Two Scoops of Django 1.11: Best Practices for the Django Web Framework


Daniel Roy Greenfeld - 2017
    We have put thousands of hours into the fourth edition of the book, writing and revising its material to include significant improvements and new material based on feedback from previous editions.

Computer Security: Principles and Practice


William Stallings - 2007
    This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

The Bletchley Girls


Tessa Dunlop - 2015
    Many were just school girls at the outbreak of war; the next six years would change their lives forever. This vivid portrayal of their experiences, sacrifices, and memories is a poignant reminder that without the work of thousands of young women Bletchley Park's extraordinary achievements would not have been possible. By meeting and talking to these fascinating female secret-keepers who are still alive today, Tessa Dunlop captures their extraordinary journeys into an adult world of war, secrecy, love, and loss. Through the voices of the women themselves, this is the story of life at Bletchley Park beyond the celebrated code-breakers; it's the story of the girls behind Britain's ability to consistently outsmart the enemy.

Starting Out with C++: From Control Structures Through Objects


Tony Gaddis - 2006
    Gaddis motivates the study of both programming skills and the C++ programming language by presenting all the details needed to understand the "how" and the "why"-but never losing sight of the fact that most beginners struggle with this material. His approach is both gradual and highly accessible, ensuring that students understand the logic behind developing high-quality programs. In Starting Out with C++: From Control Structures through Objects, Gaddis covers control structures, functions, arrays, and pointers before objects and classes. As with all Gaddis texts, clear and easy-to-read code listings, concise and practical real-world examples, and an abundance of exercises appear in every chapter. This text is intended for either a one-semester accelerated introductory course or a traditional two-semester sequence covering C++ programming. This edition is available with MyProgrammingLab, an innovative online homework and assessment tool. Through the power of practice and immediate personalized feedback, MyProgrammingLab helps students fully grasp the logic, semantics, and syntax of programming. � Note: If you are purchasing the standalone text or electronic version, MyProgrammingLab does not come automatically packaged with the text. To purchase MyProgrammingLab, please visit: myprogramminglab.com or you can purchase a package of the physical text + MyProgrammingLab by searching for ISBN 10: 0132774178 / ISBN 13: 9780132774178.� MyProgrammingLab is not a self-paced technology and should only be purchased when required by an instructor.

Women, Men, and Society


Claire M. Renzetti - 1989
    The approach, which focuses on intersecting inequalities, illustrates how racism, social class, ageism and heterosexism can compound the consequences of gender inequality. Although it focuses primarily on women and men in the United States, international issues and data are incorporated throughout.

Raising Cain: Protecting the Emotional Life of Boys


Dan Kindlon - 1999
    They reveal a nation of boys who are hurting--sad, afraid, angry, and silent. Kindlon and Thompson set out to answer this basic, crucial question: What do boys need that they're not getting? They illuminate the forces that threaten our boys, teaching them to believe that "cool" equals macho strength and stoicism. Cutting through outdated theories of "mother blame," "boy biology," and "testosterone," the authors shed light on the destructive emotional training our boys receive--the emotional miseducation of boys.Kindlon and Thompson make a compelling case that emotional literacy is the most valuable gift we can offer our sons, urging parents to recognize the price boys pay when we hold them to an impossible standard of manhood. They identify the social and emotional challenges that boys encounter in school and show how parents can help boys cultivate emotional awareness and empathy--giving them the vital connections and support they need to navigate the social pressures of youth.

Mother of Invention: How Good Ideas Get Ignored in an Economy Built for Men


Katrine Marçal - 2021
    Though the wheel was invented some five thousand years ago, and the suitcase in the nineteenth century, it wasn’t until the 1970s that someone successfully married the two. What was the hold up? For writer and journalist Katrine Marçal, the answer is both shocking and simple: because “real men” carried their bags, no matter how heavy.  Mother of Invention is a fascinating and eye-opening examination of business, technology, and innovation through a feminist lens. Because it wasn’t just the suitcase. Drawing on examples from electric cars to bra seamstresses to tech billionaires, Marçal shows how gender bias stifles the economy and holds us back, delaying innovations, sometimes by hundreds of years, and distorting our understanding of our history. While we talk about the Iron Age and the Bronze Age, we might as well talk about the “Ceramic Age” or the “Flax Age,” since these technologies were just as important. But inventions associated with women are not considered to be technology in the same way.

