Book picks similar to
Forensic Discovery by Dan Farmer
technology
work
security
computers
How Computers Work
Ron White - 1992
The full-color, detailed illustrations will take you deep inside your PC and show you just how intricate it is. This latest edition has been updated with information on all of the latest technologies, including: PCI Express Bus Serial ATA Connections Digital Photography Software TiVos, Gas Plasma Screens, iPods, and Other Home Entertainment Equipment Google and eBay 3D Game Development, Two-Slot Video Cards, and Overclocking How Computers Work has sold over two million copies world wide. But don't take our word for it � get your copy today!
Hacking For Dummies
Kevin Beaver - 2004
In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!
PHP Pocket Reference
Rasmus Lerdorf - 2000
The quick reference section organizes all the core functions of PHP alphabetically so you can find what you need easily; the slim size means you can keep it handy beside your keyboard for those times when you want to look up a function quickly without closing what you're doing.This valuable little book provides an authoritative overview of PHP packed into a pocket-sized guide that's easy to take anywhere. It is also the ideal companion for O'Reilly's comprehensive book on PHP, Programming PHP.The PHP Pocket Reference an indispensable (and inexpensive) tool for any serious PHP coder.
The Principles of Object-Oriented JavaScript
Nicholas C. Zakas - 2012
It has no concept of classes, and you don't even need to define any objects in order to write code. But don't be fooled—JavaScript is an incredibly powerful and expressive object-oriented language that puts many design decisions right into your hands.In The Principles of Object-Oriented JavaScript, Nicholas C. Zakas thoroughly explores JavaScript's object-oriented nature, revealing the language's unique implementation of inheritance and other key characteristics. You'll learn: The difference between primitive and reference values What makes JavaScript functions so unique The various ways to create objects How to define your own constructors How to work with and understand prototypes Inheritance patterns for types and objects The Principles of Object-Oriented JavaScript will leave even experienced developers with a deeper understanding of JavaScript. Unlock the secrets behind how objects work in JavaScript so you can write clearer, more flexible, and more efficient code.
Building a DevOps Culture
Mandi Walls - 2013
But, as Mandi Walls explains in this Velocity report, DevOps is really about changing company culture—replacing traditional development and operations silos with collaborative teams of people from both camps.
The DevOps movement has produced some efficient teams turning out better products faster. The tough part is initiating the change. This report outlines strategies for managers looking to go beyond tools to build a DevOps culture among their technical staff.
Topics include:
Documenting reasons for changing to DevOps before you commit
Defining meaningful and achievable goals
Finding a technical leader to be an evangelist, tools and process expert, and shepherd
Starting with a non-critical but substantial pilot project
Facilitating open communication among developers, QA engineers, marketers, and other professionals
Realigning your team’s responsibilities and incentives
Learning when to mediate disagreements and conflicts
Download this free report and learn how to the DevOps approach can help you create a supportive team environment built on communication, respect, and trust.
Mandi Walls is a Senior Consultant with Opscode.
Structure and Interpretation of Computer Programs
Harold Abelson - 1984
This long-awaited revision contains changes throughout the text. There are new implementations of most of the major programming systems in the book, including the interpreters and compilers, and the authors have incorporated many small changes that reflect their experience teaching the course at MIT since the first edition was published. A new theme has been introduced that emphasizes the central role played by different approaches to dealing with time in computational models: objects with state, concurrent programming, functional programming and lazy evaluation, and nondeterministic programming. There are new example sections on higher-order procedures in graphics and on applications of stream processing in numerical programming, and many new exercises. In addition, all the programs have been reworked to run in any Scheme implementation that adheres to the IEEE standard.
Head First PHP & MySQL
Lynn Beighley - 2008
Packed with real-world examples, this book teaches you all the essentials of server-side programming, from the fundamentals of PHP and MySQL coding to advanced topics such as form validation, session IDs, cookies, database queries and joins, file I/O operations, content management, and more.Head First PHP & MySQL offers the same visually rich format that's turned every title in the Head First series into a bestseller, with plenty of exercises, quizzes, puzzles, and other interactive features to help you retain what you've learned.Use PHP to transform static HTML pages into dynamic web sites Create and populate your own MySQL database tables, and work with data stored in files Perform sophisticated MySQL queries with joins, and refine your results with LIMIT and ORDER BY Use cookies and sessions to track visitors' login information and personalize the site for users Protect your data from SQL injection attacks Use regular expressions to validate information on forms Dynamically display text based on session info and create images on the fly Pull syndicated data from other sites using PHP and XML Throughout the book, you'll build sophisticated examples -- including a mailing list, a job board, and an online dating site -- to help you learn how to harness the power of PHP and MySQL in a variety of contexts. If you're ready to build a truly dynamic website, Head First PHP & MySQL is the ideal way to get going.
Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online
Rob Robideau - 2013
With laws getting stricter by the day and making it more and more difficult to properly protect your personal information, you need the most up-to-date information and tools available and that's what you will find in Incognito Toolkit! Don't let snoopers, investigators, and scammers look over your shoulder or track you while you work and play on the internet! Learn about the tools that will help you use the internet anonymously, privately, and securely to protect assets, avoid social stigmas, and make you safer. This book is full of information that large corporations, scammers, and nosy governments don't want you to find! You won't find a collection of techniques and creative methods like this anywhere else! Covered in Incognito Toolkit: - Making truly anonymous online purchases - Shortcomings of Bitcoin - Encrypting communications - Encryption for online file storage solutions - Locking down and monitoring your hardware - Browser Fingerprinting - Using TOR and VPNs - Creative Text and File Steganography Techniques - Critical Techniques for Publishing Anonymously - Cleaning photo and video metadata - Dealing with tracking cookies Updated December 4th, 2013 with new information about credit card skimmers, TOR hardware devices, and more!
Scroll up and click the "Look Inside" feature on the top left hand side of the page!
Data Science for Business: What you need to know about data mining and data-analytic thinking
Foster Provost - 2013
This guide also helps you understand the many data-mining techniques in use today.Based on an MBA course Provost has taught at New York University over the past ten years, Data Science for Business provides examples of real-world business problems to illustrate these principles. You’ll not only learn how to improve communication between business stakeholders and data scientists, but also how participate intelligently in your company’s data science projects. You’ll also discover how to think data-analytically, and fully appreciate how data science methods can support business decision-making.Understand how data science fits in your organization—and how you can use it for competitive advantageTreat data as a business asset that requires careful investment if you’re to gain real valueApproach business problems data-analytically, using the data-mining process to gather good data in the most appropriate wayLearn general concepts for actually extracting knowledge from dataApply data science principles when interviewing data science job candidates
Turing's Cathedral: The Origins of the Digital Universe
George Dyson - 2012
In Turing’s Cathedral, George Dyson focuses on a small group of men and women, led by John von Neumann at the Institute for Advanced Study in Princeton, New Jersey, who built one of the first computers to realize Alan Turing’s vision of a Universal Machine. Their work would break the distinction between numbers that mean things and numbers that do things—and our universe would never be the same. Using five kilobytes of memory (the amount allocated to displaying the cursor on a computer desktop of today), they achieved unprecedented success in both weather prediction and nuclear weapons design, while tackling, in their spare time, problems ranging from the evolution of viruses to the evolution of stars. Dyson’s account, both historic and prophetic, sheds important new light on how the digital universe exploded in the aftermath of World War II. The proliferation of both codes and machines was paralleled by two historic developments: the decoding of self-replicating sequences in biology and the invention of the hydrogen bomb. It’s no coincidence that the most destructive and the most constructive of human inventions appeared at exactly the same time. How did code take over the world? In retracing how Alan Turing’s one-dimensional model became John von Neumann’s two-dimensional implementation, Turing’s Cathedral offers a series of provocative suggestions as to where the digital universe, now fully three-dimensional, may be heading next.
CompTIA A+ Certification All-In-One For Dummies
Glen E. Clarke - 2009
1,200 pages of up-to-date information correlates with both the hardware and operating system exams and serves as a reference after the test-taking is completed.The minibooks cover each domain of the exam: A+ Groundwork, Inside the Box, Outside the Box, Maintenance and Troubleshooting, Operating System Basics, Managing The Operating System, Recovering Systems, Networking, and Securing Systems. You'll find plenty of sample test questions to get you prepared, too.
