Beautiful Evidence


Edward R. Tufte - 2006
    Beautiful Evidence is about how seeing turns into showing, how data and evidence turn into explanation. The book identifies excellent and effective methods for showing nearly every kind of information, suggests many new designs (including sparklines), and provides analytical tools for assessing the credibility of evidence presentations (which are seen from both sides: how to produce and how to consume presentations). For alert consumers of presentations, there are chapters on diagnosing evidence corruption and PowerPoint pitches. Beautiful Evidence concludes with two chapters that leave the world of pixel and paper flatland representations - and move onto seeing and thinking in space land, the real-land of three-space and time.

Whole Lotta Led Zeppelin: The Illustrated History of the Heaviest Band of All Time


Jon Bream - 2008
    More than 450 rare concert posters, backstage passes, tickets, LPs and singles, t-shirts, buttons, and more illustrate the book. A discography and tour itinerary complete the package, making a book as epic as the band it documents.Created from the ashes of the Yardbirds by guitarist and session wizard Jimmy Page, Led Zeppelin featured virtuoso bass player John Paul Jones, gonzo drummer John Bonham, and Robert Plant, a vocalist like no other before him. The band single-handedly defined what rock 'n' roll could be, leaving in their wake tales as tall or as real as we wanted them to be.All of that, plus exclusive commentary from Ray Davies of the Kinks, Steve Earle, Kid Rock, Ace Frehley of Kiss, Rob Thomas of Matchbox Twenty, Chris Robinson of the Black Crowes, Jon Bon Jovi and Richie Sambora, Lenny Kravitz, Dolly Parton, and many more make this book one that no fan of Led Zeppelin will want to miss!

The Perricone Prescription: A Physician's 28-Day Program for Total Body and Face Rejuvenation


Nicholas Perricone - 2002
    many people choose to temporarily circumvent these signs of aging with surgery, chemical peels, Botox injections, or laser treatments. The good news, according to research scientist and practicing dermatologist Nicholas Perricone, M.D., is that by following a simple program of diet, exercise, and skin care you can prevent and even reverse many signs of aging.The Perricone Prescription clearly and succinctly explains the rock–solid laboratory research behind Dr. Perricone's revolutionary theories, revealing that inflammation at the cellular level, precipitated by poor nutrition, pollution, sunlight, irritating skin–care treatments, and stress, is the single most powerful cause of the signs of aging. Dr. Perricone gives you the knowledge and the tools to fight that inflammation from the inside out, while at the same time decreasing the likelihood of heart disease, cancer, diabetes, arthritis, and a host of other degenerative diseases.

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Gray Hat Python: Python Programming for Hackers and Reverse Engineers


Justin Seitz - 2008
    But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

Zero Day: The Threat In Cyberspace


Robert O'Harrow Jr. - 2013
    For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code


Michael Hale Ligh - 2010
    Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Johnathan Thurston: The Autobiography


Johnathan Thurston - 2018
    This autobiography will follow Thurston's journey from a Brisbane kid who was written off as too skinny, too slow and too wild to play professionally, to his debut with the Canterbury Bulldogs in 2003, to State of Origin star, to Dally M and Clive Churchill Medal winner, and the fairytale premierships.

