Takedown: The Pursuit and Capture of Kevin Mitnick, America's Most Wanted Computer Outlaw - By the Man Who Did It


Tsutomu Shimomura - 1996
    Reprint. NYT.

Laravel: Up and Running: A Framework for Building Modern PHP Apps


Matt Stauffer - 2016
    This rapid application development framework and its vast ecosystem of tools let you quickly build new sites and applications with clean, readable code. With this practical guide, Matt Stauffer--a leading teacher and developer in the Laravel community--provides the definitive introduction to one of today's most popular web frameworks.The book's high-level overview and concrete examples will help experienced PHP web developers get started with Laravel right away. By the time you reach the last page, you should feel comfortable writing an entire application in Laravel from scratch.Dive into several features of this framework, including:Blade, Laravel's powerful, custom templating toolTools for gathering, validating, normalizing, and filtering user-provided dataLaravel's Eloquent ORM for working with the application's databasesThe Illuminate request object, and its role in the application lifecyclePHPUnit, Mockery, and PHPSpec for testing your PHP codeLaravel's tools for writing JSON and RESTful APIsInterfaces for file system access, sessions, cookies, caches, and searchTools for implementing queues, jobs, events, and WebSocket event publishingLaravel's specialty packages: Scout, Passport, Cashier, Echo, Elixir, Valet, and Socialite

Teaching Students Who are Exceptional, Diverse, and at Risk in the General Education Classroom [with MyEducationLab Code]


Sharon R. Vaughn - 1996
    From students with disabilities, culturally diverse students, and students with limited English proficiency to economically disadvantaged students this text provides teachers with the tools they need in their diverse classrooms. Revised to reflect the most current research, terminology and teaching practices, the strength of this text continues to be its numerous learning activities and sample lessons addressing both elementary and secondary classrooms. This edition continues its very popular multi- chapter unit on curriculum adaptations with specific strategies and activities for teaching reading, writing, and mathematics. With a new chapter on Response to Intervention and Progress Monitoring and full integration of the RTI framework, and the increase emphasis on middle and secondary students, this text continues its reign as an outstanding resource for all general education teachers. 0131381253 / 9780131381254 Teaching Students Who are Exceptional, Diverse, and at Risk in the General Education Classroom (with MyEducationLab) Package consists of 0135140870 / 9780135140871 MyEducationLab -- Access Card 0137151799 / 9780137151790 Teaching Students Who are Exceptional, Diverse, and at Risk in the General Education Classroom

Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia


Anthony M. Townsend - 2013
    A century ago, the telegraph and the mechanical tabulator were used to tame cities of millions. Today, cellular networks and cloud computing tie together the complex choreography of mega-regions of tens of millions of people.In response, cities worldwide are deploying technology to address both the timeless challenges of government and the mounting problems posed by human settlements of previously unimaginable size and complexity. In Chicago, GPS sensors on snow plows feed a real-time "plow tracker" map that everyone can access. In Zaragoza, Spain, a "citizen card" can get you on the free city-wide Wi-Fi network, unlock a bike share, check a book out of the library, and pay for your bus ride home. In New York, a guerrilla group of citizen-scientists installed sensors in local sewers to alert you when stormwater runoff overwhelms the system, dumping waste into local waterways.As technology barons, entrepreneurs, mayors, and an emerging vanguard of civic hackers are trying to shape this new frontier, Smart Cities considers the motivations, aspirations, and shortcomings of them all while offering a new civics to guide our efforts as we build the future together, one click at a time.

The Cyber Effect: A Pioneering Cyberpsychologist Explains How Human Behavior Changes Online


