JavaScript Bible
Danny Goodman - 1996
Part tutorial and part reference, the book serves as a learning tool for building new JavaScript skills and a detailed reference for seasoned JavaScript developers. Danny Goodman's exclusive interactive workbench, The Evaluator, makes it easy to master JavaScript and DOM concepts. Offers deployment strategies that best suit the user's content goals and target audience.Bonus CD-ROM is packed with advanced content for the reader who wants to go an extra step.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
High Performance Spark: Best Practices for Scaling and Optimizing Apache Spark
Holden Karau - 2017
But if you haven't seen the performance improvements you expected, or still don't feel confident enough to use Spark in production, this practical book is for you. Authors Holden Karau and Rachel Warren demonstrate performance optimizations to help your Spark queries run faster and handle larger data sizes, while using fewer resources.Ideal for software engineers, data engineers, developers, and system administrators working with large-scale data applications, this book describes techniques that can reduce data infrastructure costs and developer hours. Not only will you gain a more comprehensive understanding of Spark, you'll also learn how to make it sing.With this book, you'll explore:How Spark SQL's new interfaces improve performance over SQL's RDD data structureThe choice between data joins in Core Spark and Spark SQLTechniques for getting the most out of standard RDD transformationsHow to work around performance issues in Spark's key/value pair paradigmWriting high-performance Spark code without Scala or the JVMHow to test for functionality and performance when applying suggested improvementsUsing Spark MLlib and Spark ML machine learning librariesSpark's Streaming components and external community packages
Operational Amplifiers and Linear Integrated Circuits
Robert F. Coughlin - 1982
It provides many detailed, practical design and analysis examples intended to relate theory to the workplace. Chapter topics include first experiences with an op amp; inverting and noninverting amplifiers; comparators and controls; selected applications of op amps; signal generators; op amps with diodes; differential, instrumentation, and bridge amplifiers; DC performance: bias, offsets, and drift; AC performance: bandwidth, slew rate, noise; active filters; modulating, demodulating, and frequency changing with the multiplier; integrated-circuit timers; digital-to-analog converters; analog-to-digital converters; and power supplies. For design engineers rs
Defensive Security Handbook: Best Practices for Securing Infrastructure
Lee Brotherston - 2017
For companies obliged to improvise, this pragmatic guide provides a security-101 handbook with steps, tools, processes, and ideas to help you drive maximum-security improvement at little or no cost.Each chapter in this book provides step-by-step instructions for dealing with a specific issue, including breaches and disasters, compliance, network infrastructure and password management, vulnerability scanning, and penetration testing, among others. Network engineers, system administrators, and security professionals will learn tools and techniques to help improve security in sensible, manageable chunks.Learn fundamentals of starting or redesigning an InfoSec programCreate a base set of policies, standards, and proceduresPlan and design incident response, disaster recovery, compliance, and physical securityBolster Microsoft and Unix systems, network infrastructure, and password managementUse segmentation practices and designs to compartmentalize your networkExplore automated process and tools for vulnerability managementSecurely develop code to reduce exploitable errorsUnderstand basic penetration testing concepts through purple teamingDelve into IDS, IPS, SOC, logging, and monitoring
Dark Mirror: Edward Snowden and the American Surveillance State
Barton Gellman - 2020
Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio
You Don't Know JS: Up & Going
Kyle Simpson - 2015
With the "You Don’t Know JS" book series, you’ll get a more complete understanding of JavaScript, including trickier parts of the language that many experienced JavaScript programmers simply avoid.The series’ first book, Up & Going, provides the necessary background for those of you with limited programming experience. By learning the basic building blocks of programming, as well as JavaScript’s core mechanisms, you’ll be prepared to dive into the other, more in-depth books in the series—and be well on your way toward true JavaScript.With this book you will:
Learn the essential programming building blocks, including operators, types, variables, conditionals, loops, and functions
Become familiar with JavaScript's core mechanisms such as values, function closures, this, and prototypes
Get an overview of other books in the series—and learn why it’s important to understand all parts of JavaScript
Firing A Rocket : Stories of the Development of the Rocket Engines for the Saturn Launch Vehicles and the Lunar Module as Viewed from the Trenches (Kindle Single)
James R. French - 2017
