File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Regular Expressions Cookbook


Jan Goyvaerts - 2009
    Every programmer can find uses for regular expressions, but their power doesn't come worry-free. Even seasoned users often suffer from poor performance, false positives, false negatives, or perplexing bugs. Regular Expressions Cookbook offers step-by-step instructions for some of the most common tasks involving this tool, with recipes for C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET.With this book, you will:Understand the basics of regular expressions through a concise tutorial Use regular expressions effectively in several programming and scripting languages Learn how to validate and format input Manage words, lines, special characters, and numerical values Find solutions for using regular expressions in URLs, paths, markup, and data exchange Learn the nuances of more advanced regex features Understand how regular expressions' APIs, syntax, and behavior differ from language to language Write better regular expressions for custom needs Whether you're a novice or an experienced user, Regular Expressions Cookbook will help deepen your knowledge of this unique and irreplaceable tool. You'll learn powerful new tricks, avoid language-specific gotchas, and save valuable time with this huge library of proven solutions to difficult, real-world problems.

I Refuse to Lead a Dying Church!


Paul Nixon - 2007
    For this very reason, Paul Nixon refused to lead a dying church. Paul invites you to join his commitment in refusing, ever again, to lead a dying church. This commitment entails six choices: choosing life over death; choosing community over isolation; choosing fun over drudgery; choosing bold over mild; choosing frontier over fortress; and choosing now rather than later.

Emergence: The Connected Lives of Ants, Brains, Cities, and Software


Steven Johnson - 2001
    Explaining why the whole is sometimes smarter than the sum of its parts, Johnson presents surprising examples of feedback, self-organization, and adaptive learning. How does a lively neighborhood evolve out of a disconnected group of shopkeepers, bartenders, and real estate developers? How does a media event take on a life of its own? How will new software programs create an intelligent World Wide Web? In the coming years, the power of self-organization -- coupled with the connective technology of the Internet -- will usher in a revolution every bit as significant as the introduction of electricity. Provocative and engaging, Emergence puts you on the front lines of this exciting upheaval in science and thought.

Linux Bible


Christopher Negus - 2005
    Whether you're new to Linux or need a reliable update and reference, this is an excellent resource. Veteran bestselling author Christopher Negus provides a complete tutorial packed with major updates, revisions, and hands-on exercises so that you can confidently start using Linux today. Offers a complete restructure, complete with exercises, to make the book a better learning tool Places a strong focus on the Linux command line tools and can be used with all distributions and versions of Linux Features in-depth coverage of the tools that a power user and a Linux administrator need to get startedThis practical learning tool is ideal for anyone eager to set up a new Linux desktop system at home or curious to learn how to manage Linux server systems at work.

PHP Cookbook


David Sklar - 2002
    With our Cookbook's unique format, you can learn how to build dynamic web applications that work on any web browser. This revised new edition makes it easy to find specific solutions for programming challenges.PHP Cookbook has a wealth of solutions for problems that you'll face regularly. With topics that range from beginner questions to advanced web programming techniques, this guide contains practical examples -- or "recipes" -- for anyone who uses this scripting language to generate dynamic web content. Updated for PHP 5, this book provides solutions that explain how to use the new language features in detail, including the vastly improved object-oriented capabilities and the new PDO data access extension. New sections on classes and objects are included, along with new material on processing XML, building web services with PHP, and working with SOAP/REST architectures. With each recipe, the authors include a discussion that explains the logic and concepts underlying the solution.

The Gridlock Economy: How Too Much Ownership Wrecks Markets, Stops Innovation, and Costs Lives


