Book picks similar to
Cyber Smart: Five Habits to Protect Your Family, Money, and Identity from Cyber Criminals by Bart R. McDonough
cybersecurity
technology
cybersecurity-canon
digital
The New Rules of Marketing & PR: How to Use Social Media, Online Video, Mobile Applications, Blogs, News Releases, & Viral Marketing to Reach Buyers Directly
David Meerman Scott - 2007
It offers a step-by-step action plan for harnessing the power modern marketing and PR to communicate with buyers directly, raise visibility, and increase sales. It shows how large and small companies, nonprofits, and more can leverage Web-based content to get the right information to the right people at the right time for a fraction of the cost of big-budget campaigns.Including a wealth of compelling case studies and real-world examples of content marketing and inbound marketing success, this is a practical guide to the new reality of reaching buyers when they're ready.Includes updated information, examples, and case studies plus an examination of newly popular tools such as Infographics, photo-sharing using Pinterest and Instagram, as well as expanded information on social media such as YouTube, Twitter, Facebook, and LinkedInDavid Meerman Scott is a marketing strategist, bestselling author of eight books including three international bestsellers, advisor to emerging companies including HubSpot and Eloqua, and a professional speaker on topics including marketing, leadership, and social media. Prior to starting his own business, he was marketing VP for two U.S. publicly traded companies and was Asia marketing director for Knight-Ridder, at the time one of the world's largest information companies."The New Rules of Marketing & PR" offers the single resource for entrepreneurs, business owners, nonprofit managers as well as those working in marketing or publicity departments to build a marketing and PR strategy to grow any business.
How to Find Out Anything: From Extreme Google Searches to Scouring Government Documents, a Guide to Uncovering Anything about Everyone and Everything
Don MacLeod - 2012
From top CEO's salaries to police records, you'll learn little-known tricks for discovering the exact information you're looking for. You'll learn:-How to really tap the power of Google, and why Google is the best place to start a search, but never the best place to finish it. -The scoop on vast, yet little-known online resources that search engines cannot scour, such as refdesk.com, ipl.org, the University of Michigan Documents Center, and Project Gutenberg, among many others. -How to access free government resources (and put your tax dollars to good use). -How to find experts and other people with special knowledge. -How to dig up seemingly confidential information on people and businesses, from public and private companies to non-profits and international companies.Whether researching for a term paper or digging up dirt on an ex, the advice in this book arms you with the sleuthing skills to tackle any mystery.
The Garage Gym Athlete: The Practical Guide to Training like a Pro, Unleashing Fitness Freedom, and Living the Simple Life.
Jerred Moon - 2016
If you're not getting the best workout you can get... You're running the risk of being as far away from your ideal body as the Marianas Trench is from the surface of the Pacific Ocean. That's deep, buddy. Real deep. But here's something else to dive into, all puns aside: how many days are you going to let pass before you finally hit your fitness goals? Not those goals you see on TV. Not the goals your friends have. Your goals. The real ones that hit you at 3am and leave you staring at the ceiling in a wild mix of excitement and sheer panic. The ones that make you a little nervous to admit to anyone but your closest friends. Fitness is life. Moving faster, lifting more, and being better than pool-noodle flexible is the stuff that an optimal life is made out of if you ask me. And people have been asking me how to get the best body without necessarily putting your bank account on life support. That's when it hit me... Most People Are Hustling Backwards! Quick Test: if you want to know whether or not you're the President of the Backwards Fitness Hustlers Club, answer this: Why aren't you already working out on your terms? If your first thought was to pull an excuse out of that fine database you're calling a brain, I have bad news for you: you're not only hustling backwards, but you've voted yourself