Book picks similar to
Make: Technology on Your Time Volume 04: Technology on Your Time by Mark Frauenfelder
hacking
science
technology
hackerdojo
Harmonograph: A Visual Guide to the Mathematics of Music
Anthony Ashton - 1999
Harmonograph is an introduction to the evolution of simple harmonic theory, from the discoveries of Pythagoras to diatonic tuning and equal temperament. Beautiful drawings show the octave as triangle, the fifth as pentagram; diagrams show the principles of harmonics, overtones, and the monochord. Anthony Ashton examines the phenomenon of resonance in Chladni patterns, describes how to build a harmonograph of your own, and provides tables of world tuning systems. This inspiring book will appeal to musicians, mathematicians, designers, and artists alike.
Running Linux
Matt Welsh - 1995
This operating system now serves as corporate hubs, Web servers, academic research platforms, and program development systems. All along it's also managed to keep its original role as an enjoyable environment for personal computing, learning system administration and programming skills, and all-around hacking.This book, now in its third edition, has been widely recognized for years in the Linux community as the getting-started book people need. It goes into depth about configuration issues that often trip up users but are glossed over by other books.A complete, UNIX-compatible operating system developed by volunteers on the Internet, Linux is distributed freely in electronic form and at a low cost from many vendors. Developed first on the PC, it has been ported to many other architectures and can now support such heavy-duty features as multiprocessing, RAID, and clustering.Software packages on Linux include the Samba file server and Apache Web server; the X Window System (X11R6); TCP/IP networking (including PPP, SSH, and NFS support); popular software tools such as Emacs and TeX; a complete software development environment including C, C++, Java, Perl, Tcl/Tk, and Python; libraries, debuggers, multimedia support, scientific and database applications, and much more. Commercial applications that run on Linux range from end-user tools like word processors and spreadsheets to mission-critical software like the Oracle, Sybase, Informix, and IBM DB/2 database management systems.Running Linux has all the information you need to understand, install, and start using the Linux operating system. This includes a comprehensive installation tutorial, complete information on system maintenance, tools for document development and programming, and guidelines for network, file, printer, and Web site administration.
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
OccupyTheWeb - 2018
Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Stealing the Network: How to Own a Continent
Ryan Russell - 2004
While there will be the inevitable criticism that the material contained in the book could be used maliciously, the fact is that this knowledge is already in the hands of our enemies. This book is truly designed to inform while entertaining (and scaring) the reader, and it will instantly be in demand by readers of "Stealing the Network: How to Own the Box" * A meticulously detailed and technically accurate work of fiction that exposes the very real possibilities of such an event occurring* An informative and scary insight into the boundries of hacking and cyber-terrorism* Written by a team of the most accomplished cyber-security specialists in the world
Tcp/IP Illustrated, Volume 3: TCP for Transactions, Http, Nntp, and the Unix Domain Protocols
W. Richard Stevens - 1996
As in the previous two volumes, the book is filled with examples and implementation details within the 4.4BSD-Lite networking code. The TCP/IP Illustrated series provides a complete picture of the protocol suite that drives the Internet, and gives programmers, system administrators, and serious users the information, understanding, and skills they need to remain at the forefront of networking technology.
HTTP: The Definitive Guide
David Gourley - 2002
Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the black arts and tricks of the trade -- in a concise and readable manner.In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection.Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume.There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the why and the how of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.
Bash Cookbook: Solutions and Examples for Bash Users
Carl Albing - 2007
Scripting is a way to harness and customize the power of any Unix system, and it's an essential skill for any Unix users, including system administrators and professional OS X developers. But beneath this simple promise lies a treacherous ocean of variations in Unix commands and standards.bash Cookbook teaches shell scripting the way Unix masters practice the craft. It presents a variety of recipes and tricks for all levels of shell programmers so that anyone can become a proficient user of the most common Unix shell -- the bash shell -- and cygwin or other popular Unix emulation packages. Packed full of useful scripts, along with examples that explain how to create better scripts, this new cookbook gives professionals and power users everything they need to automate routine tasks and enable them to truly manage their systems -- rather than have their systems manage them.
