries on your own.Cook begins with the anatomy of a homemade robot and gives you the best advice on how to proceed successfully. General sources for tools and parts are provided in a consolidated list, and specific parts are recommended throughout the book. Also, basic safety precautions and essential measuring and numbering systems are promoted throughout.Specific tools and parts covered include digital multimeters, motors, wheels, resistors, LEDs, photoresistors, transistors, chips, gears, nut drivers, batteries, and more. "Robot Building for Beginners" is an inspiring book that provides an essential base of practical knowledge for anyone getting started in amateur robotics.

Cryptography and Network Security: Principles and Practice


William Stallings - 1998
    William Stallings offers a practical survey of both the principles and practice of cryptography and network security, reflecting the latest developments in the field.

The Open-Source Everything Manifesto: Transparency, Truth, and Trust


Robert David Steele - 2012
    Also lacking is public intelligence in the sense of decision-support: knowing what one needs to know in order to make honest decisions for the good of all, rather than corrupt decisions for the good of the few.The Open-Source Everything Manifesto is a distillation of author, strategist, analyst, and reformer Robert David Steele life's work: the transition from top-down secret command and control to a world of bottom-up, consensual, collective decision-making as a means to solve the major crises facing our world today. The book is intended to be a catalyst for citizen dialog and deliberation, and for inspiring the continued evolution of a nation in which all citizens realize our shared aspiration of direct democracy—informed participatory democracy. Open-Source Everything is a cultural and philosophical concept that is essential to creating a prosperous world at peace, a world that works for one hundred percent of humanity. The future of intelligence is not secret, not federal, and not expensive. It is about transparency, truth, and trust among our local to global collective. Only "open" is scalable. As we strive to recover from the closed world corruption and secrecy that has enabled massive fraud within governments, banks, corporations, and even non-profits and universities, this timely book is a manifesto for liberation—not just open technology, but open everything.

The Spatial Web: How Web 3.0 Will Connect Humans, Machines, and AI to Transform the World


Gabriel Rene - 2019
    Blade Runner, The Matrix, Star Wars, Avatar, Star Trek, Ready Player One and Avengers show us futuristic worlds where holograms, intelligent robots, smart devices, virtual avatars, digital transactions, and universe-scale teleportation work together perfectly, somehow seamlessly combining the virtual and the physical with the mechanical and the biological. Science fiction has done an excellent job describing a vision of the future where the digital and physical merge naturally into one — in a way that just works everywhere, for everyone. However, none of these visionary fictional works go so far as to describe exactly how this would actually be accomplished. While it has inspired many of us to ask the question—How do we enable science fantasy to become....science fact? The Spatial Web achieves this by first describing how exponentially powerful computing technologies are creating a great “Convergence.” How Augmented and Virtual Reality will enable us to overlay our information and imaginations onto the world. How Artificial Intelligence will infuse the environments and objects around us with adaptive intelligence. How the Internet of Things and Robotics will enable our vehicles, appliances, clothing, furniture, and homes to become connected and embodied with the power to see, feel, hear, smell, touch and move things in the world, and how Blockchain and Cryptocurrencies will secure our data and enable real-time transactions between the human, machine and virtual economies of the future. The book then dives deeply into the challenges and shortcomings of the World Wide Web, the rise of fake news and surveillance capitalism in Web 2.0 and the risk of algorithmic terrorism and biological hacking and “fake-reality” in Web 3.0. It raises concerns about the threat that emerging technologies pose in the hands of rogue actors whether human, algorithmic, corporate or state-sponsored and calls for common sense governance and global cooperation. It calls for business leaders, organizations and governments to not only support interoperable standards for software code, but critically, for ethical, and social codes as well. Authors Gabriel René and Dan Mapes describe in vivid detail how a new “spatial” protocol is required in order to connect the various exponential technologies of the 21st century into an integrated network capable of tracking and managing the real-time activities of our cities, monitoring and adjusting the supply chains that feed them, optimizing our farms and natural resources, automating our manufacturing and distribution, transforming marketing and commerce, accelerating our global economies, running advanced planet-scale simulations and predictions, and even bridging the gap between our interior individual reality and our exterior collective one. Enabling the ability for humans, machines and AI to communicate, collaborate and coordinate activities in the world at a global scale and how the thoughtful application of these technologies could lead to an unprecedented opportunity to create a truly global “networked” civilization or "Smart World.” The book artfully shifts between cyberpunk futurism, cautionary tale-telling, and life-affirming call-to-arms. It challenges us to consider the importance of today’s technological choices as individuals, organizations, and as a species, as we face the historic opportunity we have to transform the web, the world, and our very definition of reality.

Pandas


Anne Schreiber - 2010
    Everyone loves to watch them play, climb, cuddle, and chew. But careful, they can scratch too—just look at that tree! Pandas live in wild places very faraway, and they are the STAR ATTRACTIONS of every zoo that keeps them safe and well, all over the world.National Geographic supports K-12 educators with ELA Common Core Resources.Visit www.natgeoed.org/commoncore for more information.

Dragon's Alphabet Soup: Learn ABCs with Eric the Dragon


Rachel Yu - 2010
    The beautiful and adorable illustrations will charm your little ones into visiting this ABC book over and over again. This is a definite must have book for your favorite preschooler to 1st grader.

No Bullshit Social Media: The All-Business, No-Hype Guide to Social Media Marketing


Jason Falls - 2011
    Start using it strategically. Identify specific, actionable goals. Apply business discipline and proven best practices. Stop fearing risks. Start mitigating them. Measure performance. Get results. You can. This book shows you how. Jason Falls and Erik Deckers serve up practical social media techniques and metrics for building brands, strengthening awareness, improving service, optimizing R&D, driving better leads--and closing more sales. "Conversations" and "communities" are wonderful, but they're not enough. Get this book and get what you really want from social media: profits. Think social media's a passing fad? Too risky? Just a toy? Too soft and fuzzy? Not for your business? Wake up! It's where your customers are. And it ain't going away. Does that suck? No. It doesn't. Do social media right, and all those great business buzzwords come true. Actionable. Measurable. And...wait for it...here comes the big one. Profitable. Damn profitable. Want to know how to do it right? We'll show you. And, yeah, we know how because we've done it. This is the bullshit-free, lie-free, fluff-free, blessedly non-New-Age real deal. You're going to learn how to use social media to deliver absolutely killer customer service. How to R&D stuff people actually want. Develop scads of seriously qualified leads. You'll figure out what you want. You know, the little things like profits, market share, loyalty, and brand power. You'll figure out how to measure it. And then you'll go get it. One more thing. We know what scares you about social media. Screwing up (a.k.a., your mug on the front page of The Wall Street Journal). So we'll tell you what to do so that won't happen. Ever. No B.S. in this book. Just facts. Metrics. Best practices. Stuff to warm the hearts of your CFO, CEO, all your C-whatevers. And, yeah, you. So get your head out from under the pillow. Get your butt in gear. Let's go make some money.

The Lego Mindstorms Ev3 Idea Book: 181 Simple Machines and Clever Contraptions


Yoshihito Isogawa - 2014
    Each model includes a list of the required parts, minimal text, and colorful photographs from multiple angles so you can re-create it without the need for step-by-step instructions.You'll learn to build cars with real suspension, steerable crawlers, ball-shooters, grasping robotic arms, and other creative marvels. Each model demonstrates simple mechanical principles that you can use as building blocks for your own creations.Best of all, every part you need to build these machines comes in one LEGO set (#31313)!