into the highest office in excuseland in the process! Become and Athlete Let's get down to business. This book is called Garage Gym Athlete: The Practical Guide to Training like a Pro, Unleashing Fitness Freedom, and Living the Simple Life, and it's exactly what it says on the tin. Instead of giving you DIY fantasies, I'm bringing DIY realities to the table. Want to save a bundle of money and still have a real reason to sell tickets to the gun show? This is your guide. Is orange your favorite color? If so, then you're in luck, because Home Depot is going to be in your future...quite often. I'm focused on turning average people into athletes, in both mind and body. That's the mission. That's the big plan. That's where my heart, soul, passion, and experience combine forces to help people go from zero to zealous, and from one to outrageously fit. When you pick up this book, you'll learn: - How to rearrange your budget and family objections so the ideal garage gym can come to life (this is way more effective than another game of Tetris, and much more fun - THE best way to build stability (without a crunch in sight!) - Exactly why you should thank the inventor of PVC (especially after you check out Chapter 13!) - A step by step guide to picking a quality barbell (hint: sporting goods get 3 things wrong, but I get you back on track quick) - A down in the trenches way to build a power rack (warning: for the bold and brazen, but you'll love it) There's plenty more coming your way in this guide. I made sure that if you check it out, you'll walk away with at least a handful of great tactics, tricks, and techniques to get the ultimate job done. Would You Like to Know More? At this point, you're at the usual buyer crossroads. Do I listen to the crazy guy, or click away? If you want to jump in headfirst to some great garage gym DIY, simply cross up and click the "Buy Now" button. That's it!
CompTIA A+ Certification All-In-One For Dummies
Glen E. Clarke - 2009
1,200 pages of up-to-date information correlates with both the hardware and operating system exams and serves as a reference after the test-taking is completed.The minibooks cover each domain of the exam: A+ Groundwork, Inside the Box, Outside the Box, Maintenance and Troubleshooting, Operating System Basics, Managing The Operating System, Recovering Systems, Networking, and Securing Systems. You'll find plenty of sample test questions to get you prepared, too.
CompTIA's A+ certification is vendor-neutral and validates the skills of entry-level computer technicians; it can be the ticket to a new or better job
Certification requires successful completion of two exams; this prep guide covers all the core competencies required
Nine minibooks cover A+ Groundwork, Inside the Box, Outside the Box, Maintenance and Troubleshooting, Operating System Basics, Managing The Operating System, Recovering Systems, Networking, and Securing Systems
Covers installation, configuration, diagnosing, preventive maintenance, and basic networking, with extra information about Vista and a heavier emphasis on hardware
Companion CD-ROM include the Dummies Test Engine, an exclusive, fully customizable test-prep software package that includes 400 exam review questions
CompTIA A+ Certification All-In-One For Dummies, 2nd Edition is the best study guide to have as you prepare for the A+ exams!Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
How to Speak Machine: Laws of Design for a Digital Age
John Maeda - 2019
Machines are already more powerful than we can comprehend, and getting more powerful at an exponential pace. Once set in motion, algorithms never tire. And when a program's size, speed and endlessness combine with its ability to learn and transform itself, the outcome can be unpredictable and dangerous. Take the seemingly instant transformation of Microsoft's chatbot into a hate-spewing racist, or how crime-predicting algorithms reinforce racial bias. How To Speak Machine provides a coherent framework for today's product designers, business leaders and policymakers to grasp this brave new world. Drawing on his wide-ranging experience from engineering to computer science to design, Maeda shows how businesses and individuals can identify opportunities afforded by technology to make world-changing and inclusive products while avoiding the pitfalls inherent to the medium.
Essential PHP Security
Chris Shiflett - 2005
It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.
