sed and awk Pocket Reference: Text Processing with Regular Expressions


Arnold Robbins - 2000
    sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of performing the same edits on multiple files, and to write conversion programs.The sed & awk Pocket Reference is a companion volume to sed & awk, Second Edition, Unix in a Nutshell, Third Edition, and Effective awk Programming, Third Edition. This new edition has expanded coverage of gawk (GNU awk), and includes sections on:An overview of sed and awk's command line syntaxAlphabetical summaries of commands, including nawk and gawkProfiling with pgawkCoprocesses and sockets with gawkInternationalization with gawkA listing of resources for sed and awk usersThis small book is a handy reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of sed and awk.Arnold Robbins, an Atlanta native now happily living in Israel, is a professional programmer and technical author and coauthor of various O'Reilly Unix titles. He has been working with Unix systems since 1980, and currently maintains gawk and its documentation.

The Hardware Hacker: Adventures in Making and Breaking Hardware


Andrew Huang - 2017
    In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World


Joel Brenner - 2011
    He saw at close range the battleground on which adversaries are attacking us: cyberspace.Like the rest of us, governments and corporations inhabit “glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can—and cannot—do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.

Trafficked


Sophie Hayes - 2012
    At first, it was a typical whirlwind romance. But one day Bledi told her that love always comes at a price ...Bledi tricked Sophie into travelling to Italy, where he forced her to sell her body to help him pay off a debt. Terrified and ashamed, Sophie worked the dangerous Italian streets without rest, seeing as many as 30 clients in a night. She was completely at Bledi′s mercy for food, clothes and shelter. And without money, friends or family, she was trapped.But Sophie found the strength to keep going, clinging to life by a single thread of hope: that somehow she′d find a way to escape.

Filthy Rich


James Patterson - 2016
    A college dropout with an instinct for numbers--and for people--Epstein amassed his wealth through a combination of access and skill. But even after he had it all, Epstein wanted more. And that unceasing desire--especially a taste for young girls--resulted in his stunning fall from grace. From Epstein himself, to the girls he employed as masseuses at his home, to the cops investigating the appalling charges against him, FILTHY RICH examines all sides of a case that scandalized one of America's richest communities. An explosive true story, FILTHY RICH is a riveting account of wealth, power and the influence they bring to bear on the American justice system.

Amelia Earhart: The Mystery Solved


Elgen M. Long - 1999
    The authors offer evidence that the plane just simply ran out of fuel short of their Howland destination, and Earhart and Noonan were not captured by Japanese soldiers or islanders. The book covers the flying conditions under which Earhart flew - in an era before radar, with unreliable communications, grass landing strips and poorly mapped islands.

Kali Linux Revealed: Mastering the Penetration Testing Distribution


Raphaël Hertzog - 2017
    They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

The Upstarts: How Uber, Airbnb, and the Killer Companies of the New Silicon Valley Are Changing the World


Brad Stone - 2017
    Uber and Airbnb are household names: redefining neighbourhoods, challenging the way governments regulate business and changing the way we travel.In the spirit of iconic Silicon Valley renegades like Steve Jobs and Bill Gates, a new generation of entrepreneurs is sparking yet another cultural upheaval through technology. They are among the Upstarts, idiosyncratic founders with limitless drive and an abundance of self-confidence. Young, hungry and brilliant, they are rewriting the traditional rules of business, changing our day-to-day lives and often sidestepping serious ethical and legal obstacles in the process.The Upstarts is the definitive account of a dawning age of tenacity, creativity, conflict and wealth. In Brad Stone’s highly anticipated and riveting account of the most radical companies of the new Silicon Valley, we find out how it all started, and how the world is wildly different than it was ten years ago.

The City of Falling Angels


John Berendt - 2005
    Its architectural treasures crumble—foundations shift, marble ornaments fall—even as efforts to preserve them are underway. The City of Falling Angels opens on the evening of January 29, 1996, when a dramatic fire destroys the historic Fenice opera house. The loss of the Fenice, where five of Verdi's operas premiered, is a catastrophe for Venetians. Arriving in Venice three days after the fire, Berendt becomes a kind of detective—inquiring into the nature of life in this remarkable museum-city—while gradually revealing the truth about the fire.In the course of his investigations, Berendt introduces us to a rich cast of characters: a prominent Venetian poet whose shocking "suicide" prompts his skeptical friends to pursue a murder suspect on their own; the first family of American expatriates that loses possession of the family palace after four generations of ownership; an organization of high-society, partygoing Americans who raise money to preserve the art and architecture of Venice, while quarreling in public among themselves, questioning one another's motives and drawing startled Venetians into the fray; a contemporary Venetian surrealist painter and outrageous provocateur; the master glassblower of Venice; and numerous others-stool pigeons, scapegoats, hustlers, sleepwalkers, believers in Martians, the Plant Man, the Rat Man, and Henry James.Berendt tells a tale full of atmosphere and surprise as the stories build, one after the other, ultimately coming together to reveal a world as finely drawn as a still-life painting. The fire and its aftermath serve as a leitmotif that runs throughout, adding the elements of chaos, corruption, and crime and contributing to the ever-mounting suspense of this brilliant book.

