Book picks similar to
Comptia Security+ Sy0-501 Exam Cram by Diane Barrett
study-books
text-books
would-read-again
certifications
Overdrive: Bill Gates and the Race to Control Cyberspace
James Wallace - 1997
James Wallace brings readers up to date on the Gates saga to 1997 and reveals the inside story of the struggle to keep Microsoft on top in the World Wide Web game.
Head First JavaScript
Michael Morrison - 2007
You want to take your web skills to the next level. And you're finally ready to add "programmer" to the resume. It sounds like you're ready to learn the Web's hottest programming language: JavaScript. Head First JavaScript is your ticket to going beyond copying and pasting the code from someone else's web site, and writing your own interactive web pages. With Head First JavaScript, you learn:The basics of programming, from variables to types to looping How the web browser runs your code, and how you can talk to the browser with your code Why you'll never have to worry about casting, overloading, or polymorphism when you're writing JavaScript code How to use the Document Object Model to change your web pages without making your users click buttons If you've ever read a Head First book, you know what to expect -- a visually rich format designed for the way your brain works. Head First JavaScript is no exception. It starts where HTML and CSS leave off, and takes you through your first program into more complex programming concepts -- like working directly with the web browser's object model and writing code that works on all modern browsers. Don't be intimidated if you've never written a line of code before! In typical Head First style, Head First JavaScript doesn't skip steps, and we're not interested in having you cut and paste code. You'll learn JavaScript, understand it, and have a blast along the way. So get ready... dynamic and exciting web pages are just pages away.
An Introduction to APIs
Brian Cooksey - 2016
We start off easy, defining some of the tech lingo you may have heard before, but didn’t fully understand. From there, each lesson introduces something new, slowly building up to the point where you are confident about what an API is and, for the brave, could actually take a stab at using one.
Pawnee: The Greatest Town in America
Leslie Knope - 2011
The book chronicles the city's colorful citizens and hopping nightlife, and also explores some of the most hilarious events from its crazy history—like the time the whole town was on fire, its ongoing raccoon infestation, and the cult that took over in the 1970s. Packed with laugh-out-loud-funny photographs, illustrations, and commentary by the other inhabitants of Pawnee, it's a must-read that will make you enjoy every moment of your stay in the Greatest Town in America. Praise for Pawnee: "Carrying this book around is a good way of picking up girls with glasses." —Tom Haverford "I have read over four books, and this is by far the one that has me in it the most." —Andy Dwyer "Literally the greatest endeavor of human creativity in the history of mankind." —Chris Traeger
Costa Rica
Christopher P. Baker - 1994
Suggested travel strategies and lists of must-see sights provide you with real judgments so you can decide where you should go, stay, and eat—without hassles or regrets. Practical information includes maps, photographs, illustrations, and suggested travel strategies and lists of must-see sights, plus essentials on dining, transportation, and accommodations for a range of budgets. Complete with details for enjoying an array of outdoor adventures, such as bicycling, bungee jumping, surfing, sport fishing, wildlife viewing, and off-road driving, Moon Handbooks Costa Rica gives you the tools you need to create a personal and memorable experience.
Fit, Fifty and Fired Up
Nigel Marsh - 2012
Are you slogging your guts out at a job you don't particularly like to buy things you don't particularly need? Would you like to spend more time with your family and less time at work? Do you ever wonder what it'd be like to really love what you do?Ten years on from Fat, Forty and Fired, Nigel Marsh steps off the hamster wheel (again) to grapple with these and other less weighty questions, like: Where the hell has my wife left the cordless phone? and How do I dress my daughter as a bridge for school in ten minutes?Written with Nigel's customary humour and honesty, Fit, Fifty and Fired Up is a must-read for anyone who's ever dreamt of taking a risk to live a life they feel passionate about...
Serious Cryptography: A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson - 2017
You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.
A Guide to the Business Analysis Body of Knowledge
IIBA - 2009
Business analysis involves understanding how organizations function to accomplish their purposes and defining the capabilities an organization requires to provide products and services to external stakeholders. It includes the definition of organizational goals, understanding how those goals connect to specific objectives, determining the courses of action that an organization has to undertake to achieve those goals and objectives, and defining how the various organizational units and stakeholders within and outside of that organization interact. A Guide to the Business Analysis Body of Knowledge® (BABOK® Guide) contains a description of generally accepted practices in the field of business analysis. The content included in this release has been verified through reviews by practitioners, surveys of the business analysis community, and consultations with recognized experts in the field. In less than five years, the BABOK® Guide has been recognized around the world as a key tool for the practice of business analysis and become a widely-accepted standard for the profession, with over 200,000 copies downloaded from the IIBA® website. Version 2.0 represents a major advance on that standard, and will become an essential reference for business analysis professionals.
