Book picks similar to
Break the Code: Cryptography for Beginners by Bud Johnson


code-breaking
cryptography
format_hardcopy
hobbies_science

Minecraft Hacks: The Unofficial Guide to Tips and Tricks That Other Guides Won't Teach You


Megan Miller - 2014
    With Minecraft Hacks, you'll be able to take back that control! Only with the help found in Minecraft Hacks will you be able to craft your world exactly how you want it to look, all while discovering the hidden gems of the game.In this hacker's guide, you'll find expertise on:Mining—including diamonds and rare minerals!Farming—growing tricks, seed hacks, and the best tree-replanting techniques!Battle—for the best weapons and armor!Magic—top crafting hacks and book modifiers!You will never be stuck again! With more than one hundred full-color screenshots of in-game footage, you’ll be able to carefully follow every tip with precision. It doesn’t matter if you’re playing on a PC, mobile device, or home console; with Minecraft Hacks, you’ll be beating the game in no time. Every block has been accounted for, all living entities have been taken into consideration, and all modes of game-play are covered!

The Hairy Toe (Read and Share)


Daniel Postgate - 1998
    Grouped in four progressive levels, Read and Share books - available individually for the first time - are specially selected for qualities that encourage literacy skills and a love of reading.Sixteen top-quality books with notes for extending reading fun inspire the confidence parents and children need to experience the joys of reading . . . together. Plus an informative Parents’ Handbook!What is Read and Share?—An expert selection of sixteen high-quality picture books by superb authors and illustrators, featuring a multicultural array of subjects, including poetry and rhymes, traditional songs, stories, and information books —Four progressive levels - Beginnings, Early Steps, Next Steps, and Taking Off - each including four fabulous picture books—Two full spreads inside each book offering suggestions and activities inspired by the story, designed to help parents and children get the most out of each book - and build a foundation for reading success—A separate 24-page, full-color Parents’ Handbook providing extensive practical information and detailed answers to many of the questions parents ask about encouraging their children’s literacy

Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users


Christopher Negus - 2007
    Try out more than 1,000 commands to find and get software, monitor system health and security, and access network resources. Then, apply the skills you learn from this book to use and administer desktops and servers running Ubuntu, Debian, and KNOPPIX or any other Linux distribution.

Excel Dashboards & Reports


Michael Alexander - 2010
    Offering a comprehensive review of a wide array of technical and analytical concepts, Excel Reports and Dashboards helps Excel users go from reporting data with simple tables full of dull numbers, to presenting key information through the use of high-impact, meaningful reports and dashboards that will wow management both visually and substantively.Details how to analyze large amounts of data and report the results in a meaningful, eye-catching visualization Describes how to use different perspectives to achieve better visibility into data, as well as how to slice data into various views on the fly Shows how to automate redundant reporting and analyses Part technical manual, part analytical guidebook, Excel Dashboards and Reports is the latest addition to the Mr. Spreadsheet's Bookshelf series and is the leading resource for learning to create dashboard reports in an easy-to-use format that's both visually attractive and effective.

Code Breaking: A History and Exploration


Rudolf Kippenhahn - 1999
    In Code Breaking , Rudolf Kippenhahn offers readers both an exciting chronicle of cryptography and a lively exploration of the cryptographer’s craft. Rich with vivid anecdotes from a history of coding and decoding and featuring three new chapters, this revised and expanded edition makes the often abstruse art of deciphering coded messages accessible to the general reader and reveals the relevance of codes to our everyday high-tech society. A stylishly written, meticulously researched adventure, Code Breaking explores the ways in which communication can be obscured and, like magic, made clear again.

The Frugal Life: The Simple Path to Living a Good Life on a Budget


Michelle Stewart - 2013
    With tips that include how to save money in almost any area of your home, how to cut back on entertainment costs without giving up fun, and how to incorporate your entire family into the process, The Frugal Life offers advice that will work for busy moms or anyone trying to save money for the future.Michelle Stewart goes beyond tips about saving a few cents with coupons or cutting back on unnecessary spending. Through real-life illustrations, she looks at the reasons people spend too much money and outlines some steps for changing the way you think about finances. Anyone can save money, pay down debt, and live a more peaceful life; they just need to be willing to make some basic changes in how they deal with money.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

The Thingumajig Book of Manners


Irene Keller - 1981
    They never say "Thank you" and they never say "Please." They are a hilarious study in bad manners, but while children are laughing at the Thingumajigs' antics, they are also learning good manners from each page's contrasting example.

Tmux 2: Productive Mouse-Free Development


Brian P. Hogan - 2016
    The time you spend context switching between your editor and your consoles eats away at your productivity. Take control of your environment with tmux, a terminal multiplexer that you can tailor to your workflow. With this updated second edition for tmux 2.3, you'll customize, script, and leverage tmux's unique abilities to craft a productive terminal environment that lets you keep your fingers on your keyboard's home row.You have a database console, web server, test runner, and text editor running at the same time, but switching between them and trying to find what you need takes up valuable time and breaks your concentration. By using tmux 2.3, you can improve your productivity and regain your focus. This book will show you how.This second edition includes many features requested by readers, including how to integrate plugins into your workflow, how to integrate tmux with Vim for seamless navigation - oh, and how to use tmux on Windows 10.Use tmux to manage multiple terminal sessions in a single window using only your keyboard. Manage and run programs side by side in panes, and create the perfect development environment with custom scripts so that when you're ready to work, your programs are waiting for you. Manipulate text with tmux's copy and paste buffers, so you can move text around freely between applications. Discover how easy it is to use tmux to collaborate remotely with others, and explore more advanced usage as you manage multiple tmux sessions, add custom scripts into the tmux status line, and integrate tmux with your system.Whether you're an application developer or a system administrator, you'll find many useful tricks and techniques to help you take control of your terminal.

