Windows Sysinternals Administrator's Reference
Mark E. Russinovich - 2009
Guided by Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis, you’ll drill into the features and functions of dozens of free file, disk, process, security, and Windows management tools. And you’ll learn how to apply the book’s best practices to help resolve your own technical issues the way the experts do.Diagnose. Troubleshoot. Optimize.Analyze CPU spikes, memory leaks, and other system problems Get a comprehensive view of file, disk, registry, process/thread, and network activity Diagnose and troubleshoot issues with Active Directory® Easily scan, disable, and remove autostart applications and components Monitor application debug output Generate trigger-based memory dumps for application troubleshooting Audit and analyze file digital signatures, permissions, and other security information Execute Sysinternals management tools on one or more remote computers Master Process Explorer, Process Monitor, and Autoruns
Reality is Broken: Why Games Make Us Better and How They Can Change the World
Jane McGonigal - 2010
The average young person in the UK will spend 10,000 hours gaming by the age of twenty-one. What's causing this mass exodus? According to world-renowned game designer Jane McGonigal the answer is simple: videogames are fulfilling genuine human needs. Drawing on positive psychology, cognitive science and sociology, Reality is Broken shows how game designers have hit on core truths about what makes us happy, and utilized these discoveries to astonishing effect in virtual environments. But why, McGonigal asks, should we use the power of games for escapist entertainment alone? In this groundbreaking exploration of the power and future of gaming, she reveals how gamers have become expert problem solvers and collaborators, and shows how we can use the lessons of game design to socially positive ends, be it in our own lives, our communities or our businesses. Written for gamers and non-gamers alike, Reality is Broken sends a clear and provocative message: the future will belong to those who can understand, design and play games.
Big Data Now: 2012 Edition
O'Reilly Media Inc. - 2012
It's not just a technical book or just a businessguide. Data is ubiquitous and it doesn't pay much attention toborders, so we've calibrated our coverage to follow it wherever itgoes.In the first edition of Big Data Now, the O'Reilly team tracked thebirth and early development of data tools and data science. Now, withthis second edition, we're seeing what happens when big data grows up:how it's being applied, where it's playing a role, and theconsequences -- good and bad alike -- of data's ascendance.We've organized the second edition of Big Data Now into five areas:Getting Up to Speed With Big Data -- Essential information on thestructures and definitions of big data.Big Data Tools, Techniques, and Strategies -- Expert guidance forturning big data theories into big data products.The Application of Big Data -- Examples of big data in action,including a look at the downside of data.What to Watch for in Big Data -- Thoughts on how big data will evolveand the role it will play across industries and domains.Big Data and Health Care -- A special section exploring thepossibilities that arise when data and health care come together.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
101 Secret Hiding Places | Hide What You Don't Want Found! (Survival Guide Series)
George Shepherd - 2015
In other cases, whatever it is you’re intending to protect may be highly confidential information that requires increased security. A hollow book just won’t do. This book isn’t hollow; in it, we will discuss various hiding places, from the simple and straight forward to the complex – a place to hide your cash from your light-fingered roommate or a place where your family heirlooms may be safe from the most cunning of jewelry thieves. We will also look at secret hiding places specific to travel, as tourists are often a prime target for petty theft or burglary. The use of secret hiding places isn’t limited to hiding items of value; hiding places can also be used to conceal weapons. Carrying a weapon on your person at all times will allow you to defend yourself should the need arise, without provoking suspicion in your assailant or making those around you feel threatened. We’ll provide a few methods by which to hide both valuables and weapons on your person. Learn how to hide your treasures, items and documents securely: 1) In Your Home 2) On The Road 3) When You're Traveling 4) From Hackers/Cyber Thieves and more...
