Are You Smart Enough to Work at Google?


William Poundstone - 2012
    The blades start moving in 60 seconds. What do you do? If you want to work at Google, or any of America's best companies, you need to have an answer to this and other puzzling questions. Are You Smart Enough to Work at Google? guides readers through the surprising solutions to dozens of the most challenging interview questions. The book covers the importance of creative thinking, ways to get a leg up on the competition, what your Facebook page says about you, and much more. Are You Smart Enough to Work at Google? is a must-read for anyone who wants to succeed in today's job market.

Infrastructure as Code: Managing Servers in the Cloud


Kief Morris - 2015
    But many organizations adopting these technologies have found that it only leads to a faster-growing sprawl of unmanageable systems. This is where infrastructure as code can help. With this practical guide, author Kief Morris of ThoughtWorks shows you how to effectively use principles, practices, and patterns pioneered through the DevOps movement to manage cloud age infrastructure.Ideal for system administrators, infrastructure engineers, team leads, and architects, this book demonstrates various tools, techniques, and patterns you can use to implement infrastructure as code. In three parts, you'll learn about the platforms and tooling involved in creating and configuring infrastructure elements, patterns for using these tools, and practices for making infrastructure as code work in your environment.Examine the pitfalls that organizations fall into when adopting the new generation of infrastructure technologiesUnderstand the capabilities and service models of dynamic infrastructure platformsLearn about tools that provide, provision, and configure core infrastructure resourcesExplore services and tools for managing a dynamic infrastructureLearn specific patterns and practices for provisioning servers, building server templates, and updating running servers

The Little Elixir & OTP Guidebook


Benjamin Tan Wei Hao - 2015
    It combines the productivity and expressivity of Ruby with the concurrency and fault-tolerance of Erlang. Elixir makes full use of Erlang's powerful OTP library, which many developers consider the source of Erlang's greatness, so you can have mature, professional-quality functionality right out of the gate. Elixir's support for functional programming makes it a great choice for highly distributed event-driven applications like IoT systems.The Little Elixir & OTP Guidebook gets you started programming applications with Elixir and OTP. You begin with a quick overview of the Elixir language syntax, along with just enough functional programming to use it effectively. Then, you'll dive straight into OTP and learn how it helps you build scalable, fault-tolerant and distributed applications through several fun examples. Come rediscover the joy of programming with Elixir and remember how it feels like to be a beginner again.

Microsoft Project 2010 Step by Step


Carl Chatfield - 2010
    With Step By Step, you set the pace-building and practicing the skills you need, just when you need them! Topics include building a project plan and fine-tuning the details; scheduling tasks, assigning resources, and managing dependencies; monitoring progress and costs; keeping projects on track; communicating project data through Gantt charts and other views.

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

Sedition


Phil M. Williams - 2017
     Americans are angry and divided along party lines. They’re tired of the endless wars, high gas prices, and high unemployment. They’re tired of the graft in DC and on Wall Street. They’re tired of being spied on and herded like cattle into the prison industrial complex. Like in years before, they’re certain that, this time, their guy will change everything. The Republican and Democratic saviors make their promises, and the true believers swoon, but domestic terrorists aren’t buying what these politicians are selling. Truck driver George Chapman is in the right place at the right time to foil an assassination attempt on one of the most influential men in politics. Some might say the reluctant hero was in the wrong place at the wrong time. Some might say it was a false flag. Nonetheless, his fifteen minutes of fame grows because of his extraordinary gift. Will he use his gift and newfound fame to unite the country or to tear it apart? A revolution is coming. Which side are you on? Adult language, content, and sexual violence.

Cyberphobia: Identity, Trust, Security and the Internet


Edward Lucas - 2015
    Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.

Real-Life BPMN: With Introductions to CMMN and DMN


Jakob Freund - 2010
     It is about business process management (BPM) and Business Process Model and Notation (BPMN 2.0). Truth be told, there are several BPMN books on the market. Some of them are quite good, so why should you care about this one? This book distills the experience the authors accumulated while running Camunda, a consulting company that specializes in BPM. Camunda helped to define the BPMN specification, and during the past ten years, they have applied BPMN in over 1000 customer engagements. These were big businesses, small companies, and public institutions. Now you can benefit from this practical experience. Topics covered: The basics of modeling processes with Business Process Model and Notation (BPMN 2.0) Methods to apply BPMN successfully to real-world problems A practical approach for automating processes with BPMN 2.0 The alignment of business and IT as an attainable goal Advice on introducing BPMN across your company This book explains the notation, of course, but it also delves into the kinds of challenges that process designers face every day. It talks about pitfalls to avoid. It gives dos and don'ts. There are guidelines and best practices. In the 3rd edition we added introductions to the related BPM standards CMMN 1.1 for case management, handling unstructured processes DMN 1.1 for decision management, you might know as business rules management (BRM) This third edition in English is based on the successful fith German edition, which, according to amazon.de, it is the highest-ranked book on BPMN in German. The number of five-star ratings awarded by readers speaks volumes. Also available in Spanish. Note: The resolution of all images for the 3rd edition of the ebook has been increased to improve the digial reading experience.

