Book picks similar to
CCIE Routing and Switching V5.0 Official Cert Guide, Volume 2 by Narbik Kocharians
ccie
networking
cisco
network-engineering
Building Wireless Sensor Networks
Robert Faludi - 2010
By the time you're halfway through this fast-paced, hands-on guide, you'll have built a series of useful projects, including a complete ZigBee wireless network that delivers remotely sensed data.Radio networking is creating revolutions in volcano monitoring, performance art, clean energy, and consumer electronics. As you follow the examples in each chapter, you'll learn how to tackle inspiring projects of your own. This practical guide is ideal for inventors, hackers, crafters, students, hobbyists, and scientists.Investigate an assortment of practical and intriguing project ideasPrep your ZigBee toolbox with an extensive shopping list of parts and programsCreate a simple, working ZigBee network with XBee radios in less than two hours -- for under $100Use the Arduino open source electronics prototyping platform to build a series of increasingly complex projectsGet familiar with XBee's API mode for creating sensor networksBuild fully scalable sensing and actuation systems with inexpensive componentsLearn about power management, source routing, and other XBee technical nuancesMake gateways that connect with neighboring networks, including the Internet
Computer Networks: A Systems Approach
Larry L. Peterson - 1996
This expanded and completely updated edition covers the why of network design, focusing not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems. It is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the text, who have actually designed some of them as well, and who are still actively designing the computer networks today.The book makes less use of computer code to explain protocols than earlier editions. Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers. Other new features are: increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features; the material is structured in such a way as to make it easier to teach top-down. Furthermore, the book outstrips the competitors in offering a more robust ancillary package for student and instructor support. The text is complemented with figures as well as links to networking resources on the Web and links to author-created materials on author-maintained Web site.Computer Networks, Fourth Edition, will be an invaluable resource for networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.
Airplane Flying Handbook: FAA-H-8083-3A (FAA Handbooks series)
Federal Aviation Administration - 1999
This beginning aviator's guide is intended for pilots wishing to improve their flying proficiency and aeronautical knowledge, and flyers preparing for additional certificates or ratings, and others.
The Physics of NASCAR: How to Make Steel + Gas + Rubber = Speed
Diandra Leslie-Pelecky - 2008
In this fast-paced investigation into the adrenaline-pumping world of NASCAR, a physicist with a passion uncovers what happens when the rubber hits the road and 800- horsepower vehicles compete at 190 miles per hour only inches from one another. Diandra Leslie-Pelecky reveals how and why drivers trust the engineering and science their teams literally build around them not only to get them across the finish line in first place, but also to keep them alive. Professor Leslie-Pelecky is a physicist in love with the sport’s beauty and power and is uniquely qualified to explain exactly how physics translates into winning races. Based on the author’s extensive access to race shops, pit crews, crew chiefs and mechanics, this book traces the life cycle of a race car from behind the scenes at top race shops to the track. The Physics of NASCAR takes readers right into the ultra competitive world of NASCAR, from the champion driver’s hot seat behind the detachable steering wheel to the New Zealander nicknamed Kiwi in charge of shocks for the No. 19 car. Diandra Leslie-Pelecky tells her story in terms anyone who drives a car--and maybe occasionally looks under the hood--can understand. How do drivers walk away from serious crashes? How can two cars travel faster together than either car can on its own? How do you dress for a 1800°F gasoline fire? In simple yet detailed, high-octane prose, this is the ultimate thrill ride for armchair speed demons, auto science buffs, and NASCAR fans at every level of interest. Readers, start your engines.
Cricut Expression: A Comprehensive Guide to Creating with Your Machine
Cathie Rigby - 2012
For advanced crafters, this book instructs on features such as modes and functions, and teaches how to create with color, texture, and dimension. A cutting guide teaches the perfect settings to cut every type of material. A separate chapter introduces the new features of Cricut Expression™ 2 and explains how it differs from the original Expression machine. More than 50 creative projects inspire ideas for home décor, gifts, parties, cards, and scrapbook layouts.