Story: Substance, Structure, Style, and the Principles of Screenwriting
Robert McKee - 1997
Quincy Jones, Diane Keaton, Gloria Steinem, Julia Roberts, John Cleese and David Bowie are just a few of his celebrity alumni. Writers, producers, development executives and agents all flock to his lecture series, praising it as a mesmerizing and intense learning experience. In Story, McKee expands on the concepts he teaches in his $450 seminars (considered a must by industry insiders), providing readers with the most comprehensive, integrated explanation of the craft of writing for the screen. No one better understands how all the elements of a screenplay fit together, and no one is better qualified to explain the "magic" of story construction and the relationship between structure and character than Robert McKee.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
The Complete Idiot's Guide to Private Investigating
Steven Kerry Brown - 2002
for your own business. You?ll get the low-down on pre-employment research, tenant screening, adoption searches, safeguarding yourself from investigation, and much more. ?Completely revised with all-new chapters on skip tracing and due diligence searches ?Skills and techniques for average citizens, as well as professionals ?Includes the most useful?and little-known?databases
250+ Best Kindle Fire HD Apps for the New Kindle Fire Owner (Over 200 FREE APPS)
Tom Edwards - 2012
Forget wasting hours on research, we've done it for you. Forget confusion, we've tried and tested every app. And forget about getting left behind, with our free lifetime updates we'll keep you up to speed with the best paid and free Kindle Fire apps on the Amazon Appstore. <b>UPDATED Novenber 2013 - Kindle Fire FREE APPS and paid apps now clearly marked</b>.<b>Perfect for the New Kindle Fire HDX & HD Owner</b>Whether you've just bought your Kindle Fire, are discovering Kindle Fire apps for the first time, looking for free apps for the Kindle Fire or simply want to discover great apps that you might have missed the first time round, then this Amazon e-book is for you. <b>Free Lifetime Updates to Keep you Current</b>The best apps today might not be the best apps tomorrow. What's hip and what's not in the Amazon Appstore can change in the blink of an eye. That's why we're releasing updates of this book on a regular basis and you can receive them absolutely free even after you've purchased this book.<b>Something for Everyone in the Most Comprehensive Guide Available</b>How many app reviews and recommendations do you need to create the most comprehensive guide available? 100 apps reviewed? 200 apps reviewed? We didn't set ourselves a number, we just kept searching for great paid and free apps until we'd found something for everyone. And when we'd finished we had more than 250 apps covering 20 different categories and over 200 free apps reviewed; a truly comprehensive resource.<b>Unbiased Reviews and Recommendations</b>We only care about one thing, bringing you honest and helpful reviews of the best Kindle apps available. We don't develop apps, we don't sell apps and we don't get paid to write app reviews. We just love apps and use them all the time.<b>Intuitive Navigation and Easy One Click Selection</b>With our clear and easy to use table of contents you can navigate seamlessly to the categories that matter to you and your family. In each category discover our favorite "Must Have" app. Read reviews of all the top Kindle Fire apps and our recommendations for the best of the rest. Find an app you like and with one click redirect immediately to the relevant product page in Amazon's Appstore for the full app description and download options.<b>Bonus Material</b>If you're just getting to know your Kindle Fire for the first time then take a look at our bonus material where you will learn how to purchase and download apps, understand permissions and set parental controls.<b>Over 250 Apps in these 20 Categories</b>Books, Comics & ReadingEducation & ReferenceEntertainmentFinanceFood, Drink & CookingGamesHealth & FitnessKidsLifestyle & HobbiesMusicNews & MagazinesNoveltyPhotography, Art & CreativityProductivityShoppingSocial Networking & CommunicationsSportsTravel, Navigation & City InfoUtilitiesWeather
The 15 Habits of Highly Frugal Genealogists
Thomas MacEntee - 2015
There are many ways to save money while you pursue the “hunt” for your roots: some are just common sense while others are, frankly, ingenious. Also keep in mind that it doesn’t pay to be so focused on “frugal” that in the long run you either lose money or that genealogy is no longer “fun.” The title of this book is misleading, and intentionally so. The fact is, you’ll find over 30 amazing ways to save money when purchasing genealogy-related products and services. You may already be using some of these tricks, but I guarantee that once you starting using some of the more unusual money-saving tips, you’ll say to yourself, “Now, why didn’t I think of that!” Finally, the end of The 15 Habits of Highly Frugal Genealogists is filled with special offers exclusively for those who have purchased this book. These deals were specifically negotiated with certain vendors and most use links or promo codes that are valid through the end of 