Book picks similar to
pfSense: The Definitive Guide by Michael W. Lucas
reference
non-fiction
computers
books-wantex
Google Analytics: Understanding Visitor Behavior
Justin Cutroni - 2007
This hands-on guide shows you how to get the most out of this free and powerful tool -- whether you're new to Google Analytics or have been using it for years.Google Analytics shows you how to track different market segments and analyze conversion rates, and reveals advanced techniques such as marketing-campaign tracking, a valuable feature that most people overlook. And this practical book not only provides complete code samples for web developers, it also explains the concepts behind the code to marketers, managers, and others on your team.Discover exactly how the Google Analytics system worksLearn how to configure the system to measure data most relevant to your business goalsTrack online marketing activities, including cost-per-click ads, email, and internal campaignsTrack events -- rather than page views -- on sites with features such as maps, embedded video, and widgetsConfigure Google Analytics to track enterprise data, including multiple domainsUse advanced techniques such as custom variables and CRM integration
The Principles Of Masonic Law: A Treatise On The Constitutional Laws, Usages And Landmarks Of Freemasonry
Albert G. MacKey - 2003
From that period, the regulations adopted by the Grand Lodge of England ceased to have any binding efficacy over the craft in this country, while the laws passed by the American Grand Lodges lost the character of general regulations, and were invested only with local authority in their several jurisdictions.Before concluding this introductory section, it may be deemed necessary that something should be said of the "Ancient Landmarks of the Order," to which reference is so often made.Various definitions have been given of the landmarks. Some suppose them to be constituted of all the rules and regulations which were in existence anterior to the revival of Masonry in 1717, and which were confirmed and adopted by the Grand Lodge of England at that time. Others, more stringent in their definition, restrict them to the modes of recognition in use among the fraternity. I am disposed to adopt a middle course, and to define the Landmarks of Masonry to be, all those usages and customs of the craft--whether ritual or legislative--whether they relate to forms and ceremonies, or to the organization of the society--which have existed from time immemorial, and the alteration or abolition of which would materially affect the distinctive character of the institution or destroy its identity. Thus, for example, among the legislative landmarks, I would enumerate the office of Grand Master as the presiding officer over the craft, and among the ritual landmarks, the legend of the third degree. But the laws, enacted from time to time by Grand Lodges for their local government, no matter how old they may be, do not constitute landmarks, and may, at any time, be altered or expunged, since the 39th regulation declares expressly that "every annual Grand Lodge has an inherent power and authority to make new regulations or to alter these (viz., the thirty-nine articles) for the real benefit of this ancient fraternity, provided always that the old landmarks be carefully preserved." Download The Principles Of Masonic Law Now!
Thinking in JavaScript
Aravind Shenoy - 2014
Before we delve into the intricacies of JavaScript, we need to know why it is used. While HTML tells your browser how your webpage will look, JavaScript is used for dynamic content and to add functionality. Using this book, you will understand the concept of JavaScript and its use in web designing. You will also have a look at jQuery in general. You will learn about Functions, Operators, the concept of Variables, Conditions and Loops, Arrays, and the basics of jQuery in this book. Instead of wandering through loads of theory, we have used practical examples in this book. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output thereby understanding the subtle nuances of JavaScript. By the end of the book, with practice, you can achieve better things and get more acquainted with JavaScript.
CompTIA Network+ Study Guide: Exam N10-004
Todd Lammle - 2009
Using his one-of-a-kind conversational style, Todd gives you clear and concise information on crucial networking topics through practical examples and insights drawn from his real-world experience. This Study Guide thoroughly covers all exam objectives for the CompTIA Network+ exam (N10-004), including key topics such as network technologies, media and topologies, devices, management, tools, and security. Along with the book you get a CD-ROM featuring a custom test engine with chapter review questions, two practice exams, flashcards, and the book as a searchable PDF.Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.For Instructors: Teaching supplements are available for this title.
Professional Android 4 Application Development
Reto Meier - 2012
If you're anexperienced developer, you can start creating robust mobile Androidapps right away with this professional guide to Android 4application development. Written by one of Google's lead Androiddeveloper advocates, this practical book walks you through a seriesof hands-on projects that illustrate the features of the AndroidSDK. That includes all the new APIs introduced in Android 3 and 4, including building for tablets, using the Action Bar, Wi-Fi Direct, NFC Beam, and more.Shows experienced developers how to create mobile applicationsfor Android smartphones and tabletsRevised and expanded to cover all the Android SDK releasesincluding Android 4.0 (Ice Cream Sandwich), including all updatedAPIs, and the latest changes to the Android platform.Explains new and enhanced features such as drag and drop, fragments, the action bar, enhanced multitouch support, newenvironmental sensor support, major improvements to the animationframework, and a range of new communications techniques includingNFC and Wi-Fi direct.Provides practical guidance on publishing and marketing yourapplications, best practices for user experience, and moreThis book helps you learn to master the design, lifecycle, andUI of an Android app through practical exercises, which you canthen use as a basis for developing your own Android apps.
The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
Kevin D. Mitnick - 2017
Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.
