Android Programming: The Big Nerd Ranch Guide
Brian Hardy - 2012
Based on Big Nerd Ranch's popular Android Bootcamp course, this guide will lead you through the wilderness using hands-on example apps combined with clear explanations of key concepts and APIs. This book focuses on practical techniques for developing apps compatible with all versions of Android widely used today (Android 2.2 - 4.2). Write and run code every step of the way - creating apps that catalog crime scenes, browse photos, track your jogging route, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development. Write and run code every step of the way -- creating apps that catalog crime scenes, browse photos, track your jogging route, and more. Each chapter and app has been designed and tested to provide the knowledge and experience you need to get started in Android development."Big Nerd Ranch provided the training we needed to get hundreds of engineers building skillfully on Android. This book is a great distillation of that training and will be a huge help to anyone looking to ramp up as well." - Mike Shaver, Director of Mobile Engineering, Facebook"...a must-have for the developer just starting in Android or ready for more advanced techniques. I was impressed with this book's content and clarity of presentation. The authors explain simple and complex Android topics with equal ease." - James Steele, author of The Android Developer's Cookbook
OpenGL SuperBible: Comprehensive Tutorial and Reference
Richard S. Wright Jr. - 1996
If you want to leverage OpenGL 2.1's major improvements, you really need the Fourth Edition. It's a comprehensive tutorial, systematic API reference, and massive code library, all in one. You'll start with the fundamental techniques every graphics programmer needs: transformations, lighting, texture mapping, and so forth. Then, building on those basics, you'll move towards newer capabilities, from advanced buffers to vertex shaders. Of course, OpenGL's cross-platform availability remains one of its most compelling features. This book's extensive multiplatform coverage has been thoroughly rewritten, and now addresses everything from Windows Vista to OpenGL ES for handhelds. This is stuff you absolutely want the latest edition for. A small but telling point: This book's recently been invited into Addison-Wesley's OpenGL Series, making it an "official" OpenGL book -- and making a powerful statement about its credibility. Bill Camarda, from the August 2007 href="http://www.barnesandnoble.com/newslet... Only
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh - 1999
From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
The Decline and Fall of IBM: End of an American Icon?
Robert Cringely - 2014
Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.
Active Directory
Alistair G. Lowe-Norris - 2003
Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.You'll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you've learned--ideal whether you're a network administrator for a small business or a multinational enterprise.Upgrade Active Directory to Windows Server 2012Learn the fundamentals, including how AD stores objectsUse the AD Administrative Center and other management toolsLearn to administer AD with Windows PowerShellSearch and gather AD data, using the LDAP query syntaxUnderstand how Group Policy functionsDesign a new Active Directory forestExamine the Kerberos security protocolGet a detailed look at the AD replication process
Learning PHP and MySQL
Michele E. Davis - 2006
When working hand-in-hand, they serve as the standard for the rapid development of dynamic, database-driven websites. This combination is so popular, in fact, that it's attracting manyprogramming newbies who come from a web or graphic design background and whose first language is HTML. If you fall into this ever-expanding category, then this book is for you."Learning PHP and MySQL" starts with the very basics of the PHP language, including strings and arrays, pattern matching and a detailed discussion of the variances in different PHP versions. Next, it explains how to work with MySQL, covering information on SQL data access for language and data fundamentals like tables and statements.Finally, after it's sure that you've mastered these separate concepts, the book shows you how to put them together to generate dynamic content. In the process, you'll also learn about error handling, security, HTTP authentication, and more.If you're a hobbyist who is intimidated by thick, complex computer books, then this guide definitely belongs on your shelf. "Learning PHP and MySQL" explains everything--from basic concepts to the nuts and bolts of performing specific tasks--in plain English.Part of O'Reilly's bestselling Learning series, the book is an easy-to-use resource designed specifically for newcomers. It's also a launching pad for future learning, providing you with a solid foundation for more advanced development.
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kevin Poulsen - 2011
Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.
