Book picks similar to
Make: Technology on Your Time Volume 04: Technology on Your Time by Mark Frauenfelder
science
hacking
o-reilly
gadgets
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Masters of Deception: The Gang That Ruled Cyberspace
Michelle Slatalla - 1995
"An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour
Banjo for Dummies [With CD-ROM]
Bill Evans - 2007
Packed with over 120 how-to photos and 130 musical examples. 94 track CD included - hear and play along with every exercise and song. The only book to offer instruction in clawhammer, bluegrass, melodic, single-string, minstrel and classic styles. From Earl Scruggs’ driving bluegrass picking to the genre-busting jazz fusion of Béla Fleck and the multi-million selling movie soundtrack O Brother Where Are Thou?, the five-string banjo can be heard just about everywhere in American music these days. Banjo For Dummies is the most complete guide to the five-string banjo ever written. It covers everything you need to get into the banjo: including how to choose, tune and care for your instrument, developing a good playing posture, fretting your first chords and getting comfortable with the left and right hand picking patterns used for clawhammer and bluegrass playing techniques. You’ll then add the left hand, spicing up your playing with slides, hammer-ons, pull-offs, and chokes for an authentic five-string banjo sound. From there, you’ll move on the play 19th century minstrel style, early 20th century classic style as well as try your hand at more advanced examples of bluegrass style. An in-depth chapter on bluegrass music explores Scruggs licks and techniques as well as melodic and single-string styles, with song examples. Also included is a banjo buyer’s guide, a section on music theory as applied to bluegrass and old-time music, an accessories guide (advice on cases, picks, straps,metronomes, computer aids and much more), information on how to find a good teacher, banjo camp or festival, chord charts, bios of twelve influential players, practice tips and much, much more! Banjo For Dummies is accessible and fun to read and it’s easy to locate just what you’re interested in playing. Included are 20 songs including several new compositions written by the author just for this book, including Reno Rag (single-string style), “Winston’s Jig” (Irish three-finger), and “Everyday Breakdown” (Scruggs style). All musical examples are played slowly on the accompanying CD, many with guitar and mandolin accompaniment. Bill Evans is one of the world’s most celebrated banjo players and teachers. He has taught thousands of people to play the five-string banjo in private lessons and group workshops literally all over the world. In addition to leading the Bill Evans String Summit, Bill has performed with Dry Branch Fire Squad, David Grisman, Peter Rowan, Tony Trischka and many others and he hosts his own acclaimed banjo camp, the NashCamp Fall Banjo Retreat in the Nashville area. As an American music historian, he has taught at San Francisco State University, the University Virginia and Duke University. He has written a popular instructional column for Banjo Newsletter magazine for the last fifteen years and hosts three popular instructional DVDs for AcuTab Publications. To learn more about Bill, visit his homepage at www.nativeandfine.com.
The Bicycle Wheel
Jobst Brandt - 1993
This volume answers questions such as: Should I use low- or high-flanged hubs for touring * Should I spoke crossed-four or crossed-three? Are radially spoked wheels stiffer than crossed-four? * How can I build a 32-spoke crossed-two wheel? * Should I use butted or straight sookes? * Does tying and soldering give a rough ride?Based on years of experience, the author has divided the book into three parts. Part One, Theory, explains how wheels respond to loads. It discusses the merits of various designs and components, and explains what causes failures. Part Two, Practice, gives a step-by-step guide for building front and rear wheels and wheels with different patterns and numbers of spokes. Part Three, Data, contains test results and formulas for computing spoke lengths and other wheel dimensions.
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
The Full Tilt Poker Strategy Guide: Tournament Edition
Michael CraigTed Forrest - 2007
Their accomplishments are unparalleled, with countless World Series of Poker and World Poker Tour championships to their names and well in excess of $100 million in winnings in private games. Now, this group of poker legends has banded together to create The Full Tilt Poker Strategy Guide, which will stand as an instant classic of the genre and is sure to become the industry standard.
