File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Handmade Electronic Music: The Art of Hardware Hacking [With CD]


Nicolas Collins - 2006
    Designed for practioners and students of electronic art, it provides a guided tour through the world of electronics, encouraging artists to get to know the inner workings of basic electronic devices so they can creatively use them for their own ends."Handmade" "Electronic Music" introduces the basic of practical circuitry while instructing the student in basic electronic principles, always from the practical point of view of an artist. It teaches a style of intuitive and sensual experimentation that has been lost in this day of prefabricated electronic musical instruments whose inner workings are not open to experimentation. It encourages artists to transcend their fear of electronic technology to launch themselves into the pleasure of working creatively with all kinds of analog circuitry.

Hacker's Delight


Henry S. Warren Jr. - 2002
    Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.

Mastering Algorithms with C


Kyle Loudon - 1999
    Mastering Algorithms with C offers you a unique combination of theoretical background and working code. With robust solutions for everyday programming tasks, this book avoids the abstract style of most classic data structures and algorithms texts, but still provides all of the information you need to understand the purpose and use of common programming techniques.Implementations, as well as interesting, real-world examples of each data structure and algorithm, are included.Using both a programming style and a writing style that are exceptionally clean, Kyle Loudon shows you how to use such essential data structures as lists, stacks, queues, sets, trees, heaps, priority queues, and graphs. He explains how to use algorithms for sorting, searching, numerical analysis, data compression, data encryption, common graph problems, and computational geometry. And he describes the relative efficiency of all implementations. The compression and encryption chapters not only give you working code for reasonably efficient solutions, they offer explanations of concepts in an approachable manner for people who never have had the time or expertise to study them in depth.Anyone with a basic understanding of the C language can use this book. In order to provide maintainable and extendible code, an extra level of abstraction (such as pointers to functions) is used in examples where appropriate. Understanding that these techniques may be unfamiliar to some programmers, Loudon explains them clearly in the introductory chapters.Contents include:PointersRecursionAnalysis of algorithmsData structures (lists, stacks, queues, sets, hash tables, trees, heaps, priority queues, graphs)Sorting and searchingNumerical methodsData compressionData encryptionGraph algorithmsGeometric algorithms

Hiding from the Internet: Eliminating Personal Online Information


Michael Bazzell - 2012
    Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book will serve as a reference guide for anyone that values privacy. Each technique is explained in simple steps. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The author provides personal experiences from his journey to disappear from public view. Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to force companies to remove you from their data collection systems. This book exposes loopholes that create unique opportunities for privacy seekers. Among other techniques, you will learn to: Remove your personal information from public databases and people search sites Create free anonymous mail addresses, email addresses, and telephone numbers Control your privacy settings on social networks and remove sensitive data Provide disinformation to conceal true private details Force data brokers to stop sharing your information with both private and public organizations Prevent marketing companies from monitoring your browsing, searching, and shopping habits Remove your landline and cellular telephone numbers from online websites Use a credit freeze to eliminate the worry of financial identity theft and fraud Change your future habits to promote complete privacy and anonymity Conduct a complete background check to verify proper information removalConfigure a home firewall with VPN Kill-SwitchPurchase a completely invisible home or vehicle

