Book picks similar to
Security Strategies in Windows Platforms and Applications by Michael G. Solomon
information-technology
infrastructure
security
webdev
Calculus
Gilbert Strang - 1991
The author has a direct style. His book presents detailed and intensive explanations. Many diagrams and key examples are used to aid understanding, as well as the application of calculus to physics and engineering and economics. The text is well organized, and it covers single variable and multivariable calculus in depth. An instructor's manual and student guide are available online at http: //ocw.mit.edu/ans7870/resources/Strang/....
The Protocols (TCP/IP Illustrated, Volume 1)
W. Richard Stevens - 1993
In eight chapters, it provides the most thorough coverage of TCP available. It also covers the newest TCP/IP features, including multicasting, path MTU discovery and long fat pipes. The author describes various protocols, including ARP, ICMP and UDP. He utilizes network diagnostic tools to actually show the protocols in action. He also explains how to avoid silly window syndrome (SWS) by using numerous helpful diagrams. This book gives you a broader understanding of concepts like connection establishment, timeout, retransmission and fragmentation. It is ideal for anyone wanting to gain a greater understanding of how the TCP/IP protocols work.
Google Hacking for Penetration Testers, Volume 1
Johnny Long - 2004
What many users don't realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker's search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of informationleakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.
Pathophysiology Made Incredibly Easy!
Lippincott Williams & Wilkins - 1998
Chapters cover cancer, infection, immune disorders, genetics, and disorders of each body system, highlighting pathophysiologic processes, resulting signs and symptoms, diagnostic test findings, and current treatments. Reader-friendly features include illustrations, checklists, and full-color miniguides illustrating the pathophysiology of specific disorders.This edition has new full-color miniguides on cancer pathophysiology and neuropathology. A new Focus on Genetics feature identifies gene-related discoveries and their implications for treatment or diagnosis. Review questions and answers follow current NCLEX-RN® requirements and alternate-format questions are included.
Rez Road Follies: Canoes, Casinos, Computers, and Birch Bark Baskets
Jim Northrup - 1997
The author relates his own life experiences to offer a view of contemporary Native American life.
APA: The Easy Way: A Quick and Simplified Guide to the APA Writing Style
Peggy M. Houghton - 2005
The authors of this book draw information from themanual that is specific to academic writing and expand uponit using set-up instructions and a sample paper. The end resultof this transformational process yields a useful guide that canbe used along with the actual manual for successful academicwriting.The handbook covers many detailed specifications of the APAstyle...including in-text citations, source citations, and a samplepaper. It also sheds new light on the manual using step-by-stepprocesses and exemplification that enable readers to fulfill APArules and regulations while focusing on content, rather than theformat, of their academic research.
Organization Development: The Process Of Leading Organizational Change
Donald L. Anderson - 2009
Incorporating OD ethics and values into each chapter, Donald L. Anderson provides discussion of the real-world application of these theoretical ideas. In-depth case studies that follow major content chapters allow students to immediately apply what they have learned. In today's challenging environment of increased globalization, rapidly changing technologies, economic pressures, and expectations in the contemporary workforce, this book is an essential tool.
M: Marketing
Dhruv Grewal - 2007
This course is usually the first course taught at the undergraduate level. Marketers understand that even the best products and services will go unsold if they cannot communicate the value to the customer. Understanding this value-based approach is critical for marketing students today, and is at the forefront of this text, setting it apart. This approach is emphasized throughout the text, and demonstrated through the use of the Adding Value boxes found in each chapter. Presents a concise, impactful, and easy to read approach to Principles of Marketing. The text delivers value to both instructor and student through the engaging style and online assignment and assessment options. With monthly updates provided in a newsletter and the dynamic video program, the instructor support provided will bring marketing to life in any class setting.
Small Animal Surgery
Theresa Welch Fossum - 1997
Coverage includes basic procedures such as spays, castrations, and declaws, as well as more advanced surgeries that might be referred to specialists such as craniotomy, ventral slots, and lung lobectomy. Discussions of general surgical procedures include sterile technique, surgical instrumentation, suturing, preoperative care, and antibiotic use. Key sections provide clinically relevant coverage of soft tissue surgery, orthopedic surgery, and neurosurgery.Over 1500 full color illustrations provide exceptionally clear representations of anatomy and currently accepted surgical techniques, including approaches and closure.Over 600 full color photographs and radiographs offer clear images of specific disorders, diseases, and procedures.Information on the most efficient and cost-saving sterilization techniques including scrubless and waterless preparation solutions.General considerations and clinically relevant pathophysiology sections provide practical information for case management.Step-by-step instructions for surgical techniques are presented in italicized blue type for quick and easy reference.Special icons identify advanced procedures that should be referred to an experienced surgeon or specialist.Color-coded tables and boxes call attention to specific data, offering at-a-glance access to key information such as drug dosages, clinical signs, and analgesic protocols.Anesthesia Protocols provide quick and easy access to recommendations for anesthetizing animals with particular diseases or disorders.A new chapter on Fundamentals of Physical Rehabilitation details the basics of physical rehabilitation for practitioners who want to integrate physical therapy into practice.A new chapter on Principles of Minimally Invasive Surgery that describes the principles of performing surgery with the least instrumentation possible, including instrument selection and care and basic techniques.A new chapter on Surgery of the Eye that discusses diseases and disorders of the eye, their medical management, and corrective surgical procedures.Expanded coverage of perioperative multimodal analgesic therapy.Updated coverage of arthroscopy, canine elbow dysplasia, joint replacement, and management of osteoarthritis.The latest information on state-of-the-art radiologic techniques.
Gender: Ideas, Interactions, Institutions
Lisa Wade - 2014
Probing questions, the same ones that students often bring to the course, frame readable chapters that are packed with the most up-to-date scholarship available—in language students will understand. The authors use memorable examples mined from pop culture, history, psychology, biology, and everyday life to truly engage students in the study of gender and spark interest in sociological perspectives.
The UNIX Programming Environment
Brian W. Kernighan - 1983
Readers will gain an understanding not only of how to use the system, its components, and the programs, but also how these fit into the total environment.
Microeconomics: Principles, Problems, and Policies
Campbell R. McConnell - 1989
The 17th Edition builds upon the tradition of leadership by sticking to 3 main goals: help the beginning student master the principles essential for understanding the economizing problem, specific economic issues, and the policy alternatives; help the student understand and apply the economic perspective and reason accurately and objectively about economic matters; and promote a lasting student interest in economics and the economy.
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Lee Holmes - 2007
Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem
Think Python
Allen B. Downey - 2002
It covers the basics of computer programming, including variables and values, functions, conditionals and control flow, program development and debugging. Later chapters cover basic algorithms and data structures.
Computer Networking: A Top-Down Approach
James F. Kurose - 2000
Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.