Book picks similar to
Wireless Information Networks by Kaveh Pahlavan
communications
computing
security
technology
Nightshade Cozy Mysteries : A Witch Cozy Collection: Books 1 - 5
Lori Woods - 2019
Wish You Were Here A routine trip to the vet begins a wild adventure when Suzy Maycomber and her cat, Snowball, take a shortcut through the cemetery and find themselves in the mystical land of Nightshade, where magic exists and cats talk. Only the librarian, Rachel, the most powerful witch in Nightshade, can help Suzy get home. One big problem: Rachel's just been murdered. Desperate to find her way home, Suzy reluctantly agrees to take Rachel’s place as Nightshade’s resident witch, where she’ll have access to the spell books that might hold the answers she needs. But her search for the truth draws Suzy ever deeper into danger. There is someone – or something – in Nightshade that doesn’t want Suzy to get home. Rachel’s murderer is prepared to kill again – and Suzy may be next. If Suzy wants to get home, she’ll have to learn to be a witch first. 2. Witch Spells Trouble Just when Suzy Maycomber is getting settled at the Academy in Hemlock, trouble strikes again. Suzy discovers one of her classmates murdered in the basement of the school, and the only witness is a ghost that speaks in riddles and rhymes. Determined to unmask the killer, Suzy enlists the help of Snowball and Alfie... but something doesn't feel right. The toil and trouble doubles when almost everyone in Hemlock begins acting differently, including Alfie. Can Suzy cast her way out of another case of murder, mystery, and mayhem or will whatever is taking over the town get her too? 3. Stone Cold Witch After a werewolf is found dead in the woods after having been turned to stone, the entire town of Nightshade is on edge. At a werewolf wedding that Suzy and Snowball are invited to, a second werewolf is targeted. However, the second murder is vastly different from the first, leaving local authorities confused about a possible motive. Is the killer targeting werewolves? Or, is there more than one killer? Trouble seems to follow Suzy, but she promises to help solve this new mystery. Along with her friend Red Sumac, they head to the town of Safe Haven – home of the world’s greatest experts on stone - gargoyles. However, while in Safe Haven, Suzy discovers a truth about her past that will change everything. Can Suzy and her friends bring the killer to justice? And, can Suzy do it all while juggling the female vampire in town who has her cold, dead heart, set on winning over Val? 4. Life's A Witch After a spate of gargoyle murders, Suzy Maycomber finds herself running out of time to catch the culprit and save her friend, Red Sumac, who has been framed for the murders. Gargoyles daring to seek better lives for themselves has caused the cult group, the Anti-Masons, to re-emerge and target them. As the granddaughter of one of the world’s most notorious Anti-Masons’, Suzy’s friend, Red Sumac, is automatically under suspicion of murderous activity in Hemlock. Join Suzy and friends as they go deep under cover as Anti-Masons to discover the truth, while endangering their own lives. Will they succeed or will Red Sumac be doomed to spend the rest of her days in a witch’s prison? 5.
After the Republic
Frank L. Williams - 2015
Conflict. Lawlessness. An uncertain future in a strange place. The American republic has crumbled. Joshua Winston, a reluctant leader who had hoped to enjoy a quiet, peaceful retirement from politics, is forced off of the sidelines. Now, he must lead a group of Americans determined to survive in the dangerous new world they face. He takes great pains to steer his group clear of the chaos that reigns after the republic, but fears that the conflict will inevitably find its way to them.
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
Simon Singh - 1999
From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kevin Poulsen - 2011
Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.
The Victorian Internet
Tom Standage - 1998
Generations of innovators tried and failed to develop speedier messaging devices. But in the mid-1800s, a few extraordinary pioneers at last succeeded. Their invention--the electric telegraph--shrank the world more quickly than ever before.A colorful tale of scientific discovery and technological cunning, The Victorian Internet tells the story of the telegraph's creation and remarkable impact, and of the visionaries, oddballs, and eccentrics who pioneered it. By 1865 telegraph cables spanned continents and oceans, revolutionizing the ways countries dealt with one another. The telegraph gave rise to creative business practices and new forms of crime. Romances blossomed over the wires. Secret codes were devised by some users, and cracked by others. The benefits of the network were relentlessly hyped by its advocates and dismissed by its skeptics. And attitudes toward everything from news gathering to war had to be completely rethought. The telegraph unleashed the greatest revolution in communications since the development of the printing press. Its saga offers many parallels to that of the Internet in our own time--and is a fascinating episode in the history of technology.
Building Cloud Apps with Microsoft Azure: Best Practices for DevOps, Data Storage, High Availability, and More (Developer Reference)
Scott Guthrie - 2014
The patterns apply to the development process as well as to architecture and coding practices. The content is based on a presentation developed by Scott Guthrie and delivered by him at the Norwegian Developers Conference (NDC) in June of 2013 (part 1, part 2), and at Microsoft Tech Ed Australia in September 2013 (part 1, part 2). Many others updated and augmented the content while transitioning it from video to written form. Who should read this book Developers who are curious about developing for the cloud, are considering a move to the cloud, or are new to cloud development will find here a concise overview of the most important concepts and practices they need to know. The concepts are illustrated with concrete examples, and each chapter includes links to other resources that provide more in-depth information. The examples and the links to additional resources are for Microsoft frameworks and services, but the principles illustrated apply to other web development frameworks and cloud environments as well. Developers who are already developing for the cloud may find ideas here that will help make them more successful. Each chapter in the series can be read independently, so you can pick and choose topics that you're interested in. Anyone who watched Scott Guthrie's "Building Real World Cloud Apps with Windows Azure" presentation and wants more details and updated information will find that here. Assumptions This ebook expects that you have experience developing web applications by using Visual Studio and ASP.NET. Familiarity with C# would be helpful in places.