Hacking For Dummies


Kevin Beaver - 2004
    In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

The Software Paradox


Stephen O’Grady - 2015
    

The Beginner's Affiliate Marketing Blueprint: How to Get Started For Free And Earn Your First $10,000 In Commissions Fast! (Make Money With Affiliate Marketing 2018 Edition) (Online Business)


Alex M. - 2017
     Inside the affiliate marketing blueprint you will learn exactly how to: • Choose the right offer to promote • Get the right mindset to make money with affiliate marketing • Sign up to the best affiliate networks • Start an affiliate marketing business using free methods • Create great looking landing pages that convert • Drive traffic to your offers from the best traffic networks • Track and scale your marketing campaigns to insane numbers • Automate your affiliate business to earn commissions on autopilot • The Free bonus course will take you even more in depth and connect you with thousands of internet marketers from all over the world! Don’t wait any longer! This guide will NOT be at this price forever! Scroll up, download it, read it, and begin making money online with affiliate marketing.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Merch by Amazon Blueprint: Six Figure T-Shirt Business In One Year With Amazon Merch


Passive Marketing - 2016
    In the last year, he was able to take his brand new account from earning absolutely nothing to over 6 figures a year. His account now earns between 8 to 10 thousand a month as truly passive income as he practices exactly what is laid out in this Amazon Merch book. These results are not typical, but this book will go over the complete steps to setting up a profitable Merch by Amazon t-shirt business which you can use to sell your custom made artwork by printing it onto T-Shirts that are sold on the biggest market place in the world. *Who was this book written for?* This book is written for people who are looking to get their start selling their art (designs) on the internet with the print on demand service Merch by Amazon. There are also plenty of Amazon Merch tips and tricks for seasoned veterans to take their business to a new level. Every level of Merch by Amazon user will find something helpful from this blueprint. *Who this book is not for:* If you are looking to start an account and get rich overnight, look elsewhere. You will need to be dedicated and work hard to achieve desirable results. If you are looking for shortcuts at the expense of others (copycats), this book is not for you. If you want to make an extra livable income stream for yourself or your family, you will have to work at it and put in the time and effort. *Topics covered in this book:* • Who Am I? • What Is Merch by Amazon? • Signing Up For An Account • Dashboard Walk Through • T-Shirt Niche Research • What You Need To Create Designs • Outsourcing Designs • Merch by Amazon T-Shirt Holidays • Leveraging Pinterest Marketing To Sell Your Merch Shirts • Merch by Amazon SEO Ultimate Guide • Selling Your T-Shirt Business • Wrapping It Up Each topic goes extremely in depth with exactly what you need to succeed. It goes over all the basics that you need to know how to use, as well as tools that will help you get an edge over the competition. Learn how to get started with Merch in the next hour or two. At the end you should have a clear idea of what it takes to build a profitable business, how to find niches that are hot and selling, and what you should be focusing your time on. This is the most comprehensive book on how to start and make money with Merch by Amazon which will hold your hand every step of the way.

How to Architect


Doug Patt - 2012
    Changing the function of a word, or a room, can produce surprise and meaning. In How to Architect, Patt--an architect and the creator of a series of wildly popular online videos about architecture--presents the basics of architecture in A-Z form, starting with A is for Asymmetry (as seen in Chartres Cathedral and Frank Gehry), detouring through N is for Narrative, and ending with Z is for Zeal (a quality that successful architects tend to have, even in fiction--see The Fountainhead's architect-hero Howard Roark.)How to Architect is a book to guide you on the road to architecture. If you are just starting on that journey or thinking about becoming an architect, it is a place to begin. If you are already an architect and want to remind yourself of what drew you to the profession, it is a book of affirmation. And if you are just curious about what goes into the design and construction of buildings, this book tells you how architects think. Patt introduces each entry with a hand-drawn letter, and accompanies the text with illustrations that illuminate the concept discussed: a fallen Humpty Dumpty illustrates the perils of fragile egos; photographs of an X-Acto knife and other hand tools remind us of architecture's nondigital origins.How to Architect offers encouragement to aspiring architects but also mounts a defense of architecture as a profession--by calling out a defiant verb: architect!

Wireshark 101: Essential Skills for Network Analysis


Laura A. Chappell - 2013
    This book provides an ideal starting point whether you are interested in analyzing traffic to learn how an application works, you need to troubleshoot slow network performance, or determine whether a machine is infected with malware. Learning to capture and analyze communications with Wireshark will help you really understand how TCP/IP networks function. As the most popular network analyzer tool in the world, the time you spend honing your skills with Wireshark will pay off when you read technical specs, marketing materials, security briefings, and more. This book can also be used by current analysts who need to practice the skills contained in this book. In essence, this book is for anyone who really wants to know what's happening on their network.