2015. SPECIAL EXCLUSIVE SAVINGS! As a reader of The 15 Habits of Highly Frugal Genealogists, you’ll have exclusive access to the following deals negotiated with specific vendors. • MyHeritage: Save 35% off a Premium Plus account and 1 year Data Subscription • Legacy Tree Genealogists: $45 off any genealogy research project • Hack Genealogy Boot Camp: 30% off any digital download • Legacy Family Tree: 15% off an annual membership at Legacy Family Tree webinars; 15% off Legacy Family Tree Deluxe Software • Shop Family Tree: 15% off any one item at ShopFamilyTree.com • Amazon: Various savings on genealogy products • Family Tree Tours: Save $50 on any tour booking • Flip-Pal® mobile scanner: Save $35 on a special Flip-Pal mobile scanner bundle • Larsen Digital: 10% off ALL conversion services including audio, video and more! • AncestryDNA: Free Shipping on all AncestryDNA kits • Evidentia: 20% off Evidentia software • Genealogical Publishing Company: 30% off all items at Genealogical.com
Future Crimes
Marc Goodman - 2015
Hackers can activate baby monitors to spy on families, thieves are analyzing social media posts to plot home invasions, and stalkers are exploiting the GPS on smart phones to track their victims’ every move. We all know today’s criminals can steal identities, drain online bank accounts, and wipe out computer servers, but that’s just the beginning. To date, no computer has been created that could not be hacked—a sobering fact given our radical dependence on these machines for everything from our nation’s power grid to air traffic control to financial services. Yet, as ubiquitous as technology seems today, just over the horizon is a tidal wave of scientific progress that will leave our heads spinning. If today’s Internet is the size of a golf ball, tomorrow’s will be the size of the sun. Welcome to the Internet of Things, a living, breathing, global information grid where every physical object will be online. But with greater connections come greater risks. Implantable medical devices such as pacemakers can be hacked to deliver a lethal jolt of electricity and a car’s brakes can be disabled at high speed from miles away. Meanwhile, 3-D printers can produce AK-47s, bioterrorists can download the recipe for Spanish flu, and cartels are using fleets of drones to ferry drugs across borders. With explosive insights based upon a career in law enforcement and counterterrorism, Marc Goodman takes readers on a vivid journey through the darkest recesses of the Internet. Reading like science fiction, but based in science fact, Future Crimes explores how bad actors are primed to hijack the technologies of tomorrow, including robotics, synthetic biology, nanotechnology, virtual reality, and artificial intelligence. These fields hold the power to create a world of unprecedented abundance and prosperity. But the technological bedrock upon which we are building our common future is deeply unstable and, like a house of cards, can come crashing down at any moment. Future Crimes provides a mind-blowing glimpse into the dark side of technological innovation and the unintended consequences of our connected world. Goodman offers a way out with clear steps we must take to survive the progress unfolding before us. Provocative, thrilling, and ultimately empowering, Future Crimes will serve as an urgent call to action that shows how we can take back control over our own devices and harness technology’s tremendous power for the betterment of humanity—before it’s too late.From the Hardcover edition.
Complete Kitten Care
Amy Shojai - 2002
You'll learn all the latest about raising a cat of your dreams, introducing a new kitten to the rest of your family, and enjoy the award winning cute kitten pictures. Nationally known pet authority Amy Shojai's award-winning book contains the latest cat behavior information and kitten care research, including updated cat vaccinations guidelines, animal behavior advice, cat language tips and more. This veritable "Kitten 101" is packed with all the must-know facts about cats and kitten facts including: Choosing a kitten Best kittens for adoption Kitten breeds and buying kittens How to train a kitten Understand kitten behavior Fixing and preventing common kitten problems Toilet training cats and litter training kittens How to stop kitten biting and cat hissing Understand cat communication, cat body language and cat purrs Cat breed guide with care considerations and kitty personality types Introducing a kitten to a cat and/or a dog Kittens food considerations Grooming a cat or kitten Kitten vaccinations Kitten parasites and cat worms Kitten spay and neuter Kitten first aid Cat legends, myths, and fun facts Plus a myriad of UPDATED kitten and cat supply resources: the best kitten Websites, cat associations and feline clubs, animal welfare organizations and feline foundations, recommended cat books and kitten magazines, online kitten and cat products sources Amy Shojai is a certified animal behavior consultant, a founder of the international Cat Writers' Association, and appears as an expert on Animal Planet's CATS 101 and DOGS 101. She is the author of 30+ award winning pet care books, and also writes the critically acclaimed SEPTEMBER DAY pet-centric thrillers.
