Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Masters of Deception: The Gang That Ruled Cyberspace


Michelle Slatalla - 1995
    "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

The ARRL General Class License Manual


American Radio Relay League - 2010
    To upgrade to General Class, you must already hold a Technician Class license (or have recently passed the Technician license exam). Upgrading to a General license--which conveys extensive HF privileges—only requires passing a written examination. Once you do, the entire range of operating modes and the majority of the amateur spectrum below 30 MHz become available to you.Use this book to study for your General Class license exam. Every page presents information you will need to pass the exam and become an effective operator. You'll cover small sections at a time:Procedures and PracticesRules and RegulationsComponents and CircuitsRadio Signals and EquipmentDigital ModesAntennasPropagationElectrical and RF SafetyAt the end of the book, you'll find the entire General Question Pool.NEW FEATURE: Online Review and Practice Exams. As you complete each chapter of this book, use ARRL's online Exam Review for Ham Radio to help prepare you for exam day. This web-based service uses the question pool to construct chapter-by-chapter reviews. Once you've finished this book, use the online service to take practice exams with the same number and variety of questions that you'll encounter on exam day. You won't have any surprises on exam day!About ARRL: Founded in 1914 by Hiram Percy Maxim, ARRL (American Radio Relay League) is the national association for Amateur Radio in the US. Today, with more than 161,000 members, ARRL is the largest organization of radio amateurs in the world. ARRL's mission is based on five pillars: Public Service, Advocacy, Education, Technology, and Membership.

My Kindle Fire (My...)


Jim Cheshire - 2011
    With this book you will learn how to tap into every Kindle Fire feature, including many of the hidden ones not discussed in other books. From setting up your Kindle Page, managing your music, watching movies, and downloading content - this book covers everything. The task based full-color format allows you to quickly and easily find the exact task you want to accomplish and walks you through it in a delightfully concise and visual manner. My Kindle Fire makes it easy for you to:• Master all the basics, fast: reading, playing, watching, browsing, and more• Tweak your Kindle Fire for quicker access and longer battery life• Sample best-seller book chapters for free• Mark up any eBook with highlights, notes, and bookmarks• Convert your personal documents for use on Kindle Fire• Discover Calibre, a powerful eBook management tool• Control even the largest music libraries• Get instant answers from Wikipedia, and from Kindle Fire’s built-in dictionary• Listen to personalized Internet radio stations created just for you• Use your Kindle Fire as a digital photo frame• Prevent unwanted subscription charges• Set up any email account to work on your Kindle Fire• Explore any web content with Amazon’s innovative Silk browser• Use Amazon Cloud to get your stuff anywhere—even if you left your Kindle at home• And much much more…Unlike many other guides which might only briefly mention or skip over some very import Kindle Fire features My Kindle Fire covers everything. Here are just a few of the things you'll find in My Kindle Fire that aren't covered in other guides: • Full coverage of Calibre, a free application for Mac or PC that helps manage your eBook library• A large number of walkthroughs for managing music playlists, including how to use cloud playlists. • How to reinstall multiple apps at once in case you reset your Kindle Fire. • Step-by-step walkthroughs on configuring all types of email accounts. • Coverage on handling attachments in your email application. • Importing contacts from your existing email application or cloud service and how you can export your contacts in order to back them up. • How to use Copy and Paste on the Kindle Fire. • How to use social networking integration with Facebook and others. • Walkthroughs on using the Gallery app, Pandora, Audible, and other popular apps. • Shows you how to access files on other computers in your house right from your Kindle Fire.

Play Ukulele Today!: Level 1- A Complete Guide to the Basics-Tutor Music Book with Cd


Barrett Tagliarino - 2000
    Title: Play Ukulele Today! Level 1 Binding: Paperback Author: Tagliarino, Barrett Publisher: Hal Leonard Corporation

The Race For A New Game Machine: Creating the Chips Inside the XBox and the Playstation 3


David Shippy - 2009
    This is the inside story of the race to create a revolutionary chip to power the next generation consoles from Microsoft and Sony.