CompTIA's A+ certification is vendor-neutral and validates the skills of entry-level computer technicians; it can be the ticket to a new or better job
Certification requires successful completion of two exams; this prep guide covers all the core competencies required
Nine minibooks cover A+ Groundwork, Inside the Box, Outside the Box, Maintenance and Troubleshooting, Operating System Basics, Managing The Operating System, Recovering Systems, Networking, and Securing Systems
Covers installation, configuration, diagnosing, preventive maintenance, and basic networking, with extra information about Vista and a heavier emphasis on hardware
Companion CD-ROM include the Dummies Test Engine, an exclusive, fully customizable test-prep software package that includes 400 exam review questions
CompTIA A+ Certification All-In-One For Dummies, 2nd Edition is the best study guide to have as you prepare for the A+ exams!Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.
CEH Certified Ethical Hacker All-in-One Exam Guide
Matt Walker - 2011
Pub the Date: September. 2011 of Pages: 416 in Publisher: McGraw-Hill the Get complete coverages of all the objectives included on the EC-Council's Certified the Ethical Hacker exam inside the this comprehensive resource. Written by an the IT security expert. The this the authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter. exam tips. practice exam questions. and in-depth explanations. Designed to help you pass the exam with ease. this definitive volume also serves as an essential on-the-job reference.COVERS ALL EXAM TOPICS. INCLUDING: Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses. trojans. and other ...
Dreaming in Code: Two Dozen Programmers, Three Years, 4,732 Bugs, and One Quest for Transcendent Software
Scott Rosenberg - 2007
Along the way, we encounter black holes, turtles, snakes, dragons, axe-sharpening, and yak-shaving—and take a guided tour through the theories and methods, both brilliant and misguided, that litter the history of software development, from the famous ‘mythical man-month’ to Extreme Programming. Not just for technophiles but for anyone captivated by the drama of invention, Dreaming in Code offers a window into both the information age and the workings of the human mind.
Security in Computing
Charles P. Pfleeger - 1988
In this newFourth Edition, Charles P. Pfleeger and Shari Lawrence Pfleeger have thoroughly updated their classic guide to reflect today's newest technologies, standards, and trends. The authors first introduce the core concepts and vocabulary of computer security, including cryptography. Next, they systematically identify and assess threats now facing programs, operating systems, databases, and networks. For each threat, they offer best-practice responses. Security in Computing, Fourth Edition, goes beyond technology, covering crucial management issues you face in protecting infrastructure and information. This edition contains an all-new chapter on the economics of cybersecurity, and making the business case for security investments. Another new chapter addresses privacy--from data mining to identity theft, to RFID and e-voting. New coverage also includes Programming mistakes that compromise security: man-in-the-middle, timing, and privilege escalation Web application threats and vulnerabilities Networks of compromised systems: bots, botnets, and drones Rootkits--including the notorious Sony XCP Wi-Fi network security challenges, standards, and techniques New malicious code attacks, including false interfaces and keystroke loggers Improving code quality: software engineering, testing, and liability approaches Biometric authentication: capabilities and limitations Using Advanced Encryption System (AES) more effectively Balancing efficiency and piracy control in music and other digital content Defending against new cryptanalytic attacks against RSA, DES, and SHA Responding to the emergence of organized attacker groups pursuing profit 0132390779B0721200 Every day, the news media giv
Effective Perl Programming
Joseph Hall - 1997
The language features full support for regular expressions, object-oriented modules, network programming, and process management. Perl is extensible, and supports modular, cross-platform development.In "Effective Perl Programming," Perl experts Joseph Hall and Randal Schwartz share programming solutions, techniques, programming pointers, rules of thumb, and the pitfalls to avoid, enabling you to make the most of Perl's power and capabilities.The authors will help you develop a knack for the right ways to do things. They show you how to solve problems with Perl, and how to debug and improve your Perl programs. Offering examples, they help you learn good Perl style. Geared for programmers who have already acquired Perl basics, the book will extend your skill range, providing the tactics and deeper understanding you need to create Perl programs that are more elegant, effective, and succinct. This book also speaks to those who want to become more fluent, expressive, and individualistic Perl programmers.To help you design and write effective Perl progams, Effective Perl Programming includes: Perl basics Idiomatic Perl Regular expressions Subroutines References Debugging Usage of packages and modules Object-oriented programming Useful and interesting Perl miscellanyNumerous thought-provoking examples appear throughout the book, highlighting many of the subtleties that make Perl such a fascinating, fun, and effective language to work with.