Python for Informatics: Exploring Information: Exploring Information
Charles Severance - 2002
You can think of Python as your tool to solve problems that are far beyond the capability of a spreadsheet. It is an easy-to-use and easy-to learn programming language that is freely available on Windows, Macintosh, and Linux computers. There are free downloadable copies of this book in various electronic formats and a self-paced free online course where you can explore the course materials. All the supporting materials for the book are available under open and remixable licenses. This book is designed to teach people to program even if they have no prior experience.
Cisco CCNA in 60 Days
Paul W. Browning - 2012
Every year, tens of thousands of people embark towards taking the exam via private study, Cisco Academy courses, or online training. The sad truth is most students quit along the way, and for those few who actually do attempt it, only 50% pass. All that time, effort, and money wasted! If there are so many manuals, CBT courses, lab simulators, exam engines, and study resources out there, then what goes wrong? This is the question Cisco trainer Paul Browning wanted to get to the bottom of. After interviewing thousands of students, he discovered that most people quit because they are simply overwhelmed with the sheer volume of material they need to digest and, of course, the large number of hands-on skills they need to be able to demonstrate in the exam. Add to that the day-to-day stresses of commuting to work, bringing up a family, and the distraction of everyday problems and challenges; it's no wonder people quit. This is where Cisco CCNA in 60 Days can help. Devised by two industry experts and countless Cisco students just like you, the 60-day programme breaks down every exam requirement into a daily study task. All you need to do is open the book at the relevant day (from 1 to 60), read the theory, and complete the lab. Every lesson is reviewed several times in the form of exam questions, review sessions, a handy exam cram guide, and, of course, hands-on labs for you to follow. You can choose to take the CCENT after the first 30 days and the ICND2 after the next 30 days, or you can take the CCNA after 60 days of study. Here is what is included in your study guide: 60 daily study tasks Full explanations of theory Real-world tips and advice Over 47 hands-on labs, plus 15 bonus CCENT and ICND2 labs CCENT and ICND2 cram guides Bonus VLSM guide Motivational goal-setting guide Downloadable videos Author Paul Browning is a former police officer who used his CCNA qualification to help him make a career change to IT. He worked for Cisco in the UK for a while, and then went on to start his own Cisco training company, which he ran for 8 years before moving into online Cisco training. He is the author of several Cisco study guides. He has also created the online Cisco certification training sites, including www.howtonetwork.net and www.in60days.net. Technical author Farai Tafa used to work in a shoe shop but decided he wanted more out of life, so he began to study for his Cisco exams. He is now a dual CCIE and one of the leading Cisco consultants in the US. He currently designs, installs, and troubleshoots networks for large companies.
Nikola Tesla: Imagination and the Man That Invented the 20th Century
Sean Patrick - 2013
It’s no coincidence that geniuses not only dare to dream of the impossible for their work, but do the same for their lives. They’re audacious enough to think that they’re not just ordinary players. Few stories better illustrate this better than the life of the father of the modern world, a man of legendary imaginative power and wonder: Nikola Tesla.In this book, you’ll be taken on a whirlwind journey through Tesla’s life and work, and not only learn about the successes and mistakes of one of history’s greatest inventors, but also how to look at the world in a different, more imaginative way.Read this book now and learn lessons from Nikola Tesla on why imagination is so vital to awakening your inner genius, and insights into the real “secret” to creativity, as explained by people like Jobs, Picasso, Dali, and Twain.