Book picks similar to
Designing and Implementing Linux Firewalls with Qos Using Netfilter, Iproute2, Nat and L7-Filter by Lucian Gheorghe
linux
non-fiction
calibre-library
history
Programming in Lua
Roberto Ierusalimschy - 2001
Currently, Lua is being used in areas ranging from embedded systems to Web development and is widely spread in the game industry, where knowledge of Lua is an indisputable asset. "Programming in Lua" is the official book about the language, giving a solid base for any programmer who wants to use Lua. Authored by Roberto Ierusalimschy, the chief architect of the language, it covers all aspects of Lua 5---from the basics to its API with C---explaining how to make good use of its features and giving numerous code examples. "Programming in Lua" is targeted at people with some programming background, but does not assume any prior knowledge about Lua or other scripting languages. This Second Edition updates the text to Lua 5.1 and brings substantial new material, including numerous new examples, a detailed explanation of the new module system, and two new chapters centered on multiple states and garbage collection.
Rebel Code: Linux and the Open Source Revolution
Glyn Moody - 2000
This fast-moving narrative starts at ground zero, with the dramatic incubation of open-source software by Linux and its enigmatic creator, Linus Torvalds. With firsthand accounts, it describes how a motley group of programmers managed to shake up the computing universe and cause a radical shift in thinking for the post-Microsoft era. A powerful and engaging tale of innovation versus big business, Rebel Code chronicles the race to create and perfect open-source software, and provides the ideal perch from which to explore the changes that cyberculture has engendered in our society. Based on over fifty interviews with open-source protagonists such as Torvalds and open source guru Richard Stallman, Rebel Code captures the voice and the drama behind one of the most significant business trends in recent memory.
A Dangerous Place: The Story of the Railway Murders
Simon Farquhar - 2016
In September 1970, two boys met in the playground on their first day at secondary school in North London. They formed what would be described at the Old Bailey thirty years later as ‘a unique and wicked bond’. Between 1982 and 1986, striking near lonely railway stations in London and the Home Counties, their partnership took them from rape to murder. Three police forces pooled their resources to catch them in the biggest criminal manhunt since the Yorkshire Ripper Enquiry.A Dangerous Place is the first full-length account of the crimes of John Duffy and David Mulcahy. Told by the son of one of the police officers who led the enquiry, exhaustively researched and with unprecedented access, this is the story of two of the most notorious serial killers of the twentieth century and the times they operated in. It is the story of the women who died at their hands. It is the story of the women who survived them, and who had the courage to ensure justice was done. And it is the story of a father, told by a son.
Hitler's Children - Spitting Fire (Eyewitness Accounts - 12th SS Panzer 'Hitler Youth' in Normandy 1944)
Sprech Media - 2015
Who were these 15 to 17 year-old Hitler Youth soldiers, why were they so fanatical, and how could they be cleanly defeated? The Allied mood turned to bitterness and hatred as the brutal cunning and sheer ruthlessness of the boy soldiers and their adult leaders became clear. This book assembles a range of astonishing eyewitness testimony to the ferocious combat between Hitler Youth panzer troops, snipers and infantry against British and Canadian forces after D-Day. There are the disturbing combat experiences of surviving 12th SS Panzer fighters themselves, recorded after the war; eyewitness accounts from Allied soldiers who fought tank-to-tank and hand-to-hand against these opponents in the hedgerows, fields and streets of Normandy; and accounts too from terrified French civilians caught up in the firefights. The accounts featured are: The Tank Destroyer (Jagdpanzer IV) The Bocage Ambush (British Sergeant) The Battle for the Bunkers (12th SS Panthers) The Flail Tanks (French Civilian) The Panzerfaust Fighters (Hitlerjugend Panzergrenadiers) The Sniper (Canadian Captain) The War Crimes (12th SS Panzer Radio Operator) Panthers in the Smoke (British Cromwell Commander) Thunderbolts, Typhoons and Flak (12th Panzer Flak Unit) These are graphic and often shocking accounts of one of the strangest phases of the second world war in the west, and one that left a dreadful mark on so many who were involved in it. Sprech Media is an independent researcher and publisher of eyewitness testimonies to armed conflict in the 20th century.
