Book picks similar to
Catch Me If You Know How - Internet Edition by Travis Morgan
infosec
internet
resource-education-christian
science
So You've Been Publicly Shamed
Jon Ronson - 2015
The shamed are people like us - people who, say, made a joke on social media that came out badly, or made a mistake at work. Once their transgression is revealed, collective outrage circles with the force of a hurricane and the next thing they know they're being torn apart by an angry mob, jeered at, demonized, sometimes even fired from their job. People are using shame as a form of social control.
CCNA Routing and Switching Study Guide: Exams 100-101, 200-101, and 200-120
Todd Lammle - 2013
This all-purpose CCNA study guide methodically covers all the objectives of the ICND1 (100-101) and ICND2 (200-101) exams as well as providing additional insight for those taking CCNA Composite (200-120) exam. It thoroughly examines operation of IP data networks, LAN switching technologies, IP addressing (IPv4/IPv6), IP routing technologies, IP services, network device security, troubleshooting, and WAN technologies.Valuable study tools such as a companion test engine that includes hundreds of sample questions, a pre-assessment test, and multiple practice exams. Plus, you'll also get access to hundreds of electronic flashcards, author files, and a network simulator.CCNA candidates may choose to take either the ICND1(100-101) and ICND2 (200-101) exams or the CCNA Composite exam (200-120); this study guide covers the full objectives of all three Written by bestselling Sybex study guide author Todd Lammle, an acknowledged authority on all things Cisco Covers essential Cisco networking topics such as operating an IP data network, IP addressing, switching and routing technologies, troubleshooting, network device security, and much more Includes a comprehensive set of study tools including practice exams, electronic flashcards, comprehensive glossary of key terms, videos, and a network simulator that can be used with the book's hands-on labs Bonus Content: Access to over 40 MicroNugget videos from CBT Nuggets CCNA Routing and Switching Study Guide prepares you for CCNA certification success.
The Hunt for MH370
Ean Higgins - 2019
Piece by tantalising piece, Ean Higgins unpuzzles this most baffling of mysteries, asking dangerous questions and revealing shocking truths.' Dick Smith'The disappearance of MH370 remains the greatest and most pressing mystery in aviation history that demands answers for both the families of the stricken passengers and the travelling public. No journalist has been more relentless in the pursuit of the truth of MH370 than Ean Higgins. The Hunt for MH370 is an engrossing book in which Higgins has meticulously pieced together the puzzle of the doomed flight from its vanishing to the flawed investigation and the largest maritime search ever that leads the reader to a chilling conclusion that is almost impossible to comprehend.'Paul Whittaker, Chief Executive Sky News and former editor-in-chief, The Australian
All the Lost Girls
Bilinda P. Sheehan - 2019
They meant to take you. Alice McCarthy’s sister has been missing for twenty-two years with no clues as to her whereabouts. When a girl’s body is discovered in a shallow grave, Alice is forced to fly home to Ireland in case the remains are those of her sister Clara. What she discovers is that Clara’s disappearance may have been a part of a much larger game. Siobhan Geraghty is a detective with the National Bureau of Criminal Investigation. The discovery of a girl’s remains propels her into her first murder case as a lead investigator. She is determined that a mistake she made a year ago will not be repeated. This is her chance to redeem herself. Alice and Siobhan find themselves drawn into a deadly game where a vicious killer holds all the cards. Unless they uncover hidden secrets from the past, more girls will go missing and never be found. All the Lost Girls is a gripping psychological thriller that will enthral readers of Val McDermid, Paula Hawkins, LJ Ross, and Clare Mackintosh.