CRACK99: The Takedown of a $100 Million Chinese Software Pirate
David Locke Hall - 2015
Navy intelligence officer, David Locke Hall was a federal prosecutor when a bizarre-sounding website, CRACK99, came to his attention. It looked like Craigslist on acid, but what it sold was anything but amateurish: thousands of high-tech software products used largely by the military, and for mere pennies on the dollar. Want to purchase satellite tracking software? No problem. Aerospace and aviation simulations? No problem. Communications systems designs? No problem. Software for Marine One, the presidential helicopter? No problem. With delivery times and customer service to rival the world’s most successful e-tailers, anybody, anywhere—including rogue regimes, terrorists, and countries forbidden from doing business with the United States—had access to these goods for any purpose whatsoever.But who was behind CRACK99, and where were they? The Justice Department discouraged potentially costly, risky cases like this, preferring the low-hanging fruit that scored points from politicians and the public. But Hall and his colleagues were determined to find the culprit. They bought CRACK99's products for delivery in the United States, buying more and more to appeal to the budding entrepreneur in the man they identified as Xiang Li. After winning his confidence, they lured him to Saipan—a U.S. commonwealth territory where Hall’s own father had stormed the beaches with the marines during World War II. There they set up an audacious sting that culminated in Xiang Li's capture and imprisonment. The value of the goods offered by CRACK99? A cool $100 million.An eye-opening look at cybercrime and its chilling consequences for national security, CRACK99 reads like a caper that resonates with every amazing detail.
Hacker's Delight
Henry S. Warren Jr. - 2002
Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.
Computer Security: Principles and Practice
William Stallings - 2007
This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.
Pro Git
Scott Chacon - 2009
It took the open source world by storm since its inception in 2005, and is used by small development shops and giants like Google, Red Hat, and IBM, and of course many open source projects.A book by Git experts to turn you into a Git expert. Introduces the world of distributed version control Shows how to build a Git development workflow.
Mastering Excel Macros: Introduction (Book 1)
Mark Moore - 2014
Everybody wants to learn them. You're not a programmer though. How is a non technical user going to learn how to program? You do want to use macros to make your work easier but are you really going to sit down with a huge programming textbook and work your way through every. single. boring. page? Like most people, you'll start with great enthusiasm and vigor but after a few chapters, the novelty wears off. It gets boring. I'm going to try and change that and make learning macro programming entertaining and accessible to non-techies. First of all, programming Excel macros is a huge topic. Let's eat the elephant one bite at a time. Instead of sitting down with a dry, heavy text, you will read very focused, to the point topics. You can then immediately use what you learned in the real world. This is the first lesson in the series. You will learn what macros are, how to access them, a tiny bit of programming theory (just so you have a clue as to what's going on) and how to record macros. As with all my other lessons, this one has a follow along workbook that you can use to work through the exercises. The images in the lessons are based on Excel 2013 for Windows.
The Senior Software Engineer
David B. Copeland - 2013
This book isn't about that - it's about everything else. As such, there's very little code inside, meaning everyone from PHP hackers to hardcore embedded C programmers will get a lot out of it.This book covers 10 topics crucial to being an amazing developer:Focus on Delivering ResultsFix Bugs Efficiently and CleanlyAdd Features with EaseDeal With Technical Debt and SlopPlay Well With OthersMake Technical DecisionsBootstrap a Greenfield SystemLearn to WriteInterview Potential Co-WorkersLead a Team
Success: 30 Interviews with Entrepreneurs & Executives
Jason Navallo - 2015
Learn to apply their proven insight and methods for success into your own life!
Darknet: A Beginner's Guide to Staying Anonymous
Lance Henderson - 2012
This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!
The New Kingmakers: How Developers Conquered the World
Stephen O’Grady - 2013
In a 1995 interview, the late Steve Jobs claimed that the secret to his and Apple’s success was talent. “We’ve gone to exceptional lengths to hire the best people,” he said, believing that the talented resource was twenty-five times more valuable than an average alternative. For Microsoft founder Bill Gates, the multiple was even higher:A great lathe operator commands several times the wage of an average lathe operator, but a great writer of software code is worth 10,000 times the price of an average software writer.While the actual number might be up for debate, the importance of technical talent is not. The most successful companies today are those that understand the strategic role that developers will play in their success or failure. Not just successful technology companies – virtually every company today needs a developer strategy. There’s a reason that ESPN and Sears have rolled out API programs, that companies are being bought not for their products but their people. The reason is that developers are the most valuable resource in business.How did we get here? How did developers become the most important constituency in business seemingly overnight? The New Kingmakers explores the rise of the developer class, its implications and provides suggestions for navigating the new developer-centric landscape.