Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
Andy Oram - 2009
Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).
HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications
Juan Diego Gauchat
Fluid Mechanics: Fundamentals and Applications [with Student Resources DVD]
Yunus A. Cengel - 2004
The text covers the basic principles and equations of fluid mechanics in the context of numerous and diverse real-world engineering examples. The text helps students develop an intuitive understanding of fluid mechanics by emphasizing the physics, and by supplying attractive figures, numerous photographs and visual aids to reinforce the physics.
Advanced PHP Programming
George Schlossnagle - 2004
The rapid maturation of PHP has created a skeptical population of users from more traditional enterprise languages who question the readiness and ability of PHP to scale, as well as a large population of PHP developers without formal computer science backgrounds who have learned through the hands-on experimentation while developing small and midsize applications in PHP. While there are many books on learning PHP and developing small applications with it, there is a serious lack of information on scaling PHP for large-scale, business-critical systems. Schlossnagle's Advanced PHP Programming fills that void, demonstrating that PHP is ready for enterprise Web applications by showing the reader how to develop PHP-based applications for maximum performance, stability, and extensibility.
Fundamentals of Electrical Engineering
Leonard S. Bobrow - 1995
The text is divided into four parts: circuits, electronics, digital systems, and electromagnetics. Although it delves in depth into each of these topics, the text represents more than your basic survey of the basics of electrical engineering. A solid understanding of the fundamental principles on which modern electrical engineering is based is also provided. This edition includes a chapter on circuit analysis software SPICE, with a detailed discussion of the PC version known as PSPICE (from MicroSim Corp.). Numerous drill exercises have been added to this new edition, reinforcing ideas presented in the examples. There are over 1,000 end-of-chapter problems. This text is suitable for a variety of electrical engineering courses. It can be used as a text for an introduction to electrical engineering for both majors and non-majors or both, or can be split and the various chapters utilized for an introduction to circuits course, a first electronics course, or for a course on digital electronics and logic design.
I ♥ Justin Bieber
Harlee Harte - 2010
Following a bidding war between Justin Timberlake and Usher, the fifteen-year-old singing sensation has had four singles hit the Top 40—before his first record was even released. With that kind of popularity, it’s no wonder that Harlee Harte, author of the “I ♥” series, is on the case! Harlee is the celebrity columnist for Hollywoodland High’s student newspaper. Accompanied by her fun, fashion-forward and fabulous friends, Harlee’s “all-access” press credentials let her get up close and personal with Justin backstage, on the road, and even at major awards ceremonies. Not just a paste-up of Justin Bieber facts, Harlee’s columns are full of puzzles, quizzes, and games that bring her devoted readers closer to this top tween celebrity than ever before. Follow Harlee on Justin’s trail as she tries to juggle the ups and downs, twists and turns of her everyday teenage life—school, boys, girlfriends, parents, and, of course, staying connected with all things Bieber.
Ecology of the Planted Aquarium: A Practical Manual and Scientific Treatise for the Home Aquarist
Diana Walstad - 1999
This book presents novel scientific information in a way that beginning hobbyists can use it to set up and maintain planted freshwater aquariaAbout The Author:The author is a medical research technician, former technical advisor for the Aquatic Gardeners Association, and a long time aquarium hobbyist.
How to Be an Explorer of the World: Portable Life Museum
Keri Smith - 2008
In this captivating guided journal, readers are encouraged to explore their world as both artists and scientists. The mission Smith proposes? To document and observe the world around you. As if you've never seen it before. Take notes. Collect things you find on your travels. Document findings. Notice patterns. Copy. Trace. Focus on one thing at a time. Record what you are drawn to. With a series of interactive prompts and a beautifully hand-illustrated two-color package, readers will enjoy exploring and discovering the world through this gorgeous book.
Biopunk: Kitchen-Counter Scientists Hack the Software of Life
Marcus Wohlsen - 2011
"If you want to change the world in some big way," he says, "that's where you should start-biological molecules." The most disruptive force on the planet resides in DNA. Biotech companies and academic researchers are just beginning to unlock the potential of piecing together life from scratch. Champions of synthetic biology believe that turning genetic code into Lego-like blocks to build never-before-seen organisms could solve the thorniest challenges in medicine, energy, and environmental protection. But as the hackers who cracked open the potential of the personal computer and the Internet proved, the most revolutionary discoveries often emerge from out-of-the-way places, forged by brilliant outsiders with few resources besides boundless energy and great ideas. In "Biopunk," Marcus Wohlsen chronicles a growing community of DIY scientists working outside the walls of corporations and universities who are committed to democratizing DNA the way the Internet did information. The "biohacking" movement, now in its early, heady days, aims to unleash an outbreak of genetically modified innovation by making the tools and techniques of biotechnology accessible to everyone. Borrowing their idealism from the worlds of open-source software, artisinal food, Internet startups, and the Peace Corps, biopunks are devoted advocates for open-sourcing the basic code of life. They believe in the power of individuals with access to DNA to solve the world's biggest problems. You'll meet a new breed of hackers who aren't afraid to get their hands wet, from entrepreneurs who aim to bring DNA-based medical tools to the poorest of the poor to a curious tinkerer who believes a tub of yogurt and a jellyfish gene could protect the world's food supply. These biohackers include: -A duo who started a cancer drug company in their kitchen -A team who built an open-source DNA copy machine -A woman who developed a genetic test in her apartment for a deadly disease that had stricken her family Along with the potential of citizen science to bring about disruptive change, Wohlsen explores the risks of DIY bioterrorism, the possibility of genetic engineering experiments gone awry, and whether the ability to design life from scratch on a laptop might come sooner than we think.