Mary Aiken - 2016
    Levitt, co-author of Freakonomics - One of the best books of the year--NatureMary Aiken, the world's leading expert in forensic cyberpsychology, offers a starting point for all future conversations about how the Internet is shaping development and behavior, societal norms and values, children, safety, privacy, and our perception of the world. Drawing on her own research and extensive experience with law enforcement, Aiken covers a wide range of subjects, from the impact of screens on the developing child to the explosion of teen sexting and the acceleration of compulsive and addictive behaviors online. Aiken provides surprising statistics and incredible-but-true case studies of hidden trends that are shaping our culture and raising troubling questions about where the digital revolution is taking us.Praise for The Cyber Effect"How to guide kids in a hyperconnected world is one of the biggest challenges for today's parents. Mary Aiken clearly and calmly separates reality from myth. She clearly lays out the issues we really need to be concerned about and calmly instructs us on how to keep our kids safe and healthy in their digital lives."--Peggy Orenstein, author of the New York Times bestseller Girls & Sex"[A] fresh voice and a uniquely compelling perspective that draws from the murky, fascinating depths of her criminal case file and her insight as a cyber-psychologist . . . This is Aiken's cyber cri de coeur as a forensic scientist, and she wants everyone on the case."--The Washington Post"Fascinating . . . If you have children, stop what you are doing and pick up a copy of The Cyber Effect."--The Times (UK)"An incisive tour of sociotechnology and its discontents."--Nature"Just as Rachel Carson launched the modern environmental movement with her Silent Spring, Mary Aiken delivers a deeply disturbing, utterly penetrating, and urgently timed investigation into the perils of the largest unregulated social experiment of our time."--Bob Woodward"Mary Aiken takes us on a fascinating, thought-provoking, and at times scary journey down the rabbit hole to witness how the Internet is changing the human psyche. A must-read for anyone who wants to understand the temptations and tragedies of cyberspace."--John R. Suler, PhD, author of The Psychology of Cyberspace"Drawing on a fascinating and mind-boggling range of research and knowledge, Mary Aiken has written a great, important book that terrifies then consoles by pointing a way forward so that our experience online might not outstrip our common sense."--Steven D. Levitt"Having worked with law enforcement groups from INTERPOL and Europol as well as the U.S. government, Aiken knows firsthand how today's digital tools can be exploited by criminals lurking in the Internet's Dark Net."--Newsweek

Asteroid Mining 101: Wealth for the New Space Economy


John S. Lewis - 2014
    It is within the realm of possibility that their work may usher in a change in global economics as profound as the Industrial Revolution. As may be expected, press reports dealing with asteroid mining have been numerous, ranging in scope from short and breezy to broad and serious, and in quality from accurate to impressionistic to simply uninformed. There is good reason to be curious about what may be the biggest game-changer in human economic history. And there is good reason to look closely at the underlying science and engineering that form the foundation of this work.

Rise of the Machines: A Cybernetic History


Thomas Rid - 2016
    Rise of the Machines reclaims the spectacular story of cybernetics, one of the twentieth century’s pivotal ideas.Springing from the mind of mathematician Norbert Wiener amid the devastation of World War II, the cybernetic vision underpinned a host of seductive myths about the future of machines. Cybernetics triggered blissful cults and military gizmos, the Whole Earth Catalog and the air force’s foray into virtual space, as well as crypto-anarchists fighting for internet freedom.In Rise of the Machines, Thomas Rid draws on unpublished sources—including interviews with hippies, anarchists, sleuths, and spies—to offer an unparalleled perspective into our anxious embrace of technology.

Mastering Excel Macros: Introduction (Book 1)


Mark Moore - 2014
    Everybody wants to learn them. You're not a programmer though. How is a non technical user going to learn how to program? You do want to use macros to make your work easier but are you really going to sit down with a huge programming textbook and work your way through every. single. boring. page? Like most people, you'll start with great enthusiasm and vigor but after a few chapters, the novelty wears off. It gets boring. I'm going to try and change that and make learning macro programming entertaining and accessible to non-techies. First of all, programming Excel macros is a huge topic. Let's eat the elephant one bite at a time. Instead of sitting down with a dry, heavy text, you will read very focused, to the point topics. You can then immediately use what you learned in the real world. This is the first lesson in the series. You will learn what macros are, how to access them, a tiny bit of programming theory (just so you have a clue as to what's going on) and how to record macros. As with all my other lessons, this one has a follow along workbook that you can use to work through the exercises. The images in the lessons are based on Excel 2013 for Windows.

How to Count (Programming for Mere Mortals, #1)


Steven Frank - 2011
    unsigned numbers- Floating point and fixed point arithmeticThis short, easily understood book will quickly get you thinking like a programmer.

TCP/IP Illustrated, Volume 1: The Protocols


Kevin R. Fall - 2009
    Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP best-seller has been thoroughly updated to reflect a new generation of TCP/IP-based networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: " Remote procedure call " Identity management (access control / authentication) " Network and transport layer security (authentication / privacy) " File access protocols, including NFS and SMB/CIFS " Host initialization and DHCP " NAT and firewalls " E-mail " Web and web services " Wireless and wireless security " New tools, including Ethereal, nmap and netcat

Privacy in Context: Technology, Policy, and the Integrity of Social Life


Helen Nissenbaum - 2009
    This book claims that what people really care about when they complain and protest that privacy has been violated is not the act of sharing information itself—most people understand that this is crucial to social life —but the inappropriate, improper sharing of information.Arguing that privacy concerns should not be limited solely to concern about control over personal information, Helen Nissenbaum counters that information ought to be distributed and protected according to norms governing distinct social contexts—whether it be workplace, health care, schools, or among family and friends. She warns that basic distinctions between public and private, informing many current privacy policies, in fact obscure more than they clarify. In truth, contemporary information systems should alarm us only when they function without regard for social norms and values, and thereby weaken the fabric of social life.