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers
Kevin D. Mitnick - 2005
In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
Binocular Highlights
Gary Seronik - 2007
Each object is plotted on a detailed, easy-to-use star map, and most of these sights can be found even in a light-polluted sky. Also included are four seasonal all-sky charts that help locate each highlight. You don't need fancy or expensive equipment to enjoy the wonders of the night sky. In fact, as even experienced star gazers know, to go beyond the naked-eye sky and delve deep into the universe, all you need are binoculars ? even the ones hanging unused in your closet. If you don't own any, Binocular Highlights explains what to look for when choosing binoculars for star gazing and provides observing tips for users of these portable and versatile mini-telescopes. Sprial-bound with readable paper spine, full color throughout.
The Musical Human: A History of Life on Earth
Michael Spitzer - 2021
How we have created, performed and listened to this music throughout history has defined what our species is and how we understand who we are. Yet music is an overlooked part of our origin story. The Musical Human takes us on an exhilarating journey across the ages – from Bach to BTS and back – to explore the vibrant relationship between music and the human species. With insights from a wealth of disciplines, world-leading musicologist Michael Spitzer renders a global history of music on the widest possible canvas, looking at music in our everyday lives; music in world history; and music in evolution, from insects to apes, humans to AI. Through this journey we begin to understand how music is central to the distinctly human experiences of cognition, feeling and even biology, both widening and closing the evolutionary gaps between ourselves and animals in surprising ways.The Musical Human boldly puts the case that music is the most important thing we ever did; it is a fundamental part of what makes us human.
Hacking For Dummies
Kevin Beaver - 2004
In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!
Free as in Freedom: Richard Stallman's Crusade for Free Software
Sam Williams - 2002
It examines Stallman's unique personality and how that personality has been at turns a driving force and a drawback in terms of the movement's overall success.Free as in Freedom examines one man's 20-year attempt to codify and communicate the ethics of 1970s era "hacking" culture in such a way that later generations might easily share and build upon the knowledge of their computing forebears. The book documents Stallman's personal evolution from teenage misfit to prescient adult hacker to political leader and examines how that evolution has shaped the free software movement. Like Alan Greenspan in the financial sector, Richard Stallman has assumed the role of tribal elder within the hacking community, a community that bills itself as anarchic and averse to central leadership or authority. How did this paradox come about? Free as in Freedom provides an answer. It also looks at how the latest twists and turns in the software marketplace have diminished Stallman's leadership role in some areas while augmenting it in others.Finally, Free as in Freedom examines both Stallman and the free software movement from historical viewpoint. Will future generations see Stallman as a genius or crackpot? The answer to that question depends partly on which side of the free software debate the reader currently stands and partly upon the reader's own outlook for the future. 100 years from now, when terms such as "computer," "operating system" and perhaps even "software" itself seem hopelessly quaint, will Richard Stallman's particular vision of freedom still resonate, or will it have taken its place alongside other utopian concepts on the 'ash-heap of history?'
Primitive Technology: A Survivalist's Guide to Building Tools, Shelters, and More in the Wild
John Plant - 2019
John Plant, the man behind the channel, Primitive Technology, is a bonafide YouTube star. With almost 10 million subscribers and an average of 5 million views per video, John's channel is beloved by a wide-ranging fan base, from campers and preppers to hipster woodworkers and craftsmen. Now for the first time, fans will get a detailed, behind-the-scenes look into John's process. Featuring 50 projects with step-by-step instructions on how to make tools, weapons, shelters, pottery, clothing, and more, Primitive Technology is the ultimate guide to the craft. Each project is accompanied by illustrations as well as mini-sidebars with the history behind each item, plus helpful tips for building, material sourcing, and so forth. Whether you're a wilderness aficionado or just eager to spend more time outdoors, Primitive Technology has something for everyone's inner nature lover.
Hal Leonard Bass Method - Complete Edition
Ed Friedland - 1996
Bass MethodThe critically acclaimed Hal Leonard Electric Bass Method Second Edition in a handy composite edition Contains 3 books and 3 CDs for Levels 1, 2 and 3.
Hacking the Xbox: An Introduction to Reverse Engineering
Andrew Huang - 2003
The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.