Beyond the Twelve-Factor App Exploring the DNA of Highly Scalable, Resilient Cloud Applications


Kevin Hoffman - 2016
    Cloud computing is rapidly transitioning from a niche technology embraced by startups and tech-forward companies to the foundation upon which enterprise systems build their future. In order to compete in today’s marketplace, organizations large and small are embracing cloud architectures and practices.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World


Bruce Schneier - 2015
    Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.

Psychnotes: Clinical Pocket Guide


Darlene D. Pedersen - 2005
    The 4th Edition of this AJN Book-of-the-Year award winner has been thoroughly updated to deliver even more resources and tools, plus new DSM-5 content. "Psych Notes is packed with all of the essential content necessary to REVIEW (you should also have expanded knowledge of this content) and pass the ANCC PMHNP certification exam. You will be astonished with the depth and breadth of information contained in this easy to read and use (spiral bound) book. Be sure to access the online information that accompanies this book, too as it contains a grid comparing the changes from DSM-IV and DSM-5!" --Sandra Hannon-Engel, Ph.D., RN, CNS, PMHNP, Assistant Professor, William F. Connell School of Nursing, Boston College, Boston, MA. "It's a pretty good book for both nursing students and practicing RN's. No matter what specialty you're in you'll come across patients that are psychologically unstable and this book gives you a quick and easy reference to your needs. Everything is laid out in simple form and focuses on the most pertinent topics in psych." - Jim Astapan, Amazon.com "Very good source for fast references." - Ileana, Amazon.com "An amazingly complete collection of all that pertains to psych/mental health care. An easy to use resource and a wonderful review." - Camille Grosso, Ph.D., R.N.

Coin Collecting For Dummies


Neil S. Berman - 2001
    The allure of money is especially strong. Coins represent real value. The warmth of silver and the weight of gold are irresistible to some. Coins travel throughout the world and through time itself, representing and absorbing history as they pass from one person to the next. Oh the stories coins could tell if they only had voices.Coin-collecting is a relaxing and inexpensive (although it can be very expensive!) hobby. If you buy properly, coins can be an excellent place to park your money for a rainy day, and if you buy the right coins and the market improves, you may even be able to make a profit on your collection. In fact, n"umismatics" (the fancy term for coin collecting) offers more riches than you may realize. This rewarding hobby also opens the door to some serious life skills, such asHistoryGeographyObservational skillsOrganizational skillsAnalytical tools.This book is designed to appeal to collectors at every level, from beginner to advanced. This is not a hardcore coin book; rather, "Coin Collecting For Dummies" is a great general reference that points you in different directions for further investigation. Perhaps the most important goal of this book is to get you excited - and to keep you excited - about coin collecting. "Coin Collecting For Dummies" covers all these topics and more: Deciding what to collectStoring your collection correctlyFinding out about repaired, restored, and recolored coinsPricing world coinsFinding a good coin dealerBuying at auctionUnderstanding that condition equals valueExploring the wild side with rare, expensive, and esoteric coinsSelling your coinsNo one needs coins, but if you decide to collect them, you certainly need this book. Coin collecting can sometimes be a confusing maze of choices sprinkled with little traps along the way. Sure, you can go it alone, but why not make your journey into numismatics a lot easier by picking the brain of an expert collector and learning from the mistakes of others.

Etsy Empire: Proven Tactics for Your Etsy Business Success, Including Etsy SEO, Etsy Shop Building, Social Media for Etsy and Etsy Pricing Tips


Eric Michael - 2014
    Etsy Empire is the first book to provide instruction on all aspects of building a successful Etsy business selling crafts and vintage collectibles.Complete primers on internet selling often cost in excess of $50. After all, why would a successful Etsy shop owner give other competitors instructions on exactly how to build the most profitable shop in their own niches? They wouldn't, right?Well, I was a successful Etsy seller for years, but I moved on to providing help for aspiring online business owners, so I have no reservations about telling you exactly how to sell more items on Etsy and build an Etsy shop that will provide you consistent paychecks and grow over time. Etsy Empire offers a unique combination of the most important Etsy tips for building your business:1. Build your brand. This is the most important task for Etsy sellers.2. Determine demand for your potential business for free.3. Learn how to double or triple traffic to your shop and sales items with Etsy SEO and Google SEO4. Use Pinterest, Facebook and Twitter to sell more items and engage your shop's fans - Social Media for Etsy5. Learn how to sell crafts and vintage collectibles on Etsy6. Etsy tips for packaging and shipping7. Learn valuable tips for improving Etsy photography and how to make your item descriptions convert into sales8. Etsy 101 - learn how to start your business from scratch and build into a successful online business9. Learn how to network with other successful Etsy shop owners10. How to design a great Etsy shop - create a professional shop banner, shop name and avatar

Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age


Steven Levy - 2001
    From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.

