Book picks similar to
Big Breaches: Cybersecurity Lessons for Everyone by Neil Daswani
programming
society-technology
someday
cyber-security
Akka in Action
Raymond Roestenburg - 2012
Akka uses Actors-independently executing processes that communicate via message passing—as the foundation for fault-tolerant applications where individual actors can fail without crashing everything. Perfect for high-volume applications that need to scale rapidly, Akka is an efficient foundation for event-driven systems that want to scale elastically up and out on demand, both on multi-core processors and across server nodes.Akka in Action is a comprehensive tutorial on building message-oriented systems using Akka. The book takes a hands-on approach, where each new concept is followed by an example that shows you how it works, how to implement the code, and how to (unit) test it. You'll learn to test and deploy an actor system and scale it up and out, showing off Akka's fault tolerance. As you move along, you'll explore a message-oriented event-driven application in Akka. You'll also tackle key issues like how to model immutable messages and domain models, and apply patterns like Event Sourcing, and CQRS. The book concludes with practical advice on how to tune and customize a system built with Akka.
Network Warrior
Gary A. Donahue - 2007
What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.
Captain Cook: His Life, Voyages, and Discoveries
William Henry Giles Kingston - 1871
This book is not an adventure story with a fictitious hero, but is the story of one of the great nautical heroes of the eighteenth century, a man who discovered many of the islands of the Pacific, to say nothing of the great lands of Australia and new Zealand.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
The Legacy Builder: Five Non-Negotiable Leadership Secrets
Rod Olson - 2013
The five non-negotiables. And you can’t give away what you don’t possess yourself.” When Lance Marshall’s life comes crashing down, his wife arranges for him to meet with his high school mentor, Coach Moore. Coach sends Lance “back to the locker room” to talk with five sports legends who are now successful leaders. Each player will show Lance a principle for excellence in both leadership and the home. But the advice comes with a caveat: Lance must apply the principle he learns within twenty-four hours or the meetings end. This modern parable is for business leaders, coaches, and parents who know the challenge of motivating people while balancing the demands of life with integrity—and leaving a legacy that will last forever.
Laravel: Code Bright
Dayle Rees - 2013
At $29 and cheaper than a good pizza, you will get the book in its current partial form, along with all future chapters, updates, and fixes for free. As of the day I wrote this description, Code Bright had 130 pages and was just getting started. To give you some perspective on how detailed it is, Code Happy was 127 pages in its complete state. Want to know more? Carry on reading.Welcome back to Laravel. Last year I wrote a book about the Laravel PHP framework. It started as a collection of tutorials on my blog, and eventually became a full book. I definitely didn’t expect it to be as popular as it was. Code Happy has sold almost 3000 copies, and is considered to be one of the most valuable resourcesfor learning the Laravel framework.Code Bright is the spiritual successor to Code Happy. The framework has grown a lot in the past year, and has changed enough to merit a new title. With Code Bright I hope to improve on Code Happy with every way, my goal is, to once again, build the most comprehensive learning experience for the framework. Oh, and to still be funny. That’s very important to me.Laravel Code Bright will contain a complete learning experience for all of the framework’s features. The style of writing will make it approachable for beginners, and a wonderful reference resource for experienced developers alike.You see, people have told me that they enjoyed reading Code Happy, not only for its educational content, but for its humour, and for my down to earth writing style. This is very important to me. I like to write my books as if we were having a conversation in a bar.When I wrote Code Happy last year, I was simply a framework enthusiast. One of the first to share information about the framework. However, since then I have become a committed member of the core development team. Working directly with the framework author to make Laravel a wonderful experience for the developers of the world.One other important feature of both books, is that they are published while in progress. This means that the book is available in an incomplete state, but will grow over time into a complete title. All future updates will be provided for free.What this means is that I don’t have to worry about deadlines, or a fixed point of completion. It leads to less stress and better writing. If I think of a better way to explain something, I can go back and change it. In a sense, the book will never be completed. I can constantly add more information to it, until it becomes the perfect resource.Given that this time I am using the majority of my spare time to write the title (yes, I have a full time job too!), I have raised the price a little to justify my invested time. I was told by many of my past readers that they found the previous title very cheap for the resource that it grew into, so if you are worried about the new price, then let me remind you what you will get for your 29 bucks.The successor to Code Happy, seen by many as the #1 learning resource for the Laravel PHP framework.An unending source of information, chapters will be constantly added as needed until the book becomes a giant vault of framework knowledge.Comedy, and a little cheesy, but very friendly writing.
