The Chick Bowdrie Short Stories Bundle


Louis L'Amour - 2015
    This outlaw turned Texas Ranger was one of the favorite protagonists of master storyteller Louis L’Amour, appearing in a total of nineteen short stories bursting with unforgettable heroics and harrowing action. They’re all here in this eBook bundle, together forming an epic portrait of a man standing at the crossroads between good and evil:   McNelly Knows a Ranger • A Job for a Ranger • Bowdrie Rides a Coyote Trail • A Trail to the West • The Outlaws of Poplar Creek • Bowdrie Follows a Cold Trail • More Brains Than Bullets • The Road to Casa Piedras • Bowdrie Passes Through • Where Buzzards Fly • South of Deadwood • Too Tough to Brand • Case Closed—No Prisoners • The Killer from the Pecos • A Ranger Rides to Town • Rain on the Mountain Fork • Down Sonora Way • Strange Pursuit • Strawhouse Trail   The name is Bowdrie. It was a name that caused the most hardened gunmen to break out in a cold sweat. Chick Bowdrie. He could have ridden the outlaw trail, but the Texas Rangers recruited him because they didn’t want to have to fight against him. Pursuing the most wanted men in the Southwest, he knew all too well the dusty trails, the bitter cattle feuds, the desperate killers, and the quiet, weather-beaten, wind-blasted towns that could explode into action with the wrong word. He had sworn to carry out the law, but there were times when he had to apply justice with his fists and his guns. They called in the Rangers to handle the tough ones, and there was never a Ranger tougher or smarter than Bowdrie.

Operating System Concepts Essentials


Abraham Silberschatz - 2010
    This book covers the core concepts of operating systems without any unnecessary jargon or text. The authors put you on your way to mastering the fundamental concepts of operating systems while you also prepare for today's emerging developments.Covers the core concepts of operating systems Bypasses unnecessary and wordy text or jargon Encourages you to take your operating system knowledge to the next level Prepares you for today's emerging developments in the field of operating systems Operating Systems Concepts Essentials is a soup-to-nuts guide for all things involving operating systems!

Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell


Phil Lapsley - 2013
    Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T's monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell's Achilles' heel. Phil Lapsley expertly weaves together the clandestine underground of "phone phreaks" who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI.The product of extensive original research, Exploding the Phone is a ground-breaking, captivating book.

Fatal System Error: The Hunt for the New Crime Lords Who are Bringing Down the Internet


Joseph Menn - 2010
    His guides are California surfer and computer whiz Barrett Lyon and a fearless British high-tech agent. Through these heroes, Menn shows the evolution of cyber-crime from small-time thieving to sophisticated, organized gangs, who began by attacking corporate websites but increasingly steal financial data from consumers and defense secrets from governments. Using unprecedented access to Mob businesses and Russian officials, the book reveals how top criminals earned protection from the Russian government.Fatal System Error penetrates both the Russian cyber-mob and La Cosa Nostra as the two fight over the Internet's massive spoils. The cloak-and-dagger adventure shows why cyber-crime is much worse than you thought—and why the Internet might not survive.

Encyclopedia of Electronic Components Volume 1: Resistors, Capacitors, Inductors, Switches, Encoders, Relays, Transistors


Charles Platt - 2012
    You’ll learn what each one does, how it works, why it’s useful, and what variants exist. No matter how much you know about electronics, you’ll find fascinating details you’ve never come across before.Convenient, concise, well-organized, and precisePerfect for teachers, hobbyists, engineers, and students of all ages, this reference puts reliable, fact-checked information right at your fingertips—whether you’re refreshing your memory or exploring a component for the first time. Beginners will quickly grasp important concepts, and more experienced users will find the specific details their projects require.Unique: the first and only encyclopedia set on electronic components, distilled into three separate volumesIncredibly detailed: includes information distilled from hundreds of sourcesEasy to browse: parts are clearly organized by component typeAuthoritative: fact-checked by expert advisors to ensure that the information is both current and accurateReliable: a more consistent source of information than online sources, product datasheets, and manufacturer’s tutorialsInstructive: each component description provides details about substitutions, common problems, and workaroundsComprehensive: Volume 1 covers power, electromagnetism, and discrete semi-conductors; Volume 2 includes integrated circuits, and light and sound sources; Volume 3 covers a range of sensing devices.

Git Pocket Guide


Richard E. Silverman - 2013
    It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks

The Best of 2600: A Hacker Odyssey


Emmanuel Goldstein - 2008
    Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

The Linux Command Line Beginner's Guide


Jonathan Moeller - 2012
    ABOUT THE AUTHORStanding over six feet tall, Jonathan Moeller has the piercing blue eyes of a Conan of Cimmeria, the bronze-colored hair a Visigothic warrior-king, and the stern visage of a captain of men, none of which are useful in his career as a computer repairman, alas.He has written the "Demonsouled" trilogy of sword-and-sorcery novels, and continues to write the "Ghosts" sequence about assassin and spy Caina Amalas, the "Computer Beginner's Guide" series of computer books, and numerous other works.