Managing Risk and Information Security: Protect to Enable
Malcolm Harkins - 2012
Because almost every aspect of an enterprise is now dependent on technology, the focus of IT security must shift from locking down assets to enabling the business while managing and surviving risk. This compact book discusses business risk from a broader perspective, including privacy and regulatory considerations. It describes the increasing number of threats and vulnerabilities, but also offers strategies for developing solutions. These include discussions of how enterprises can take advantage of new and emerging technologiessuch as social media and the huge proliferation of Internet-enabled deviceswhile minimizing risk. With ApressOpen, content is freely available through multiple online distribution channels and electronic formats with the goal of disseminating professionally edited and technically reviewed content to the worldwide community. Here are some of the responses from reviewers of this exceptional work: Managing Risk and Information Security is a perceptive, balanced, and often thought-provoking exploration of evolving information risk and security challenges within a business context. Harkins clearly connects the needed, but often-overlooked linkage and dialog between the business and technical worlds and offers actionable strategies. The book contains eye-opening security insights that are easily understood, even by the curious layman. Fred Wettling, Bechtel Fellow, IS&T Ethics & Compliance Officer, Bechtel As disruptive technology innovations and escalating cyber threats continue to create enormous information security challenges, Managing Risk and Information Security: Protect to Enable provides a much-needed perspective. This book compels information security professionals to think differently about concepts of risk management in order to be more effective. The specific and practical guidance offers a fast-track formula for developing information security strategies which are lock-step with business priorities. Laura Robinson, Principal, Robinson Insight Chair, Security for Business Innovation Council (SBIC) Program Director, Executive Security Action Forum (ESAF) The mandate of the information security function is being completely rewritten. Unfortunately most heads of security havent picked up on the change, impeding their companies agility and ability to innovate. This book makes the case for why security needs to change, and shows how to get started. It will be regarded as marking the turning point in information security for years to come. Dr. Jeremy Bergsman, Practice Manager, CEB The world we are responsible to protect is changing dramatically and at an accelerating pace. Technology is pervasive in virtually every aspect of our lives. Clouds, virtualization and mobile are redefining computing and they are just the beginning of what is to come. Your security perimeter is defined by wherever your information and people happen to be.
Stranded on Haven
William Zellmann - 2014
No, he was just a slum-bred cargo handler, until everyone aboard was killed except him. With the help of the ship’s Artificial Intelligence, he located the nearest known settled star, some ten light years away; thirty years away in normal space. There is, however a system just less than one light year away that might have an Earthlike planet. It does have one, and it also has a colony. Haven was settled 500 years ago, but a catastrophe prevented it from landing their colony ship, which was designed to provide computer information services for a century. Without the ship’s services, the colony has reverted, and is now at a prespace level. After two years in normal space, Jerd is desperate for human company. But the colony has airships, radios, and a patchwork of small nations. What kind of welcome can he expect? Startrader and the colony ship both contain information which would let any of the six nations occupying Haven take over the planet. Will the nations welcome him and his ship? Will they race to kill him and seize Startrader and its wonders? Will he face spies and assassins, or will he find a new home? Find out in William Zellmann’s newest space opera!
Computers & Typesetting, Volume A: The TeXBook
Donald Ervin Knuth - 1984
It is particularly valuable where the document, article, or book to be produced contains a lot of mathematics, and where the user is concerned about typographic quality. TeX software offers both writers and publishers the opportunity to produce technical text of all kinds, in an attractive form, with the speed and efficiency of a computer system.Novice and expert users alike will gain from The TeXbook the level of information they seek. Knuth warns newcomers away from the more difficult areas, while he entices experienced users with new challenges. The novice need not learn much about TeX to prepare a simple manuscript with it. But for the preparation of more complex documents, The TeXbook contains all the detail required.Knuth’s familiar wit, and illustrations specially drawn by Duane Bibby, add a light touch to an unusually readable software manual.The TeXbook is the first in a five-volume series on Computers and Typesetting, all authored by Knuth.
Steve Jobs the Journey is the Reward: The Journey is the Reward
Jeffrey S. Young - 1987
An unvarnished view of an extraordinary man and the multimillion dollar business he built--and lost.
