Book picks similar to
Comptia Security+ Sy0-501 Exam Cram by Diane Barrett


computer-training
cyber-security
information-technology
internet-security

Air Mail: Letters From The World's Most Troublesome Passenger


Terry Ravenscroft - 2007
    But are they? He is probably the only man who has ever requested the recipe for an airline’s lasagna or wanted to enjoy his flight with an inflatable rubber woman sat on his knee. Prepare to meet the man who must have his diet of stir-fried mulberry leaves accommodated and the man who left his false teeth on a flight and is sure he recognized them on a later flight—in a flight attendant's mouth. Ravenscroft's correspondence tackles travel annoyances like excess baggage charges alongside more surreal letters, such as the one starting out asking an Australian airline if they offer an authentic Australian experience (for instance, Australian cuisine or in-flight movies) which then moves on to the question of at what age a baby is safe from being swallowed by a dingo.

IVAR THE BONELESS: Myths Legends & History (Vikings Book 1)


KIV Books - 2018
    The records that talk about him are quite conflicting as they often are with mythical and historical figures. This book will do it's best and take a closer look to his origins, family and his notable exploits. We will also catch a glimpse into the possibilities of his demeanor and behavior without moving away from the fact that he is one of the most ruthless men to ever invade England in the 9th century. It is our hope that you'll enjoy this book and learn many new and exciting things about Ivar the Boneless!

The Extreme Searcher's Internet Handbook: A Guide for the Serious Searcher


Randolph Hock - 2004
    From emerging search tools Ask.com and Windows Live to standbys Google and Yahoo!, the major search engines and their myriad of services are thoroughly discussed. Recent additions to the Internet realm—RSS feeds, podcasts, alert services, wikis, and blogs—are explained, as well as tried-and-true search tools, including web directories, newsgroups, and image resources. For those with little to moderate searching experience, friendly, easy-to-follow guidelines to the world of Web research are provided, while experienced searchers will discover new perspectives on content and techniques.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

Head First jQuery


Ryan Benedetti - 2011
    With Head First jQuery, you'll quickly get up to speed on this amazing JavaScript library by learning how to navigate HTML documents while handling events, effects, callbacks, and animations. By the time you've completed the book, you'll be incorporating Ajax apps, working seamlessly with HTML and CSS, and handling data with PHP, MySQL and JSON.If you want to learn—and understand—how to create interactive web pages, unobtrusive script, and cool animations that don't kill your browser, this book is for you.Use jQuery with DOM to overcome the limitations of HTML and CSSLearn how jQuery selectors and actions work togetherWrite functions and wire them to interface elementsUse jQuery effects to create actions on the pageMake your pages come alive with animationBuild interactive web pages with jQuery and AjaxBuild forms in web applications

Living with Art


Mark Getlein - 2006
    Living with Art helps students develop an appreciation of art by offering a clear and comprehensive introduction to the visual arts from several perspectives: themes and purposes of art; the vocabulary of art; individual art media (painting, drawing, camera arts, sculpture, architecture, etc.); and the history of art. The book is rich with illustrations drawn from a wide range of artistic cultures and time periods.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

The Linux Command Line


William E. Shotts Jr. - 2012
    Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction

The Dream: Martin Luther King, Jr., and the Speech that Inspired a Nation


Drew D. Hansen - 2003
    electrified the nation when he delivered his "I Have a Dream" speech from the steps of the Lincoln Memorial. King's prophetic utterances started the long overdue process of changing America's idea of itself. His words would enter the American lexicon, galvanizing the civil rights movement, becoming a touchstone for all that the country might someday achieve.The Dream is the first book about Martin Luther King, Jr.'s legendary "I Have a Dream" speech. Opening with an enthralling account of the August day in 1963 that saw 250,000 Americans converge at the March on Washington, The Dream delves into the fascinating and little-known history of King's speech. Hansen explores King's compositional strategies and techniques, and proceeds to a brilliant analysis of the "I Have a Dream" speech itself, examining it on various levels: as a political treatise, a work of poetry, and as a masterfully delivered and improvised sermon bursting with biblical language and imagery.In tracing the legacy of "I Have a Dream" since 1963, The Dream insightfully considers how King's incomparable speech "has slowly remade the American imagination," and led us closer to King's visionary goal of a redeemed America.