Never Seen (Hoskins & Fletcher Book 1)
T.L. Dyer - 2019
Their killer drugs them and slashes their wrists. Then he cleans their bodies, combs their hair and wraps them in protective sheeting before leaving them where they’ll be easily found.Is it a compulsion? A game? Or a cry for help?These are the questions Detective Lawrence Hoskins must answer as he takes on the lead role in his first serial murder investigation. But as the bodies keep coming he feels like he’s the one holding the blade, the one standing between life and death. Under mounting pressure he turns to former colleague Cass Fletcher for help. She knows how a compulsive murderer thinks and why they can’t stop. If she can tell him why perhaps it will lead him to who.Except Hoskins has already made one mistake he’s not aware of. Involving Fletcher is another. And as the killer continues to elude him the case takes its toll on those around him in ways he never expects. More so when the signs start pointing in a new direction…“Five beautiful boys lined up in a rowNo longer unnoticed but seen by allThe officers who killed them soon everyone will knowBecause the tougher they act, the easier they fall.”NEVER SEEN is the first book in the Hoskins & Fletcher crime series
Tubes: A Journey to the Center of the Internet
Andrew Blum - 2012
But what is it physically? And where is it really? Our mental map of the network is as blank as the map of the ocean that Columbus carried on his first Atlantic voyage. The Internet, its material nuts and bolts, is an unexplored territory. Until now.In Tubes, journalist Andrew Blum goes inside the Internet's physical infrastructure and flips on the lights, revealing an utterly fresh look at the online world we think we know. It is a shockingly tactile realm of unmarked compounds, populated by a special caste of engineer who pieces together our networks by hand; where glass fibers pulse with light and creaky telegraph buildings, tortuously rewired, become communication hubs once again. From the room in Los Angeles where the Internet first flickered to life to the caverns beneath Manhattan where new fiber-optic cable is buried; from the coast of Portugal, where a ten-thousand-mile undersea cable just two thumbs wide connects Europe and Africa, to the wilds of the Pacific Northwest, where Google, Microsoft, and Facebook have built monumental data centers—Blum chronicles the dramatic story of the Internet's development, explains how it all works, and takes the first-ever in-depth look inside its hidden monuments.This is a book about real places on the map: their sounds and smells, their storied pasts, their physical details, and the people who live there. For all the talk of the "placelessness" of our digital age, the Internet is as fixed in real, physical spaces as the railroad or telephone. You can map it and touch it, and you can visit it. Is the Internet in fact "a series of tubes" as Ted Stevens, the late senator from Alaska, once famously described it? How can we know the Internet's possibilities if we don't know its parts?Like Tracy Kidder's classic The Soul of a New Machine or Tom Vanderbilt's recent bestseller Traffic, Tubes combines on-the-ground reporting and lucid explanation into an engaging, mind-bending narrative to help us understand the physical world that underlies our digital lives.
Nightwork: A History of Hacks and Pranks at MIT
T.F. Peterson - 2003
The MIT hacking culture has given us such treasures as police cars and cows on the Great Dome, a disappearing door to the President's office, and the commencement game of "Al Gore Buzzword Bingo." Hacks can be technical, physical, virtual, or verbal. Often the underlying motivation is to conquer the inaccessible and make possible the improbable. Hacks can express dissatisfaction with local culture or with administrative decisions, but mostly they are remarkably good-spirited. They are also by definition ephemeral. Fortunately, the MIT Museum has amassed a unique collection of hack-related pictures, reports, and remnants. Nightwork collects the best materials from this collection, to entertain innocent bystanders and inspire new generations of practitioners.
Explain the Cloud Like I'm 10
Todd Hoff - 2018
And I mean all the time. Every day there’s a new cloud-based dating app; a new cloud-based gizmo for your house; a new cloud-based game; or a thousand other new things—all in the cloud.The cloud is everywhere! Everything is in the cloud! What does it mean! Let’s slow down. Take a deep breath. That’s good. Take another. Excellent. This book teaches you all about the cloud. I’ll let you in on a little secret: the cloud is not that hard to understand. It’s not. It’s just that nobody has taken the time to explain to you what the cloud is. They haven’t, have they?Deep down I think this is because they don’t understand the cloud either, but I do. I’ve been a programmer and writer for over 30 years. I’ve been in cloud computing since the very start, and I’m here to help you on your journey to understand the cloud. Consider me your tour guide. I’ll be with you every step of the way, but not in a creepy way.I take my time with this book. I go slow and easy, so you can build up an intuition about what the cloud really is, one idea at a time. When you finish reading, you’ll understand the cloud. When you hear someone say some new cool thing is in the cloud, you’ll understand exactly what they mean. That’s a promise. How do I deliver on that promise? I use lots and lots of pictures. I use lots and lots of examples. We’ll reveal the secret inner-workings of AWS, Netflix, Facebook Messenger, Amazon Kindle, Apple iCloud, Google Maps, Nest and cloud DVRs. You’ll learn by seeing and understanding; no matter if you're a complete beginner, someone who knows a little and wants to learn more, or a programmer looking to change their career to the cloud.The cloud is the future. You don't want to miss out on the future, do you? Read this book and we'll discover it together.I’m excited. This will be fun. Let’s get started!