Making Games with Python & Pygame
Al Sweigart - 2012
Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for free from http: //inventwithpython.com/pygame This book was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has some familiarity with Python.
Legends over Generations
Ashraf Haggag - 2018
These genius minds put a keen interest in every phenomenon right from when they were young. The zeal, passion, dedication, hard work and efforts they put into their work helped them discover something new about the world we live in. In these Legends, we’ve seen inexplicable abilities that helped us define our existence and human life. Their names are engraved in the sands of time for their work in the welfare of mankind with different inventions that have made our lives easy, enjoyable and successful. The following chapters commemorate the greatest personalities we’ve ever seen who changed the world.They are among the most influential people of today’s world. With practical advantages in various aspects, they have helped us to grow a better understanding of the world and different working phenomenon’s that governs us. Their way of shaping modern day culture is completely unrivaled.
Songbird Cottage Beginnings
Sylvia Price - 2020
Sam MacAuley and his wife Annalize are total opposites. When Sam wants to leave city life in Halifax to get a plot of land on Cape Breton Island, where he grew up, his wife wants nothing to do with his plans and opts to move herself and their three boys back to her home country of South Africa. As Sam settles into a new life on his own, his friend Lachlan encourages him to get back into the dating scene. Although he meets plenty of women, he longs to find the one with whom he wants to share the rest of his life. Will Sam ever meet “the one”?Get to know Sam and discover the origins of the Songbird Cottage. This is the prequel to the rest of the Pleasant Bay series.
Those Want Ads Can Be Murder
Les Macdonald - 2014
All of the cases end in murder. The stories start with The Black Widow of Laporte, Indiana which is the story of.Belle Gunness and her use of the want ads in the early 1900's. We work our way through the 20th century with The French Bluebeard, The Bogeyman, The Torch Murderer, The Bluebeard of Quiet Dell, The Lonely Hearts Killers, It's A Family Affair, The Lonely Hearts Husband Killer, Harv the Hammer and The Glamour Girl Killer. The final section of the book features nine cases where Craigslist ads have resulted in murder. There are more than 80 pictures throughout the book.
The Hardware Hacker: Adventures in Making and Breaking Hardware
Andrew Huang - 2017
In The Hardware Hacker, Huang shares his experiences in manufacturing and open hardware, creating an illuminating and compelling career retrospective.Huang's journey starts with his first visit to the staggering electronics markets in Shenzhen, with booths overflowing with capacitors, memory chips, voltmeters, and possibility. He shares how he navigated the overwhelming world of Chinese factories to bring chumby, Novena, and Chibitronics to life, covering everything from creating a Bill of Materials to choosing the factory to best fit his needs.Through this collection of personal essays and interviews on topics ranging from the legality of reverse engineering to a comparison of intellectual property practices between China and the United States, bunnie weaves engineering, law, and society into the tapestry of open hardware.With highly detailed passages on the ins and outs of manufacturing and a comprehensive take on the issues associated with open source hardware, The Hardware Hacker is an invaluable resource for aspiring hackers and makers.