But Neil Armstrong and Sally Ride would have never made history, and humankind would not have touched the stars, if not for the men and women on the ground who lit the fuse that launched the first rockets.Enthralled as a boy by the exploits of Flash Gordon and the novels of Robert Heinlein and Arthur C. Clarke—who put the science in science fiction—James French became one of the original unsung engineers of America’s groundbreaking space program. His fascinating memoir offers an up-close-and-technical look at building, testing, and perfecting the pioneering Saturn rockets and original lunar landing module, and he shares true tales, both humorous and harrowing, of life—and near death—on the front lines of scientific exploration.If you’ve ever said, “It’s not rocket science,” you’re right. It’s rocket engineering—and here’s your chance to marvel at how it changed the world and made it possible to explore all that lies beyond Earth. James R French graduated from MIT in 1958 with a degree of BSME Specializing in Propulsion. His first job was with Rocketdyne Division of North American Aviation where he worked on developmental testing of H-1 engines and combustion devices hardware for F-1 and J-2 engines used in Saturn 5. Mr. French has also worked at TRW Systems, where he was Lead Development Test Engineer on the Lunar Module Descent Engine, and Jet Propulsion Laboratory where he was Advanced Planetary studies Manager as well as Chief Engineer for the SP-100 Space Nuclear Power System and worked on Mariners 5, 6, 7, 8, and 9; Viking 1 & 2 and Voyager 1 & 2. . In 1986, he helped found American Rocket Co., a commercial launch company.Since 1987, Mr. French has been consultant to a variety of aerospace companies, SDIO, NASA, and USAF. He has participated in various startup companies in the private space flight arena and currently consults extensively to Blue Origin. Mr. French is co-author with Dr. Michael Griffin of the best-selling text Space Vehicle Design, published by AIAA. The second edition of the book has received the Summerfield Book Award for 2008. Mr. French is a Fellow of both AIAA and the British Interplanetary Society and a 50+ year member of AIAA. He has held several Technical Committee and other posts in AIAA. Cover design by Evan Twohy
The Passionate Programmer
Chad Fowler - 2009
In this book, you'll learn how to become an entrepreneur, driving your career in the direction of your choosing. You'll learn how to build your software development career step by step, following the same path that you would follow if you were building, marketing, and selling a product. After all, your skills themselves are a product. The choices you make about which technologies to focus on and which business domains to master have at least as much impact on your success as your technical knowledge itself--don't let those choices be accidental. We'll walk through all aspects of the decision-making process, so you can ensure that you're investing your time and energy in the right areas. You'll develop a structured plan for keeping your mind engaged and your skills fresh. You'll learn how to assess your skills in terms of where they fit on the value chain, driving you away from commodity skills and toward those that are in high demand. Through a mix of high-level, thought-provoking essays and tactical "Act on It" sections, you will come away with concrete plans you can put into action immediately. You'll also get a chance to read the perspectives of several highly successful members of our industry from a variety of career paths. As with any product or service, if nobody knows what you're selling, nobody will buy. We'll walk through the often-neglected world of marketing, and you'll create a plan to market yourself both inside your company and to the industry in general. Above all, you'll see how you can set the direction of your career, leading to a more fulfilling and remarkable professional life.
Good Math: A Geek's Guide to the Beauty of Numbers, Logic, and Computation
Mark C. Chu-Carroll - 2013
There is joy and beauty in mathematics, and in more than two dozen essays drawn from his popular “Good Math” blog, you’ll find concepts, proofs, and examples that are often surprising, counterintuitive, or just plain weird.Mark begins his journey with the basics of numbers, with an entertaining trip through the integers and the natural, rational, irrational, and transcendental numbers. The voyage continues with a look at some of the oddest numbers in mathematics, including zero, the golden ratio, imaginary numbers, Roman numerals, and Egyptian and continuing fractions. After a deep dive into modern logic, including an introduction to linear logic and the logic-savvy Prolog language, the trip concludes with a tour of modern set theory and the advances and paradoxes of modern mechanical computing.If your high school or college math courses left you grasping for the inner meaning behind the numbers, Mark’s book will both entertain and enlighten you.
Artificial Intelligence in Practice: How 50 Successful Companies Used AI and Machine Learning to Solve Problems
Bernard Marr - 2019
Presenting 50 case studies of actual situations, this book demonstrates practical applications to issues faced by businesses around the globe. The rapidly evolving field of artificial intelligence has expanded beyond research labs and computer science departments and made its way into the mainstream business environment. Artificial intelligence and machine learning are cited as the most important modern business trends to drive success. It is used in areas ranging from banking and finance to social media and marketing. This technology continues to provide innovative solutions to businesses of all sizes, sectors and industries. This engaging and topical book explores a wide range of cases illustrating how businesses use AI to boost performance, drive efficiency, analyse market preferences and many others. Best-selling author and renowned AI expert Bernard Marr reveals how machine learning technology is transforming the way companies conduct business. This detailed examination provides an overview of each company, describes the specific problem and explains how AI facilitates resolution. Each case study provides a comprehensive overview, including some technical details as well as key learning summaries: Understand how specific business problems are addressed by innovative machine learning methods Explore how current artificial intelligence applications improve performance and increase efficiency in various situations Expand your knowledge of recent AI advancements in technology Gain insight on the future of AI and its increasing role in business and industry Artificial Intelligence in Practice: How 50 Successful Companies Used Artificial Intelligence to Solve Problems is an insightful and informative exploration of the transformative power of technology in 21st century commerce.