Dirty Electricity: Electrification and the Diseases of Civilization


Samuel Milham - 2010
    "Dirty Electricity" tells the story of Dr. Samuel Milham, the scientist who first alerted the world about the frightening link between occupational exposure to electromagnetic fields and human disease. Milham takes readers through his early years and education, following the twisting path that led to his discovery that most of the twentieth century diseases of civilization, including cancer, cardiovascular disease, diabetes, and suicide, are caused by electromagnetic field exposure.Dr. Milham warns that because of the recent proliferation of radio frequency radiation from cell phones and towers, terrestrial antennas, Wi-Fi and Wi-max systems, broadband internet over power lines, and personal electronic equipment, we may be facing a looming epidemic of morbidity and mortality. In "Dirty Electricity," he reveals the steps we must take, personally and as a society, to coexist with this marvelous but dangerous technology.

The Revolution Will be Digitised: Dispatches from the Information War


Heather Brooke - 2011
    Circling them is a new generation of hackers, pro-democracy campaigners and internet activists who no longer accept that the Establishment should run the show. Award-winning journalist and campaigner Heather Brooke takes us inside the Information War and explores the most urgent questions of the digital age: where is the balance between freedom and security? In an online world, does privacy still exist? And will the internet empower individuals, or usher in a new age of censorship, surveillance and oppression?

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

Hacking: Ultimate Hacking for Beginners, How to Hack (Hacking, How to Hack, Hacking for Dummies, Computer Hacking)


Andrew McKinnon - 2015
    It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Denial of Service or DoS Spoofing Techniques Mobile Hacking Hacking Tools Penetration Testing Passive Attacks If you are looking to venture into the world of hacking, this book will teach you all the information you need to know. When you download Hacking: Ultimate Hacking For Beginners - How to Hack, you'll discover how to acquire Many Powerful Hacking Tools. You'll also learn about Malware: A Hacker’s Henchman and Common Attacks And Viruses. You'll even learn about identity theft, how to protect yourself, and how hackers profit from this information! Read this book for FREE on Kindle Unlimited - Download NOW! Download Hacking: Ultimate Hacking For Beginners - How to Hack right away - This Amazing 4th Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, mobile hacking, and tips for ethical hacking. You'll even learn how to fight viruses and choose the right antivirus software for your system! Just scroll to the top of the page and select the Buy Button. Download Your Copy TODAY!

The Big Book of Maker Skills: Tools & Techniques for Building Great Tech Projects


Chris Hackett - 2014
    Step-by-step illustrations, helpful diagrams, and exceptional photography make this book an easy-to-follow and easy-on-the-eyes guide to getting your project done.With an emphasis on making DIY projects that can change the world, The Big Book of Maker Skills includes sections and tutorials on:Setting Up a HackerspacePicking the Right ToolsWelding SmartsCircuitry BasicsProgramming & ArduinosWorking with Wood3-D PrintingLaser-cuttingCNC RoutingTesting & PrototypingDrones and Space Exploration ToolsRoboticsBiotechnologySourcing and Crowdsourcing

A Shortcut Through Time: The Path to the Quantum Computer


George Johnson - 2003
    Such a device would operate under a different set of physical laws: The laws of quantum mechanics. Johnson gently leads the curious outsider through the surprisingly simple ideas needed to understand this dream, discussing the current state of the revolution, and ultimately assessing the awesome power these machines could have to change our world.

The Bicycle Wheel


Jobst Brandt - 1993
    This volume answers questions such as: Should I use low- or high-flanged hubs for touring * Should I spoke crossed-four or crossed-three? Are radially spoked wheels stiffer than crossed-four? * How can I build a 32-spoke crossed-two wheel? * Should I use butted or straight sookes? * Does tying and soldering give a rough ride?Based on years of experience, the author has divided the book into three parts. Part One, Theory, explains how wheels respond to loads. It discusses the merits of various designs and components, and explains what causes failures. Part Two, Practice, gives a step-by-step guide for building front and rear wheels and wheels with different patterns and numbers of spokes. Part Three, Data, contains test results and formulas for computing spoke lengths and other wheel dimensions.

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers


Kevin D. Mitnick - 2005
    In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Hacking For Dummies


Kevin Beaver - 2004
    In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!