Mechanical Engineering Reference Manual for the PE Exam


Michael R. Lindeburg - 1994
    Dozens of key charts, tables, and graphs, including updated steam tables and two new charts of LMTD heat exchanger correction factors, make it possible to work most exam problems using the Reference Manual alone. A complete, easy-to-use index saves you valuable time during the exam as it helps you quickly locate important information needed to solve problems._____________________________Since 1975 more than 2 million people preparing for their engineering, surveying, architecture, LEED®, interior design, and landscape architecture exams have entrusted their exam prep to PPI. For more information, visit us at www.ppi2pass.com.

Schaum's Outline of Theory and Problems of Data Structures


Seymour Lipschutz - 1986
    This guide, which can be used with any text or can stand alone, contains at the beginning of each chapter a list of key definitions, a summary of major concepts, step by step solutions to dozens of problems, and additional practice problems.

The Art of Enameling: Techniques, Projects, Inspiration


Linda Darty - 2004
    Written with clarity and passion by a leader in the field, it covers all the popular techniques, the fundamentals of setting up a studio, and 14 fabulous projects. The various styles range from traditional cloisonné, champlevé, and plique-à-jour to experimental techniques such as firing enamel onto mesh forms. Even more creative possibilities await in the firing: use copper oxide to create cool color variations or try raku firing for unique effects. All the well-photographed projects, from a vibrantly toned flower ring to an elegant set of buttons with a delicate leaf pattern, encourage novices to use their skills and imagination.

Jumping into C++


Alex Allain - 2013
    As a professional C++ developer and former Harvard teaching fellow, I know what you need to know to be a great C++ programmer, and I know how to teach it, one step at a time. I know where people struggle, and why, and how to make it clear. I cover every step of the programming process, including:Getting the tools you need to program and how to use them*Basic language feature like variables, loops and functions*How to go from an idea to code*A clear, understandable explanation of pointers*Strings, file IO, arrays, references*Classes and advanced class design*C++-specific programming patterns*Object oriented programming*Data structures and the standard template library (STL)Key concepts are reinforced with quizzes and over 75 practice problems.

Linux Administration Handbook


Evi Nemeth - 2006
    Several things make this one stand out. Here's the most important: Linux Administration Handbook is designed for administrators working in industrial-strength production environments. It never glosses over the "subtleties" that can get you in big trouble. It doesn't stint on technical detail. It's never satisfied with restating the man pages. And it's full of war stories from folks who've been there. Evi Nemeth and her coauthors: Boy, have they ever been there. (Just ask any gray-bearded Unix sysadmin about their earlier, legendary Unix System Administration Handbook.) There's only been one downside to Linux Administration Handbook: It's been nearly five years since it was written. Well, that flaw's just been remedied. The new Second Edition has been systematically revised for the latest administration tools (think Nagios and LVM). It's carefully targeted at today's five most widely used distributions: Red Hat Enterprise Linux 4.3, Fedora Core 5, SUSE Linux 10.2, Debian 3.2 "Etch," and Ubuntu 6.06. The result: a book you can rely on for the next five years. Rely on to do what? Just about everything. You'll find chapters on booting and shutting down; "rootly" powers; controlling processes; the Linux filesystem; on adding new users. You'll learn the most efficient ways to perform backups. How to make sense of syslogs and log files. Everything you need to know about drivers, the kernel, networking, NFS -- and Internet services, from web hosting to email. Nemeth & Company bring their experience to bear on troubleshooting, performance optimization, print management, security, Windows interoperability, even "policies and politics." Whatever Linux books you already own, if you depend on Linux to run efficiently and reliably, you need this one, too. Bill Camarda, from the December 2006 href="http://www.barnesandnoble.com/newslet... Only

Hacking Linux Exposed: Linux Security Secrets & Solutions


Brian Hatch - 2001
    Hacking Exposed Linux provides the most up-to-date coverage available from a large team of topic-focused experts. The book is based on the latest security research and shows you, in full detail, how to lock out intruders and defend your Linux systems against catastrophic attacks.Secure Linux by using attacks and countermeasures from the latest OSSTMM researchFollow attack techniques of PSTN, ISDN, and PSDN over LinuxHarden VoIP, Bluetooth, RF, RFID, and IR devices on LinuxBlock Linux signal jamming, cloning, and eavesdropping attacksApply Trusted Computing and cryptography tools for your best defenseFix vulnerabilities in DNS, SMTP, and Web 2.0 servicesPrevent SPAM, Trojan, phishing, DoS, and DDoS exploitsFind and repair errors in C code with static analysis and Hoare Logic

Kali Linux Revealed: Mastering the Penetration Testing Distribution


Raphaël Hertzog - 2017
    They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

Running with Lydiard


Arthur Lydiard - 2000
    Instructing runners in Finland, Mexico, Venezuela, Denmark, Japan, the USA and New Zealand, Lydiard has continued to refine his methods, and this manual contains information on exercise physiology, diet, injury prevention and cure, discussion of Lydiard's methods and revised training schedules.

How to Drive: Real World Instruction and Advice from Hollywood's Top Driver


Ben Collins - 2016
    And an absolute must for everyone with a learner's permit. Former Top Gear Stig and professional driver Ben Collins shares expert skills culled from a twenty year career as one of the best drivers in the world, famous for racing in the Le Mans series and NASCAR, piloting the Batmobile, and dodging bullets with James Bond. Refined over thousands of hours of elite-level performance in the physics of driving, his philosophy results in greater control and safer, more efficient and fun driving for all skill levels.

Google Analytics: Understanding Visitor Behavior


Justin Cutroni - 2007
    This hands-on guide shows you how to get the most out of this free and powerful tool -- whether you're new to Google Analytics or have been using it for years.Google Analytics shows you how to track different market segments and analyze conversion rates, and reveals advanced techniques such as marketing-campaign tracking, a valuable feature that most people overlook. And this practical book not only provides complete code samples for web developers, it also explains the concepts behind the code to marketers, managers, and others on your team.Discover exactly how the Google Analytics system worksLearn how to configure the system to measure data most relevant to your business goalsTrack online marketing activities, including cost-per-click ads, email, and internal campaignsTrack events -- rather than page views -- on sites with features such as maps, embedded video, and widgetsConfigure Google Analytics to track enterprise data, including multiple domainsUse advanced techniques such as custom variables and CRM integration

The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data


Kevin D. Mitnick - 2017
    Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.

Set Lighting Technician's Handbook: Film Lighting Equipment, Practice, and Electrical Distribution


Harry Box - 1998
    Detailed. Practical. Set Lighting Technician's Handbook, Third Edition is a friendly, hands-on manual covering the day-to-day practices, equipment, and tricks of the trade essential to anyone doing motion picture lighting. This handbook offers a wealth of practical technical information, useful techniques, as well as aesthetic discussions. The Set Lighting Technician's Handbook focuses on what is important when working on-set: trouble-shooting, teamwork, set protocol, and safety. It describes tricks and techniques for operating a vast array of lighting equipment including xenons, camera synchronous strobes, black lights, underwater units, lighting effects units, and many others. Since its first edition, this handy on-set reference continues to be widely adopted as a training and reference manual by union training programs as well as top university film production programs. New in the third edition is an expanded resource section, new illustrations and tables, and coverage of new lighting products and techniques for how to use them.

Diablo Bestiary - The Book of Adria


Robert Brooks - 2018
    

Android Hacker's Handbook


Joshua J. Drake - 2013
    Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

The Essential Guide to Telecommunications


Annabel Z. Dodd - 1998
    It aims to give readers a fundamental overview of the technologies that make up the telecommunications infrastructure.