Darknet: A Beginner's Guide to Staying Anonymous


Lance Henderson - 2012
    This book covers it all! Encrypting your private files, securing your PC, masking your online footsteps, and all while giving you peace of mind with TOTAL 100% ANONYMITY. Don't waste months scouring the internet for info. Just read this! You'll be hooked in five minutes. It's all here: CIA techniques, how the NSA catches Tor users, Truecrypt and the FBI, nuking tracking cookies, private browsing, preventing identity theft. I will show you: -How to Be Anonymous Online -Step by Step Guides for Tor, Freenet, I2P, VPNs, Usenet and more -Browser Fingerprinting -Anti-Hacking and Counter-Forensic Techniques -Photo & Video Metadata -How to Encrypt Files (I make this super simple) -How to Defeat NSA Spying -How to Browse the Deep Web -How to Protect Your Identity -How to Hide Anything! You've probably read How to Be Invisible by J. J. Luna and Incognito Toolkit by Rob Robideau, and while they are fine books, you need this companion piece to take it to the next level!

Admiral Chester W. Nimitz: The Life and Legacy of the U.S. Pacific Fleet’s Commander in Chief during World War II


Charles River Editors - 2019
    soil.” – Admiral Nimitz All Americans are familiar with the “day that will live in infamy.” At 9:30 a.m. on Sunday, December 7, 1941, Pearl Harbor, the advanced base of the United States Navy’s Pacific Fleet, was ablaze. It had been smashed by aircraft launched by the carriers of the Imperial Japanese Navy. All eight battleships had been sunk or badly damaged, 350 aircraft had been knocked out, and over 2,000 Americans lay dead. Indelible images of the USS Arizona exploding and the USS Oklahoma capsizing and floating upside down have been ingrained in the American conscience ever since. In less than an hour and a half the Japanese had almost wiped out America’s entire naval presence in the Pacific. Despite fighting in North Africa and the Atlantic, the United States still had the resources and manpower to fight the Japanese in the Pacific. Though the Japanese had crippled the American fleet at Pearl Harbor, its distance from Japan made an invasion of Pearl Harbor impossible, and Japan had not severely damaged important infrastructure. Thus, the United States was able to quickly rebuild a fleet, still stationed at Pearl Harbor right in the heart of the Pacific. This forward location allowed the United States to immediately push deeply into the Pacific Theater. The Americans would eventually push the Japanese back across the Pacific, and one of the most instrumental leaders in the effort was Admiral Chester W. Nimitz, who commanded the U.S. Pacific Fleet and helped coordinate joint operations with the legendary General Douglas MacArthur, the Supreme Commander, Southwest Pacific Area. The ensuing strategies would lead to decisive operations at places like Midway, Iwo Jima, Okinawa, and others before the use of the atomic bombs compelled Japan’s surrender in August 1945. Admiral Chester W. Nimitz: The Life and Legacy of the U.S. Pacific Fleet’s Commander in Chief during World War II chronicles Nimitz’s life and examines the decisions he made during history’s deadliest war. Along with pictures of important people, places, and events, you will learn about Admiral Nimitz like never before.

Mastering Excel Macros: Introduction (Book 1)


Mark Moore - 2014
    Everybody wants to learn them. You're not a programmer though. How is a non technical user going to learn how to program? You do want to use macros to make your work easier but are you really going to sit down with a huge programming textbook and work your way through every. single. boring. page? Like most people, you'll start with great enthusiasm and vigor but after a few chapters, the novelty wears off. It gets boring. I'm going to try and change that and make learning macro programming entertaining and accessible to non-techies. First of all, programming Excel macros is a huge topic. Let's eat the elephant one bite at a time. Instead of sitting down with a dry, heavy text, you will read very focused, to the point topics. You can then immediately use what you learned in the real world. This is the first lesson in the series. You will learn what macros are, how to access them, a tiny bit of programming theory (just so you have a clue as to what's going on) and how to record macros. As with all my other lessons, this one has a follow along workbook that you can use to work through the exercises. The images in the lessons are based on Excel 2013 for Windows.