Zelda Fitzgerald: The Biography
University Press Biographies - 2017
The chafing restrictions of a typical upbringing in upper-class, small town Alabama simply did not apply to Zelda, who was described as an unusual child and permitted to roam the streets with little supervision. Zelda refused to blossom into a typical 'Southern belle' on anyone's terms but her own and while still in high school enjoyed the status of a local celebrity for her shocking behavior. Everybody in town knew the name Zelda Sayre. Queen of the Montgomery social scene, Zelda had a different beau ready and willing to show her a good time for every day of the week. Before meeting F. Scott Fitzgerald, Zelda's life was a constant pursuit of pleasure. With little thought for the future and no responsibilities to speak of, Zelda committed herself fully to the mantra that accompanied her photo in her high school graduation book: "Why should all life be work, when we all can borrow. Let's think only of today, and not worry about tomorrow." But for now Zelda was still in rehearsal for her real life to begin, a life she was sure would be absolutely extraordinary. Zelda Sayre married F. Scott Fitzgerald on the 3rd of April 1920 and left sleepy Montgomery behind in order to dive headfirst into the shimmering, glamourous life of a New York socialite. With the publication of Scott's first novel, This Side of Paradise, Zelda found herself thrust into the limelight as the very epitome of the Flapper lifestyle. Concerned chiefly with fashion, wild parties and flouting social expectations, Zelda and Scott became icons of the Jazz Age, the personification of beauty and success. What Zelda and Scott shared was a romantic sense of self-importance that assured them that their life of carefree leisure and excess was the only life really worth living. Deeply in love, the Fitzgeralds were like to sides of the same coin, each reflecting the very best and worst of each other. While the world fell in love with the image of the Fitzgeralds they saw on the cover of magazines, behind the scenes the Fitzgerald's marriage could not withstand the tension of their creative arrangement. Zelda was Scott's muse and he mercilessly mined the events of their life for material for his books. Scott claimed Zelda's memories, things she said, experiences she had and even passages from her diary as his possessions and used them to form the basis of his fictional works. Zelda had a child but the domestic sphere offered no comfort or purpose for her. The Flapper lifestyle was not simply a phase she lived through, it formed the very basis of her character and once the parties grew dull, the Fitzgeralds' drinking became destructive and Zelda's beauty began to fade, the world held little allure for her. Zelda sought reprieve in work and tried to build a career as a ballet dancer. When that didn't work out she turned to writing but was forbidden by Scott from using her own life as material. Convinced that she would never leave her mark on the world as deeply or expressively as Scott had, Zelda retreated into herself and withdrew from the people she knew in happier times. The later years of Zelda's life were marred by her detachment from reality as, diagnosed with schizophrenia, Zelda spent the last eighteen years of her life living in and out of psychiatric hospitals. As Scott's life unraveled due to alcohol abuse, Zelda looked back on the years they had spent together, young and wild and beautiful, as the best of her life. She may have been right but she was wrong about one thing, Zelda did leave her mark on the world and it was a deep and expressive mark that no one could have left but her. Zelda Fitzgerald: The Biography
The Vikings: Raiders, Explorers And Seafaring Warriors
Lance Hightower - 2016
Their achievements, rich culture and craftsmanship contributed greatly to our world today, and their explorations helped make up the boundaries of nations. The Vikings: Raiders, Explorers, and Seafaring Warriors by author Lance Hightower will give you a glimpse of the battles that raged for more than 300 years, sparked by the cultural and religious differences that were the trigger for warring with the Franks, England and Ireland, and for trade and exploration into the Muslim empire, the Byzantine Empire, as far as Russia, Spain and North America.They came from Sweden, Norway and Denmark, not as one army, but as separate tribes who assaulted their way through Christendom as retaliation for the destruction of their holy icon. They came from the sea in a way that ingeniously allowed them to go where no conventional ship dared, and they were able to navigate waters without benefit of the sun to guide them. They used boats that made ship-building history – light, fast, and equally efficient in shallow rivers and mighty oceans.They terrorized, traded, bartered, took slaves, colonized, fought and died all in the name of Odin, god of the battle-slain. Perhaps in the end, they fought more for territory and riches than principle, but the history of the Vikings will always remain as one of the most enthralling of all Ages, where honor was crucial, death on the battlefield was preferred to idleness, and the stormy pantheon of their gods still held the greatest influence in their lives.The brilliant sagas come to life with snippets of modern translations, told like tales of old should be told, with dread, heroics and excitement. Lance Hightower combines his own expertise with the latest archeological findings and information given to us from ancient text to present a first-rate portrayal of the Vikings in an easy-to-read format that is a refreshing change from the usual dry delivery of history.
North Korea: A Bare Bones History
James Friend - 2015
Kim Il Sung wasted little time before plunging the country into a futile war which cost more than two million people their lives. His son, Kim Jong Il, would wallow in obscene luxury as North Korea suffered one of the Twentieth Century’s most terrible famines. Kim Jong Un has only recently ascended to power. However, he has already ordered his own uncle’s execution by antiaircraft gun. The North Korean people are told that they are the most fortunate in the world. In reality they are the most oppressed. North Korea is a country where criticising the government, or even watching a foreign film, can lead to imprisonment and death.North Korea: A Bare Bones History tells the story of one of the world’s most enigmatic nations. It’s an extraordinary history of war, assassination, kidnapping, terrorism, and an attempt to decapitate a rival head of state.
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis - 2005
I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits