Keeping the Wonder: An Educator's Guide to Magical, Engaging, and Joyful Learning


Jenna Copper - 2021
    

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory


Michael Hale Ligh - 2014
    As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics--now the most sought after skill in the digital forensics and incident response fields.Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:How volatile memory analysis improves digital investigations Proper investigative steps for detecting stealth malware and advanced threats How to use free, open source tools for conducting thorough memory forensics Ways to acquire memory from suspect systems in a forensically sound manner The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Before the Lights Go Out: A Season Inside a Game on the Brink


Sean Fitz-Gerald - 2019
    It's become more expensive, more exclusive, and effectively off-limits to huge swaths of the potential sports-loving population. Youth registration numbers are stagnant; efforts to appeal to new Canadians are often grim at best; the game, increasingly, does not resemble the country of which it's for so long been an integral part. These signs worried Sean Fitz-Gerald. As a lifelong hockey fan and father of a young mixed-race son falling headlong in love with the game, he wanted to get to the roots of these issues. His entry point: a season with the Peterborough Petes, a storied OHL team far from its former glory in a once-emblematic Canadian city that is finding itself on the wrong side of the country's changing demographics. Fitz-Gerald profiles the players, coaches and front office staff, a mix of world-class talents with NHL aspirations and Peterborough natives happy with more modest dreams. Through their experiences, their widely varied motivations and expectations, we get a rich, colourful understanding of who ends up playing hockey in Canada and why. Fitz-Gerald interweaves the action of the season with portraits of public figures who've shaped and been shaped by the game: authors who captured its spirit, politicians who exploited it, and broadcasters who try to embody and sell it. He finds his way into community meetings full of angry season ticket holders, as well as into sterile boardrooms full of the sport's institutional brain trust, unable to break away from the inertia of tradition and hopelessly at war with itself. Before the Lights Go Out is a moving, funny, yet unsettling picture of a sport at a crossroads. Fitz-Gerald's warm but rigorous journalistic approach reads, in the end, like a letter to a troubled friend: it's not too late to save hockey in this country, but who has the will to do it?

Kali Linux Revealed: Mastering the Penetration Testing Distribution


Raphaël Hertzog - 2017
    They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

NOT A BOOK: The Cheesecake Factory Menu


NOT A BOOK
    The standardized menu for the The Cheesecake Factory restaurant chain.

Worm: The First Digital World War


Mark Bowden - 2011
    Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

Narrative Inquiry: Experience and Story in Qualitative Research


D. Jean Clandinin - 1999
    Clandinin and Connelly have created a major tour de force. This book is lucid, fluid, beautifully argued, and rich in examples. Students will find a wealth of arguments to support their research, and teaching faculty will find everything they need to teach narrative inquiry theory and methods.--Yvonna S. Lincoln, professor, Department of Educational Administration, Texas A&M University Understanding experience as lived and told stories--also known as narrative inquiry--has gained popularity and credence in qualitative research. Unlike more traditional methods, narrative inquiry successfully captures personal and human dimensions that cannot be quantified into dry facts and numerical data. In this definitive guide, Jean Clandinin and Michael Connelly draw from more than twenty years of field experience to show how narrative inquiry can be used in educational and social science research. Tracing the origins of narrative inquiry in the social sciences, they offer new and practical ideas for conducting fieldwork, composing field notes, and conveying research results. Throughout the book, stories and examples reveal a wide range of narrative methods. Engaging and easy to read, Narrative Inquiry is a practical resource from experts who have long pioneered the use of narrative in qualitative research.

Balance with Blended Learning: Partner with Your Students to Reimagine Learning and Reclaim Your Life


Catlin R. Tucker - 2020
     Blended learning allows a partnership that gives teachers more time and energy to innovate and personalize learning while providing students the opportunity to be active agents driving their own growth. Balance With Blended Learning provides teachers with strategies to actively engage students in setting goals, monitoring development, reflecting on growth, using feedback, assessing work quality, and communicating their progress with parents. It includes Practical strategies for teachers who are overwhelmed by their workloads Vignettes written by teachers across disciplines Ready-to-use templates to help students track their progress Stories from the author's experience as a teacher and blended learning coach

Future Crimes


Marc Goodman - 2015
    Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services.      Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders.     With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment.     Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.From the Hardcover edition.

DarkMarket: Cyberthieves, Cybercops and You


Misha Glenny - 2011
    The world has become a law enforcer's nightmare and every criminal's dream. We bank online; shop online; date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security--sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them?In this fascinating and compelling book, Misha Glenny, author of the international best seller "McMafia," explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Governments and the private sector are losing billions of dollars each year fighting an ever-morphing, often invisible and often supersmart new breed of criminal: the hacker. Glenny has traveled and trawled the world. By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players--the criminals, the geeks, the police, the security experts and the victims--and he places everyone and everything in a rich brew of politics, economics and history.The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.

Timeless: Love, Morgenthau, and Me


Lucinda Franks - 2014
    She’s a radical, self-styled hippie, and he is New York’s famous district attorney, a legal luminary of the establishment; she’s a prizewinning New York Times journalist who has chained herself to fences, bloodied draft files, and otherwise broken the law for her beliefs, and he is a secret iconoclast who could have put her in jail.     Timeless: Love, Morgenthau, and Me is the memoir of their triumph against the odds, their ongoing thirty-five-year marriage, a union between two people so deeply in love but so different—and with so many decades separating them—that their family and friends fought to keep them apart.     Franks offers a confidential tour of their marriage, as well as the never-revealed, behind-the-scenes details of Morgenthau’s famous cases. We see a red-faced Ronald Lauder storm into Morgenthau’s office after the DA seizes a priceless Egon Schiele painting from the walls of the Museum of Modern Art; we witness the CIA dismissing Morgenthau’s discovery of the growing terrorist cell in New York that would become al-Qaeda headquarters. This is an unusually close look at the privates lives of two well-known people who have always refused to reveal themselves to the public.

The Politics of the Administrative Process


Donald F. Kettl - 2001
    Kettl and Fesler understand that the push and pull of political forces make the functions of bureaucracy ever more contentious, but no less crucial to governance.Based on reviewer feedback, and given advances in scholarship and in practice, the authors introduce the crucial topics of ethics, accountability, and leadership early on, utilizing these central ideas as touchstones throughout the book. While this text continues to focus on the core components of public administration--such as budgeting, personnel, and implementation--it's been thoroughly updated to cover recent developments, including administrative issues spotlighted during the 2008 presidential campaigns, the use of technology in government management, and the changing face of the federal workforce. Fully updated tables and figures feature a wealth of current data, and photos add visual context to the book's core concepts.What was an appendix showcasing fourteen case studies in the previous edition is now a set of fully-integrated case studies--one in each chapter--that challenges students to apply ideas and analysis as they go. Each case emphasizes the people on the front lines at the local, state, and federal levels with topics ranging from Taser use in law enforcement to the recent economic bailout. Useful discussion questions at the end of each case help shape student responses and in-class conversation.

The Will to Lead, the Skill to Teach: Transforming Schools at Every Level


Anthony Muhammad - 2011
    The authors acknowledge both the structural and sociological issues that contribute to low-performing schools and offer multiple tools and strategies to assess and improve classroom management, increase literacy, establish academic vocabulary, and contribute to a healthier school culture.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.