Book picks similar to
CCNA Fast Pass by Todd Lammle


ccna
technical
technology
technical-books

Computer Networking: A Top-Down Approach


James F. Kurose - 2000
    Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.

Valkyrie: The North American Xb-70: The Usa's Ill-Fated Supersonic Heavy Bomber


Graham M. Simons - 2011
    . . [with] new information, photographs and first-hand accounts." --FlypastDuring the 1950s, plans were being drawn at North American Aviation in Southern California for an incredible Mach-3 strategic bomber. The concept was born as a result of General Curtis LeMay's desire for a heavy bomber with the weapon load and range of the subsonic B-52 and a top speed in excess of the supersonic medium bomber, the B-58 Hustler. However, in April 1961, Defense Secretary McNamara stopped the production go-ahead for the B-70 because of rapid cost escalation and the USSR's newfound ability to destroy aircraft at extremely high altitude using either missiles or the new Mig-25 fighter. Nevertheless, in 1963 plans for the production of three high-speed research aircraft were approved and construction proceeded. In September 1964 the first Valkyrie, now re-coded A/V-1, took to the air for the first time and in October went supersonic.This book is the most detailed description of the design, engineering and research that went into this astounding aircraft. It is full of unpublished details, photographs and firsthand accounts from those closely associated with the project. Although never put into full production, this giant six-engined aircraft became famous for its breakthrough technology, and the spectacular images captured on a fatal air-to-air photo shoot when an observing Starfighter collided with Valkyrie A/V-2 which crashed into the Mojave Desert."Well-illustrated with numerous diagrams and black and white photographs, the book provides an interesting insight into one of the so-called 'white elephant' projects of the 1960s." --Jets Monthly

Microwave Engineering


David M. Pozar - 1990
    The author successfully introduces Maxwell's equations, wave propagation, network analysis, and design principles as applied to modern microwave engineering. A considerable amount of material in this book is related to the design of specific microwave circuits and components, for both practical and motivational value. It also presents the analysis and logic behind these designs so that the reader can see and understand the process of applying the fundamental concepts to arrive at useful results. The derivations are well laid out and the majority of each chapter's formulas are displayed in a nice tabular format every few pages. This Third Edition offers greatly expanded coverage with new material on: Noise; Nonlinear effects; RF MEMs; transistor power amplifiers; FET mixers; oscillator phase noise; transistor oscillators and frequency multiplier.

Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


Gordon Fyodor Lyon - 2009
    From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.

Rethinking the Internet of Things: A Scalable Approach to Connecting Everything


Francis Dacosta - 2013
    Billions of interconnected devices will be monitoring the environment, transportation systems, factories, farms, forests, utilities, soil and weather conditions, oceans and resources Many of these sensors and actuators will be networked into autonomous sets, with much of the information being exchanged machine-to-machine directly and without human involvement. Machine-to-machine communications are typically terse. Most sensors and actuators will report or act upon small pieces of information - chirps. Burdening these devices with current network protocol stacks is inefficient, unnecessary and unduly increases their cost of ownership. This must change. The architecture of the Internet of Things will entail a widely distributed topology incorporating simpler chirp protocols towards at the edges of the network. Rethinking the Internet of Things describes reasons why we must rethink current approaches to the Internet of Things. Appropriate architectures that will coexist with existing networking protocols are described in detail. An architecture comprised of integrator functions, propagator nodes, and end devices, along with their interactions, is explored. What you'll learn Teaches the difference between the "normal" Internet and the Internet of Things, Describes a new architecture and its components in the "chirp" context. Explains the shortcomings of IP for IoT. Describes the anatomy of the IoT. Re-frames key ideas such as reliability. Describes how to build the IoT Who this book is forThought leaders, executives, architectural, standards and development leaders in the evolving IoT industry