Michael A. Heller - 2008
    Why can’t we build them? 50 patent owners are blocking a major drug maker from creating a cancer cure. Why won’t they get out of the way? 90% of our broadcast spectrum sits idle while American cell phone service lags far behind Japan’s and Korea’s. Why are we wasting our airwaves? 98% of African American–owned farms have been sold off over the last century. Why can’t we stop the loss? All these problems are really the same problem—one whose solution would jump-start innovation, release trillions in productivity, and help revive our slumping economy.Every so often an idea comes along that transforms our understanding of how the world works. Michael Heller has discovered a market dynamic that no one knew existed. Usually, private ownership creates wealth, but too much ownership has the opposite effect—it creates gridlock. When too many people own pieces of one thing, whether a physical or intellectual resource, cooperation breaks down, wealth disappears, and everybody loses. Heller’s paradox is at the center of The Gridlock Economy. Today’s leading edge of innovation—in high tech, biomedicine, music, film, real estate—requires the assembly of separately owned resources. But gridlock is blocking economic growth all along the wealth creation frontier.A thousand scholars have applied and verified Heller’s paradox. Now he takes readers on a lively tour of gridlock battlegrounds. Heller zips from medieval robber barons to modern-day broadcast spectrum squatters; from Mississippi courts selling African-American family farms to troubling New York City land confiscations; and from Chesapeake Bay oyster pirates to today’s gene patent and music mash-up outlaws. Each tale offers insights into how to spot gridlock in operation and how we can overcome it.The Gridlock Economy is a startling, accessible biography of an idea. Nothing is inevitable about gridlock. It results from choices we make about how to control the resources we value most. We can unlock the grid; this book shows us where to start.

Becoming a Better Programmer


Pete Goodliffe - 2014
    Code Craft author Pete Goodliffe presents a collection of useful techniques and approaches to the art and craft of programming that will help boost your career and your well-being.Goodliffe presents sound advice that he's learned in 15 years of professional programming. The book's standalone chapters span the range of a software developer's life--dealing with code, learning the trade, and improving performance--with no language or industry bias. Whether you're a seasoned developer, a neophyte professional, or a hobbyist, you'll find valuable tips in five independent categories:Code-level techniques for crafting lines of code, testing, debugging, and coping with complexityPractices, approaches, and attitudes: keep it simple, collaborate well, reuse, and create malleable codeTactics for learning effectively, behaving ethically, finding challenges, and avoiding stagnationPractical ways to complete things: use the right tools, know what "done" looks like, and seek help from colleaguesHabits for working well with others, and pursuing development as a social activity

Scrolling Forward: Making Sense of Documents in the Digital Age


David M. Levy - 2001
    Like Henry Petroski's The Pencil, Scrolling Forward takes a common, everyday object, the document, and illuminates what it reveals about us--our work, our values, our relationships--both in the past and as we move into the digital age.

The Art of the Metaobject Protocol


Gregor Kiczales - 1991
    The authors, who developed the metaobject protocol andwho were among the group that developed CLOS, introduce this new approach toprogramming language design, describe its evolution and design principles, andpresent a formal specification of a metaobject protocol for CLOS.Kiczales, desRivi?res, and Bobrow show that the "art of metaobject protocol design" lies increating a synthetic combination of object-oriented and reflective techniques thatcan be applied under existing software engineering considerations to yield a newapproach to programming language design that meets a broad set of designcriteria.One of the major benefits of including the metaobject protocol inprogramming languages is that it allows users to adjust the language to better suittheir needs. Metaobject protocols also disprove the adage that adding moreflexibility to a programming language reduces its performance. In presenting theprinciples of metaobject protocols, the authors work with actual code for asimplified implementation of CLOS and its metaobject protocol, providing anopportunity for the reader to gain hands-on experience with the design process. Theyalso include a number of exercises that address important concerns and openissues.Gregor Kiczales and Jim des Rivi?res, are Members of the Research Staff, andDaniel Bobrow is a Research Fellow, in the System Sciences Laboratory at Xerox PaloAlto Research Center.

The Practice of Network Security Monitoring: Understanding Incident Detection and Response


Richard Bejtlich - 2013
    The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

A History of Modern Computing


Paul E. Ceruzzi - 1998
    The author concentrates on five key moments of transition: the transformation of the computer in the late 1940s from a specialized scientific instrument to a commercial product; the emergence of small systems in the late 1960s; the beginning of personal computing in the 1970s; the spread of networking after 1985; and, in a chapter written for this edition, the period 1995-2001.The new material focuses on the Microsoft antitrust suit, the rise and fall of the dot-coms, and the advent of open source software, particularly Linux. Within the chronological narrative, the book traces several overlapping threads: the evolution of the computer's internal design; the effect of economic trends and the Cold War; the long-term role of IBM as a player and as a target for upstart entrepreneurs; the growth of software from a hidden element to a major character in the story of computing; and the recurring issue of the place of information and computing in a democratic society.The focus is on the United States (though Europe and Japan enter the story at crucial points), on computing per se rather than on applications such as artificial intelligence, and on systems that were sold commercially and installed in quantities.