Advanced PHP Programming


George Schlossnagle - 2004
    The rapid maturation of PHP has created a skeptical population of users from more traditional enterprise languages who question the readiness and ability of PHP to scale, as well as a large population of PHP developers without formal computer science backgrounds who have learned through the hands-on experimentation while developing small and midsize applications in PHP. While there are many books on learning PHP and developing small applications with it, there is a serious lack of information on scaling PHP for large-scale, business-critical systems. Schlossnagle's Advanced PHP Programming fills that void, demonstrating that PHP is ready for enterprise Web applications by showing the reader how to develop PHP-based applications for maximum performance, stability, and extensibility.

Operating System Concepts Essentials


Abraham Silberschatz - 2010
    This book covers the core concepts of operating systems without any unnecessary jargon or text. The authors put you on your way to mastering the fundamental concepts of operating systems while you also prepare for today's emerging developments.Covers the core concepts of operating systems Bypasses unnecessary and wordy text or jargon Encourages you to take your operating system knowledge to the next level Prepares you for today's emerging developments in the field of operating systems Operating Systems Concepts Essentials is a soup-to-nuts guide for all things involving operating systems!

Networking for Systems Administrators (IT Mastery Book 5)


Michael W. Lucas - 2015
    Servers give sysadmins a incredible visibility into the network—once they know how to unlock it. Most sysadmins don’t need to understand window scaling, or the differences between IPv4 and IPv6 echo requests, or other intricacies of the TCP/IP protocols. You need only enough to deploy your own applications and get easy support from the network team.This book teaches you:•How modern networks really work•The essentials of TCP/IP•The next-generation protocol, IPv6•The right tools to diagnose network problems, and how to use them•Troubleshooting everything from the physical wire to DNS•How to see the traffic you send and receive•Connectivity testing•How to communicate with your network team to quickly resolve problemsA systems administrator doesn’t need to know the innards of TCP/IP, but knowing enough to diagnose your own network issues transforms a good sysadmin into a great one.

Professional PHP Programming


Sascha Schumann - 1999
    PHP is a server-side, HTML-embedded scripting language. It is an open source technology, rapidly gaining popularity as a scripting language for people running dynamic websites. One of its major attractions over Perl, JavaScript and other scripting languages is that PHP has a built-in database integration layer and seamless IP connectivity, with LDAP and TCP as well as the IMAP mail interface. Features; Real world, practical experience and techniques From installation and configuration of the PHP engine to advanced dynamic application design Definitive coverage of core PHP language and database addressing: MySQL is covered in depth. Practical e-commerce and business scripting including database application development, together with PHP and XML applications. LDAP connectivity addressed.

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Quantum Physics Made Easy: The Introduction Guide For Beginners Who Flunked Maths And Science In Plain Simple English


Donald B. Grey - 2019
     99.99% of the world’s mysteries are yet to be discovered and/or solved. Why not… It’s time for you to rediscover science? One of the most compelling draws of the sciences for many people is the potential of discovering something that was not known before. Whether someone’s doing it for fame, for fortune, or just for the fun of it, discovering something new, leaving your own personal mark for the rest of humanity’s time in the universe, is a tempting prospect for many. How would you feel about naming a star, and for others to know that you named it? That star would be visible in the sky for the rest of your lifetime, and more than likely for your great-great-great-grandchildren’s lifetimes. Your discovery would be immortalized above for the life of the star. Inside this book you will discover: -String theory and how it came about -Black holes and quantum gravity -If Schrödinger’s Cat is really a cat? -Disagreements between Einstein and Bohr -The double slit experiment Attention! Quantum Physics is NOT for everyone! This book is not for people: -Who doesn’t want to impress their girl with science -Who are not curious about the universe -Who isn’t inspired to name their own science theory If you are ready to learn about quantum physics, Scroll Up And Click On The “BUY NOW” Button Now!