OpenGL SuperBible: Comprehensive Tutorial and Reference


Richard S. Wright Jr. - 1996
    If you want to leverage OpenGL 2.1's major improvements, you really need the Fourth Edition. It's a comprehensive tutorial, systematic API reference, and massive code library, all in one. You'll start with the fundamental techniques every graphics programmer needs: transformations, lighting, texture mapping, and so forth. Then, building on those basics, you'll move towards newer capabilities, from advanced buffers to vertex shaders. Of course, OpenGL's cross-platform availability remains one of its most compelling features. This book's extensive multiplatform coverage has been thoroughly rewritten, and now addresses everything from Windows Vista to OpenGL ES for handhelds. This is stuff you absolutely want the latest edition for. A small but telling point: This book's recently been invited into Addison-Wesley's OpenGL Series, making it an "official" OpenGL book -- and making a powerful statement about its credibility. Bill Camarda, from the August 2007 href="http://www.barnesandnoble.com/newslet... Only

How to Master CCNA


Rene Molenaar - 2013
    You will learn about the basics of networking like the OSI Model, the difference between IPv4, IPv6, TCP, UDP and more. You will also learn how to configure protocols like spanning-tree, VLANs and trunking on your switches and how routers use routing protocols to build their routing table. This book covers everything for the ICND1 (100-101), ICND2 (200-101) and CCNA combined exam (200-120).

Introducing Windows Server 2012


Mitch Tulloch - 2012
    This practical introduction illuminates new features and capabilities, with scenarios demonstrating how the platform can meet the needs of your business.Based on beta software, this book provides the early, high-level information you need to begin preparing now for deployment and management. Topics include:Virtualization and cloud solutions Availability Provisioning and storage management Security and scalability Infrastructure options Server administration

Practical Object Oriented Design in Ruby


Sandi Metz - 2012
    The Web is awash in Ruby code that is now virtually impossible to change or extend. This text helps you solve that problem by using powerful real-world object-oriented design techniques, which it thoroughly explains using simple and practical Ruby examples. Sandi Metz has distilled a lifetime of conversations and presentations about object-oriented design into a set of Ruby-focused practices for crafting manageable, extensible, and pleasing code. She shows you how to build new applications that can survive success and repair existing applications that have become impossible to change. Each technique is illustrated with extended examples, all downloadable from the companion Web site, poodr.info. The first title to focus squarely on object-oriented Ruby application design, Practical Object-Oriented Design in Ruby will guide you to superior outcomes, whatever your previous Ruby experience. Novice Ruby programmers will find specific rules to live by; intermediate Ruby programmers will find valuable principles they can flexibly interpret and apply; and advanced Ruby programmers will find a common language they can use to lead development and guide their colleagues. This guide will help you Understand how object-oriented programming can help you craft Ruby code that is easier to maintain and upgrade Decide what belongs in a single Ruby class Avoid entangling objects that should be kept separate Define flexible interfaces among objects Reduce programming overhead costs with duck typing Successfully apply inheritance Build objects via composition Design cost-effective tests Solve common problems associated with poorly designed Ruby code

R Packages


Hadley Wickham - 2015
    This practical book shows you how to bundle reusable R functions, sample data, and documentation together by applying author Hadley Wickham’s package development philosophy. In the process, you’ll work with devtools, roxygen, and testthat, a set of R packages that automate common development tasks. Devtools encapsulates best practices that Hadley has learned from years of working with this programming language. Ideal for developers, data scientists, and programmers with various backgrounds, this book starts you with the basics and shows you how to improve your package writing over time. You’ll learn to focus on what you want your package to do, rather than think about package structure. Learn about the most useful components of an R package, including vignettes and unit tests Automate anything you can, taking advantage of the years of development experience embodied in devtools Get tips on good style, such as organizing functions into files Streamline your development process with devtools Learn the best way to submit your package to the Comprehensive R Archive Network (CRAN) Learn from a well-respected member of the R community who created 30 R packages, including ggplot2, dplyr, and tidyr

Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

Threat Modeling: Designing for Security


Adam Shostack - 2014
    Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

HTML & XHTML: The Definitive Guide


Chuck Musciano - 1996
    For nearly a decade, hundreds of thousands of web developers have turned to HTML & XHTML: The Definitive Guide to master standards-based web development. Truly a definitive guide, the book combines a unique balance of tutorial material with a comprehensive reference that even the most experienced web professionals keep close at hand. From basic syntax and semantics to guidelines aimed at helping you develop your own distinctive style, this classic is all you need to become fluent in the language of web design.The new sixth edition guides you through every element of HTML and XHTML in detail, explaining how each element works and how it interacts with other elements. You'll also find detailed discussions of CSS (Cascading Style Sheets), which is intricately related to web page development. The most all-inclusive, up-to-date book on these languages available, this edition covers HTML 4.01, XHTML 1.0, and CSS2, with a preview of the upcoming XHTML2 and CSS3. Other topics include the newer initiatives in XHTML (XForms, XFrames, and modularization) and the essentials of XML for advanced readers. You'll learn how to:Use style sheets to control your document's appearance Work with programmatically generated HTML Create tables, both simple and complex Use frames to coordinate sets of documents Design and build interactive forms and dynamic documents Insert images, sound files, video, Java applets, and JavaScript programs Create documents that look good on a variety of browsersThe authors apply a natural learning approach that uses straightforward language and plenty of examples. Throughout the book, they offer suggestions for style and composition to help you decide how to best use HTML and XHTML to accomplish a variety of tasks. You'll learn what works and what doesn't, and what makes sense to those who view your web pages and what might be confusing. Written for anyone who wants to learn the language of the Web--from casual users to the full-time design professionals--this is the single most important book on HTML and XHTML you can own.Bill Kennedy is chief technical officer of MobileRobots, Inc. When not hacking new HTML pages or writing about them, "Dr. Bill" (Ph.D. in biophysics from Loyola University of Chicago) is out promoting the company's line of mobile, autonomous robots that can be used for artificial intelligence, fuzzy logic research, and education.Chuck Musciano began his career as a compiler writer and crafter of tools at Harris Corporations' Advanced Technology Group and is now a manager of Unix Systems in Harris' Corporate Data Center.

Kindle Fire Owner's Manual: The ultimate Kindle Fire guide to getting started, advanced user tips, and finding unlimited free books, videos and apps on Amazon and beyond


Steve Weber - 2012
    a quick, easy reference to using your Kindle Fire -- to the max!Amazon's Kindle Fire is the handiest tablet available, and is your portal to an infinite universe of education and entertainment. This valuable reference book helps you get the maximum bang for your Kindle bucks. You'll see how to quickly set up your Kindle, navigate the touch-screen, buy, rent or stream video, and browse the world's largest library of digital books.This reference guide from Amazon guru Steve Weber demystifies the Kindle and explains in plain English how to master the Kindle basics, plus secret tips, tricks and shortcuts you won't find elsewhere. Each section includes clearly written step-by-step instructions, illustrated with screenshots and menus just like you'll see on your own Kindle screen. You'll see how to:■ Change your Kindle's setting just the way you want.■ Charge your Kindle's battery properly and prolong its life.■ Enjoy an infinite supply of the best books, music and video from Amazon, iTunes or virtually any other source.■ Use personal and office documents, including word processing files, PDFs, and spreadsheets. Chuck your laptop and PDA, and do everything you want on your Kindle!■ The easy way to harvest your own content and get it onto your Kindle Fire, including gems you didn't buy at Amazon. ■ How to download free games and educational apps, plus free bonuses from Amazon's Android App Store or other sources.■ How to download, organize and read your favorite books, magazines and newspapers on the Kindle Fire.■ How to get current and archived editions of the world's most popular newspapers, magazines and websites streamed to your Kindle--updated constantly, with no fees whatsoever!■ Use Amazon's free "Cloud" service for unlimited storage of your digital content.■ Purchase or rent thousands of movies and TV shows, and how to find a gold mine of free video.■ Find the best free content in the world, downloadable to your Kindle. (You might never have to pay for books, movies or music again--ever!)■ Use Amazon Prime to stream movies using your home's Internet service.■ Use your Kindle to send and receive email from Gmail, Yahoo! Mail, Hotmail, and virtually any other service.■ Surf the Web at daredevil speeds using Kindle's built-in Silk Web browser.■ Show off your own photos and videos on your Kindle, no matter which camera you used.About the author:ABOUT THE AUTHOR: Steve Weber has been writing about Amazon for nearly a decade. He is the founding publisher of KindleBuffet.com, a website and newsletter that features the best free Kindle eBooks currently being offered as free promotions.