Programming Groovy


Venkat Subramaniam - 2008
    But recently, the industry has turned to dynamic languages for increased productivity and speed to market.Groovy is one of a new breed of dynamic languages that run on the Java platform. You can use these new languages on the JVM and intermix them with your existing Java code. You can leverage your Java investments while benefiting from advanced features including true Closures, Meta Programming, the ability to create internal DSLs, and a higher level of abstraction.If you're an experienced Java developer, Programming Groovy will help you learn the necessary fundamentals of programming in Groovy. You'll see how to use Groovy to do advanced programming including using Meta Programming, Builders, Unit Testing with Mock objects, processing XML, working with Databases and creating your own Domain-Specific Languages (DSLs).

Reversing: Secrets of Reverse Engineering


Eldad Eilam - 2005
    The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language

Train Your Brain: How to Build a Million Dollar Business in Record Time


Dana Wilde - 2013
    There always seemed to be a new system to learn, a new surefire method or cutting-edge technique for entrepreneurs to master.In an effort to teach her team members a better and easier way, Dana Wilde created Train Your Brain, a tested and proven system combining elements of both mindset and action ... or as Dana likes to call it, Intentional Action.What Dana discovered by using Train Your Brain is that mindset can be "taught" and that learning simple mindset strategies not only allows you to understand how the brain works but also shows you how easy it is to change your thinking and, as a result, change your outcomes.In Train Your Brain, Dana breaks down the Cycle of Perpetual Sameness--the number one reason why most people only experience incremental change in their lives. More importantly, she also provides the much-needed blueprint to help you get off this counterproductive cycle quickly.Train Your Brain, with its twenty easy-to-implement "Mindware Experiments," gives you all the necessary tools needed to get off ... and stay off ... the Cycle of Perpetual Sameness, so you can transform your life and grow your business in record time!

Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers


T.J. O'Connor - 2012
    Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground


Kevin Poulsen - 2011
    Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.

Confessions of a Crypto Millionaire


Dan Conway - 2019
    Reading this book was nothing short of thrilling." – Manhattan Book ReviewAt the start of this riveting memoir, Dan Conway is a brash young executive in a vast corporation, slogging his way up the ladder while struggling with depression and an addiction he thought he had defeated long ago. As he begins to realize that the mix of nightmarish bureaucracy and his unruly "flip side" have doomed any chance of success, Dan stumbles upon cryptocurrency, tumbling down the rabbit hole to discover a strange, anarchic, but captivating world. He decides to wager everything—his savings, his marriage, his family, his future—on the fledgling crypto, Ether.In Confessions of a Crypto Millionaire, readers join Dan on a rollicking, harrowing, frequently hilarious journey, including his: struggle to rise through the corporate ranks; battle with addiction and its aftermath; bid to reinvent himself; efforts to hold his marriage and family together; and the costs–and thrills–of risking it all."For Conway, crypto was only partly about the money. It was also about finding liberation and salvation." – ForbesDan details in a non-technical and non-preachy way how the idea of blockchain-based decentralization has convinced a generation of dreamers, misfits and gamblers to too often bet more than they can afford to lose. He illustrates how public blockchains like Ethereum could disrupt the nature of work itself in the coming years, upending stultifying centralized corporations in favor of "trust machines" and peer-to-peer cooperation. In the process, readers take a thrilling ride with Dan on a turbocharged adventure through crypto, not knowing if he will make history or lose everything he holds dear.

Advanced Cardiac Life Support (ACLS) Certification Course Kit - Including Practice Tests - Review of BLS and detailed instruction of ACLS algorithms


Karl Disque - 2013
    This is the online Advanced Cardiac Life Support (ACLS) course offered by Save a Life Certifications by NHCPS. This course builds on the foundation of lifesaving BLS skills, emphasizing the importance of continuous, high-quality CPR. This advanced course highlights the importance of high-performance team dynamics and communication, systems of care, recognition and intervention of cardiopulmonary arrest, immediate post-cardiac arrest, acute dysrhythmia, stroke, and acute coronary syndromes (ACS). Included with this purchase is a unique code that allows you to complete the ACLS course on the NHCPS website. This course also includes the most recent update of the NHCPS Advanced Cardiac Life Support (ACLS) Provider Handbook with several constructive improvements to an already exceptional handbook. With these updates, NHCPS proudly offers one of the most effective and user-friendly ACLS Provider Handbooks on the market. Information covered by the course includes a review of BLS, and detailed instruction of ACLS algorithms, airway management, ACLS medications, and more. Full-page ACLS algorithms, as well as tables, diagrams, and other learning tools, are also included within the handbook. All material included in this handbook is delivered in a manner meant to enhance learning in the most comprehensive and convenient way possible. Upon completion of the course, you will receive an ACLS provider card in an electronic version as well as a printed copy shipped to your address (allow 3-5 business days for delivery).