Pro C# 3.0 and the .NET 3.5 Framework (Pro)
Andrew Troelsen - 2007
Since that time, this text has been revised, tweaked, and enhanced to account for the changes found within each release of the .NET platform (1.1, 2.0, 3.0 and now 3.5)..NET 3.0 was more of an augmentative release, essentially providing three new APIs: Windows Presentation Foundation (WPF), Windows Communication Foundation (WCF) and Windows Workflow Foundation (WF). As you would expect, coverage of the "W's" has been expanded a great deal in this version of the book from the previous Special Edition text.Unlike .NET 3.0, .NET 3.5 provides dozens of C# language features and .NET APIs. This edition of the book will walk you through all of this material using the same readable approach as was found in previous editions. Rest assured, you'll find detailed coverage of Language Integrated Query (LINQ), the C# 2008 language changes (automatic properties, extension methods, anonymous types, etc.) and the numerous bells and whistles of Visual Studio 2008. What you'll learn Everything you need to knowget up to speed with C# 2008 quickly and efficiently. Discover all the new .NET 3.5 featuresLanguage Integrated Query, anonymous types, extension methods, automatic properties, and more. Get a professional footholdtargeted to appeal to experienced software professionals, this book gives you the facts you need the way you need to see them. A rock-solid foundationfocuses on everything you need to be a successful .NET 3.5 programmer, not just the new features. Get comfortable with all the core aspects of the platform including assemblies, remoting, Windows Forms, Web Forms, ADO.NET, XML web services, and much more. Who this book is forIf you're checking out this book for the first time, understand that it targets experienced software professionals and/or students of computer science (so please don't expect three chapters devoted to "for" loops). The mission of this text is to provide you with a rock-solid foundation to the C# 2008 programming language and the core aspects of the .NET platform (object-oriented programming, assemblies, file IO, Windows Forms/WPF, ASP.NET, ADO.NET, WCF, WF, etc.). Once you digest the information presented in these 33 chapters, you'll be in a perfect position to apply this knowledge to your specific programming assignments, and you'll be well equipped to explore the .NET universe on your own terms. "
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
OneNote: OneNote User Guide to Getting Things Done: Setup OneNote for GTD in 5 Easy Steps (OneNote & David Allen's GTD (2015))
Jack Echo - 2015
Would you like to capture your thoughts and to-do's so they don't ALWAYS run loose and rampant in your mind?Would you like to significantly improve your efficiency and productivity so you free up YOUR time?Or maybe you'd like to reduce your stress AND still get more DONE. If so, you've found the right book!Unless you've been living under a rock for the past 13 years you would have heard about David Allen's "Getting Things Done" (GTD) System detailed in his New York Times Bestseller
Getting Things Done: The Art of Stress-free Productivity.
Jack Echo has built upon the same best-selling productivity principles in the newly revised 2015 GTD system by providing a comprehensive guide on how to integrate these principles with OneNote (a free digital note-taking software developed by Microsoft). Through integration of the two systems you have the added benefit and ability to note-take wherever you are without a pen and paper whilst supercharging your productivity in all your daily activities.No matter how technologically illiterate you may be, this guide will walk you step by step on how to set up the GTD system in OneNote within 30 minutes by following the diagrams and 5 simple steps laid out for you. If you aren't familiar with the GTD productivity system by David Allen, Jack has you covered as he explains the foundations of the productivity system. Inside You'll Discover... What the 2015 GTD System Is and WHY It Significantly Improves Your Productivity What OneNotes All About and How to Easily Navigate the Features The #1 Thing You MUST Avoid for Enhanced Productivity The Answer to the Ever Eluding Question: OneNote or EverNote?! How to Set OneNote Up Rapidly in 5 Savvy Steps Why OneNote and GTD Form the Dream Team 6 Productivity Hacks & Tricks with OneNote that Will Make You a Productivity Ninja Integration of OneNote with Other Software 7 Lucrative Lists to Stress-free Productivity How to Use OneNote with GTD to Decrease Stress and Get More Done in Less Time The Core Principles of the GTD System Results from Studies Done by Cognitive Scientists on Productivity and the Implications It Has On You Three Reasons Why Things Are Always on Your Mind PLUS: How to Get Six Free Bonus eBooks Inside... What are you waiting for?Times ticking! Get more out of your TIME and EFFORT today by making the smartest investment you could possibly make. An investment in
yourself
, your future and your productivity. Scroll up NOW and Buy with 1-Click!
Archery: Steps to Success
Kathleen M. Haywood - 1989
Describes the skills, techniques, and strategies to shoot safely, accurately, and consistently, using recurve or compound bows, in target and hunting situations. Through step-by-step, progressive instruction, each phase of the shot is covered: stance, draw, aim, release, and follow-through. New to this edition are full color photographs which clarify detailed written descriptions of proper techniques for shooting form, sighting and aiming, and anchoring. Drills and assessment exercises allow readers to apply and develop the physical and mental skills while a scoring system for each exercise promotes progressive skill development. "
Ikigai: The Japanese Way to a Happy Healthy Long Life
Eric Goodfellow - 2018
The benefits of doing so are explained and the formula to discovering your personal ikigai is within the pages of this book.Change your outlook and give yourself a reason for getting up in the morning, surround yourself with positive people and improve your life. That is the root of the ikigai, to find your bliss!
Kindle Fire HD For Dummies
Nancy C. Muir - 2012
This full-color guide will have you blazing through the web, staying entertained with the latest apps and games, watching your favorite TV shows and movies, and, of course, reading magazines, newspapers, and books to indulge all your interests. Whether this is your first tablet or you're upgrading from another device, you'll get to know your Kindle Fire HD and rekindle your love of reading with "Kindle Fire HD For Dummies"!Covers the Kindle Fire HD and original Kindle FireHelps you navigate the interface, customize your settings, get connected, and take advantage of Amazon CloudShows you how to work with the built-in apps and find new ones to to try out from the Amazon AppstoreExplains how to fill your Kindle Fire with cool stuff - from movies and music to videos, photos, apps, e-books, and moreWalks you through using Amazon's incredibly smooth Amazon Silk web browser to find anything you need online and keep in touch with e-mail, Skype, Facebook, and TwitterLight 'er up and unleash the fun with "Kindle Fire HD For Dummies"!
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Bill Blunden - 2009
Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0