Book picks similar to
Learn Computer Forensics: A beginner's guide to searching, analyzing, and securing digital evidence by William Oettinger
computer
cyber-security
have-not-read
informatica
Getting Started with SQL: A Hands-On Approach for Beginners
Thomas Nield - 2016
If you're a business or IT professional, this short hands-on guide teaches you how to pull and transform data with SQL in significant ways. You will quickly master the fundamentals of SQL and learn how to create your own databases.Author Thomas Nield provides exercises throughout the book to help you practice your newfound SQL skills at home, without having to use a database server environment. Not only will you learn how to use key SQL statements to find and manipulate your data, but you'll also discover how to efficiently design and manage databases to meet your needs.You'll also learn how to:Explore relational databases, including lightweight and centralized modelsUse SQLite and SQLiteStudio to create lightweight databases in minutesQuery and transform data in meaningful ways by using SELECT, WHERE, GROUP BY, and ORDER BYJoin tables to get a more complete view of your business dataBuild your own tables and centralized databases by using normalized design principlesManage data by learning how to INSERT, DELETE, and UPDATE records
Beyond Software Architecture: Creating and Sustaining Winning Solutions
Luke Hohmann - 2003
There are currently a significant number of books on creating, documenting, and implementing software architecture, but precious few resources have addressed how to build a software architecture that aligns with a customer's overall business goals. In this new book, Luke Hohmann borrows from his extensive experience managing successful enterprise software projects to provide practical wisdom on creating and sustaining winning software solutions. This book helps technologists grasp the business ramifications of their decisions, and provides business-oriented software professionals (e.g. sales people and marketers) with better knowledge of how robust software can be built and maintained.
Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)
Marianne Bellotti - 2021
Aging computer systems present complex technical challenges for organizations both large and small, and Kill It with Fire provides sound strategies for spearheading modernization efforts.Kill It with Fire examines aging computer systems, the evolution of technology over time, and how organizations can modernize, maintain, and future-proof their current systems.In playful and engaging prose, Marianne Bellotti uses real-world case studies to illustrate the technical challenges of modernizing complex legacy systems, as well as the organizational challenges of time-intensive maintenance efforts. The book explains how to evaluate existing architecture, create upgrade plans, and handle communication structures. Team exercises and historical analyses of complex computer systems make this a valuable resource for those in both older and newer companies, and will help readers restore or create systems built to evolve as time goes on.
HTML and CSS: Design and Build Websites
Jon Duckett - 2011
Joining the professional web designers and programmers are new audiences who need to know a little bit of code at work (update a content management system or e-commerce store) and those who want to make their personal blogs more attractive. Many books teaching HTML and CSS are dry and only written for those who want to become programmers, which is why this book takes an entirely new approach. • Introduces HTML and CSS in a way that makes them accessible to everyone—hobbyists, students, and professionals—and it’s full-color throughout • Utilizes information graphics and lifestyle photography to explain the topics in a simple way that is engaging • Boasts a unique structure that allows you to progress through the chapters from beginning to end or just dip into topics of particular interest at your leisureThis educational book is one that you will enjoy picking up, reading, then referring back to. It will make you wish other technical topics were presented in such a simple, attractive and engaging way!
The Elements of Computing Systems: Building a Modern Computer from First Principles
Noam Nisan - 2005
The books also provides a companion web site that provides the toold and materials necessary to build the hardware and software.
Mastering Blockchain: Distributed Ledgers, Decentralization and Smart Contracts Explained
Imran Bashir - 2017
Get to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsExplore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide
The Happy Lawyer: Making a Good Life in the Law
Nancy Levit - 2010
You're happy, right? Not really. Oh, it beats laying asphalt, but after all your hard work, you expected more from your job. What gives?The Happy Lawyer examines the causes of dissatisfaction among lawyers, and then charts possible paths to happier and more fulfilling careers in law. Eschewing a one-size-fits-all approach, it shows how maximizing our chances for achieving happiness depends on understanding our own personality types, values, strengths, and interests.Covering everything from brain chemistry and the science of happiness to the workings of the modern law firm, Nancy Levit and Doug Linder provide invaluable insights for both aspiring and working lawyers. For law students, they offer surprising suggestions for selecting a law school that maximizes your long-term happiness prospects. For those about to embark on a legal career, they tell you what happiness research says about which potential jobs hold the most promise. For working lawyers, they offer a handy toolbox--a set of easily understandable steps--that can boost career happiness. Finally, for firm managers, they offer a range of approaches for remaking a firm into a more satisfying workplace.Read this book and you will know whether you are more likely to be a happy lawyer at age 30 or age 60, why you can tell a lot about a firm from looking at its walls and windows, whether a 10 percent raise or a new office with a view does more for your happiness, and whether the happiness prospects are better in large or small firms.No book can guarantee a happier career, but for lawyers of all ages and stripes, The Happy Lawyer may give you your best shot.
Why You Need to Start Network Marketing: How to Remove Risk and Have a Better Life
Keith Schreiter - 2016
Discover the real reason why people around the world are adding network marketing to their lives. In this book you will learn: * Why network marketing is a natural thing for us to do. * How to present network marketing so that prospects "get it." * The real power behind our business. * Why jobs are nice, but risky ... and what we can do about it. * How to take a different view of the big picture. * Chances of failure and the absence of guarantees. * Understanding wealth ... and being broke. * The easiest way to spread your message. Short, compact, and to the point. A fast read, and a faster life-changer. Here is your chance to see what others see. Scroll up and get your copy now!
Pass CCRN! [With CDROM]
Robin Donohoe Dennison - 1996
This book contains a review of critical care nursing and practice questions and answers designed to prepare nurses to earn AACN certification (or renew AACN certification) by passing the required exam. Utilizing an outline format and the revised blueprint for the certification examination, it's the easy to follow, comprehensive and portable, quick-study tool that nurses can take anywhere.
The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online
Mary Aiken - 2016
Levitt, co-author of Freakonomics - One of the best books of the year--NatureMary Aiken, the world's leading expert in forensic cyberpsychology, offers a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, privacy, and our perception of the world. Drawing on her own research and extensive experience with law enforcement, Aiken covers a wide range of subjects, from the impact of screens on the developing child to the explosion of teen sexting and the acceleration of compulsive and addictive behaviors online. Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.Praise for The Cyber Effect"How to guide kids in a hyperconnected world is one of the biggest challenges for today's parents. Mary Aiken clearly and calmly separates reality from myth. She clearly lays out the issues we really need to be concerned about and calmly instructs us on how to keep our kids safe and healthy in their digital lives."--Peggy Orenstein, author of the New York Times bestseller Girls & Sex"[A] fresh voice and a uniquely compelling perspective that draws from the murky, fascinating depths of her criminal case file and her insight as a cyber-psychologist . . . This is Aiken's cyber cri de coeur as a forensic scientist, and she wants everyone on the case."--The Washington Post"Fascinating . . . If you have children, stop what you are doing and pick up a copy of The Cyber Effect."--The Times (UK)"An incisive tour of sociotechnology and its discontents."--Nature"Just as Rachel Carson launched the modern environmental movement with her Silent Spring, Mary Aiken delivers a deeply disturbing, utterly penetrating, and urgently timed investigation into the perils of the largest unregulated social experiment of our time."--Bob Woodward"Mary Aiken takes us on a fascinating, thought-provoking, and at times scary journey down the rabbit hole to witness how the Internet is changing the human psyche. A must-read for anyone who wants to understand the temptations and tragedies of cyberspace."--John R. Suler, PhD, author of The Psychology of Cyberspace"Drawing on a fascinating and mind-boggling range of research and knowledge, Mary Aiken has written a great, important book that terrifies then consoles by pointing a way forward so that our experience online might not outstrip our common sense."--Steven D. Levitt"Having worked with law enforcement groups from INTERPOL and Europol as well as the U.S. government, Aiken knows firsthand how today's digital tools can be exploited by criminals lurking in the Internet's Dark Net."--Newsweek
False Justice: Eight Myths that Convict the Innocent
Jim Petro - 2011
Now newly published in paperback with an extensive list of web links to wrongful conviction sources internationally, "False Justice "is ideal for use in a wide array of criminal justice and criminology courses.Myth 1: Everyone in prison claims innocence. In fact, guilt is usually clear and undisputed either because the criminal was caught in the act, left substantial evidence, or made the decision to take a plea. While taking a plea does not assure guilt, often a combination of the above reveals the soundness of the defendant s decision to plead rather than go to trial. Lauren McGarity, a mediator, conflict resolution expert, and educator who has worked with hundreds of Ohio inmates for ten years, dispelled this myth for us in "False Justice."Myth 2: Our system almost never convicts an innocent person. We mined and share the research and opinion of both conservatives and liberals, and we have concluded that the 311 persons exonerated of serious felonies to date, December 12, 2013, by DNA technology (which was first employed in criminal forensics in the U.S. in the late 1980s) must be the tip of the iceberg, a phrase commonly mentioned in our research. Following the Elkins experience, Nancy and I