Book picks similar to
Cisco CCNA Exam #640-607 Certification Guide by Wendell Odom
protocols
scanned
computer-science
given-away
More of the Fit Woman's Secrets
Lorna Jane Clarkson - 2013
Steal This Computer Book 4.0 – What They Won′t Tell You About the Internet 4e
Wallace Wang - 2006
It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances. Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected. He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work. Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hack
Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World
Don Tapscott - 2016
But it is much more than that, too. It is a public ledger to which everyone has access, but which no single person controls. It allows for companies and individuals to collaborate with an unprecedented degree of trust and transparency. It is cryptographically secure, but fundamentally open. And soon it will be everywhere.In Blockchain Revolution, Don and Alex Tapscott reveal how this game-changing technology will shape the future of the world economy, dramatically improving everything from healthcare records to online voting, and from insurance claims to artist royalty payments. Brilliantly researched and highly accessible, this is the essential text on the next major paradigm shift. Read it, or be left behind.
Research Methods and Statistics in Psychology
Hugh Coolican - 1990
The book assumes no prior knowledge, taking the student through every stage of their research project in manageable steps. Advice on planning and conducting studies, analyzing data, and writing up practical reports is given, and examples are provided, as well as advice on how to report results in conventional (APA) style. Unlike other introductory texts, there is practical guidance on qualitative research, as well as discussion of issues of bias, interpretation, and variance. Content on qualitative methods has been expanded for the fifth edition and now includes additional material on widely used methods, such as grounded theory, thematic analysis, interpretive phenomenological analysis (IPA), and discourse analysis. The book provides clear coverage of statistical procedures, and includes everything needed at an undergraduate level from nominal level tests, to multi-factorial ANOVA designs, multiple regression, and log linear analysis. In addition, the book provides detailed and illustrated SPSS textbook. Each chapter contains a self-test glossary, key terms, and exercises, ensuring that key concepts have been understood. Students are further supported. Students are further supported by an accompanying website that provides additional exercises, revision flash cards, links to further reading, and data for use with SPSS. The website will also include updated coverage of SPSS should a new version be launched. The bestselling research methods text for over a decade, Research Methods and Statistics in Psychology remains an invaluable resource for students of psychology throughout their studies.
Make: More Electronics: Learning Through Discovery
Charles Platt - 2013
Right away, you'll start working on real projects, and you'll explore all the key components and essential principles through the book's collection of experiments. You'll build the circuits first, then learn the theory behind them! This book picks up where Make: Electronics left off: you'll learn about power amplification, switching, and motors. This book also covers analog integrated circuits, randomicity, and an assortment of sensors. With step-by-step instructions, and hundreds of color photographs and illustrations, this book will help you use -- and understand -- intermediate to advanced electronics concepts and techniques.
Network Security Essentials: Applications and Standards
William Stallings - 1999
Covers e-mail security, IP security, Web security, and network management security. Includes a concise section on the discipline of cryptography-covering algorithms and protocols underlying network security applications, encryption, hash functions, digital signatures, and key exchange. For system engineers, engineers, programmers, system managers, network managers, product marketing personnel, and system support specialists.
Midas World
Frederik Pohl - 1983
In this world, the "rich" are those whose quotas are low; while the "poor" live in vast mansions and have to eat endless gourmet meals.
How to Build an Android: The True Story of Philip K. Dick's Robotic Resurrection
David F. Dufty - 2012
DickIn late January 2006, a young robotocist on the way to Google headquarters lost an overnight bag on a flight somewhere between Dallas and Las Vegas. In it was a fully functional head of the android replica of Philip K. Dick, cult science-fiction writer and counterculture guru. It has never been recovered.In a story that echoes some of the most paranoid fantasies of a Dick novel, readers get a fascinating inside look at the scientists and technology that made this amazing android possible. The author, who was a fellow researcher at the University of Memphis Institute of Intelligent Systems while the android was being built, introduces readers to the cutting-edge technology in robotics, artificial intelligence, and sculpture that came together in this remarkable machine and captured the imagination of scientists, artists, and science-fiction fans alike. And there are great stories about Dick himself his inspired yet deeply pessimistic worldview, his bizarre lifestyle, and his enduring creative legacy. In the tradition of popular science classics like "Packing for Mars" and "The Disappearing Spoon," "How to Build an Android" is entertaining and informative popular science at its best."
The Implementation (TCP/IP Illustrated, Volume 2)
Gary R. Wright - 1995
"TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.
Was It Beautiful?
Alison McGhee - 2003
She brilliantly captures the close but guarded ties between residents of a grieving small town, and delivers dialogue with the uncommon and impressive mix of precision, poignancy, and believability.” —Minneapolis Star Tribune“McGhee is a beautiful writer, especially in her sense of place and her precision in describing characters.” —Twin Cities Pioneer Press“McGhee, author of the critically acclaimed novel Shadow Baby, portrays in spare and beautiful prose a setting and community that recall the cold, hard landscapes of Richard Russo’s fiction.” —Book PageWas It Beautiful? is a powerful and tender portrayal of loss and renewal at midlife. With singular grace and humor, Alison McGhee pays loving attention to the details of life in the Adirondacks and to the small kindnesses and idiosyncrasies that make each member of a community precious and unique.
Existentialism and Humanism: Jean-Paul Sartre
Gerald Jones - 2003
It is suitable for both A Level and HE philosophy students. historical context; a section by section guide to Existentialism and Humanism including key quotes; tasks and activities to help you understand and evaluate Sartre's philosophy; and a critical analysis of the philosophical implications of Sartre's ideas. It also offers summaries of key points needed for exam questions about Sartre and existentialism plus an extensive glossary of key words and ideas focused coverage of AS and A2 Philosophy
The Epic Struggle of the Internet of Things
Bruce Sterling - 2014
But is it what you think it is?Because the Internet of Things is not about things on the internet. A world in which all our household gadgets can communicate with each other may sound vaguely useful, but it’s not really for us consumers. The Internet of Things serves the interests of the technology giants, in their epic wrangles with each other. And it is they who will turn the jargon of “smart cities” and “smart homes” into a self-fulfilling prophesy. In this piercing and provocative essay, Bruce Sterling tells the story of an idea that just won’t go away because there’s too much money to be made and a whole world to control.
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Steven Levy - 2001
From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
The Patron Saint of Plagues
Barth Anderson - 2006
But while the rivals battle over borders, a pestilence beyond politics threatens to explode into a worldwide epidemic. . . .Since the rise of the Holy Renaissance, Ascension—once known as Mexico City—has become the most populous city in the world, its citizens linked to a central government net through wetware implanted in their brains. But while their dictator grows fat with success, the masses are captivated by Sister Domenica, an insurgent nun whose weekly pirate broadcasts prophesy a wave of death. All too soon, Domenica’s nightmarish prediction proves true, and Ascension’s hospitals are overrun with victims of a deadly fever. As the rampant plague kills too quickly to be contained, Mexico smuggles its last hope over the violently contested border. . . .Henry David Stark is a crack virus hunter for the American Center for Disease Control and a veteran of global humanitarian efforts. But this disease is unlike any he’s seen before—and there seems to be no way to cure or control it. Racing against time, Stark battles corruption to uncover a horrifying truth: this is no ordinary outbreak but a deliberately unleashed man-made virus . . . and the killer is someone Stark knows.