Ubuntu: The Beginner's Guide


Jonathan Moeller - 2011
     In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.

Stealing the Network: How to Own an Identity


Raven Alder - 2005
    Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.

Introducing Windows 10 for IT Professionals


Ed Bott - 2015
    This guide introduces new features and capabilities, providing a practical, high-level overview for IT professionals ready to begin deployment planning now. This book is a preview, a work in progress about a work in progress. It offers a snapshot of the Windows 10 Technical Preview as of April 2015, on the eve of the BUILD Developers’ Conference in San Francisco.

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

CCNA Cisco Certified Network Associate Study Guide


Todd Lammle - 2000
    This book/CD-ROM package has now been updated to cover the latest version of the CCNA exam.

C Programming: Language: A Step by Step Beginner's Guide to Learn C Programming in 7 Days


Darrel L. Graham - 2016
    It is a great book, not just for beginning programmers, but also for computer users who would want to have an idea what is happening behind the scenes as they work with various computer programs. In this book, you are going to learn what the C programming language entails, how to write conditions, expressions, statements and even commands, for the language to perform its functions efficiently. You will learn too how to organize relevant expressions so that after compilation and execution, the computer returns useful results and not error messages. Additionally, this book details the data types that you need for the C language and how to present it as well. Simply put, this is a book for programmers, learners taking other computer courses, and other computer users who would like to be versed with the workings of the most popular computer language, C. In this book You'll learn: What Is The C Language? Setting Up Your Local Environment The C Structure and Data Type C Constants and Literals C Storage Classes Making Decisions In C The Role Of Loops In C Programming Functions in C Programming Structures and Union in C Bit Fields and Typedef Within C. C Header Files and Type Casting Benefits Of Using The C Language ...and much more!! Download your copy today! click the BUY button and download it right now!

Access 2007: The Missing Manual


Matthew MacDonald - 2006
    It runs on PCs rather than servers and is ideal for small- to mid-sized businesses and households. But Access is still intimidating to learn. It doesn't help that each new version crammed in yet another set of features; so many, in fact, that even the pros don't know where to find them all. Access 2007 breaks this pattern with some of the most dramatic changes users have seen since Office 95. Most obvious is the thoroughly redesigned user interface, with its tabbed toolbar (or "Ribbon") that makes features easy to locate and use. The features list also includes several long-awaited changes. One thing that hasn't improved is Microsoft's documentation. To learn the ins and outs of all the features in Access 2007, Microsoft merely offers online help.Access 2007: The Missing Manual was written from the ground up for this redesigned application. You will learn how to design complete databases, maintain them, search for valuable nuggets of information, and build attractive forms for quick-and-easy data entry. You'll even delve into the black art of Access programming (including macros and Visual Basic), and pick up valuable tricks and techniques to automate common tasks -- even if you've never touched a line of code before. You will also learn all about the new prebuilt databases you can customize to fit your needs, and how the new complex data feature will simplify your life. With plenty of downloadable examples, this objective and witty book will turn an Access neophyte into a true master.

The Tao of Network Security Monitoring: Beyond Intrusion Detection


Richard Bejtlich - 2004
    This book reducesthe investigative workload of computer security incident response teams(CSIRT) by posturing organizations for incident response success.Firewalls can fail. Intrusion-detection systems can be bypassed. Networkmonitors can be overloaded. These are the alarming but true facts aboutnetwork security. In fact, too often, security administrators' tools can serve asgateways into the very networks they are defending.Now, a novel approach to network monitoring seeks to overcome theselimitations by providing dynamic information about the vulnerability of allparts of a network. Called network security monitoring (NSM), it draws on acombination of auditing, vulnerability assessment, intrusion detection andprevention, and incident response for the most comprehensive approach tonetwork security yet. By focusing on case studies and the application of opensourcetools, the author helps readers gain hands-on knowledge of how tobetter defend networks and how to mitigate damage from security incidents.