Wiring Simplified


H.P. Richter - 1978
    Homeowners learn how to understand codes and safety, select and connect wires, ground for safety, and install service equipment. Detailed drawings illustrate how to wire electrical devices, such as receptacles and different types of switches, with a focus on ensuring safe installations. Also discussed are special wiring projects such as modernizing old wiring and working with power-limited wiring.

Primitive Technology: A Survivalist's Guide to Building Tools, Shelters, and More in the Wild


John Plant - 2019
    John Plant, the man behind the channel, Primitive Technology, is a bonafide YouTube star. With almost 10 million subscribers and an average of 5 million views per video, John's channel is beloved by a wide-ranging fan base, from campers and preppers to hipster woodworkers and craftsmen. Now for the first time, fans will get a detailed, behind-the-scenes look into John's process. Featuring 50 projects with step-by-step instructions on how to make tools, weapons, shelters, pottery, clothing, and more, Primitive Technology is the ultimate guide to the craft. Each project is accompanied by illustrations as well as mini-sidebars with the history behind each item, plus helpful tips for building, material sourcing, and so forth. Whether you're a wilderness aficionado or just eager to spend more time outdoors, Primitive Technology has something for everyone's inner nature lover.

The Full Tilt Poker Strategy Guide: Tournament Edition


Michael CraigTed Forrest - 2007
    Their accomplishments are unparalleled, with countless World Series of Poker and World Poker Tour championships to their names and well in excess of $100 million in winnings in private games. Now, this group of poker legends has banded together to create The Full Tilt Poker Strategy Guide, which will stand as an instant classic of the genre and is sure to become the industry standard.

Linux Device Drivers


Jonathan Corbet - 2005
    And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic "Linux Device Drivers" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of "Linux Device Drivers" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.

Binocular Highlights


Gary Seronik - 2007
    Each object is plotted on a detailed, easy-to-use star map, and most of these sights can be found even in a light-polluted sky. Also included are four seasonal all-sky charts that help locate each highlight. You don't need fancy or expensive equipment to enjoy the wonders of the night sky. In fact, as even experienced star gazers know, to go beyond the naked-eye sky and delve deep into the universe, all you need are binoculars ? even the ones hanging unused in your closet. If you don't own any, Binocular Highlights explains what to look for when choosing binoculars for star gazing and provides observing tips for users of these portable and versatile mini-telescopes. Sprial-bound with readable paper spine, full color throughout.

Making Embedded Systems: Design Patterns for Great Software


Elecia White - 2011
    This easy-to-read guide helps you cultivate a host of good development practices, based on classic software design patterns and new patterns unique to embedded programming. Learn how to build system architecture for processors, not operating systems, and discover specific techniques for dealing with hardware difficulties and manufacturing requirements.Written by an expert who’s created embedded systems ranging from urban surveillance and DNA scanners to children’s toys, this book is ideal for intermediate and experienced programmers, no matter what platform you use.Optimize your system to reduce cost and increase performanceDevelop an architecture that makes your software robust in resource-constrained environmentsExplore sensors, motors, and other I/O devicesDo more with less: reduce RAM consumption, code space, processor cycles, and power consumptionLearn how to update embedded code directly in the processorDiscover how to implement complex mathematics on small processorsUnderstand what interviewers look for when you apply for an embedded systems job"Making Embedded Systems is the book for a C programmer who wants to enter the fun (and lucrative) world of embedded systems. It’s very well written—entertaining, even—and filled with clear illustrations." —Jack Ganssle, author and embedded system expert.

Metasploit: The Penetration Tester's Guide


David Kennedy - 2011
    But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier


Suelette Dreyfus - 1997
    Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

iPhone: The Missing Manual


David Pogue - 2007
    iPhone: The Missing Manual is a book as breathtaking as its subject. Teeming with high-quality color graphics, each custom designed page helps you accomplish specific tasks -- everything from Web browsing to watching videos. Written by New York Times columnist and Missing Manual series creator David Pogue, this book shows you how to get the most out of your new Apple iPhone.The name iPhone may be doing Apple a disservice. This machine is so packed with possibilities that the cellphone may actually be the least interesting part. The iPhone is at least three products merged into one: a phone, a wide-screen iPod and a wireless, touch-screen Internet communicator. The iPhone's beauty alone may be enough for you to dig for your credit cards, but its Mac OS X-based software makes it not so much a smartphone as something out of the film "Minority Report."The real magic, however, awaits when you browse the Web. You get to see the entire Web page on the iPhone's screen. All of this is cooked up with Apple's traditional secret sauce of simplicity, intelligence and whimsy.Written by New York Times columnist and Missing Manual series creator David Pogue, iPhone: The Missing Manual shows you everything they need to know to get the most out of your new Apple iPhone. Full of humor, tips, tricks, and surprises, this book teaches you how to extend iPhone's usefulness by exploiting its links to the Web as well as its connection to Macs or PCs; how to save money using Internet-based messages instead of phone calls; and how to fill the iPhone with TV shows and DVDs for free.