Essential Elements 2000 - Book 1: Flute [With CDROM]
Hal Leonard Corporation - 1999
Features: - Same great Essential Elements 2000 method - 15-minute video/"super lesson" for learning the basics- Play-along mp3* tracks for all 185 exercises (featuring a professional player on your instrument)- Tempo Adjustment Software- Duets and Trios- Music Listening Library- SmartMusic Software for Exercises 1-100 (for use on PC/Mac) - practice, record, and email a performance with on-screen assessment *mp3 files will play on most current CD or DVD players Authors: Tim Lautzenheiser, John Higgins, Charles Menghini, Paul Lavender, Tom C. Rhodes, Don Bierschenk
The Educator's Guide to Texas School Law
Jim Walsh - 1985
In this new seventh edition, the authors have streamlined the discussion by pruning older material and weaving in new developments. The result is an authoritative source on all major dimensions of Texas school law that is both well integrated and easy to read.Intended for Texas school personnel, school board members, interested attorneys, and taxpayers, the seventh edition explains what the law is and what the implications are for effective school operations. It is designed to help professional educators avoid expensive and time-consuming lawsuits by taking effective preventive action. It is an especially valuable resource for school law courses and staff development sessions.The seventh edition begins with a review of the legal structure of the Texas school system. Successive chapters address attendance and the instructional program, the education of children with special needs, employment and personnel, expression and associational rights, the role of religion in public schools, student discipline, open meetings and records, privacy, search and seizure, and legal liability under both federal and Texas law. In addition to state law, the book addresses the growing role of the federal government in school operation through such major federal legislation as the Americans with Disabilities Act, the Individuals with Disabilities Education Act, and the No Child Left Behind Act.
Learn Brazilian Portuguese - Word Power 101
Innovative Language - 2011
This e-book is a completely new way to learn Brazilian Portuguese vocabulary fast - and for free! Start speaking Brazilian Portuguese in minutes with the powerful learning methods you will master in this book.The vocabulary words you’ll find in Learn BrazilianPortuguese - Word Power 101 were hand selected by our Brazilian Portuguese language teachers as the top 101 most frequently used words in the Brazilian Portuguese language. With each entry, you’ll see the word and a vibrant image to help remember the meaning. You’ll hear the word (separate free download) to master the pronunciation. Then you’ll see how the word is actually used in everyday speech with sample sentences and phrases. Learning Brazilian Portuguese vocabulary has never been easier!In this book, you’ll get: - 101 of the most frequently used Brazilian Portuguese vocabulary words - Audio with authentic native Brazilian Portuguese pronunciation *Supplementary mp3 audio files are a separate download - Vibrant photos and images to help memorization - Useful and practical sample sentences and phrases Purchase Learn BrazilianPortuguese - Word Power 101 today to start mastering Brazilian Portuguese vocabulary in the fastest, easiest and most fun way possible!
RHCE Red Hat Certified Engineer Linux Study Guide: Exam (RH302)
Michael Jang - 2002
100% complete coverage of all objectives for exam RH302 Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Real-world exercises modeled after hands-on exam scenarios Two complete lab-based exams simulate the format, tone, topics, and difficulty of the real exam Bonus content (available for download) includes installation screen review, basic instructions for using VMware and Xen as testbeds, and paper and pencil versions of the lab exams Covers all RH302 exam topics, including: Hardware installation and configuration The boot process Linux filesystem administration Package management and Kickstart User and group administration System administration tools Kernel services and configuration Apache and Squid Network file sharing services (NFS, FTP, and Samba) Domain Name System (DNS) E-mail (servers and clients) Extended Internet Services Daemon (xinetd), the Secure package, and DHCP The X Window System Firewalls, SELinux, and troubleshooting
Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide
Darril Gibson - 2011
The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he's honed in the classroom that have helped hundreds of students master the Security+ content. You'll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what's important. Over 450 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You'll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you'll be a step ahead for other exams. This SY0-301 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http: //blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http: //learnzapp.com/partners/darrilgibson/
Stealing the Network: How to Own a Shadow
Johnny Long - 2007
Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries
Offside: My Life Crossing the Line
Sean Avery - 2018
And the most respected of these is the code of silence. For the first time, a hockey player is prepared to reveal what really goes on in the NHL, in the spirit of what Ball Four did for baseball. The money, the personalities, the adultery, and the drugs--and also the little things that make up daily life in the league. Most athletes have little to say, but Sean doesn't have that problem. Yes, he tells us about the guys he's fought and the guys he's partied with, and he tells us where to find the best cougar bars in various NHL cities and what it's like to be hounded by the media when you're dating a celebrity. But Sean's job on the ice was always to get inside the heads of the guys he played against, and that insight on human nature is on full display in Offside.What makes millionaire athletes tick? What are their weaknesses? And in the end, what makes Sean Avery--once called the most hated player in the NHL--who he is? What is it like to make people hate you for a living? Sean Avery's misdeeds on and off the ice are well-documented, and he certainly has his detractors. But on the other hand, he has a lot of supporters, in part for things like being the first North American athlete to come out in favour of marriage equality, and in part just for being an interesting guy. Love him or hate him, he is one of the best-known players of the past few decades, and certainly one of the most colourful and outspoken. In Offside, he meets his accusers head-on, and gives them something to think about.