Dark Territory: The Secret History of Cyber War
Fred Kaplan - 2016
The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.
Hoover Dam: An American Adventure
Joseph E. Stevens - 1988
Through the worst years of the Great Depression as many as five thousand laborers toiled twenty-four hours a day, seven days a week, to erect the huge structure that would harness the Colorado River and transform the American West.Construction of the giant dam was a triumph of human ingenuity, yet the full story of this monumental endeavor has never been told. Now, in an engrossing, fast-paced narrative, Joseph E. Stevens recounts the gripping saga of Hoover Dam. Drawing on a wealth of material, including manuscript collections, government documents, contemporary newspaper and magazine accounts, and personal interviews and correspondence with men and women who were involved with the construction, he brings the Hoover Dam adventure to life.Described here in dramatic detail are the deadly hazards the work crews faced as they hacked and blasted the dam’s foundation out of solid rock; the bitter political battles and violent labor unrest that threatened to shut the job down; the deprivation and grinding hardship endured by the workers’ families; the dam builders’ gambling, drinking, and whoring sprees in nearby Las Vegas; and the stirring triumphs and searing moments of terror as the massive concrete wedge rose inexorably from the canyon floor.Here, too, is an unforgettable cast of characters: Henry Kaiser, Warren Bechtel, and Harry Morrison, the ambitious, headstrong construction executives who gambled fortune and fame on the Hoover Dam contract; Frank Crowe, the brilliant, obsessed field engineer who relentlessly drove the work force to finish the dam two and a half years ahead of schedule; Sims Ely, the irascible, teetotaling eccentric who ruled Boulder City, the straightlaced company town created for the dam workers by the federal government; and many more men and women whose courage and sacrifice, greed and frailty, made the dam’s construction a great human, as well as technological, adventure.Hoover Dam is a compelling, irresistible account of an extraordinary American epic.
Cayenne Pepper Cures (Miracle Healers from the Kitchen)
Sharon Daniels - 2012
It is more powerful than any other." - Dr. Richard Schulze, Medical Herbalist from herbdoc.com.Hats off to you! You've just plunged into a wealth of information that hardly any professional doctors have a clue about. Get ready to relish in the brilliance of the kitchen miracle that surgeons shun and doctors disgrace.A sea of unknown, unrevealed information awaits you. This book will act as your guide, so that you will soon be able to harness the full power of cayenne - the herb I once took for granted, and the herb that I now owe my health.Everyone out there seems to be promoting good health. Well, that's great. Good health is something that needs to be promoted. You need herbs, not drugs. You need nature, not synthetics. You need to use the proven, natural, side-affect-free healers that the earth is full of, not the clear, cold liquids that scientists processed through a test tube.If I had the time, I'd drive from house to house, shaking people out of their beds and telling them to wake up to the miracles of cayenne. But I can't, so I've got the next best thing.This report, which I've been compiling for a while, is brimming with the fiery brilliance of cayenne and all that I've found out about it.For example, cayenne has been known to cure 17 big diseases. It has been known to stop a heart attack in a matter of minutes. It can sharpen your vision better than the most powerful contact lenses available. It can expand your arteries like anything, giving the blood room to really flow and travel everywhere, from your arms (giving you strength) to your brain (giving you better brainpower). It can cure arthritis and much, much more.If your heart can't pump enough blood to a certain area, take cayenne pepper.Because if you're on prescription medications, you could take up to a year (or more!) to heal. But if you take cayenne, you could cut it down to a month or two.Did you know that if you take garlic in the right proportions, you can bring your blood pressure back to normal in three months?Well, if you add cayenne, you could cut that down to three days.Cayenne can unclog your kidneys and your sinuses, allow you to breathe freely and restore broken, bleeding gums to normal. Cayenne, in short, is a kitchen miracle.I owe my health to cayenne. I hope that by reading this report, you soon will too.To your health,Sharon Daniels
Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance
Julia Angwin - 2014
We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
Secrets and Lies: Digital Security in a Networked World
Bruce Schneier - 2000
Identity Theft. Corporate Espionage. National secrets compromised. Can anyone promise security in our digital world?The man who introduced cryptography to the boardroom says no. But in this fascinating read, he shows us how to come closer by developing security measures in terms of context, tools, and strategy. Security is a process, not a product – one that system administrators and corporate executives alike must understand to survive.This edition updated with new information about post-9/11 security.