Google Hacks: Tips & Tools for Finding and Using the World's Information


Rael Dornfest - 2003
    But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach. And have a lot of fun while doing it:Search Google over IM with a Google Talk bot Build a customized Google Map and add it to your own web site Cover your searching tracks and take back your browsing privacy Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice Keep tabs on blogs in new, useful ways Turn Gmail into an external hard drive for Windows, Mac, or Linux Beef up your web pages with search, ads, news feeds, and more Program Google with the Google API and language of your choice For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!

Black Hat Python: Python Programming for Hackers and Pentesters


Justin Seitz - 2014
    But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."

Print Is Dead: Books in Our Digital Age


Jeff Gomez - 2007
    Through wars, radio, TV, computer games and fluctuating literacy rates, the book has, somewhat bizarrely, remained the more robust and culturally relevant way to communicate ideas. Now, for the first time since the Middle Ages, all that is about to change.

Analog Science Fiction and Fact, November 1985


Stanley SchmidtLarry Powell - 1985
    Gillett, Ph.D.• The Efficiency Expert by W. R. Thompson• Second Helpings by George R. R. Martin• Random Sample by Heidi Heyer• On Gaming by Dana Lombardy• Siblings by Larry Powell• Diabetes and Rockets by G. Harry Stine• Béisbol by Ben Bova• The Darkling Plain by P. M. Fergusson• Biolog: P. M. Fergusson by Jay Kay Klein• The Reference Library by Thomas A. Easton •   Review: Artifact by Gregory Benford by Thomas A. Easton •   Review: Cuckoo's Egg by C. J. Cherryh by Thomas A. Easton •   Review: Skinner by Richard S. McEnroe by Thomas A. Easton •   Review: Blood Music by Greg Bear by Thomas A. Easton •   Review: A Coming of Age by Timothy Zahn by Thomas A. Easton •   Review: Trumps of Doom by Roger Zelazny by Thomas A. Easton •   Review: The Fall of Winter by Jack C. Haldeman, II by Thomas A. Easton •   Review: The Time Travelers; A Science Fiction Quartet by Martin H. Greenberg and Robert Silverberg by Thomas A. Easton •   Review: The Hugo Winners, 1976-1979 by Isaac Asimov by Thomas A. Easton •   Review: Young Extraterrestrials by Isaac Asimov and Martin Greenberg and Charles Waugh by Thomas A. Easton •   Review: The Year's Best Science Fiction, Second Annual Collection by Gardner Dozois by Thomas A. Easton •   Review: The Future of Flight by Dean Ing and Leik Myrabo by Thomas A. Easton •   Review: Out of the Cradle: Exploring the Frontiers Beyond Earth by William K. Hartmann and Pamela Lee and Ron Miller by Thomas A. Easton • Brass Tacks by Stanley Schmidt• Analog: A Calendar of Upcoming Events by Anthony R. Lewis

Edison Inventing the Century


Neil Baldwin - 1995
    Using unprecedented access to Edison family papers and years of research at the Edison corporate archives, Neil Baldwin offers a revealing portrait of one of America's seminal inventors: a man whose imagination, dynamism, entrepreneurial brilliance epitomized the American dream as he became a victim of its darker side."Baldwin has demythologized the man and left the genius bigger than life." --Newsweek

Exploring Arduino: Tools and Techniques for Engineering Wizardry


Jeremy Blum - 2013
    Whether you're a budding hobbyist or an engineer, you'll benefit from the perfectly paced lessons that walk you through useful, artistic, and educational exercises that gradually get more advanced. In addition to specific projects, the book shares best practices in programming and design that you can apply to your own projects. Code snippets and schematics will serve as a useful reference for future projects even after you've mastered all the topics in the book.Includes a number of projects that utilize different capabilities of the Arduino, while interfacing with external hardware Features chapters that build upon each other, tying in concepts from previous chapters to illustrate new ones Includes aspects that are accompanied by video tutorials and other multimedia content Covers electrical engineering and programming concepts, interfacing with the world through analog and digital sensors, communicating with a computer and other devices, and internet connectivity Explains how to combine smaller topics into more complex projects Shares downloadable materials and source code for everything covered in the book Projects compatible with many official Arduino boards including Arduino Uno; Arduino Leonardo; Arduino Mega 2560; Arduino Due; Arduino Nano; Arduino Mega ADK; LilyPad Arduino and may work with Arduino-compatible boards such as Freeduino and new third party certified boards such as the Intel Galileo Exploring Arduino takes you on an adventure and provides you with exclusive access to materials not found anywhere else!