Silverthorn by Raymond E. Feist Summary & Study Guide
BookRags - 2010
The Silverthorn study guide includes the following sections: Plot Summary, Chapter Summaries & Analysis, Characters, Objects/Places, Themes, Style, Quotes, and Topics for Discussion.
Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
Andy Oram - 2009
Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).
DarkMarket: Cyberthieves, Cybercops and You
Misha Glenny - 2011
The world has become a law enforcer's nightmare and every criminal's dream. We bank online; shop online; date, learn, work and live online. But have the institutions that keep us safe on the streets learned to protect us in the burgeoning digital world? Have we become complacent about our personal security--sharing our thoughts, beliefs and the details of our daily lives with anyone who might care to relieve us of them?In this fascinating and compelling book, Misha Glenny, author of the international best seller "McMafia," explores the three fundamental threats facing us in the twenty-first century: cybercrime, cyberwarfare and cyberindustrial espionage. Governments and the private sector are losing billions of dollars each year fighting an ever-morphing, often invisible and often supersmart new breed of criminal: the hacker. Glenny has traveled and trawled the world. By exploring the rise and fall of the criminal website DarkMarket he has uncovered the most vivid, alarming and illuminating stories. Whether JiLsi or Matrix, Iceman, Master Splynter or Lord Cyric; whether Detective Sergeant Chris Dawson in Scunthorpe, England, or Agent Keith Mularski in Pittsburgh, Pennsylvania, Glenny has tracked down and interviewed all the players--the criminals, the geeks, the police, the security experts and the victims--and he places everyone and everything in a rich brew of politics, economics and history.The result is simply unputdownable. DarkMarket is authoritative and completely engrossing. It's a must-read for everyone who uses a computer: the essential crime book for our times.
The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski - 2011
Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.
Bash Command Line Pro Tips
Jason Cannon - 2014
As someone that has used the Bash shell almost daily for over 15 years, I've accumulated several command line "tricks" that have saved me time and frustration. Bash Command Line Pro Tips is a collection of 10 techniques that you can put to use right away to increase your efficiency at the command line. Here is what you will learn by reading Bash Command Line Pro Tips: Tip 1: Tab Completion Tip 2: Change to the Previous Directory Tip 3: Reuse the Last Item from the Previous Command Line Tip 4: Rerun a Command That Starts with a given String Tip 5: Command Substitution Tip 6: Use a for Loop at the Command Line Tip 7: Rerun the Previous Command with Root Privileges Tip 8: Rerun the Previous Command While Substituting a String Tip 9: Reuse a Word on the Same Command Line Tip 10: Fix Typos and Shorten Lengthy Commands with Aliases Scroll up, click the "Buy Now With 1-Click" button to start leaning these powerful Linux Command Line Tips.
Schneier on Security
Bruce Schneier - 2008
Crime: Now We're Talking- MySpace Passwords Aren't So Dumb- An American Idol for Crypto Geeks- Why Smart Cops Do Dumb Things- How Security Companies Sucker Us With LemonsEach section will have a significant introduction by the author. As well, the author will be writing at least 6-10 never-before-published articles.
Ethics in Information Technology
George W. Reynolds - 2002
This book offers an excellent foundation in ethical decision-making for current and future business managers and IT professionals.
Training Guide: Programming in HTML5 with JavaScript and CSS3
Glenn Johnson - 2013
Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.Provides in-depth, hands-on training you take at your own pace Focuses on job-role-specific expertise for using HTML5, JavaScript, and CSS3 to begin building modern web and Windows 8 apps Features pragmatic lessons, exercises, and practices Creates a foundation of skills which, along with on-the-job experience, can be measured by Microsoft Certification exams such as 70-480 Coverage includes: creating HTML5 documents; implementing styles with CSS3; JavaScript in depth; using Microsoft developer tools; AJAX; multimedia support; drawing with Canvas and SVG; drag and drop functionality; location-aware apps; web storage; offline apps; writing your first simple Windows 8 apps; and other key topics
The Cuckoo's Egg: Tracking a Spy Through the Maze of Computer Espionage
Clifford Stoll - 1989
citizen recognized its ominous potential. Armed with clear evidence of computer espionage, he began a highly personal quest to expose a hidden network of spies that threatened national security. But would the authorities back him up? Cliff Stoll's dramatic firsthand account is "a computer-age detective story, instantly fascinating [and] astonishingly gripping" (Smithsonian). Cliff Stoll was an astronomer turned systems manager at Lawrence Berkeley Lab when a 75-cent accounting error alerted him to the presence of an unauthorized user on his system. The hacker's code name was "Hunter" -- a mysterious invader who managed to break into U.S. computer systems and steal sensitive military and security information. Stoll began a one-man hunt of his own: spying on the spy. It was a dangerous game of deception, broken codes, satellites, and missile bases -- a one-man sting operation that finally gained the attention of the CIA...and ultimately trapped an international spy ring fueled by cash, cocaine, and the KGB.