suspected a substantial number of innocent people in our prisons, but our research required that we frequently revise our thinking upward. Estimates have ranged from, conservatively, about one thousand to as many as tens of thousands of innocent people in American prisons today. We believe and research and logic suggest that our system convicts innocent persons far more frequently than most imagine and that most Americans, if more fully informed, would consider this a national travesty.Myth 3: Only the guilty confess. Stephen Boorn confessed to a murder in Manchester, Vermont, even though there was no trace of evidence, including a body. Boorn is not alone. "False Justice" explores what prompted Christopher Ochoa and others falsely accused of murder to incriminate themselves. We explore why the Miranda warning failed in these cases to provide intended protections.Myth 4: Wrongful conviction is the result of innocent human error. As chief legal officer of Ohio, I supervised a staff of 1,250, including 350 lawyers, who managed more than 35,000 active legal cases at a time. Yet I was totally unaware of the extent of wrongful criminal conviction, and was disappointed to learn that misconduct by police and prosecutors has contributed to many wrong verdicts. In the first edition of "False Justice" we noted that official misconduct was identified early as a contributor in DNA-proven wrongful convictions. Prosecutorial misconduct was a factor in thirty-three of the first seventy-four DNA exonerations (44.6 percent) and police misconduct was present in thirty-seven, or exactly half of those cases.3 Subsequent exonerations have supported the finding that official misconduct is a significant contributor to wrongful conviction. The National Registry of Exonerations reports at this writing (Dec. 14, 2013) 564 known cases of official misconduct both police and prosecutor and in some cases both in its universe of 1,262 exonerations, or in 44.6 percent of known exonerations since 1989.4 This book challenges thinking on what tactics should and should not be dismissed as "human error."Myth 5: An eyewitness is the best testimony. Mistaken eyewitness testimony, a contributor in 75 percent of wrongful convictions, was the prevailing contributor to wrongful conviction in the cases of Elkins, Green, Gillispie, and others included in the book. "False Justice" shares highlights of what we now know about memory and how this has shaped legislative and procedural reforms that will enable more accurate capture of eyewitness testimony.Myth 6: Conviction errors get corrected on appeal. The long, difficult, and expensive struggle to reverse a conviction is demonstrated in the Boorn, Elkins, Green, and Gillispie cases. Our appeals process addresses only certain errors that may have occurred in preparation of the case or in the courtroom. Post-conviction relief is difficult to attain in a system that properly seeks finality in the criminal process. The other route to correcting a conviction error is through new evidence, which, as indicated in Elkins and Gillispie, must meet specific requirements that are very difficult to achieve.Myth 7: It dishonors the victim to question a conviction. "False Justice" reveals that, contrary to a popular opinion, only a minority of convicted persons claim innocence and represent cases that are worthy of post-conviction DNA analysis. Prosecutors who oppose access to post-conviction DNA evidence, which could conclusively prove guilt or innocence, frequently claim that this would dishonor the victim. Public safety requires that we abandon this myth, or understand that by allowing the real perpetrators to escape justice, we contribute to an increase in crime and victims. How does "that" honor victims?Myth 8: If the justice system has problems, the pros will fix them. While most men and women who work in the criminal justice system are well meaning, committed, and deserving of our respect, they typically do not have the authority, resources, perspective, time, or inclination to change the system. "False Justice" recommends reforms achieved through legislation, policy, and court opinion. However, these will not occur with any urgency until conventional wisdom catches up with the truths revealed in this DNA age. Therefore, it will take us everyday American citizens not the pros, to accelerate this process. By abandoning myths and advocating reforms, we will not only reduce the destruction that comes with wrongful conviction but will also make the United States safer."
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Pro Git
Scott Chacon - 2009
It took the open source world by storm since its inception in 2005, and is used by small development shops and giants like Google, Red Hat, and IBM, and of course many open source projects.A book by Git experts to turn you into a Git expert. Introduces the world of distributed version control Shows how to build a Git development workflow.
Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet
Joseph Menn - 2010
His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought—and why the Internet might not survive.