The Ruby Programming Language
David Flanagan - 2008
It was written (and illustrated!) by an all-star team:David Flanagan, bestselling author of programming language "bibles" (including JavaScript: The Definitive Guide and Java in a Nutshell) and committer to the Ruby Subversion repository.Yukihiro "Matz" Matsumoto, creator, designer and lead developer of Ruby and author of Ruby in a Nutshell, which has been expanded and revised to become this book.why the lucky stiff, artist and Ruby programmer extraordinaire. This book begins with a quick-start tutorial to the language, and then explains the language in detail from the bottom up: from lexical and syntactic structure to datatypes to expressions and statements and on through methods, blocks, lambdas, closures, classes and modules. The book also includes a long and thorough introduction to the rich API of the Ruby platform, demonstrating -- with heavily-commented example code -- Ruby's facilities for text processing, numeric manipulation, collections, input/output, networking, and concurrency. An entire chapter is devoted to Ruby's metaprogramming capabilities.The Ruby Programming Language documents the Ruby language definitively but without the formality of a language specification. It is written for experienced programmers who are new to Ruby, and for current Ruby programmers who want to challenge their understanding and increase their mastery of the language.
The Adobe Photoshop Lightroom 5 Book for Digital Photographers (Voices That Matter)
Peachpit Press - 2013
Scott doesn’t just show you which sliders do what (every Lightroom book will do that). Instead, by using the following three simple, yet brilliant, techniques that make it just an incredible learning tool, this book shows you how to create your own photography workflow using Lightroom: Throughout the book, Scott shares his own personal settings and studiotested techniques. Each year he trains thousands of Lightroom users at his live seminars and through that he’s learned what really works, what doesn’t, and he tells you flat out which techniques work best, which to avoid, and why. The entire book is laid out in a real workflow order with everything step by step, so you can begin using Lightroom like a pro from the start. What really sets this book apart is the last chapter. This is where Scott dramatically answers his #1 most-asked Lightroom question, which is: “Exactly what order am I supposed to do things in, and where does Photoshop fit in?” You’ll see Scott’s entire start-to-finish Lightroom 5 workflow and learn how to incorporate it into your own workflow. Plus, this book includes a downloadable collection of some of the hottest Lightroom Develop module presets to give you a bunch of amazing effects with just one click! Scott knows first-hand the challenges today’s digital photographers are facing, and what they want to learn next to make their workflow faster, easier, and more fun. He has incorporated all of that into this major update for Lightroom 5. It’s the first and only book to bring the whole process together in such a clear, concise, and visual way. Plus, the book includes a special chapter on integrating Adobe Photoshop seamlessly right into your workflow, and you’ll also learn some of Scott’s latest Photoshop portrait retouching techniques and special effects, which take this book to a whole new level. There is no faster, more straight-to-the-point, or more fun way to learn Lightroom than with this groundbreaking book.
Advanced Apex Programming for Salesforce.com and Force.com
Dan Appleman - 2012
Intended for developers who are already familiar with the Apex language, and experienced Java and C# developers who are moving to Apex, this book starts where the Force.com documentation leaves off. Instead of trying to cover all of the features of the platform, Advanced Apex programming focuses entirely on the Apex language and core design patterns. You’ll learn how to truly think in Apex – to embrace limits and bulk patterns. You’ll see how to develop architectures for efficient and reliable trigger handling, and for asynchronous operations. You’ll discover that best practices differ radically depending on whether you are building software for a specific organization or for a managed package. And you’ll find approaches for incorporating testing and diagnostic code that can dramatically improve the reliability and deployment of Apex software, and reduce your lifecycle and support costs. Based on his experience both as a consultant and as architect of a major AppExchange package, Dan Appleman focuses on the real-world problems and issues that are faced by Apex developers every day, along with the obscure problems and surprises that can sneak up on you if you are unprepared.
Another 365 Things People Believe That Aren't True (The Misconception Trilogy Book 3)
James Egan - 2015
James Bond isn't a secret agent. The funny bone isn't a bone. E-readers like the Kindle were invented in 1949. Slavery has never been more common as it is today. Neanderthals were extremely smart and were able to speak. Vikings invented rap battles. Natural oranges aren't orange. Rats didn't cause the Black Death. Halitosis doesn't exist. Buddhists don't worship Buddha. Everyone mispronounces "Nutella." St. Patrick wasn't Irish. There has never been 50 states in the United States. Selfies aren't a recent fad. They have existed since 1839. Guardian angels aren't mentioned in the Bible. A comatose person can speak and walk around. Nicotine doesn't cause cancer.
Excel Dashboards & Reports
Michael Alexander - 2010
Offering a comprehensive review of a wide array of technical and analytical concepts, Excel Reports and Dashboards helps Excel users go from reporting data with simple tables full of dull numbers, to presenting key information through the use of high-impact, meaningful reports and dashboards that will wow management both visually and substantively.Details how to analyze large amounts of data and report the results in a meaningful, eye-catching visualization Describes how to use different perspectives to achieve better visibility into data, as well as how to slice data into various views on the fly Shows how to automate redundant reporting and analyses Part technical manual, part analytical guidebook, Excel Dashboards and Reports is the latest addition to the Mr. Spreadsheet's Bookshelf series and is the leading resource for learning to create dashboard reports in an easy-to-use format that's both visually attractive and effective.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz - 2014
But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."
World Radio TV Handbook: The Directory of Global Broadcasting
Jens M. Frost - 1947
Completely revised and updated, this new edition is the most accurate guide to national and international SW, MW, and FM broadcasting available. "The World Radio TV Handbook" is divided into a number of sections covering numerous topics, from National Radio - which looks at the world's domestic radio services, listed by country and including contact details, to International Radio - featuring full facts about all broadcasters transmitting internationally; and from Television Broadcasts - which details the world's main national broadcasters and large regional networks to frequency lists of all MW and international and domestic SW broadcasts. Also included in this revised edition is a reference section that contains listings of international and domestic transmitter sites, standard time and frequency transmissions, DX Club information, as well as other essential print and electronic resources.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.