RHCSA/RHCE Red Hat Linux Certification Study Guide (Exams EX200 & EX300), 6th Edition (Certification Press)


Michael Jang - 2011
    100 complete coverage of all official objectives for Exams EX200 and EX300 Exam Readiness Checklist-youre ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Two-Minute Drills for quick review 100 lab questions-two full lab-based RHCSA exams and two full lab-based RHCE exams-match the format, tone, topics, and difficulty of the real exam Covers all the exam topics, including Virtual Machines and Automated Installations Fundamental Command Line Skills RHCSA-Level Security Options The Boot Process Linux Filesystem Administration Package Management User Administration RHCSA-Level System Administration RHCE Security System Services and SELinux RHCE Administration Mail Servers Samba File Sharing DNS, FTP, and Logging CD-ROM includes Complete lab-based exam preparation, featuring Two full RHCSA practice exams Two full RHCE practice exams Lab-based chapter self tests In-depth answer explanations for all labs RHCSA and RHCE Glossary PDF copy of the book for studying on the go Michael Jang, RHCE, LPIC-2, UCP, LCP, MCP, is the author of three previous bestselling editions of RHCE Red Hat Certified Engineer Linux Study Guide and several other books on Linux and professional certification.

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide


James Michael Stewart - 2015
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

Guided Math in Action: Building Each Student's Mathematical Proficiency with Small-Group Instruction


Nicki Newton - 2011
    Lots of actual templates, graphic organizers, black-line masters, detailed lesson plans, and student work samples are included, as well as vignettes of mini-lessons, center time, small guided math groups, and share time.This practical, hands-on guide will help you...Understand the framework of Guided Math lessons Gain an in-depth look at the role of assessment throughout the Guided Math process Develop an action plan to get started immediately This is a must-have resource for all educators looking for a structure to teach small groups in math that meet the Common Core State Standards for Mathematics.

Keeping the Wonder: An Educator's Guide to Magical, Engaging, and Joyful Learning


Jenna Copper - 2021
    

The Tangled Web: A Guide to Securing Modern Web Applications


Michal Zalewski - 2011
    Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.

The Little Book on CoffeeScript


Alex MacCaw - 2012
    Through example code, this guide demonstrates how CoffeeScript abstracts JavaScript, providing syntactical sugar and preventing many common errors. You’ll learn CoffeeScript’s syntax and idioms step by step, from basic variables and functions to complex comprehensions and classes.Written by Alex MacCaw, author of JavaScript Web Applications (O’Reilly), with contributions from CoffeeScript creator Jeremy Ashkenas, this book quickly teaches you best practices for using this language—not just on the client side, but for server-side applications as well. It’s time to take a ride with the little language that could.Discover how CoffeeScript’s syntax differs from JavaScriptLearn about features such as array comprehensions, destructuring assignments, and classesExplore CoffeeScript idioms and compare them to their JavaScript counterpartsCompile CoffeeScript files in static sites with the Cake build systemUse CommonJS modules to structure and deploy CoffeeScript client-side applicationsExamine JavaScript’s bad parts—including features CoffeeScript was able to fix

PostgreSQL 9.0 High Performance


Gregory Smith - 2010
    You could spend years discovering solutions to them all, step by step as you encounter them. Or you can just look in here. All successful database applications are destined to eventually run into issues scaling up their performance. Peek into the future of your PostgreSQL database's problems today. Know the warning signs to look for, and how to avoid the most common issues before they even happen. Surprisingly, most PostgreSQL database applications evolve in the same way: Choose the right hardware. Tune the operating system and server memory use. Optimize queries against the database, with the right indexes. Monitor every layer, from hardware to queries, using some tools that are inside PostgreSQL and others that are external. Using monitoring insight, continuously rework the design and configuration. On reaching the limits of a single server, break things up; connection pooling, caching, partitioning, and replication can all help handle increasing database workloads. The path to a high performance database system isn't always easy. But it doesn't have to be mysterious with the right guide. This book is a clear, step-by-step guide to optimizing and scaling up PostgreSQL database servers. - Publisher.

Not Everyone Gets A Trophy: How to Manage the Millennials


Bruce Tulgan - 2015