Building Machine Learning Systems with Python


Willi Richert - 2013
    

Reactive Design Patterns


Roland Kuhn - 2014
    The Reactive Application model addresses these demands through new patterns designed to "react" effectively to user and system events, changes in load, competition for shared system resources, and unanticipated failures. Although reactive design patterns can be implemented using standard enterprise development tools, you best realize the benefits when you pair them with a functional programming language like Scala and an Actor-based concurrency system like Akka.Reactive Design Patterns is a clearly-written guide for building event-driven distributed systems that are resilient, responsive, and scalable. Written by the authors of the Reactive Manifesto, this book teaches you to apply reactive design principles to the real problems of distributed application development. You'll discover technologies and paradigms that can be used to build reactive applications including Akka and other actor-based systems, functional programming, replication and distribution, and implementation techniques such as futures, iteratees, and reactive streams. While the book presents concrete examples in Scala, Java, JavaScript, and Erlang, the primary goal is to introduce patterns and best practices that you can use to apply reactive principles to common problems you'll face when building distributed systems.WHAT'S INSIDE* Discover best practices and patterns for building responsive applications* Build applications that can withstand hardware or software failure at any level* Patterns for fault tolerance, scalability, and responsiveness* Maximize multicore hardware using asynchronous and event-driven solutions* Scale applications under tremendous loadReaders should be familiar with a standard programming language like Java, C++ or C# and be comfortable with the basics of distributed systems. Software engineers and architects will learn how to avoid common pitfalls and apply patterns for solving day-to-day problems in a fault-tolerant and scalable way to maximize their application's responsiveness to users and clients. Project leaders and CTOs will gain a deeper understanding of the philosophy behind resilience and scalability in distributed systems, as well as their limitations, challenges and benefits.

Becoming a Better Programmer


Pete Goodliffe - 2014
    Code Craft author Pete Goodliffe presents a collection of useful techniques and approaches to the art and craft of programming that will help boost your career and your well-being.Goodliffe presents sound advice that he's learned in 15 years of professional programming. The book's standalone chapters span the range of a software developer's life--dealing with code, learning the trade, and improving performance--with no language or industry bias. Whether you're a seasoned developer, a neophyte professional, or a hobbyist, you'll find valuable tips in five independent categories:Code-level techniques for crafting lines of code, testing, debugging, and coping with complexityPractices, approaches, and attitudes: keep it simple, collaborate well, reuse, and create malleable codeTactics for learning effectively, behaving ethically, finding challenges, and avoiding stagnationPractical ways to complete things: use the right tools, know what "done" looks like, and seek help from colleaguesHabits for working well with others, and pursuing development as a social activity

Handbook of Technical Writing


Gerald J. Alred - 1982
    Alphabetically organized and easy to use, its nearly 400 entries provide guidance for the most common types of professional documents and correspondence, including reports, proposals, manuals, memos, and white papers. Abundant sample documents and visuals throughout the book demonstrate effective technical communication, reflecting current practices for formatting documents and using e-mail. In addition, advice on organizing, researching, writing, and revising complements thorough treatment of grammar, usage, style, and punctuation to provide comprehensive help with writing skills. This edition has been thoroughly revised to include expanded advice for analyzing the context of different writing situations, using and integrating visuals, and dealing with ethical concerns in technical writing. Improved coverage of research now includes guidelines for IEEE-style documentation as well as clearer explanations of copyright and plagiarism concerns. Entries throughout the book have been revised, updated, consolidated, and streamlined to provide the most accurate and accessible information. Comprehensive yet concise, the Handbook of Technical Writing remains the quick reference faithful users have come to appreciate.

Geek Logik: 50 Foolproof Equations for Everyday Life


Garth Sundem - 2006
    Call it the algebra oracle: By plugging in the right variables, GEEK LOGIK answers life’s most persistent questions. It covers Dating and Romance, Career and Finance, and everyday decisions like Should I get a tattoo? Can I still wear tight jeans? Is it time to see a therapist? How many beers should I have at the company picnic? How does it work? Take a simple issue that comes up once or twice a week: Should I call in sick? Fill in the variables honestly, such as D for doctor’s note (enter 1 for “no,†10 for “yes,†and 5 for “yes, but it’s a forgeryâ€), R for importance of job (1-10, with 10 being “personally responsible for Earth’s orbit around Sunâ€), Fj for how much fun you have at work (1-10, with 10 being “personal trainer for underwear modelsâ€), N for how much you need the money (1-10, with 10 being “I owe the mobâ€), then do the math, and voilà—if the product, Hooky, is greater than 1, enjoy your very own Ferris Bueller’s Day Off. Includes a pocket calculator so that prospective geeks can immediately solve the equation on the back cover: Should I buy this book?

I Heart Logs: Event Data, Stream Processing, and Data Integration


Jay Kreps - 2014
    Even though most engineers don't think much about them, this short book shows you why logs are worthy of your attention.Based on his popular blog posts, LinkedIn principal engineer Jay Kreps shows you how logs work in distributed systems, and then delivers practical applications of these concepts in a variety of common uses--data integration, enterprise architecture, real-time stream processing, data system design, and abstract computing models.Go ahead and take the plunge with logs; you're going love them.Learn how logs are used for programmatic access in databases and distributed systemsDiscover solutions to the huge data integration problem when more data of more varieties meet more systemsUnderstand why logs are at the heart of real-time stream processingLearn the role of a log in the internals of online data systemsExplore how Jay Kreps applies these ideas to his own work on data infrastructure systems at LinkedIn

Basic Machines and How They Work


Naval Education and Training Program Development Center - 1971
    Thorough in its coverage of basic theory, from the lever and inclined plane to internal combustion engines and power trains, it requires nothing more than an understanding of the most elementary mathematics. Beginning with the simplest of machines — the lever — the text proceeds to discussions of the block and tackle (pulleys and hoists), wheel and axle, the inclined plane and the wedge, the screw, and different types of gears (simple, spur, bevel, herringbone, spiral, worm, etc.). A chapter on the concept of work discusses the measurement of work, friction, and efficiency; this is followed by investigations of power, force, and pressure, with explanations of the uses of scales, balances, gauges, and barometers. The fundamentals of hydrostatic and hydraulic machines (such as the hydraulic braking system and the hydraulic press) are discussed in detail. The remaining chapters cover machine elements (bearings and springs), basic mechanisms (gear differential, couplings, cams, clutches), the internal combustion engine and power trains (including explanations of various transmission systems — synchromesh, auxiliary, etc.). Every concept is clearly defined, and discussions always build easily from elementary theory to specific applications familiar to anyone with the slightest interest in mechanics. Important concepts, machine components, and techniques are clearly illustrated in more than 200 diagrams, drawings, and cross-sections that reveal inner workings — all of these help to clarify even further an already clear and well-organized presentation. Although it was originally designed for use in U.S. Naval Training Schools, this book can be used to great advantage as a basic text in mechanical engineering in standard technical schools, and it will be immensely valuable even to lay readers who desire a basic knowledge of mechanics.

Database Systems: The Complete Book


Jeffrey D. Ullman - 1999
    Written by well-known computer scientists, this introduction to database systems offers a comprehensive approach, focusing on database design, database use, and implementation of database applications and database management systems. The first half of the book provides in-depth coverage of databases from the point of view of the database designer, user, and application programmer. It covers the latest database standards SQL:1999, SQL/PSM, SQL/CLI, JDBC, ODL, and XML, with broader coverage of SQL than most other texts. The second half of the book provides in-depth coverage of databases from the point of view of the DBMS implementor. It focuses on storage structures, query processing, and transaction management. The book covers the main techniques in these areas with broader coverage of query optimization than most other texts, along with advanced topics including multidimensional and bitmap indexes, distributed transactions, and information integration techniques.

Assembly Language Programming And Organization Of The Ibm Pc


Andrew B.C. Yu - 1992
    This text includes coverage of I/O control, video/graphics control, text display, and OS/2. Its also illustrates examples of structured programming.

Signals and Systems


A. Anand Kumar - 2011
    Written with student centred, pedagogically driven approach, the text provides a self-contained introduction to the theory of signals and systems. This book looks at the concepts of systems, and also examines signals and the way that signals interact with physical systems. It covers topics ranging from basic signals and systems to signal analysis, properties of continuous-time Fourier transforms including Fourier transforms of standard signals, signal transmission through linear systems, relation between convolution and correlation of signals, sampling theorems and techniques, and transform analysis of LTI systems. All the solved and unsolved problems in this book are designed to illustrate the topics in a clear way.