Analog Science Fiction and Fact, November 1985
Stanley SchmidtLarry Powell - 1985
Gillett, Ph.D.• The Efficiency Expert by W. R. Thompson• Second Helpings by George R. R. Martin• Random Sample by Heidi Heyer• On Gaming by Dana Lombardy• Siblings by Larry Powell• Diabetes and Rockets by G. Harry Stine• Béisbol by Ben Bova• The Darkling Plain by P. M. Fergusson• Biolog: P. M. Fergusson by Jay Kay Klein• The Reference Library by Thomas A. Easton • Review: Artifact by Gregory Benford by Thomas A. Easton • Review: Cuckoo's Egg by C. J. Cherryh by Thomas A. Easton • Review: Skinner by Richard S. McEnroe by Thomas A. Easton • Review: Blood Music by Greg Bear by Thomas A. Easton • Review: A Coming of Age by Timothy Zahn by Thomas A. Easton • Review: Trumps of Doom by Roger Zelazny by Thomas A. Easton • Review: The Fall of Winter by Jack C. Haldeman, II by Thomas A. Easton • Review: The Time Travelers; A Science Fiction Quartet by Martin H. Greenberg and Robert Silverberg by Thomas A. Easton • Review: The Hugo Winners, 1976-1979 by Isaac Asimov by Thomas A. Easton • Review: Young Extraterrestrials by Isaac Asimov and Martin Greenberg and Charles Waugh by Thomas A. Easton • Review: The Year's Best Science Fiction, Second Annual Collection by Gardner Dozois by Thomas A. Easton • Review: The Future of Flight by Dean Ing and Leik Myrabo by Thomas A. Easton • Review: Out of the Cradle: Exploring the Frontiers Beyond Earth by William K. Hartmann and Pamela Lee and Ron Miller by Thomas A. Easton • Brass Tacks by Stanley Schmidt• Analog: A Calendar of Upcoming Events by Anthony R. Lewis
Gray Hat Hacking: The Ethical Hacker's Handbook
Shon Harris - 2004
Section I: Exploits 202; Chapter 1: Survival; Chapter 2: Basic Exploits; Chapter 3: Advance Exploits; Chapter 4: Writing Shell Code; Section II: Vulnerability Analysis; Chapter 5: Passive Analysis; Chapter 6: Active Analysis; Chapter 7: Bug to Exploit; Chapter 8: Mitigation; Section III: Advanced System Hacks; Chapter 9: Advanced.
Marshall Brain's How Stuff Works
Marshall Brain - 2001
Marshall Brain's How Stuff Works is a lavish, full-color, highly visual resource for those with hungry minds who crave an understanding of the way things work around them-from submarine ships to digital technology to toilets With over 1,000 full-color illustrations and photos showing step-by-step images of how stuff works, these easy-to-understand explanations cover the most popular and interesting subject areas, including Technology, Science, Health, Fitness, Transportation, and more Sample topics include: How CDs Work, How Car Engines Work, and How Nuclear Radiation and Power Work.
Fatal Flight: The True Story of Britain's Last Great Airship
Bill Hammack - 2017
The British expected R.101 to spearhead a fleet of imperial airships that would dominate the skies as British naval ships, a century earlier, had ruled the seas. The dream ended when, on its demonstration flight to India, R.101 crashed in France, tragically killing nearly all aboard.Combining meticulous research with superb storytelling, Fatal Flight guides us from the moment the great airship emerged from its giant shed—nearly the largest building in the British Empire—to soar on its first flight, to its last fateful voyage. The full story behind R.101 shows that, although it was a failure, it was nevertheless a supremely imaginative human creation. The technical achievement of creating R.101 reveals the beauty, majesty, and, of course, the sorrow of the human experience.The narrative follows First Officer Noel Atherstone and his crew from the ship’s first test flight in 1929 to its fiery crash on October 5, 1930. It reveals in graphic detail the heroic actions of Atherstone as he battled tremendous obstacles. He fought political pressures to hurry the ship into the air, fended off Britain’s most feted airship pilot, who used his influence to take command of the ship and nearly crashed it, and, a scant two months before departing for India, guided the rebuilding of the ship to correct its faulty design. After this tragic accident, Britain abandoned airships, but R.101 flew again, its scrap melted down and sold to the Zeppelin Company, who used it to create LZ 129, an airship even more mighty than R.101—and better known as the Hindenburg. Set against the backdrop of the British Empire at the height of its power in the early twentieth century,Fatal Flight portrays an extraordinary age in technology, fueled by humankind’s obsession with flight.
Print Is Dead: Books in Our Digital Age
Jeff Gomez - 2007
Through wars, radio, TV, computer games and fluctuating literacy rates, the book has, somewhat bizarrely, remained the more robust and culturally relevant way to communicate ideas. Now, for the first time since the Middle Ages, all that is about to change.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Linux Device Drivers
Jonathan Corbet - 2005
And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic "Linux Device Drivers" from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn: how to support computer peripherals under the Linux operating system how to develop and write software for new hardware under Linux the basics of Linux operation even if they are not expecting to write a driver The new edition of "Linux Device Drivers" is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier
Suelette Dreyfus - 1997
Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.