Stages to Saturn: A Technological History of the Apollo/Saturn Launch Vehicles


Roger E. Bilstein - 1997
    . . . Roger Bilstein gracefully wends his way through a maze of technical documentation to reveal the important themes of this story. Rarely has such a nuts-and-bolts tale been so gracefully told."—Air University Review"Easily the best book of the NASA History Series. . . . Starting with the earliest rockets, Bilstein traces the development of the family of massive Saturn launch vehicles that carried the Apollo astronauts to the moon and boosted Skylab into orbit."—Technology and CultureA classic study of the development of the Saturn launch vehicle that took Americans to the moon in the 1960s and 1970s, Stages to Saturn is one of the finest official histories ever produced. The Saturn rocket was developed as a means of accomplishing President John F. Kennedy's goal for the United States to reach the moon before the end of the decade. Without the Saturn V rocket, with its capability of sending as payload the Apollo Command and Lunar Modules--along with support equipment and three astronauts--more than a quarter of a million miles from earth, Kennedy's goal would have been unrealizable. Stages to Saturn not only tells the important story of the research and development of the Saturn rockets and the people who designed them but also recounts the stirring exploits of their operations, from orbital missions around earth testing Apollo equipment to their journeys to the moon and back.  Essential reading for anyone seeking to understand the development of space flight in America and the course of modern technology, this reprint edition includes a new preface by the author providing a 21st-century perspective on the historic importance of the Saturn project.Roger E. Bilstein is professor emeritus of history at the University of Houston, Clear Lake. Regarded as one of the nation’s premier aerospace historians, he is the author of six books, including Flight in America: From the Wrights to the Astronauts and Testing Aircraft, Exploring Space: An Illustrated History of NACA and NASA.

File System Forensic Analysis


Brian Carrier - 2005
    Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.

Employment Law for Business


Dawn D. Bennett-Alexander - 1997
    It is intended to instruct students on how to manage effectively and efficiently with full comprehension of the legal ramifications of their decisions. Students are shown how to analyze employment law facts using concrete examples of management-related legal dilemmas that do not present clear-cut solutions. The methods of arriving at resolutions are emphasized, so that when the facts of the workplace problem are not quite the same, the student can still reach a good decision based on the legal considerations required by law, which remain relevant.

Advanced Rails Recipes


Mike Clark - 2007
    Fueled by significant benefits and an impressive portfolio of real-world applications already in production, Rails is destined to continue making significant inroads in coming years.Each new Rails application showing up on the web adds yet more to the collective wisdom of the Rails development community. Yesterday's best practices yield to today's latest and greatest techniques, as the state of the art is continually refined in kitchens all across the Internet. Indeed, these are times of great progress.At the same time, it's easy to get left behind in the wake of progress. Advanced Rails Recipes keeps you on the cutting edge of Rails development and, more importantly, continues to turn this fast-paced framework to your advantage.Advanced Rails Recipes is filled with pragmatic recipes you'll use on every Rails project. And by taking the code in these recipes and slipping it into your application you'll not only deliver your application quicker, you'll do so with the confidence that it's done right.The book includes contributions from Aaron Batalion, Adam Keys, Adam Wiggins, Andre Lewis, Andrew Kappen, Benjamin Curtis, Ben Smith, Chris Bernard, Chris Haupt, Chris Wanstrath, Cody Fauser, Dan Benjamin, Dan Manges, Daniel Fischer, David Bock, David Chelimsky, David Heinemeier Hansson, Erik Hatcher, Ezra Zygmuntowicz, Geoffrey Grosenbach, Giles Bowkett, Greg Hansen, Gregg Pollack, Hemant Kumar, Hugh Bien, Jamie Orchard-Hays, Jamis Buck, Jared Haworth, Jarkko Laine, Jason LaPier, Jay Fields, John Dewey, Jonathan Dahl, Josep Blanquer, Josh Stephenson, Josh Susser, Kevin Clark, Luke Francl, Mark Bates, Marty Haught, Matthew Bass, Michael Slater, Mike Clark, Mike Hagedorn, Mike Mangino, Mike Naberezny, Mike Subelsky, Nathaniel Talbott, PJ Hyett, Patrick Reagan, Peter Marklund, Pierre-Alexandre Meyer, Rick Olson, Ryan Bates, Scott Barron, Tony Primerano, Val Aleksenko, and Warren Konkel.