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
Smashing CSS: Professional Techniques for Modern Layout
Eric A. Meyer - 2010
Very few in the industry can show you the ins and outs of CSS like Eric Meyer and inside Smashing CSS Eric provides techniques that are thorough, utterly useful, and universally applicable in the real world. From choosing the right tools, to CSS effects and CSS3 techniques with jQuery, Smashing CSS is the practical guide to building modern web layouts.With Smashing CSS you will learn how to:Throw elements offscreen/hide them Create body/HTML backgrounds in XHTML Usemore than 15 layout techniques including clearfix, two/three simple columns, faux columns, One True Layout, Holy Grail, em-based layout, fluid grids, sticky footers, and more Use a variety of CSS effects including CSS popups, boxpunching, rounded corners, CSS sprites, Sliding Doors, Liquid Bleach, ragged floats, and more Apply CSS table styling including using thead, tfoot, and tbody, row headers, column-oriented styling (classes); styling data tables with jQuery, tables to graphs, tables to maps; and more Use CSS3 elements including rounded corners, multiple backgrounds, RGBA, using jQuery to do CSS3 selections and so much more. Eric Meyer is an internationally recognized expert on the subjects of HTML, CSS, and Web standards, and has been working on the Web since 1993. Smashing CSS is for developers who already have some experience with CSS and JavaScript and are ready for more advanced techniques.Smashing Magazine (smashingmagazine.com) is one of the world's most popular web design sites. True to the Smashing mission, the Smashing Magazine book series delivers useful and innovative information to Web designers and developers.
Manufacturing Processes for Engineering Materials
Serope Kalpakjian - 2007
The book carefully presents the fundamentals of materials processing along with their relevant applications, so that the reader can clearly assess the capabilities, limitations, and potentials of manufacturing processes and their competitive aspects. Using real-world examples and well-wrought graphics, this book covers a multitude of topics, including the mechanical behavior of materials; the structure and manufacturing properties of metals; surfaces, dimensional characteristics, inspection, and quality assurance; metal-casting processes including heat treatment; bulk deformation processes; sheet-metal forming processes; material removal processes; polymers, reinforced plastics, rapid prototyping and rapid tooling; metal powders, ceramics, glasses, composites, and superconductors; joining and fastening processes; microelectronic and micromechanical devices; automation; computer-integrated systems; and product design. For manufacturing engineers, metallurgists, industrial designers, material handlers, product designers, and quality assurance managers.
How To Get To The Top Of Google in 2021: The Plain English Guide to SEO (Digital Marketing by Exposure Ninja)
Tim Cameron-Kitchen - 2020
Whether you’ve dabbled in Search Engine Optimisation (SEO) and been disappointed with the results, are a complete SEO newbie looking for a large slice of the ranking pie or you’re a seasoned professional looking to stay up to date with the best SEO practices, this book is for you. How would it feel to…
Understand how Google chooses which websites to rank?
Know exactly what keywords to target to attract people who are ready to buy what you sell?
Have your most profitable keywords hit the top spot?
Confidently be able to tweak your website and its structure (no technical know-how needed!) for fast gains?
Be able to write killer content that Google and your visitors love?
Build relationships with key publication players in your industry and have them begging for your content?
Have crafted a complete SEO strategy to laser-target your focus and get big results?
What kind of results can you achieve? One of our clients came to us in 2015 asking for help. His business was making $2k per month in sales, and he was contemplating closing shop. Today, that business turns over $3.4million per month, thanks to the strategies in this book.You’ll read about this business and others in the book. Every strategy is data-backed and battle-tested by the Exposure Ninja team, who grow real businesses like yours. What's inside? Section 1: The Foundations You’ll learn:
The four free ways to appear on the first page of Google
How to identify keywords that will drive hordes of hungry traffic to your website
The key to seeing ranking gains in just weeks
Why snooping on your competitors is crucial, and how to steal the good bits.
Section 2: Your Website Transform your website’s ranking by:
Structuring it to make it easy for Google AND visitors to use
Using content to 10x your traffic
Transforming your blog into a sales generator
Avoiding the SEO pitfalls that can do more harm to your website than good
Section 3: Promoting Your Website You’ll find out:
The exact process that took one business from 35 to 3,450 leads a month
How to get links from national newspaper websites
The easy way to pitch content sounding desperate
How to get links from social media
Section 4: Designing Your SEO Strategy SEO can be overwhelming. Replace panic with serene calm as you:
Put everything into a comprehensive strategy
Pick the key tasks to get results if you’re low on time
Learn which metrics to track and which to ignore
Implement three key practices that will ensure long-term improvement, whatever Google throws at you
"But how do I know all this is possible?" Tim Cameron-Kitchen started out as a professional drummer. After building and ranking a website for his next-door neighbour, he got bitten by the SEO bug. Hundreds of clients later and with a team of 100 at his agency Exposure Ninja, Tim's story shows that anyone, even if you don't have a background in SEO, can learn what it takes to rank their website on Google.