Tcp/IP Illustrated, Volume 3: TCP for Transactions, Http, Nntp, and the Unix Domain Protocols
W. Richard Stevens - 1996
As in the previous two volumes, the book is filled with examples and implementation details within the 4.4BSD-Lite networking code. The TCP/IP Illustrated series provides a complete picture of the protocol suite that drives the Internet, and gives programmers, system administrators, and serious users the information, understanding, and skills they need to remain at the forefront of networking technology.
The Glass Cage: How Our Computers Are Changing Us
Nicholas Carr - 2014
Even as they bring ease to our lives, these programs are stealing something essential from us.Drawing on psychological and neurological studies that underscore how tightly people’s happiness and satisfaction are tied to performing hard work in the real world, Carr reveals something we already suspect: shifting our attention to computer screens can leave us disengaged and discontented.From nineteenth-century textile mills to the cockpits of modern jets, from the frozen hunting grounds of Inuit tribes to the sterile landscapes of GPS maps, The Glass Cage explores the impact of automation from a deeply human perspective, examining the personal as well as the economic consequences of our growing dependence on computers.With a characteristic blend of history and philosophy, poetry and science, Carr takes us on a journey from the work and early theory of Adam Smith and Alfred North Whitehead to the latest research into human attention, memory, and happiness, culminating in a moving meditation on how we can use technology to expand the human experience.
Google+ for Business: How Google's Social Network Changes Everything
Chris Brogan - 2011
Top social media consultant and Google+ early adopter Chris Brogan shows business people how to leverage its immense potential before their competitors even realize it's there.
Irresistible: The Rise of Addictive Technology and the Business of Keeping Us Hooked
Adam Alter - 2017
We obsess over our emails, Instagram likes, and Facebook feeds; we binge on TV episodes and YouTube videos; we work longer hours each year; and we spend an average of three hours each day using our smartphones. Half of us would rather suffer a broken bone than a broken phone, and Millennial kids spend so much time in front of screens that they struggle to interact with real, live humans. In this revolutionary book, Adam Alter, a professor of psychology and marketing at NYU, tracks the rise of behavioral addiction, and explains why so many of today's products are irresistible. Though these miraculous products melt the miles that separate people across the globe, their extraordinary and sometimes damaging magnetism is no accident. The companies that design these products tweak them over time until they become almost impossible to resist. By reverse engineering behavioral addiction, Alter explains how we can harness addictive products for the good—to improve how we communicate with each other, spend and save our money, and set boundaries between work and play—and how we can mitigate their most damaging effects on our well-being, and the health and happiness of our children.
Practical UNIX & Internet Security
Simson Garfinkel - 1991
Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.
IoT Inc.: How Your Company Can Use the Internet of Things to Win in the Outcome Economy
Bruce Sinclair - 2017
They’re in our companies, in our homes, in our pockets. People love these products. But what they love more is what these products do—and for anyone running a business today, outcomes are the key. The Internet of Things (IoT) is the point of connection between products and the results they deliver—it’s where products become software. IoT Inc. explains everything you need to know to position your company within this powerful new network. And once you do, you’ll leave the competition in the dust. Founder and president of today’s leading IoT business consulting firm, Bruce Sinclair has been helping companies develop IoT strategies for a decade—far longer than the term has even existed. This essential guide provides an in-depth look into IoT—how it works and how it is transforming business; methods for seeing your own business, customers, and competitors through the lens of IoT, and a deep dive into how to develop and implement a powerful IoT strategy. IoT isn’t a new business trend. It’s the new way of business. Period. The IoT wave is heading for your industry. You can either meet it head-on, and ride it to success, or you can turn your back and let it swamp you. This is your playbook for transforming your company into a major player in the IoT Outcome economy.