Book picks similar to
Linux for Beginners and Command Line Kung Fu by Jason Cannon
linux
computers
unread
collecting-dust
See
Jamie Magee - 2012
Charlie Myers is on a life altering path that will cause the dammed to humble in silence.One night…just a few friends, how could it go so wrong? That was the question seventeen year old Charlie Myers was asking when she found herself in the ER. Outwardly nothing was wrong with Charlie, she was a vision of perfect heath, internally she was battling a raging headache…one the doctor told her she would overcome shortly, but Charlie knew something else was wrong …very wrong.Part of her had been stolen…she was missing memories. Those memories were sacred. They held the key to her sanity. They told her that the sinister whispers, the shadows that came to life before her were not as ominous as she felt they were. They held the bond with her late father, a famed musician. They caused her to forget the one talent that allowed her to face the darkness that haunted her every waking hour. They also masked a much deeper bond, the face of the one that had stolen her heart, long before the age of seventeen.Sitting in the ER with her angry mother she couldn’t figure out what she was missing, or even how. Her thoughts told her that she needed to protect Britain, a friend of hers, but that didn’t make any sense – Britain didn’t need to be protected from anyone, he was strong, young, and absurdly wealthy. Charlie also knew that even though her friend Bianca called Charlie her best friend, she didn’t trust her …she was almost sure she despised her, but she couldn’t figure out why, or understand how random thoughts were telling her that she adored both Britain and Bianca – that they were her saviors – that they brought silence to the unstoppable whispers, but the silence scared Charlie. In her mind anyone or anything that could bring silence to something that dark could not be good.Charlie wanted to stay in NY, figure out what she was missing, why, and who was behind it all, but her mother had other plans. Against her will, Charlie was sent to Salem to live with her sister, within that small town Charlie found her memories and so much more.Her story begins now.Ibsn: 9781301864768Word count: 104k
Someone Else's Daughter
Linsey Lanier - 2011
Independent. Skeptical.Thirteen years ago her abusive husband stole her baby and gave it up for adoption.She comes to Atlanta to find her daughter.THE PIWade Parker.Ace detective.Wealthy owner of the Parker Investigative Agency.The most eligible forty-four-year-old bachelor in Atlanta.Still mourning the death of his socialite wife, he must solve a disturbing murder case.Before the killer strikes again.THE MURDERERA serial killer strangling young girls in a bizarre ritual.Why?She doesn't need a man.He needs to find a killer.Together, can they save a thirteen year old girl?
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
UNIX Power Tools
Jerry Peek - 1993
It also covers add-on utilities and how to take advantage of clever features in the most popular UNIX utilities.Loaded with even more practical advice about almost every aspect of UNIX, this edition addresses the technology that UNIX users face today, differing from the first edition in a number of important ways.First, it slants the blend of options and commands more toward the POSIX utilities, including the GNU versions; the bash and tcsh shells have greater coverage, but we've kept the first edition's emphasis on the core concepts of sh and csh that will help you use all UNIX shells; and, Perl is more important than awk these days, so we've de-emphasized awk in this edition.This is a browser's book...like a magazine that you don't read from start to finish, but leaf through repeatedly until you realize that you've read it all. The book is structured so that it bursts at the seams with cross references. Interesting "sidebars" explore syntax or point out other directions for exploration, including relevant technical details that might not be immediately apparent. You'll find articles abstracted from other O'Reilly books, new information that highlights program "tricks" and "gotchas," tips posted to the Net over the years, and other accumulated wisdom.The 53 chapters in this book discuss topics like file management, text editors, shell programming -- even office automation. Overall, there's plenty of material here to satisfy even the most voracious appetites. The bottom line? UNIX Power Tools is loaded with practical advice about almost every aspect of UNIX. It will help you think creatively about UNIX, and will help you get to the point where you can analyze your own problems. Your own solutions won't be far behind.The CD-ROM includes all of the scripts and aliases from the book, plus perl, GNU emacs, netpbm (graphics manipulation utilities), ispell,screen, the sc spreadsheet, and about 60 other freeware programs. In addition to the source code, all the software is precompiled for Sun4, Digital UNIX, IBM AIX, HP/UX, Red Hat Linux, Solaris, and SCO UNIX.