The Courage To Start: A Guide To Running for Your Life
John "The Penguin" Bingham - 2013
The miracle is that I had the courage to start."Take your first step toward fitness and a happier, healthier life.Has the idea of running crossed your mind, but you haven't acted on it because you don't think you have the body of a runner? Have you thought about running but quit before you started because you knew that you would be breathless at the end of your driveway? Well, put aside those fears because you can do it. John Bingham, author of the popular Runner's World column "The Penguin Chronicles," transformed himself from an overweight couch potato who smoked into a runner who has completed eleven marathons and hundreds of road races.Forget about the image of a perfect body in skintight clothes, and don't worry about how fast or how far you go. Bingham shows how anyone can embrace running as a life-enhancing activity -- rather than as a competition you will never win. In an entertaining blend of his own success story and practical advice, Bingham provides reasonable guidelines for establishing a program of achievable goals; offers tips on clothing, running shoes, and other equipment; and explains how anyone can prepare for and run distances ranging from a few miles to marathons.After all, in running and in life, the difference between success and failure sometimes comes down to a single step. Waddle on, friends.
Exodus and QB VII: Two Leon Uris Classics
Leon Uris - 2013
But the path that Jewish immigrants took to enter British-controlled Palestine was a difficult one, fraught with danger and political intrigue. The boat was intercepted by British forces and the refugees were placed in concentration camps.Uris’s blockbuster novel traces the lives of the men and women who brave British naval blockades to help Israel come into being, from Ari Ben Canaan, who works tirelessly to smuggle in settlers, to Kitty Fremont, an American nurse drawn into a vast, tragic history. Weaving together fact and fiction, history and dramatic storylines, Exodus stands today as one of the most influential narratives of the founding of the State of Israel.In QB VII, for Abe Cady, settlement is not an option when the facts of the Holocaust are on trial. A journalist and screenwriter, Cady produced the definitive account of the Holocaust just after World War II. But Polish doctor Adam Kelno, who was pressed into service in a notorious concentration camp, sues Cady for his book’s claim that the doctor conducted terrible experiments on camp inmates. The libel trial that follows tears open old wounds, disrupts lives, and becomes a battle for justice on behalf of tens of thousands of lost and damaged souls.QB VII is a gripping drama, largely based on author Uris’s own protracted libel defense against a former concentration camp surgeon named in his novel Exodus. It was made into the first miniseries in television history.
Hail to the Redskins: Gibbs, the Diesel, the Hogs, and the Glory Days of D.C.'s Football Dynasty
Adam Lazarus - 2015
From 1981 to 1992, Gibbs coached the franchise to three Super Bowl victories, making the team the toast of the nation’s capital, from the political elite to the inner city, and helping to define one of the sport’s legendary eras.Veteran sportswriter Adam Lazarus masterfully charts the Washington Football Team's rise from mediocrity (the franchise had never won a Super Bowl and Gibbs’s first year as head coach started with a five-game losing streak that almost cost him his job) to its stretch of four championship games in ten years. What makes their sustained success all the more remarkable, in retrospect, is that unlike the storied championship wins of Joe Montana’s 49ers and Tom Brady’s Patriots, the Washington Football Team's Super Bowl victories each featured a different starting quarterback: Joe Theismann in 1983, the franchise’s surprising first championship run; Doug Williams in 1988, a win full of meaning for a majority African American city during a tumultuous era; and Mark Rypien in 1992, capping one of the greatest seasons of all time, one that stands as Gibbs’s masterpiece.Hail to the Redskins features an epic roster of saints and sinners: hard-drinking fullback John Riggins; the dominant, blue-collar offensive linemen known as “the Hogs,” who became a cultural phenomenon; quarterbacks Williams, the first African American QB to win a Super Bowl, and Theisman, a model-handsome pitchman whose leg was brutally broken by Lawrence Taylor on Monday Night Football; gregarious defensive end Dexter Manley, who would be banned from the league for cocaine abuse; and others including the legendary speedster Darrell Green, record-breaking receiver Art Monk, rags-to-riches QB Rypien, expert general managers and talent evaluators Bobby Beathard and Charley Casserly, aristocratic owner Jack Kent Cooke, and, of course, Gibbs himself, a devout Christian who was also a ruthless competitor and one of the sport’s most adaptable and creative coaching minds.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.