Enigmas: Alan Turing and the Codebreakers of the World Wars
David Boyle - 2017
Many of those most closely involved in cracking the Enigma code – Alistair Denniston, Frank Birch, Dilly Knox – had wrestled with German naval codes for most of the First World War. By the end of the war they had been successfully cracking a new code every day, from their secret Room 40 at the Old Admiralty Building, in a London blacked out for Zeppelin Raids. The techniques they developed then, the ideas that they came to rely on, the people they came to trust, had been developed the hard way, under intense pressure and absolute secrecy during the First World War. Operation Primrose Operation Primrose tells the story of the capture of U-110 – and with it a working Enigma machine. One of the biggest secrets of the war, the capture of that one machine turned the tide of the war. Turing and his colleagues at Bletchley Park worked tirelessly to crack the code, and with the working Enigma machine they finally had their break-through moment. This book sets the story, and the Enigma cryptographers, in context – at the heart of the Battle of the Atlantic, when it reached its crescendo in the pursuit of the battleship Bismarck the week after U110 was taken. It sets Bletchley Park in its wider context too, at the heart of an intricate and maverick network of naval intelligence, tracking signals and plotting them to divert convoys around waiting U-boats, involving officers like James Bond’s future creator, Ian Fleming. It also sets out the most important context of all, forgotten in so much of the Enigma history: that Britain’s own naval code had already been cracked, and its signals were being read, thanks to the efforts of Turing’s opposite number, the German naval cryptographer, Wilhelm Tranow. An exciting and enthralling true story ‘Operation Primrose’ is an excellently researched piece on the race for naval supremacy in the Second World War. Alan Turing Mathematician, philosopher, codebreaker. Turing was one of the most original thinkers of the last century - and the man whose work helped create the computer-driven world we now inhabit. But he was also an enigmatic figure, deeply reticent yet also strikingly naïve. Turing’s openness about his homosexuality at a time when it was an imprisonable offence ultimately led to his untimely death at the age of only forty-one. Alan Turing: Unlocking the Enigma seeks to find the man behind the science, illuminating the life of a person who is still a shadowy presence behind his brilliant achievements. Turing was instrumental in cracking the Nazi Enigma machines at the top secret code breaking establishment at Bletchley Park during the Second World War. But his achievements were to be tragically overshadowed by his supposedly subversive views and for his sexuality. Praise for David Boyle: ‘The tone of the book may be gloomy but there is plenty of entertainment value …’ - Anne Ashworth, The Times ‘Exhilarating’ - Daily Mail ‘He tells these stories, on the whole persuasively and with some startling asides.
The Pottery Cottage Murders: The terrifying true story of an escaped prisoner and the family he held hostage
Carol Ann Lee - 2020
A family of five held hostage in their home. A frantic police manhunt across the snowbound Derbyshire moors. Just one survivor. The definitive account of the terrifying 1977 Pottery Cottage murders that shocked Britain. For three days, escaped prisoner Billy Hughes played macabre psychological games with Gill Moran and her family, keeping them in separate rooms of their home while secretly murdering them one by one. On several occasions Hughes ordered Gill and her husband, Richard, to leave the house for provisions, confident that they would return without betraying him in order to protect their loved ones. Blizzards hampered the desperate police search, but they learned where the dangerous convict was hiding and closed in on the cottage. A high-speed car chase on icy roads ended with a crash and the killer being shot as he swung a newly sharpened axe at his final victim. This was Britain's first instance of police officers committing 'justifiable homicide' against an escapee. The story of these terrible events is told here by Carol Ann Lee and Peter Howse, the former Chief Inspector who saved Gill Moran's life more than 40 years ago. Peter's professional role has permitted access to witness statements, crime-scene photographs and police reports. Peter Howse and Carol Ann Lee have made use of these, along with fresh interviews with many of those directly involved, to tell a fast-paced and truly shocking story with great insight and empathy.
Active Directory
Alistair G. Lowe-Norris - 2003
Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.You'll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you've learned--ideal whether you're a network administrator for a small business or a multinational enterprise.Upgrade Active Directory to Windows Server 2012Learn the fundamentals, including how AD stores objectsUse the AD Administrative Center and other management toolsLearn to administer AD with Windows PowerShellSearch and gather AD data, using the LDAP query syntaxUnderstand how Group Policy functionsDesign a new Active Directory forestExamine the Kerberos security protocolGet a detailed look at the AD replication process