Python: Programming: Your Step By Step Guide To Easily Learn Python in 7 Days (Python for Beginners, Python Programming for Beginners, Learn Python, Python Language)


iCode Academy - 2017
    Are You Ready To Learn Python Easily? Learning Python Programming in 7 days is possible, although it might not look like it

Carceral Capitalism


Jackie Wang - 2017
    When people are trapped in a cycle of debt it also can affect their subjectivity and how they temporally inhabit the world by making it difficult for them to imagine and plan for the future. What psychic toll does this have on residents? How does it feel to be routinely dehumanized and exploited by the police?—from Carceral CapitalismIn this collection of essays in Semiotext(e)'s Intervention series, Jackie Wang examines the contemporary incarceration techniques that have emerged since the 1990s. The essays illustrate various aspects of the carceral continuum, including the biopolitics of juvenile delinquency, predatory policing, the political economy of fees and fines, cybernetic governance, and algorithmic policing. Included in this volume is Wang's influential critique of liberal anti-racist politics, “Against Innocence,” as well as essays on RoboCop, techno-policing, and the aesthetic problem of making invisible forms of power legible.Wang shows that the new racial capitalism begins with parasitic governance and predatory lending that extends credit only to dispossess later. Predatory lending has a decidedly spatial character and exists in many forms, including subprime mortgage loans, student loans for sham for-profit colleges, car loans, rent-to-own scams, payday loans, and bail bond loans. Parasitic governance, Wang argues, operates through five primary techniques: financial states of exception, automation, extraction and looting, confinement, and gratuitous violence. While these techniques of governance often involve physical confinement and the state-sanctioned execution of black Americans, new carceral modes have blurred the distinction between the inside and outside of prison. As technologies of control are perfected, carcerality tends to bleed into society.

Absolute Java


Walter J. Savitch - 2003
    Praised for providing an engaging balance of thoughtful examples and explanatory discussion, ?best-selling author Walter Savitch explains concepts and techniques in a straightforward style using understandable language and code enhanced by a suite of pedagogical tools.? "Absolute Java "is appropriate for both introductory and intermediate programming courses introducing Java.

Unmastered: A Book on Desire, Most Difficult to Tell


Katherine Angel - 2012
    Incisive, moving, and lyrical, it opens up a larger space for the exploration of feelings that can be difficult to express.

Social Engineering: The Art of Human Hacking


Christopher Hadnagy - 2010
    Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.

The Art of Electronics


Paul Horowitz - 1980
    Widely accepted as the authoritative text and reference on electronic circuit design, both analog and digital, this book revolutionized the teaching of electronics by emphasizing the methods actually used by circuit designers -- a combination of some basic laws, rules of thumb, and a large bag of tricks. The result is a largely nonmathematical treatment that encourages circuit intuition, brainstorming, and simplified calculations of circuit values and performance. The new Art of Electronics retains the feeling of informality and easy access that helped make the first edition so successful and popular. It is an ideal first textbook on electronics for scientists and engineers and an indispensable reference for anyone, professional or amateur, who works with electronic circuits.

Inventing the Internet


Janet Abbate - 1999
    In Inventing the Internet, Janet Abbate recounts the key players and technologies that allowed the Internet to develop; but her main focus is always on the social and cultural factors that influenced the Internets design and use. The story she unfolds is an often twisting tale of collaboration and conflict among a remarkable variety of players, including government and military agencies, computer scientists in academia and industry, graduate students, telecommunications companies, standards organizations, and network users.The story starts with the early networking breakthroughs formulated in Cold War think tanks and realized in the Defense Department's creation of the ARPANET. It ends with the emergence of the Internet and its rapid and seemingly chaotic growth. Abbate looks at how academic and military influences and attitudes shaped both networks; how the usual lines between producer and user of a technology were crossed with interesting and unique results; and how later users invented their own very successful applications, such as electronic mail and the World Wide Web. She concludes that such applications continue the trend of decentralized, user-driven development that has characterized the Internet's entire history and that the key to the Internet's success has been a commitment to flexibility and diversity, both in technical design and in organizational culture.