Book picks similar to
Make: Technology on Your Time Volume 02: Technology on Your Time Volume 02 by Mark Frauenfelder
mag
skill-upgrade-books
technology
unsorted
Choosing Colors: An Expert Choice of the Best Colors to Use in Your Home
Kevin McCloud - 2003
Each palette--which includes anywhere from 6 to 16 color swatches--forms a blueprint for a unique decorative scheme. A palette based on old Chinese silk, for example, is seen reinterpreted in a contemporary New York apartment. Plus, each palette features gorgeous photographs that bring the color scheme to life, along with invaluable advice and tips for using the colors to transform a room. Readers will also find manufacturers' paint references and numbers, lists of suppliers, and much more. The ultimate color sourcebook!
The Ivey Guide to Law School Admissions: Straight Advice on Essays, Résumés, Interviews, and More
Anna Ivey - 2005
In this book-the first of its kind by a former law school admissions officer-she draws on her expertise to cover topics from the application and the essay to the interview and the recommendations, touching on hot-button issues like how much the LSAT, ethnicity, and age really matter. Offering an insider's advice on how to produce the very best application, this guide gives straight answers to questions such as: • What kind of essay should I write to set me apart from the rest of the pack?• Should I explain my low LSAT score, my D in chemistry, my attention deficit disorder, my time in rehab? • Is law school worth the debt I'll face when I graduate? Full of invaluable examples and anecdotes about real admissions decisions, The Ivey Guide to Law School Admissions is certain to become the new bible for would-be law students everywhere.
Electronics Fundamentals: Circuits, Devices and Applications (Floyd Electronics Fundamentals Series)
Thomas L. Floyd - 1983
Written in a clear and accessible narrative, the 7th Edition focuses on fundamental principles and their applications to solving real circuit analysis problems, and devotes six chapters to examining electronic devices. With an eye-catching visual program and practical exercises, this book provides readers with the problem-solving experience they need in a style that makes complex material thoroughly understandable. For professionals with a career in electronics, engineering, technical sales, field service, industrial manufacturing, service shop repair, and/or technical writing.
Getting Started with Arduino
Massimo Banzi - 2008
Getting Started with Arduino gives you lots of ideas for Arduino projects and helps you get going on them right away. From getting organized to putting the final touches on your prototype, all the information you need is right in the book. Inside, you'll learn about:Interaction design and physical computing The Arduino hardware and software development environment Basics of electricity and electronics Prototyping on a solderless breadboard Drawing a schematic diagram And more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED. Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.
Hacking Exposed Wireless: Wireless Security Secrets & Solutions
Johnny Cache - 2007
Providing tactical wireless security implementation coverage by showing how to execute the attacks and implement the defenses, this title demonstrates how attackers identify and exploit wireless network weaknesses and covers various wireless technologies - WiFi/802.11, Bluetooth, IRDA, 3G Wireless, and more.
Run with Power: The Complete Guide to Power Meters for Running
Jim Vance - 2016
From 5K to ultramarathon, a power meter can make you faster—but only if you know how to use it. Just viewing your numbers is not enough; you can only become a faster, stronger, more efficient runner when you know what your key numbers mean for your workouts, races, and your season-long training. In Run with Power, TrainingBible coach Jim Vance offers the comprehensive guide you need to find the speed you want.Run with Power demystifies the data and vocabulary so you can find and understand your most important numbers. You’ll set your Running Power Zones so you can begin training using 8 power-based training plans for 5K, 10K, half-marathon, and marathon. Vance shows you how you can compare wattage, heart rate, pace, and perceived exertion to gain the maximum insight into your performances, how you respond to training, and how you can train more effectively. Run with Power will revolutionize how you train and race. Armed with Vance’s guidance, you can train more specifically for races, smooth your running technique, accurately measure your fitness, predict a fitness plateau, monitor injuries, know exactly how hard you’re training, get more fitness from every workout, recover fully, perfect your tapers, warm up without wasting energy, pace your race on any terrain, know when to open the throttle, and create an unprecedented picture of yourself as an athlete.If you’re just glancing at the number on your wrist or computer monitor, you’ve got a lot more speed potential. Knowledge is power and understanding your power numbers can open the gate to new methods and new PRs. Run with Power introduces the use of power meters to the sport of running and will show you how to break through to all-new levels of performance.Key concepts explored in Run with Power: 3/9 Test, 30-minute Time Trial Test, Running Functional Threshold Power (rFTPw), Running Functional Threshold Pace (rFTPa), Averaged and Normalized Power (NP), Intensity Factor (IF), Peak Power, Variability Index, Efficiency Index (EI), speed per watt, Vance’s Power Zones for Running, Training Stress Score (TSS), and Periodization with Power. Includes 6 testing methods and 8 power-based training schedules and workouts for 5K, 10K, half-marathon, and marathon.
