Book picks similar to
Using Linux, Special Ed., with 2 CD-ROM by Jack Tackett Jr.
aaa
computer
linux
reference
Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali
OccupyTheWeb - 2018
Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Basic Engineering Circuit Analysis
J. David Irwin - 1984
Now in a new Ninth Edition, this reader-friendly book has been completely revised and improved to ensure that the learning experience is enhanced. It's built on the strength of Irwin's problem-solving methodology, providing readers with a strong foundation as they advance in the field.
Adobe InDesign CS6 Classroom in a Book
Adobe Creative Team - 2012
The 16 project-based lessons show readers step-by-step the key techniques for working with InDesign CS6. Readers learn what they need to know to create engaging page layouts using InDesign CS6. This completely revised CS6 edition covers the new tools for adding PDF form fields, linking content, and creating alternative layouts for digital publishing. The companion CD includes all the lesson files that readers need to work along with the book. This thorough, self-paced guide to Adobe InDesign CS6 is ideal for beginning users who want to master the key features of this program. Readers who already have some experience with InDesign can improve their skills and learn InDesign's newest features. "The Classroom in a Book series is by far the best training material on the market. Everything you need to master the software is included: clear explanations of each lesson, step-by-step instructions, and the project files for the students." -Barbara Binder, Adobe Certified Instructor, Rocky Mountain Training Classroom in a Book(R), the best-selling series of hands-on software training workbooks, helps you learn the features of Adobe software quickly and easily. Classroom in a Book offers what no other book or training program does-an official training series from Adobe Systems Incorporated, developed with the support of Adobe product experts. All of Peachpit's eBooks contain the same content as the print edition. You will find a link in the last few pages of your eBook that directs you to the media files.Helpful tips:If you are able to search the book, search for "Where are the lesson files?"Go to the very last page of the book and scroll backwards.You will need a web-enabled device or computer in order to access the media files that accompany this ebook. Entering the URL supplied into a computer with web access will allow you to get to the files.Depending on your device, it is possible that your display settings will cut off part of the URL. To make sure this is not the case, try reducing your font size and turning your device to a landscape view. This should cause the full URL to appear.
Inside the Machine
Jon Stokes - 2006
Once you understand how the microprocessor-or central processing unit (CPU)-works, you'll have a firm grasp of the fundamental concepts at the heart of all modern computing.Inside the Machine, from the co-founder of the highly respected Ars Technica website, explains how microprocessors operate-what they do and how they do it. The book uses analogies, full-color diagrams, and clear language to convey the ideas that form the basis of modern computing. After discussing computers in the abstract, the book examines specific microprocessors from Intel, IBM, and Motorola, from the original models up through today's leading processors. It contains the most comprehensive and up-to-date information available (online or in print) on Intel's latest processors: the Pentium M, Core, and Core 2 Duo. Inside the Machine also explains technology terms and concepts that readers often hear but may not fully understand, such as "pipelining," "L1 cache," "main memory," "superscalar processing," and "out-of-order execution."Includes discussion of:Parts of the computer and microprocessor Programming fundamentals (arithmetic instructions, memory accesses, control flow instructions, and data types) Intermediate and advanced microprocessor concepts (branch prediction and speculative execution) Intermediate and advanced microprocessor concepts (branch prediction and speculative execution) Intermediate and advanced computing concepts (instruction set architectures, RISC and CISC, the memory hierarchy, and encoding and decoding machine language instructions) 64-bit computing vs. 32-bit computing Caching and performance Inside the Machine is perfect for students of science and engineering, IT and business professionals, and the growing community of hardware tinkerers who like to dig into the guts of their machines.
SQL (Visual QuickStart Guide)
Chris Fehily - 2002
With SQL and this task-based guide to it, you can do it toono programming experience required!After going over the relational database model and SQL syntax in the first few chapters, veteran author Chris Fehily launches into the tasks that will get you comfortable with SQL fast. In addition to explaining SQL basics, this updated reference covers the ANSI SQL:2003 standard and contains a wealth of brand-new information, including a new chapter on set operations and common tasks, well-placed optimization tips to make your queries run fast, sidebars on advanced topics, and added IBM DB2 coverage.Best of all, the book's examples were tested on the latest versions of Microsoft Access, Microsoft SQL Server, Oracle, IBM DB2, MySQL, and PostgreSQL. On the companion Web site, you can download the SQL scripts and sample database for all these systems and put your knowledge to work immediately on a real database..
Programming with Java: A Primer
E. Balagurusamy - 2006
The language concepts are aptly explained in simple and easy-to-understand style, supported with examples, illustrations and programming and debugging exercises.
Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning
Gordon Fyodor Lyon - 2009
From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
Rotorcraft Flying Handbook
Federal Aviation Administration - 2000
Most FAA Knowledge Exams’ questions are taken directly from the information presented in these texts.Written for applicants preparing for the private, commercial, or flight instructor certificate with a helicopter or gyroplane class rating, this guide covers both aeronautical knowledge and skill for operating rotorcraft vehicles. It is also a valuable tool for flight instructors as a teaching aid. This is the Basic Helicopter Handbook (Advisory Circular 61-13B) updated and renamed. This is FAA handbook FAA-H-8083-21.