Privacy in the Age of Big Data: Recognizing Threats, Defending Your Rights, and Protecting Your Family


Theresa M. Payton - 2014
    The devices we use to get just-in-time coupons, directions when we're lost, and maintain connections with loved ones no matter how far away they are, also invade our privacy in ways we might not even be aware of. Our devices send and collect data about us whenever we use them, but that data is not safeguarded the way we assume it would be. Privacy is complex and personal. Many of us do not know the full extent to which data is collected, stored, aggregated, and used. As recent revelations indicate, we are subject to a level of data collection and surveillance never before imaginable. While some of these methods may, in fact, protect us and provide us with information and services we deem to be helpful and desired, others can turn out to be insidious and over-arching. Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we may not consent, and of which we are likely unaware. Payton and Claypoole skillfully introduce readers to the many ways we are 'watched, ' and how to adjust our behaviors and activities to recapture our privacy. The authors suggest the tools, behavior changes, and political actions we can take to regain data and identity security. Anyone who uses digital devices will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.

Creative Haven Whimsical Gardens Coloring Book


Alexandra Cowell - 2015
    The imaginative and playful designs will inspire colorists to add their own special touches to make each picture uniquely their own. Illustrations are printed on one side of perforated pages for easy removal and display. Specially designed for experienced colorists, Whimsical Gardens and other Creative Haven® adult coloring books offer an escape to a world of inspiration and artistic fulfillment. Each title is also an effective and fun-filled way to relax and reduce stress.

Django for Beginners: Learn web development with Django 2.0


William S. Vincent - 2018
    Proceed step-by-step through five progressively more complex web applications: from a "Hello World" app all the way to a robust Newspaper app with a custom user model, complete user authentication flow, foreign key relationships, and more. Learn current best practices around class-based views, templates, urls, user authentication, testing, and deployment. The material is up-to-date with the latest versions of both Django (2.0) and Python (3.6). TABLE OF CONTENTS: * Introduction * Chapter 1: Initial Setup * Chapter 2: Hello World app * Chapter 3: Pages app * Chapter 4: Message Board app * Chapter 5: Blog app * Chapter 6: Forms * Chapter 7: User Accounts * Chapter 8: Custom User Model * Chapter 9: User Authentication * Chapter 10: Bootstrap * Chapter 11: Password Change and Reset * Chapter 12: Email * Chapter 13: Newspaper app * Chapter 14: Permissions and Authorizations * Chapter 15: Comments * Conclusion

Cannibal Killers: Monsters with an Appetite for Murder and a Taste for Human Flesh


Chloe Castleden - 2010
    It has long been a taboo subject, with even the tabloid press shying away from publishing precise details of cannibal crimes. When Albert Fish kidnapped, killed, and consumed ten-year-old Grace Budd in New York in 1928, he went to great pains to assure her parents, in a letter he wrote six years later that brought about his arrest, that he had not sexually assaulted her. But at the time, the court portrayed Fish as a sexually motivated criminal rather than as a cannibal. Yet, sexual depravity and cannibalism are far from being mutually exclusive. Andrei Chikatilo, the Butcher of Rostov, is proof of that, having eaten parts of the sexual organs of some of his fifty-six victims. Tsutomu Miyazaki, the Japanese Dracula, murdered little girls, molested their corpses, and drank their blood. These and many other cases, including those of Jeffrey Dahmer, Edmund Kemper, Joachim Kroll (the Duisburg Man Eater), and Daniel Rakowitz—who murdered his roommate and made soup from her brains—are studied in chilling detail.

Social Engineering: The Science of Human Hacking


Christopher Hadnagy - 2018
    The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.

Steal This Computer Book 4.0 – What They Won′t Tell You About the Internet 4e


Wallace Wang - 2006
    It is an unabashed look at the dark side of the Net--the stuff many other books gloss over. It's hard-edged, wisecracking, and often quite cynical as it pours over the reality of online scams, illegal activities, and simple annoyances. Wang's stated goal is to open the reader's eyes about what's really there. He shows what's being done, how it's being done, and how to avoid problems or even strike back. He begins with a chapter about the news media, and his message is that no source is to be trusted completely. He examines issues important to Internet users: the cost of getting computerized (with tips on how to find the real bargains), who is using the Internet as a source of hate information, and how your privacy can be invaded and protected. He shows you the secrets of malicious hackers and others and how some of them attack computer systems without the ethical mindset typical of the original, idealistic hackers. Wang shows you how you can set up your defenses against such an onslaught, discussing how to protect yourself and your kids from online stalkers and how online con games work. Wang never claims that the Internet is the electronic den of darkness that the pop media make it out to be. But he makes it clear that something this big has its lowlights--it's own "net noir." His messages are "know your enemy" and "be careful who you trust," an ideology verified by the examples he provides. --Elizabeth Lewis This offbeat, non-technical book examines what hackers do, how they do it, and how readers can protect themselves. Informative, irreverent, and entertaining, the completely revised fourth edition of Steal This Computer Book contains new chapters that discuss the hacker mentality, lock picking, exploiting P2P file sharing networks, and how people manipulate search engines and pop-up ads. Includes a CD with hundreds of megabytes of hack