Medjugorje: The Last Apparition
Wayne Weible - 2013
It is packed with vital new information in addition to the basic story of its beginnings and where it is today. Included is startling commentary on the alleged secrets and how they will change the world forever. Underlying the story is the disclosure by the Mother of Jesus that she will never come to earth again in apparition. THE LAST APPARITION is a must read!
Kursk Down: The Shocking True Story of the Sinking of a Russian Nuclear Submarine
Clyde W. Burleson - 2002
Hailed as "unsinkable, " the "Kursk" was on maneuvers when mysterious explosions rocked the sub, causing it to sink to the bottom of the sea with its 118-man crew. This in-depth look at the disaster reveals previously unreleased information from family members of the deceased as well as from government officials.
Nikola Tesla: A Captivating Guide to the Life of a Genius Inventor
Captivating History - 2017
His claim that “harnessing the forces of nature was the only worthwhile scientific endeavor" both impressed and enraged the scientific community. Eventually, his peers could no longer dismiss his eccentricities and began to view him as a crackpot — a potentially dangerous one. Although Tesla’s work was a major factor in the success of the second Industrial Revolution, he died alone, impoverished, and largely shunned by the scientific community that once hailed him a genius. Beset by visions, without a wife or children, Nikola Tesla’s brilliant mind changed the world, even though at the time of his death he passed unnoticed into obscurity. Some of the topics covered in this book include:
Childhood
Education and Early Career
Patents and Politics
The Eccentric Genius
Tesla’s Coil and the Niagara Contract
Influential Friends and the Lure of Flight
The Wardenclyffe Tower
1914 and Beyond
And much more!
Scroll to the top and select the "BUY NOW" button for instant download
Magnum! The Wild Weasels in Desert Storm. The Elimination of Iraq's Air Defence
Braxton R. Eisel - 2009
Building upon that record and the recollections of other F-4G Wild Weasel aircrew, the authors show a slice of what life and war was like during that time. The pawns in the game, the ones that had to actually do the fighting and dying were the hundreds of thousands of men and women who left their homes and families to live for seemingly endless months in the vast, trackless desert while the world stage-play unfolded. To them, the war was deeply personal. At times, the war was scary; at other times, it was funny as hell. Usually, if you survive the former, it turns into the latter.
Double Life: The Shattering Affair between Chief Judge Sol Wachtler and Socialite Joy Silverman
Linda Wolfe - 1994
He was the top justice of New York’s highest court. She was a stunning socialite and his wife’s step-cousin. In 1993 Sol Wachtler was convicted of blackmail and extortion against Joy Silverman, his former mistress. How did a respected jurist and one of the most prominent men in America end up serving time in prison? Linda Wolfe starts at the beginning—from Wachtler’s modest Brooklyn upbringing through his courtship and marriage to Joan Wolosoff, the only child of a wealthy real estate developer. Joy Fererh was three and a half when her father walked out. When she and Sol met, he was fifty-five and nearing the pinnacle of his legal career. She was a thirtysomething stay-at-home mother who, with Sol’s help, made a career for herself as a Republican Party fundraiser. They kept their affair a secret—until an explosive mix of sex, power, betrayal, and prescription-drug abuse set the stage for the tabloid headlines of the decade.
The Legacy Letters: Messages of Life and Hope from 9/11 Family Members
Tuesday's Children - 2011
They are first- generation Americans, citizens of other nations, and lifelong New Yorkers. But they all share one thing: They honor their loved ones by living their lives with purpose, and a promise to never forget.These courageous family members share their grief and loss-and hope- speaking in their own words, with love, courage, and strength enough to inspire us all.