Zentangle Inspired Art: A Beginners Guide to Zentangle Art and Zentangle Inspired Art and Craft Projects
Mahe Zehra Husain - 2014
This art form has been developed by Rick Roberts and Maria Thomas. What I love most about this art form is that all the patterns are based on simple lines, circles and shapes. Anyone can do it. The beauty of Zentangle lies in the way these patterns evolve from their simple building blocks. Different patterns are put together to create small ‘tiles’ or square drawings. Zentangle art has been used by artists from all over the globe and from all art fields. They have incorporated Zentangle art into everything from mixed media, paper crafting, scrap booking to home décor projects. A simple search on Google images will reveal the vast world of Zentangle art! Zentangle art has also been used by kids all over the world to have fun and make paper toys. With this book Zentangle art can now be used by you to rest, relax, create and make art! This book is perfect for the beginner as well as the experienced tangler. We will go through the list of tools needed, basic tangles created by Rick and Maria, Zentangle Inspired Projects, creating new tangles and lots of worksheets for you to play with and have fun. So left brained or right brained, artist or scientist, child or adult join us in this wonderful journey as we discover and create awesome doodles and tangles. This book will take you from the tools needed to start your Zentangle art experience to creating some beautiful Zentangle Inspired Art pieces that will range from mixed media to home décor crafts. Let’s take a brief look at all we will cover in this book. We will discuss paper, pencils, tiles and log books to store patterns. Once we have all the basics in place we will move on to basic tangle patterns. These tangle patterns have either all been developed by the founders of Zentangle, Rick and Maria or are part of the list of official tangles. They are a great place to start your tangling adventure. Tangles can also be enhanced in several different ways. We will talk about four of these methods and share some examples. Next up we will add some color to the black and white world of Zentangle Art and stir things up a bit. We will go through several different ways in which color can be incorporated in your tangled art. Then we come to the art creation section of the book! In Chapter 5 I will share lots of worksheets for exercises and projects you can do yourself whenever you want. The worksheets come as an easy download and you can print as many as you want to use for yourself or share with family and friends when you introduce them to tangling. These worksheets come as a separate pdf which is available for FREE download for all readers. In Chapter 6 I will outline and give instructions for several applications of Zentangle art in the popular art and craft forms today. We will talk about mixed media art dolls, home décor items, book making, art journaling, card making, paper quilts, Artist Trading Cards and paper crafting. To finish up I will share with you a few of the tangles I have come up with and will show you how to create your own!
The Conscientious Marine Aquarist: A Commonsense Handbook for Successful Saltwater Hobbyists
Robert M. Fenner - 1996
As a pragmatic, hands-on guide for beginning to intermediate hobbyists, The Conscientious Marine Aquarist demystifies the process of planning, setting up, stocking, and managing a beautiful, thriving slice of the tropical ocean. A leading advocate for the responsible collection and care of wild-caught specimens, Fenner starts with the basics -- "What is a fish?" -- and proceeds to give the reader the scientific background and expert-level secrets to being a smarter consumer, better steward, and more successful marine aquarium keeper.
Google Hacks: Tips & Tools for Finding and Using the World's Information
Rael Dornfest - 2003
But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach. And have a lot of fun while doing it:Search Google over IM with a Google Talk bot Build a customized Google Map and add it to your own web site Cover your searching tracks and take back your browsing privacy Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice Keep tabs on blogs in new, useful ways Turn Gmail into an external hard drive for Windows, Mac, or Linux Beef up your web pages with search, ads, news feeds, and more Program Google with the Google API and language of your choice For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!
The Year in Tech, 2021: The Insights You Need from Harvard Business Review (HBR Insights Series)
Harvard Business Review - 2020
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz - 2014
But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."
Mini Weapons of Mass Destruction: Build a Secret Agent Arsenal
John Austin - 2011
If you’re a budding spy, what better way to conceal your clandestine activities than to miniaturize your secret agent arsenal? MiniWeapons of Mass Destruction 2 provides fully illustrated step-by-step instructions for building 30 different spy weapons and surveillance tools, including:* Paper Dart Watch * Pen Blowgun* Rubber Band Derringer * Mint Tin Catapult* Pushpin Dart * Cotton Swab .38 Special* Toothpaste Periscope * Paper Throwing Star* Bionic Ear * And more!Once you’ve assembled your weaponry, the author provides a number of ideas on how to hide your stash—inside a deck of cards, a false-bottom soda bottle, or a cereal box briefcase—and targets for practicing your spycraft, including a flip-down firing range, a fake security camera, and sharks with laser beams.