Thirty Seconds to Impact
Peter Burkill - 2010
It was not until moments before landing that anything went wrong. Coming in to Heathrow Airport, the plane suffered inexplicable loss of power to both engines, and it was suddenly likely that the plane would plough into a built-up area outside the airport, with the loss of all lives on board. Peter tells us in graphic detail his thoughts and actions when he managed to help save the plane at the last moment thanks to a flash of inspiration that led him to change the position of the wing flaps, which appeared to gain the vehicle enough precious time to make it over the perimeter fence and land on the grass, short of the runway. For both Maria and Peter, their lives following the crash have resulted in experiences that they never would have expected to have happened. There isn't a handbook with rules to follow after a crash so the subsequent aftermath was laced with events that could have been handled better from all sides, which lead to Maria and Peter having to find strength inside them that they had never needed before. A little more than a year later, they have used these strengths to begin a new chapter in their lives; starting with leaving British Airways and celebrating a second chance to enjoy life.But there are still nights when they find themselves awake, crying about what could have happened on that fateful day.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency
Parmy Olson - 2012
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec. In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Psilocybin Mushroom Handbook: Easy Indoor and Outdoor Cultivation
L.G. Nicholas - 2005
Anyone with a clean kitchen, some basic equipment, and a closet shelf or shady flowerbed will be able to grow a bumper crop. This Handbook also includes an introduction to mushroom biology, a guide for supplies, and advice on discreetly integrating psychedelic mushrooms into outdoor gardens.Hand-drawn illustrations and full-color and black-&-white photographs provide the reader with steps in the cultivation process and exact identification of desired species.The four species detailed include two species that have previously had very little coverage: Psilocybe mexicana (a tiny mushroom used for millennia by indigenous Mexican shamans) and Psilocybe azurescens (a newly described species native to the Pacific Northwest and easily grown outdoors on woodchips).This innovative book also offers a wealth of information about the use of psilocybin-containing mushrooms in both traditional and modern contexts. Contributing ethnobotanist Kathleen Harrison highlights the history, ritual and mythology of sacred Psilocybe mushrooms used in indigenous shamanic settings. The book’s authors offer insights into how these principles might be put into practice by the modern voyager, to provide, safe, healing and fruitful journeys.
Solar Electricity Handbook
Michael Boxwell - 2009
Assuming no previous knowledge, the book explains how solar panels work, how they can be used and explains the steps you need to take to successfully design and install a solar photovoltaic system from scratch. Accompanying this book is a solar resource website containing lots of useful information, lists of suppliers and on-line solar energy calculators that will simplify the cost analysis and design processes.
Strength of Materials, Part 1 and Part 2
Stephen P. Timoshenko - 1983
1: Elementary Theory and Problems contains the essential material that is usually covered in required courses of strength of materials in our engineering schools. Strength of Materials - Part. 2: Advanced Theory and Problems contains the later developments that are of practical importance in the fields of strength of materials, and theory of elasticity. Complete derivations of problems of practical interest are given in most cases. The books are illustrated with a number of problems to which solutions are presented. In many cases, the problems are chosen so as to widen the field covered by the text and to illustrate the application of the theory in the solution of design problems.
Cooking for Geeks: Real Science, Great Cooks, and Good Food
Jeff Potter - 2007
Author and cooking geek Jeff Potter helps you apply curiosity, inspiration, and invention to the food you prepare. Why do we bake some things at 350°F / 175°C and others at 375°F / 190°C? Why is medium-rare steak so popular? And just how quickly does a pizza cook if you “overclock” an oven to 1,000°F / 540°C? This expanded new edition provides in-depth answers, and lets you experiment with several labs and more than 100 recipes— from the sweet (a patent-violating chocolate chip cookie) to the savory (pulled pork under pressure).When you step into the kitchen, you’re unwittingly turned into a physicist and a chemist. This excellent and intriguing resource is for inquisitive people who want to increase their knowledge and ability to cook.• Discover what type of cook you are and learn how to think about flavor• Understand how protein denaturation, Maillard reactions, caramelization, and otherreactions impact the foods we cook• Gain firsthand insights from interviews with researchers, food scientists, knife experts, chefs, and writers—including science enthusiast Adam Savage, chef Jaques Pépin, and chemist Hervé This
Saunders Veterinary Anatomy Coloring Book
Baljit Singh - 2010
The coloring book helps you memorize the anatomy content you need to know in both veterinary medicine and veterinary technology and gives you a fun way to review the information you have studied. All illustrations in the book are suitable for coloring and are of the highest quality, created by expert medical illustrators.Organized by body region, the book is divided into sections devoted to the head and neck; neck, back, and vertebral column; thorax; abdomen; pelvis; forlimb; and hindlimb.Numbered lead lines clearly identify structures to be colored and correspond to a numbered list beneath the illustration so you can easily visualize the veterinary anatomy. Plus, you can create your own color code using the numbered boxes provided for each illustration.Comprehensive veterinary anatomy coverage helps you reinforce your understanding of canine, feline, equine, porcine, ruminants, and avian anatomy.High quality illustrations make it easy for you to color in each anatomic region and review anatomic details.Self-study format provides a fun and interactive way to prepare for exams throughout your veterinary courses.Part of Elsevier's complete veterinary anatomy learning system, integrating core anatomy knowledge, engaging review, hands-on practice, and clinical application to give you a solid foundation for success!