Ninja Foodi: The Pressure Cooker that Crisps: Complete Cookbook for Beginners: Your Expert Guide to Pressure Cook, Air Fry, Dehydrate, and More
Kenzie Swanhart - 2018
Here, in the official Ninja® Foodi™ Complete Cookbook for Beginners, you’ll find easy, flavorful recipes specifically designed for the innovative technology of the Ninja® Foodi™.No matter what you’re in the mood for, there’s a wide range of versatile recipes in Ninja® Foodi™ Complete Cookbook for Beginners. From wholesome “360 Meals” that allow you to fully cook grains, crisp vegetables, and tender proteins all in the same pot, to time-saving “Frozen to Crispy” recipes that allow you to cook frozen food without defrosting it first, the Ninja® Foodi™ Complete Cookbook for Beginners puts tasty, nourishing meals on the table in no time.The ultimate beginner’s guide for using this one-of-a-kind appliance, the Ninja® Foodi™ Complete Cookbook for Beginners includes:
75 quick, tasty, good-for-you recipes that include options not only for breakfast, lunch, and dinner, but also appetizers, breads, desserts, and more
Quick-start guidance for using your Ninja® Foodi™ and understanding all of its unique features such as how to pressure cook, air fry, TenderCrisp™, dehydrate, and more
Expert tips and tricks that will eliminate the learning curve regardless of your prior culinary experience
There is no dinner dilemma that the Ninja® Foodi™ can’t handle. And with the official Ninja® Foodi™ Complete Cookbook for Beginners, there’s no recipe that you can’t cook.
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Introducing Elixir: Getting Started in Functional Programming
Simon St.Laurent - 2013
If you're new to Elixir, its functional style can seem difficult, but with help from this hands-on introduction, you'll scale the learning curve and discover how enjoyable, powerful, and fun this language can be. Elixir combines the robust functional programming of Erlang with an approach that looks more like Ruby and reaches toward metaprogramming with powerful macro features.Authors Simon St. Laurent and J. David Eisenberg show you how to write simple Elixir programs by teaching you one skill at a time. You’ll learn about pattern matching, recursion, message passing, process-oriented programming, and establishing pathways for data rather than telling it where to go. By the end of your journey, you’ll understand why Elixir is ideal for concurrency and resilience.* Get comfortable with IEx, Elixir's command line interface* Become familiar with Elixir’s basic structures by working with numbers* Discover atoms, pattern matching, and guards: the foundations of your program structure* Delve into the heart of Elixir processing with recursion, strings, lists, and higher-order functions* Create processes, send messages among them, and apply pattern matching to incoming messages* Store and manipulate structured data with Erlang Term * Storage (ETS) and the Mnesia database* Build resilient applications with the Open Telecom Platform (OTP)* Define macros with Elixir's meta-programming tools.
Open Sources
Chris DiBona - 1999
Open Source has grabbed the computer industry's attention. Netscape has opened the source code to Mozilla; IBM supports Apache; major database vendors haved ported their products to Linux. As enterprises realize the power of the open-source development model, Open Source is becoming a viable mainstream alternative to commercial software.Now in Open Sources, leaders of Open Source come together for the first time to discuss the new vision of the software industry they have created. The essays in this volume offer insight into how the Open Source movement works, why it succeeds, and where it is going.For programmers who have labored on open-source projects, Open Sources is the new gospel: a powerful vision from the movement's spiritual leaders. For businesses integrating open-source software into their enterprise, Open Sources reveals the mysteries of how open development builds better software, and how businesses can leverage freely available software for a competitive business advantage.The contributors here have been the leaders in the open-source arena:Brian Behlendorf (Apache) Kirk McKusick (Berkeley Unix) Tim O'Reilly (Publisher, O'Reilly & Associates) Bruce Perens (Debian Project, Open Source Initiative) Tom Paquin and Jim Hamerly (mozilla.org, Netscape) Eric Raymond (Open Source Initiative) Richard Stallman (GNU, Free Software Foundation, Emacs) Michael Tiemann (Cygnus Solutions) Linus Torvalds (Linux) Paul Vixie (Bind) Larry Wall (Perl) This book explains why the majority of the Internet's servers use open- source technologies for everything from the operating system to Web serving and email. Key technology products developed with open-source software have overtaken and surpassed the commercial efforts of billion dollar companies like Microsoft and IBM to dominate software markets. Learn the inside story of what led Netscape to decide to release its source code using the open-source mode. Learn how Cygnus Solutions builds the world's best compilers by sharing the source code. Learn why venture capitalists are eagerly watching Red Hat Software, a company that gives its key product -- Linux -- away.For the first time in print, this book presents the story of the open- source phenomenon told by the people who created this movement.Open Sources will bring you into the world of free software and show you the revolution.
Worm: The First Digital World War
Mark Bowden - 2011
Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.