Mac OS X: Tiger Edition


David Pogue - 2001
    The new Mac OS X 10.4, better known as Tiger, is faster than its predecessors, but nothing's too fast for Pogue and Mac OS X: The Missing Manual. There are many reasons why this is the most popular computer book of all time.With its hallmark objectivity, the Tiger Edition thoroughly explores the latest features to grace the Mac OS. Which ones work well and which do not? What should you look for? This book tackles Spotlight, an enhanced search feature that helps you find anything on your computer; iChat AV for videoconferencing; Automator for automating repetitive, manual or batch tasks; and the hundreds of smaller tweaks and changes, good and bad, that Apple's marketing never bothers to mention.Mac OS X: The Missing Manual, Tiger Edition is the authoritative book that's ideal for every user, including people coming to the Mac for the first time. Our guide offers an ideal introduction that demystifies the Dock, the unfamiliar Mac OS X folder structure, and the entirely new Mail application. There are also mini-manuals on iLife applications such as iMovie, iDVD, and iPhoto, those much-heralded digital media programs, and a tutorial for Safari, Mac's own web browser.And plenty more: learn to configure Mac OS X using the System Preferences application, keep your Mac secure with FileVault, and learn about Tiger's enhanced Firewall capabilities. If you're so inclined, this Missing Manual also offers an easy introduction to the Terminal application for issuing basic Unix commands.There's something new on practically every page, and David Pogue brings his celebrated wit and expertise to every one of them. Mac's brought a new cat to town and we have a great new way to tame it.

Dot Dead: A Silicon Valley Mystery


Keith Raffel - 2006
    Far from the gray-haired, cookie-baking grandmother he imagined her to be, Gwendolyn was a stranger to Ian, but her family, old boyfriend, and the Palo Alto police seem to think they were a couple. And despite his best efforts to prove otherwise, the evidence against Ian is growing. It looks like someone is framing Ian for murder, but who? An executive at a tech firm, Ian is anxious to prove his innocence to his boss and mentor Paul Berk, a Silicon Valley legend. As the investigation heats up so does Ian's interest in Gwendolyn's sister, but can she be trusted?

Python Essential Reference (Developer's Library)


David Beazley - 1999
    This text concisely describes the Python language and its programming environment for those readers already familiar with languages such as C and C++.

Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare


Paul Rosenzweig - 2013
    Telecommunications, commercial and financial systems, government operations, food production - virtually every aspect of global civilization now depends on interconnected cyber systems to operate; systems that have helped advance medicine, streamline everyday commerce, and so much more. Thinking about Cybersecurity: From Cyber Crime to Cyber Warfare is your guide to understanding the intricate nature of this pressing subject. Delivered by cybersecurity expert and professor Paul Rosenzweig, these 18 engaging lectures will open your eyes to the structure of the Internet, the unique dangers it breeds, and the ways we’re learning how to understand, manage, and reduce these dangers.In addition, Professor Rosenzweig offers sensible tips on how best to protect yourself, your network, or your business from attack or data loss.Disclaimer: The views expressed in this course are those of the professor and do not necessarily reflect the position or policy of the U.S. Department of Homeland Security, the U.S. Department of Defense, or the U.S. government. Disclaimer: Please note that this recording may include references to supplemental texts or print references that are not essential to the program and not supplied with your purchase.©2013 The Teaching Company, LLC (P)2013 The Great Courses

The Dragonfly Effect: Quick, Effective, and Powerful Ways to Use Social Media to Drive Social Change


Jennifer Aaker - 2010
    But no book addresses how to harness the incredible power of social media to make a difference. "The Dragonfly Effect" shows you how to tap social media and consumer psychological insights to achieve a single, concrete goal. Named for the only insect that is able to move in any direction when its four wings are working in concert, this bookReveals the four "wings" of the Dragonfly Effect-and how they work together to produce colossal resultsFeatures original case studies of global organizations like the Gap, Starbucks, Kiva, Nike, eBay, Facebook; and start-ups like Groupon and COOKPAD, showing how they achieve social good and customer loyaltyLeverage the power of design thinking and psychological research with practical strategiesReveals how everyday people achieve unprecedented results-whether finding an almost impossible bone marrow match for a friend, raising millions for cancer research, or electing the current president of the United States"The Dragonfly Effect" shows that you don't need money or power to inspire seismic change.

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Death's Mistress


Terry Goodkind - 2017
    But it was Richard who converted Nicci instead, and for years thereafter she served Richard and Kahlan as one of their closest friends--and one of their most lethal defenders.Now, with the reign of Richard and Kahlan finally stablized, Nicci has set out on her own for new adventures. Her first job being to keep the unworldly prophet Nathan out of trouble...