Igniting the Sixth Sense: The Lost Human Sensory that Holds the Key to Spiritual Awakening and Unlocking the Power of the Universe


Eric Pepin - 2013
     Is it possible to: - Influence reality with the power of thought? - Push into the universal mind, vastly increasing your intelligence? - Easily reach peak states for real, breakthrough spiritual experiences? Indeed and much more. This is not just another fuzzy New Age book about a magical, vague 'sixth sense'. Igniting the Sixth Sense deals with the magnetic sense that allows birds, whales, bees and many other animals to detect and use magnetic fields in ways that seem impossible for humans. Yet, we possess this same natural ability. What happens if you combine a modern human with an active, magnetic sensory? They display skills and abilities that seem, at times, super-human. Eric Pepin, the #1 spiritual Amazon bestselling author of Meditation within Eternity and The Handbook of the Navigator, takes you on a journey where you will discover: * How to access a larger memory beyond your own; the Akashic Records * Discover the method of magnetic prana attraction that makes the entire Universe react to who you are and what you want * How to enhance every mind, body and spiritual technique you practice. Including meditation, martial arts and more * The 15 minute miracle that gives you nearly unlimited amounts of energy * How to create a 'psychic buffer' so you aren't overwhelmed, harmed or influenced by the energy and thoughts of others * Learn the secret to programming your own energy field And that's just the beginning. There are 280 pages worth, packed with in-depth knowledge and effective techniques you can easily apply. It's all here, and it works.

Making Games with Python & Pygame


Al Sweigart - 2012
    Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for free from http: //inventwithpython.com/pygame This book was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has some familiarity with Python.

Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)


Artemis Caro - 2017
    As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn: A Brief History of Blockchain Technology Blockchain Basics: Managing Digital Transactions What is a Distributed Ledger? Blockchain Beyond Bitcoin Implications Of Blockchain: Big Data, Privacy & Personal Data Profiting from Blockchain Technologies Limitations & Challenges of Blockchain The Future of Blockchain For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets. This is ALL About To Change... Make sure you take action and join the Financial Revolution by reading this book!

Google Hacking: An Ethical Hacking Guide To Google


Ankit Fadia - 2007
    Google Hacking teaches people how to get the most out of this revolutionary search engine. Not only will this book teach readers how Google works, but it will also empower them with the necessary skills to make their everyday searches easier, more efficient, and more productive. Google Hacking also demonstrates how Google can be used for negative means. It's immense searching power, means that everyone, including cyber criminals, can feasibly access confidential data, such as company presentations, budgets, blueprints, even credit card numbers, with just the click of a mouse. Using numerous examples, case studies, and screenshots, this book explains the art of ethical Google Hacking -- it not only teaches readers how Google works, but it provides them with the knowledge they need to protect their data and systems from getting Google Hacked. This is the only book you need to maximize (and protect yourself) from Google searches!

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

DevOps Troubleshooting: Linux Server Best Practices


Kyle Rankin - 2012
    It has saved me hours in troubleshooting complicated operations problems." -Trotter Cashion, cofounder, Mashion DevOps can help developers, QAs, and admins work together to solve Linux server problems far more rapidly, significantly improving IT performance, availability, and efficiency. To gain these benefits, however, team members need common troubleshooting skills and practices. In DevOps Troubleshooting: Linux Server Best Practices , award-winning Linux expert Kyle Rankin brings together all the standardized, repeatable techniques your team needs to stop finger-pointing, collaborate effectively, and quickly solve virtually any Linux server problem. Rankin walks you through using DevOps techniques to troubleshoot everything from boot failures and corrupt disks to lost email and downed websites. You'll master indispensable skills for diagnosing high-load systems and network problems in production environments. Rankin shows how to Master DevOps' approach to troubleshooting and proven Linux server problem-solving principles Diagnose slow servers and applications by identifying CPU, RAM, and Disk I/O bottlenecks Understand healthy boots, so you can identify failure points and fix them Solve full or corrupt disk issues that prevent disk writes Track down the sources of network problems Troubleshoot DNS, email, and other network services Isolate and diagnose Apache and Nginx Web server failures and slowdowns Solve problems with MySQL and Postgres database servers and queries Identify hardware failures-even notoriously elusive intermittent failures