In the Beginning...Was the Command Line
Neal Stephenson - 1999
And considering that the "one man" is Neal Stephenson, "the hacker Hemingway" (Newsweek) -- acclaimed novelist, pragmatist, seer, nerd-friendly philosopher, and nationally bestselling author of groundbreaking literary works (Snow Crash, Cryptonomicon, etc., etc.) -- the word is well worth hearing. Mostly well-reasoned examination and partial rant, Stephenson's In the Beginning... was the Command Line is a thoughtful, irreverent, hilarious treatise on the cyber-culture past and present; on operating system tyrannies and downloaded popular revolutions; on the Internet, Disney World, Big Bangs, not to mention the meaning of life itself.
Dark Fae F.B.I. Complete Series: An Urban Fantasy Boxed Set
Alex Rivers - 2018
And one of them is a serial killer. I thought this would be a simple profiling case. Just another Jack-the-Ripper wannabe, prowling London’s streets, searching for easy kills. I was wrong. This killer is fae, and he’s as elusive as smoke on the wind. But I’m an FBI profiler, and it’s my job to track him down. It doesn’t matter that one of the main suspects--a lethally alluring fae--is trying to seduce me… or kill me, I’m not sure which. I won’t be stopped, not even when panic roils through the streets of London, or when the police start to suspect me. As I close in on the killer, I follow him to a magical shadow realm that’s like nothing I ever expected, where I’m hunted like prey. Fine. Bring it on. I’m an FBI Agent. And it turns out I have magical powers of my own. This boxed set contains all four books in the Dark Fae F.B.I series. They're urban fantasy with lots of magic, romance, and intrigue--not to mention mysterious London history.
Eve Lloyd's A Deadline Cozy Mystery
Sonia Parin - 2017
Paying her aunt, Mira Lloyd, a.k.a. Elizabeth Lloyd, renowned historical romance author, a long overdue visit, she plans on spending a month on Rock-Maine Island lounging around and plotting the launch of her new life. Her ex-husband, however, has other ideas. As for her aunt… she’s gone missing. And now there’s a dead body to contend with and a murder weapon with her fingerprints on it. A mantle of suspicion hangs over Eve and everyone she encounters has a reason to want her out of the way. Unwilling to leave matters in the hands of swoon worthy Detective Jack Bradford… only because it’s her civic duty to provide a new perspective, Eve Lloyd engages the assistance of her new friend and fellow suspect, Jill Saunders. They both stumble their way through a long list of possible motives and suspects in a race to find the killer before either one turns into the next victim. Snuffed Out Eve Lloyd, a death knell? Eve refuses to believe her choice of words had something to do with inviting a killer to the island, but just to be on the safe side, she agrees to avoid all use of any and all words related to killing. However, it might already be too late… Her run in with a local artist, Reginald Bryant Burns, has put her in an awkward position. Trying to make amends, Eve resorts to bribery, but that only makes matters worse and now…She’s a prime suspect in a murder investigation. The timing couldn’t be worse. She has a date with Detective Jack Bradford and the killer is threatening to ruin it for her. All Tied Up It’s no accident. Eve Lloyd is a magnet for trouble. On the brink of settling into an uneventful existence, Eve Lloyd turns her attention to a new venture. She’s going to open an inn and she thinks she’s found the perfect house. It should all be smooth sailing from there, but she’s developed a knack for landing right in the thick of it. This time, she stumbles on a body in the least likely place and her fingerprints are all over the handcuffs found on the murder victim. As the suspects list grows, and the dream of running an inn evaporates, she becomes a target of the killer’s rage.Despite trying to keep her nose out of other people’s business, it seems the only way she can get her life back on track is if she sets a trap for the killer. The Last Bite Eve Lloyd’s childhood nemesis, Charlotte McLain, is getting married. Nothing will induce Eve to attend. Nothing except… blackmail.From the start, everything about this wedding rings alarm bells for Eve. The location, the groom, the guests. The bride. But that’s nothing unusual. The odds of everything going right are stacked in the bride’s favor. There have already been several deaths on the island. Lighting surely wouldn’t strike again…When the groom suddenly dies, all fingers of blame are pointed directly at Eve. After all, she had opportunity and plenty of motives.She’s been framed and despite trying to keep her nose out of trouble, she’s now been dragged right back into the thick of it. The list of suspects is extensive, but she’s sure she can narrow it down to… at least a half dozen people. The Final Cut “…What sort of business person would I be if I start killing off my guests?” Eve Lloyd has settled into her new life in Rock-Maine Island and is about to open up an inn - a costly venture now that she has her heart set on getting an expensive custom made stove.
The Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win
Gene Kim - 2013
It's Tuesday morning and on his drive into the office, Bill gets a call from the CEO. The company's new IT initiative, code named Phoenix Project, is critical to the future of Parts Unlimited, but the project is massively over budget and very late. The CEO wants Bill to report directly to him and fix the mess in ninety days or else Bill's entire department will be outsourced. With the help of a prospective board member and his mysterious philosophy of The Three Ways, Bill starts to see that IT work has more in common with manufacturing plant work than he ever imagined. With the clock ticking, Bill must organize work flow streamline interdepartmental communications, and effectively serve the other business functions at Parts Unlimited. In a fast-paced and entertaining style, three luminaries of the DevOps movement deliver a story that anyone who works in IT will recognize. Readers will not only learn how to improve their own IT organizations, they'll never view IT the same way again.
CompTIA Network+ Study Guide: Exam N10-004
Todd Lammle - 2009
Using his one-of-a-kind conversational style, Todd gives you clear and concise information on crucial networking topics through practical examples and insights drawn from his real-world experience. This Study Guide thoroughly covers all exam objectives for the CompTIA Network+ exam (N10-004), including key topics such as network technologies, media and topologies, devices, management, tools, and security. Along with the book you get a CD-ROM featuring a custom test engine with chapter review questions, two practice exams, flashcards, and the book as a searchable PDF.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.For Instructors: Teaching supplements are available for this title.
The Death Fields: Books 1-3
Angel Lawson - 2017
Not only must survive the apocalypse but she's tasked with a job that will potentially save thousands of lives. Follow Alexandra's as she fights the living and dead wile carrying data for the cure. Can she survive the Death Fields and will she get to her family in time?
WPF 4 Unleashed
Adam Nathan - 2010
Windows Presentation Foundation (WPF) is the recommended technology for creating Windows user interfaces, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, multi-touch, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. WPF 4 Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by WPF guru and Microsoft developer Adam Nathan. Covers everything you need to know about Extensible Application Markup Language (XAML) Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more Highlights the latest features, such as multi-touch, text rendering improvements, XAML language enhancements, new controls, the Visual State Manager, easing functions, and much more Delves into topics that aren't covered by most books: 3D, speech, audio/video, documents, effects Shows how to create popular UI elements, such as Galleries, ScreenTips, and more Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes Explains how to create first-class custom controls for WPF Demonstrates how to create hybrid WPF software that leverages Windows Forms, DirectX, ActiveX, or other non-WPF technologies Explains how to exploit new Windows 7 features, such as Jump Lists and taskbar customizations
The Tenth Island: Finding Joy, Beauty, and Unexpected Love in the Azores
Diana Marcum - 2018
A long-buried personal sadness is enfolding her—and her career is stalled—when she stumbles upon an unusual group of immigrants living in rural California. She follows them on their annual return to the remote Azorean islands in the Atlantic Ocean, where bulls run down village streets, volcanoes are active, and the people celebrate festas to ease their saudade, a longing so deep that the Portuguese word for it can’t be fully translated.Years later, California is in a terrible drought, the wildfires seem to never end, and Diana finds herself still dreaming of those islands and the chuva—a rain so soft you don’t notice when it begins or ends.With her troublesome Labrador retriever, Murphy, in tow, Diana returns to the islands of her dreams only to discover that there are still things she longs for—and one of them may be a most unexpected love.
Python for Informatics: Exploring Information: Exploring Information
Charles Severance - 2002
You can think of Python as your tool to solve problems that are far beyond the capability of a spreadsheet. It is an easy-to-use and easy-to learn programming language that is freely available on Windows, Macintosh, and Linux computers. There are free downloadable copies of this book in various electronic formats and a self-paced free online course where you can explore the course materials. All the supporting materials for the book are available under open and remixable licenses. This book is designed to teach people to program even if they have no prior experience.
Wanted (Forest of Dean Wolves)
K.A. Jones - 2012
Her world was turned upside-down when her Father called her to a family meeting and announced that she was coming of age and that she is a shifter, and so are her family.Her coming of age has a whole different meaning to shifters. Kat discovers that she is giving off a scent that the males find attractive, and makes them want the ultimate goal. For her to have their babies, but there are risks.Should Kat choose to remain human? Or should she embrace her new life?