Eniac: The Triumphs and Tragedies of the World's First Computer


Scott McCartney - 1999
    10 illustrations.

Security in Computing


Charles P. Pfleeger - 1988
    In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv

Snowing in Bali


Kathryn Bonella - 2012
    Among Bali's drug dealers it's the code for a huge cocaine shipment having just landed. For the men who run the country's drug empires, it's time to get rich and party hard.Snowing in Bali is the story of the drug trafficking and dealing scene that's made Bali one of the world's most important destinations in the global distribution of narcotics. With its central location to the Asia Pacific market, its thriving tourist industry to act as cover for importation, and a culture of corruption that can easily help law enforcement turn a blind eye, Bali has long been a paradise for traffickers as well as for holiday-makers.Kathryn Bonella, bestselling author of Hotel Kerobokan, has been given extraordinary access into the lives of some of the biggest players in Bali's drug world, both past and present. She charts their rise to incredible wealth and power, and their drug-fuelled lifestyles, filled with orgies, outrageous extravagance and surfing. But running international drug empires in Bali can also be a highly risky business, with terrible consequences for those caught and convicted.From the highs of multi-million dollar deals to the desperate lows of death row in an Indonesian high security jail, Snowing in Bali is a unique, uncensored insight into a hidden world.

The Decline and Fall of IBM: End of an American Icon?


Robert Cringely - 2014
    Big Blue, as the company is known, tends to rely for its success on magical thinking but that magic ran out a long time ago. The company got in trouble back in the 1990s and had to hire for the first time an outside CEO, Lou Gerstner, to save the day. Gerstner pushed IBM into services with spectacular results but this hurt the company, too. As services have became commoditized IBM could only compete by offshoring the work and quality suffered. The other negative impact of Gerstner was his compensation which was for the first time in IBM history very high. Only the Watson family had become rich running IBM with later CEOs like John Opel and John Akers living comfortable lives with lots of perks, but they never got BIG RICH. That changed with Gerstner. Sam Palmisano an IBM lifer followed Gerstner as CEO and followed, too, the Gerstner playbook. Palmisano retired three years ago with a retirement package worth $241 million, replaced by IBM's first woman CEO, Ginni Rometty, who certainly expects a comparable golden parachute. In order to achieve these numbers, though, IBM has essentially sacrificed both its customers and employees. In order to have ever growing earnings per share the company has cut labor to the bone, off-shored everything it can, dropped quality, deliberately underbid contracts to win them then not performed. IBM's acquisition policy is one of buying companies to get their sales then cutting costs to the bone and under-delivering. This and share buybacks have kept earnings growing until this house of cards recently began to fall. Ginni Rometty, who will end up taking the fall for Palmisano's flawed strategy, has stated a very specific earnings goal for 2015 that she will destroy the company to achieve if she must. This book how IBM fell from grace, where it is headed, and what specifically can be done to save the company before it is too late.

Dogfight: How Apple and Google Went to War and Started a Revolution


Fred Vogelstein - 2013
    At the center of this change are Apple and Google, two companies whose philosophies, leaders, and commercial acumen have steamrolled the competition. In the age of the Android and the iPad, these corporations are locked in a feud that will play out not just in the marketplace but in the courts and on screens around the world.     Fred Vogelstein has reported on this rivalry for more than a decade and has rare access to its major players. In Dogfight, he takes us into the offices and board rooms where company dogma translates into ruthless business; behind outsize personalities like Steve Jobs, Apple’s now-lionized CEO, and Eric Schmidt, Google’s executive chairman; and inside the deals, lawsuits, and allegations that mold the way we communicate. Apple and Google are poaching each other’s employees. They bid up the price of each other’s acquisitions for spite, and they forge alliances with major players like Facebook and Microsoft in pursuit of market dominance.     Dogfight reads like a novel: vivid nonfiction with never-before-heard details. This is more than a story about what devices will replace our phones and laptops. It’s about who will control the content on those devices and where that content will come from—about the future of media in Silicon Valley, New York, and Hollywood.

Seven from Heaven: The Miracle of the McCaughey Septuplets


Kenny McCaughey - 1998
    Seven from Heaven deals important issues that the McCaugheys worked through, including the treatment of infertility, the decision to carry all of the babies to t term, the importance of family, church, and community, and the faithfulness of God to provide in the face of limited resources.