Stages to Saturn: A Technological History of the Apollo/Saturn Launch Vehicles


Roger E. Bilstein - 1997
    . . . Roger Bilstein gracefully wends his way through a maze of technical documentation to reveal the important themes of this story. Rarely has such a nuts-and-bolts tale been so gracefully told."—Air University Review"Easily the best book of the NASA History Series. . . . Starting with the earliest rockets, Bilstein traces the development of the family of massive Saturn launch vehicles that carried the Apollo astronauts to the moon and boosted Skylab into orbit."—Technology and CultureA classic study of the development of the Saturn launch vehicle that took Americans to the moon in the 1960s and 1970s, Stages to Saturn is one of the finest official histories ever produced. The Saturn rocket was developed as a means of accomplishing President John F. Kennedy's goal for the United States to reach the moon before the end of the decade. Without the Saturn V rocket, with its capability of sending as payload the Apollo Command and Lunar Modules--along with support equipment and three astronauts--more than a quarter of a million miles from earth, Kennedy's goal would have been unrealizable. Stages to Saturn not only tells the important story of the research and development of the Saturn rockets and the people who designed them but also recounts the stirring exploits of their operations, from orbital missions around earth testing Apollo equipment to their journeys to the moon and back.  Essential reading for anyone seeking to understand the development of space flight in America and the course of modern technology, this reprint edition includes a new preface by the author providing a 21st-century perspective on the historic importance of the Saturn project.Roger E. Bilstein is professor emeritus of history at the University of Houston, Clear Lake. Regarded as one of the nation’s premier aerospace historians, he is the author of six books, including Flight in America: From the Wrights to the Astronauts and Testing Aircraft, Exploring Space: An Illustrated History of NACA and NASA.

Google Hacking for Penetration Testers, Volume 1


Johnny Long - 2004
    What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Honeydukes: A Scratch & Sniff Adventure (Harry Potter)


Daphne Pendergrass - 2018
    From Fizzing Whizbees to Cockroach Clusters, Bertie Bott's Every Flavor Beans to Chocolate Frogs, the Harry Potter films abound with sweets to enchant and astonish!Now for the first time, fans can scratch and savor the scents of delectable confections straight from the shelves of Honeydukes! Look back on the most mouthwatering Harry Potter movie moments in this beautiful, scented hardcover, perfect for fans of all ages.

Give Them Grace: Dazzling Your Kids with the Love of Jesus


Elyse M. Fitzpatrick - 2011
    And we want to be good parents. But what exactly do we mean by "good?" And is "being good" really the point?Mother-daughter team Elyse Fitzpatrick and Jessica Thompson contend that every way we try to make our kids "good" is simply an extension of Old Testament Law--a set of standards that is not only unable to save our children, but also powerless to change them.No, rules are not the answer. What they need is GRACE.We must tell our kids of the grace-giving God who freely adopts rebels and transforms them into loving sons and daughters. If this is not the message your children hear, if you are just telling them to "be good," then the gospel needs to transform your parenting too.Give Them Grace is a revolutionary perspective on parenting that shows us how to receive the gospel afresh and give grace in abundance, helping our children know the dazzling love of Jesus and respond with heartfelt obedience.

Tank: The Definitive Visual History of Armored Vehicles


David Willey - 2017
    Packed full of tanks, armored vehicles, personnel carriers, and anti-tank weaponry, "Tank" combines comprehensive photographic spreads with in-depth histories of key manufacturers and specially commissioned visual tours of the most iconic examples of their kind. The featured vehicles are placed in their wider context, along with with tactical and technological improvements, and the impact of the tank on the evolution of battlefield and military strategy."Tank" charts the evolution of the tank over the past century, covering over 450 tanks and military vehicles from all over the world. Look through the history of tanks and explore the form and function of a weapon that changed history. Learn the different vehicles' weight, size, country of origin, and time of use through in-depth profiles.An essential visual history, "Tank" provides a complete and exciting overview to the iconic vehicles that changed history.

American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road


Nick Bilton - 2017
    In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye. It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists and black hat hackers—could buy and sell contraband detection-free. Spurred by a public outcry, the federal government launched an epic two-year manhunt for the site’s elusive proprietor, with no leads, no witnesses, and no clear jurisdiction. All the investigators knew was that whoever was running the site called himself the Dread Pirate Roberts. The Silk Road quickly ballooned into $1.2 billion enterprise, and Ross embraced his new role as kingpin. He enlisted a loyal crew of allies in high and low places, all as addicted to the danger and thrill of running an illegal marketplace as their customers were to the heroin they sold. Through his network he got wind of the target on his back and took drastic steps to protect himself—including ordering a hit on a former employee. As Ross made plans to disappear forever, the Feds raced against the clock to catch a man they weren’t sure even existed, searching for a needle in the haystack of the global Internet.Drawing on exclusive access to key players and two billion digital words and images Ross left behind, Vanity Fair correspondent and New York Times bestselling author Nick Bilton offers a tale filled with twists and turns, lucky breaks and unbelievable close calls. It’s a story of the boy next door’s ambition gone criminal, spurred on by the clash between the new world of libertarian-leaning, anonymous, decentralized Web advocates and the old world of government control, order, and the rule of law. Filled with unforgettable characters and capped by an astonishing climax, American Kingpin might be dismissed as too outrageous for fiction. But it’s all too real.