The Old New Thing: Practical Development Throughout the Evolution of Windows


Raymond Chen - 2006
    With this book, Raymond shares his knowledge, experience, and anecdotal stories, allowing all of us to get a better understanding of the operating system that affects millions of people every day. This book has something for everyone, is a casual read, and I highly recommend it!--Jeffrey Richter, Author/Consultant, Cofounder of WintellectVery interesting read. Raymond tells the inside story of why Windows is the way it is.--Eric Gunnerson, Program Manager, Microsoft CorporationAbsolutely essential reading for understanding the history of Windows, its intricacies and quirks, and why they came about.--Matt Pietrek, MSDN Magazine's Under the Hood ColumnistRaymond Chen has become something of a legend in the software industry, and in this book you'll discover why. From his high-level reminiscences on the design of the Windows Start button to his low-level discussions of GlobalAlloc that only your inner-geek could love, The Old New Thing is a captivating collection of anecdotes that will help you to truly appreciate the difficulty inherent in designing and writing quality software.--Stephen Toub, Technical Editor, MSDN MagazineWhy does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called hives?Many of Windows' quirks have perfectly logical explanations, rooted in history. Understand them, and you'll be more productive and a lot less frustrated. Raymond Chen--who's spent more than a decade on Microsoft's Windows development team--reveals the hidden Windows you need to know.Chen's engaging style, deep insight, and thoughtful humor have made him one of the world's premier technology bloggers. Here he brings together behind-the-scenes explanations, invaluable technical advice, and illuminating anecdotes that bring Windows to life--and help you make the most of it.A few of the things you'll find inside:What vending machines can teach you about effective user interfaces A deeper understanding of window and dialog management Why performance optimization can be so counterintuitive A peek at the underbelly of COM objects and the Visual C++ compiler Key details about backwards compatibility--what Windows does and why Windows program security holes most developers don't know about How to make your program a better Windows citizen

Castles: Their Construction and History


Sidney Toy - 1939
    Nearly 200 photos & drawings illustrate moats, keeps, baileys etc. Covers Caernarvon Castle, Dover Castle, Hadrian's Wall, the Tower of London etc. 199 black-&-white illustrations.PrefaceThe ancient fortresses of Babylon, Mesopotamia, Assyria, Asia Minor & GreeceFortifications of Greece & Rome, 300 to 200 BCFortifications of the Levant, Rome & Western Europe, 200 to 30 BCFortifications of the Roman Empire Byzantine fortifications from the 5th to the 10th centuryFortifications of Western Europe from the 5th to the 11th centuryRectangular keeps or donjonsByzantine & Saracen fortifications of the 12th centuryTransitional keeps of the 12th centuryFortifications & buildings of the bailey in the 11th & 12th centuriesCastles from about 1190 to 1270Siege engines & siege operations of the Middle AgesEdwardian & contemporary castlesTowns, fortified bridges & towersGatehouses & defences of the curtain during the 13th & 14th centuriesDevelopment of the tower-house16th-century fortsIndex

The Perricone Weight-Loss Diet: A Simple 3-Part Plan to Lose the Fat, the Wrinkles, and the Years


Nicholas Perricone - 2005
    Nicholas Perricone’s advice, care, and transformative eating plan–and all with the welcome yet unexpected benefit of losing excess weight along with the wrinkles! Building on this discovery, Dr. Perricone breaks new ground with his trademark anti-inflammatory program based on the foods, supplements, and lifestyle changes with the proven ability to accelerate fat loss by increasing metabolism and building and maintaining muscle mass.Consider this staggering fact: As we age, we can expect to gain ten pounds of fat and lose five pounds of muscle each decade. In three easy steps, Dr. Perricone shows how to fight this weight gain and rebuild muscle mass, and avoid the haggard, aging, and drawn appearance that results from other weight-loss programs.Inside The Perricone Weight-Loss Diet discover• the rejuvenating and slimming secrets of the anti-inflammatory diet• which foods, supplements, and lifestyle changes enable us to lose fat while maintaining muscle• how to control hormones such as insulin and cortisol to lose weight • how to maintain youthful, firm, and radiantly toned skin on the face and body during weight lossAs an added bonus, as you follow Dr. Perricone’s program you’ll sleep better, have more energy and less stress, and experience greater mental clarity without the food cravings. Lose the weight, the wrinkles, and the years!