Learn Windows PowerShell 3 in a Month of Lunches


Don Jones - 2011
    Just set aside one hour a day—lunchtime would be perfect—for a month, and you'll be automating Windows tasks faster than you ever thought possible. You'll start with the basics—what is PowerShell and what can you do with it. Then, you'll move systematically through the techniques and features you'll use to make your job easier and your day shorter. This totally revised second edition covers new PowerShell 3 features designed for Windows 8 and Windows Server 2012.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideLearn PowerShell from the beginning—no experience required! Covers PowerShell 3, Windows 8, and Windows Server 2012 Each lesson should take you one hour or lessAbout the TechnologyPowerShell is both a language and an administrative shell with which you can control and automate nearly every aspect of Windows. It accepts and executes commands immediately, and you can write scripts to manage most Windows servers like Exchange, IIS, and SharePoint.Experience with Windows administration is helpful. No programming experience is assumed.Table of ContentsBefore you begin Meet PowerShell Using the help system Running commands Working with providers The pipeline: connecting commands Adding commands Objects: data by another name The pipeline, deeper Formatting—and why it's done on the right Filtering and comparisons A practical interlude Remote control: one to one, and one to many Using Windows Management Instrumentation Multitasking with background jobs Working with many objects, one at a time Security alert! Variables: a place to store your stuff Input and output Sessions: remote control with less work You call this scripting? Improving your parameterized script Advanced remoting configuration Using regular expressions to parse text files Additional random tips, tricks, and techniques Using someone else's script Never the end PowerShell cheat sheet

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Kindle Fire For Dummies


Nancy C. Muir - 2011
    It walks you through all the tablet's features, shows you how to set up the device, navigate the touchscreen interface, buy music, stream video, download apps, and read e-books from Amazon.com. The book demystifies this all-new tablet and provides a handy reference that can be conveniently downloaded and read right on your Kindle Fire device.Looks at the new Kindle Fire, which features revolutionary technology and access to cool new services; this e-book explains both in plain English Is only available in e-book format and downloads directly to the Kindle Fire and other Kindle devices, making it a handy reference you can take virtually anywhere Covers not only the basics, but also tips and tricks for taking full advantage of the Kindle Fire and the services of Amazon's online stores Kindle Fire For Dummies is packed with powerful tips designed to help you get more punch out of your Kindle Fire tablet.

Admiral Chester W. Nimitz: The Life and Legacy of the U.S. Pacific Fleet’s Commander in Chief during World War II


Charles River Editors - 2019
    soil.” – Admiral Nimitz All Americans are familiar with the “day that will live in infamy.” At 9:30 a.m. on Sunday, December 7, 1941, Pearl Harbor, the advanced base of the United States Navy’s Pacific Fleet, was ablaze. It had been smashed by aircraft launched by the carriers of the Imperial Japanese Navy. All eight battleships had been sunk or badly damaged, 350 aircraft had been knocked out, and over 2,000 Americans lay dead. Indelible images of the USS Arizona exploding and the USS Oklahoma capsizing and floating upside down have been ingrained in the American conscience ever since. In less than an hour and a half the Japanese had almost wiped out America’s entire naval presence in the Pacific. Despite fighting in North Africa and the Atlantic, the United States still had the resources and manpower to fight the Japanese in the Pacific. Though the Japanese had crippled the American fleet at Pearl Harbor, its distance from Japan made an invasion of Pearl Harbor impossible, and Japan had not severely damaged important infrastructure. Thus, the United States was able to quickly rebuild a fleet, still stationed at Pearl Harbor right in the heart of the Pacific. This forward location allowed the United States to immediately push deeply into the Pacific Theater. The Americans would eventually push the Japanese back across the Pacific, and one of the most instrumental leaders in the effort was Admiral Chester W. Nimitz, who commanded the U.S. Pacific Fleet and helped coordinate joint operations with the legendary General Douglas MacArthur, the Supreme Commander, Southwest Pacific Area. The ensuing strategies would lead to decisive operations at places like Midway, Iwo Jima, Okinawa, and others before the use of the atomic bombs compelled Japan’s surrender in August 1945. Admiral Chester W. Nimitz: The Life and Legacy of the U.S. Pacific Fleet’s Commander in Chief during World War II chronicles Nimitz’s life and examines the decisions he made during history’s deadliest war. Along with pictures of important people, places, and events, you will learn about Admiral Nimitz like never before.

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

HTML and XHTML Pocket Reference


Jennifer Niederst Robbins - 2006
    You no longer use HTML and XHTML as design tools, but strictly as ways to define the meaning and structure of web content. And Cascading Style Sheets (CSS) are no longer just something interesting to tinker with, but a reliable method for handling all matters of presentation, from fonts and colors to page layout. When you follow the standards, both the site's design and underlying code are much cleaner. But how do you keep all those HTML and XHTML tags and CSS values straight? Jennifer Niederst-Robbins, the author of our definitive guide on standards-compliant design, Web Design in a Nutshell, offers you the perfect little guide when you need answers immediately: HTML and XHTML Pocket Reference. This revised and updated new edition takes the top 20% of vital reference information from her Nutshell book, augments it judiciously, cross-references everything, and organizes it according to the most common needs of web developers. The result is a handy book that offers the bare essentials on web standards in a small, concise format that you can use carry anywhere for quick reference. This guide will literally fit into your back pocket. Inside HTML and XHTML Pocket Reference, you'll find instantly accessible alphabetical listings of every element and attribute in the HTML 4.01 and XHTML 1.0 Recommendations. This is an indispensable reference for any serious web designer, author, or programmer who needs a fast on-the-job resource when working with established web standards.