The Physics of NASCAR: How to Make Steel + Gas + Rubber = Speed
Diandra Leslie-Pelecky - 2008
In this fast-paced investigation into the adrenaline-pumping world of NASCAR, a physicist with a passion uncovers what happens when the rubber hits the road and 800- horsepower vehicles compete at 190 miles per hour only inches from one another. Diandra Leslie-Pelecky reveals how and why drivers trust the engineering and science their teams literally build around them not only to get them across the finish line in first place, but also to keep them alive. Professor Leslie-Pelecky is a physicist in love with the sport’s beauty and power and is uniquely qualified to explain exactly how physics translates into winning races. Based on the author’s extensive access to race shops, pit crews, crew chiefs and mechanics, this book traces the life cycle of a race car from behind the scenes at top race shops to the track. The Physics of NASCAR takes readers right into the ultra competitive world of NASCAR, from the champion driver’s hot seat behind the detachable steering wheel to the New Zealander nicknamed Kiwi in charge of shocks for the No. 19 car. Diandra Leslie-Pelecky tells her story in terms anyone who drives a car--and maybe occasionally looks under the hood--can understand. How do drivers walk away from serious crashes? How can two cars travel faster together than either car can on its own? How do you dress for a 1800°F gasoline fire? In simple yet detailed, high-octane prose, this is the ultimate thrill ride for armchair speed demons, auto science buffs, and NASCAR fans at every level of interest. Readers, start your engines.
A Touch of Farmhouse Charm: Easy DIY Projects to Add a Warm and Rustic Feel to Any Room
Liz Fourez - 2016
With the turn of each page, Liz Fourez leads you on a tour through her family’s house, restored to its 1940s rustic farm style, and teaches you how to make each handmade decoration yourself. The projects require minimal effort, yet add instant charm to any room. With your blue jeans on and a few of the most basic supplies in hand, you’ll be on your way to your dream home in no time.You’ll learn how to make a custom wood Family Name Sign for your living room, a Wooden Boot Tray on Casters for the entryway, a Ruffled Stool Slipcover for the kitchen and a Rustic Wooden Frame for the bedroom, plus decorations for the office, bathroom, kids’ bedroom and playroom. Farmhouse style is about cultivating a connection among family, home and nature; A Touch of Farmhouse Charm helps you bring the warmth and beauty of simpler times to your modern life naturally.
Fact or Fiction: Science Tackles 58 Popular Myths
Scientific American - 2013
Drawing from Scientific American's "Fact or Fiction" and "Strange But True" columns, we've selected fifty-eight of the most surprising, fascinating, useful, and just plain wacky topics confronted by our writers over the years.
Understanding Air France 447
Bill Palmer - 2013
Written by A330 Captain, Bill Palmer, this book opens to understanding the actions of the crew, how they failed to understand and control the problem, and how the airplane works and the part it played. All in easy to understand terms.Addressed are the many contributing aspects of weather, human factors, and airplane system operation and design that the crew could not recover from. How each contributed is covered in detail along with what has been done, and needs to be done in the future to prevent this from happening again.Also see the book's companion website: UnderstandingAF447.com for supplemental materials referred to in the book or to contact the author.
Inside Cyber Warfare: Mapping the Cyber Underworld
Jeffrey Carr - 2009
You'll learn how sophisticated hackers working on behalf of states or organized crime patiently play a high-stakes game that could target anyone, regardless of affiliation or nationality.Inside Cyber Warfare goes beyond the headlines of attention-grabbing DDoS attacks and takes a deep look inside multiple cyber-conflicts that occurred from 2002 through summer 2009.Learn how cyber attacks are waged in open conflicts, including recent hostilities between Russia and Georgia, and Israel and PalestineDiscover why Twitter, Facebook, LiveJournal, Vkontakte, and other sites on the social web are mined by the intelligence services of many nationsRead about China's commitment to penetrate the networks of its technologically superior adversaries as a matter of national survivalFind out why many attacks originate from servers in the United States, and who's responsibleLearn how hackers are "weaponizing" malware to attack vulnerabilities at the application level
Destination Mars: The Story of Our Quest to Conquer the Red Planet
Andrew May - 2017
Half a century later, only robots have been to the Red Planet and our astronauts rarely venture beyond Earth orbit.Now Mars is back With everyone from Elon Musk to Ridley Scott and Donald Trump talking about it, interplanetary exploration is back on the agenda and Mars is once again the prime destination for future human expansion and colonisation. In Destination Mars, astrophysicist and science writer Andrew May traces the history of our fascination with the Red Planet and explores the science upon which a crewed mission would be based, from assembling a spacecraft in Earth orbit to surviving solar storms. With expert insight, he analyses the new space race and assesses what the future holds for human life on Mars.
After Effects Apprentice
Trish Meyer - 2007
http://69.131.42.194/showpic.php?imag...
Emergency! Crisis on the Flight Deck
Stanley Stewart - 1989
This book offers a unique insight into how crews responded to crisis and what really happened.