Windows Hacking 2.0
Ankit Fadia - 2010
Millions of systems around the world run on this operating system. This popularity has led Windows to be quite vulnerable, as crackers have targeted Windows for their attacks more than lesser-used operating systems.Windows Hacking 2.0 throws light on how to tweak the operating system to make the most of all its features, functionality, looks and feel. The comprehensively researched security tips, tricks and hacks covered in this book allow readers to secure Windows better, customize almost all its aspects to suit personal preferences and make it work the extra mile. After reading this book, not only will readers be able to protect their Windows system against the most common vulnerabilities, loopholes and threats, but will also be able to play cool tricks to impress their friends. A fun and light read that will also make the reader more aware of Windows-related security issues and practices.Want to improve the security of your Windows system? Want to customize the look and feel of your Windows system? Want to control all aspects and features of your Windows System? Want to play harmless pranks on your friends and trick them? Windows Hacking 2.0 will ensure that even you can hack!
Pray the Rosary Bead by Bead - Formatted to Mimic Rosary Beads
Mike Hart - 2011
This Rosary tool has also been consistently in the Amazon top ten best selling books of Prayer since every month since its release; this includes paperback and kindle prayer books. Buy with confidence and may it enhance your opportunity to pray to Our Lady.This is a tool to allow you to use your Kindle to pray the rosary. This version of the rosary is intended to allow for praying the rosary with the turn of each page acting as a rosary bead. It contains all four rosary mysteries Joyful, Sorrowful, Glorious, and Luminous. The table of contents will allow you to jump to any of the four mysteries. Given that the Kindle, Nook, and other eBook devices allow thousands of books to be carried within them, it makes sense that the most powerful prayer in the world should also be included. Turning one page for each bead of the rosary makes the device feel and respond like a rosary necklace. Praying the rosary is an art which includes a certain rhythm of changing beads and prayers while in contemplation. Other rosary books either teach the prayers or outline the process but don’t account for the rhythm an art of contemplation that the process itself supports. This version allows that process to be integrated into the book itself; no beads required. While I personally love rosary beads, I don’t always have them available. I also like having the precise bible scriptures associated with each Mystery integrated into the process itself; it allows a more detailed focus by reading the actual living word of God without losing rhythm. While I personally know what the mysteries are about and what each decade story is, it adds a bit of opportunity to read in detail the bible passages of each mystery while not breaking stride with the prayer process. And, if there is ever a moment of distraction by events around me, I never lose my exact spot in praying the rosary.I pray that this book enhances opportunity for you to pray the rosary on many occasions when otherwise you may not have, and I hope it enhances your prayers on a regular basis through deeper connection with the scriptures which are the living word of God. The following updates were made based on user recommendations:VERSION UPDATED JULY 22, 2012 - Changed the table of contents to show the correct day for Luminous Mysteries to be prayed 'Thursday', updated the Glory Be prayer to be included after the first 3 Hail Mary's at the opening of each Mystery, Updated the Glory Be to be worded more technically correct.VERSION UPDATED DECEMBER 11, 2011 - Changed language of Apostle's Creed to match Catholic Church New Translation, fixed misspelled word "beech" to read "beseech", fixed missing bible verse for Mysteries "crowning with thorns" and "coronation of mary".
Road Atlas Large Scale
Rand McNally & Company - 2015
Updated atlas contains maps of every U.S. state that are 35% larger than the standard atlas version plus over 350 detailed city inset and national park maps and a comprehensive, unabridged index. Road construction projects and updates highlighted for every state and conveniently located above the maps. Contains mileage chart showing distances between 77 North American cities and national parks with driving times map. Tough spiral binding allows the book to lay open easily. Other Features Best of the Road - Our editor's favorite road trips from our Best of the Road collection follows scenic routes along stretches of coastline, both east and west, to forests mountains, and prairies; and through small towns and big cities. For a weekend or a week there's something for everyone. Tell Rand! As much as we work to keep our atlases up to date, conditions change quickly and new construction projects begin frequently. If you know of something we haven't captured in our atlas, let us know at randmcnally.com/tellrand. Tourism websites and phone numbers for every U.S. state and Canadian province on map pages
Essential System Administration: Tools and Techniques for Linux and Unix Administration
Æleen Frisch - 2002
Essential System Administration provides a clear, concise, practical guide to the real-world issues that anyone responsible for a Unix system faces daily.The new edition of this indispensable reference has been fully updated for all the latest operating systems. Even more importantly, it has been extensively revised and expanded to consider the current system administrative topics that administrators need most. Essential System Administration,3rd Edition covers: DHCP, USB devices, the latest automation tools, SNMP and network management, LDAP, PAM, and recent security tools and techniques.Essential System Administration is comprehensive. But what has made this book the guide system administrators turn to over and over again is not just the sheer volume of valuable information it provides, but the clear, useful way the information is presented. It discusses the underlying higher-level concepts, but it also provides the details of the procedures needed to carry them out. It is not organized around the features of the Unix operating system, but around the various facets of a system administrator's job. It describes all the usual administrative tools that Unix provides, but it also shows how to use them intelligently and efficiently.Whether you use a standalone Unix system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, Essential System Administration is for you. This comprehensive and invaluable book combines the author's years of practical experience with technical expertise to help you manage Unix systems as productively and painlessly as possible.
Organize Your Genealogy in Evernote in 10 Easy Steps
Lorine McGinnis Schulze - 2014
You will learn how to create notes, how to create stacks, how to set up a hierarchical structure for tags, how to create virtual genealogy binders, easy ways to transfer your computer files into an Evernote Note, and more. You will be able to follow each step to create your own Genealogy Binders full of your research (documents, photos, audio files, and more) on all your ancestors. Your Genealogy files will be organized, easily accessible and readily available to share with others if desired.