Book picks similar to
CEH v9: Certified Ethical Hacker Version 9 Practice Tests by Raymond Blockmon
humble
technical
0000000
collection
The Conscientious Marine Aquarist: A Commonsense Handbook for Successful Saltwater Hobbyists
Robert M. Fenner - 1996
As a pragmatic, hands-on guide for beginning to intermediate hobbyists, The Conscientious Marine Aquarist demystifies the process of planning, setting up, stocking, and managing a beautiful, thriving slice of the tropical ocean. A leading advocate for the responsible collection and care of wild-caught specimens, Fenner starts with the basics -- "What is a fish?" -- and proceeds to give the reader the scientific background and expert-level secrets to being a smarter consumer, better steward, and more successful marine aquarium keeper.
Make: More Electronics: Learning Through Discovery
Charles Platt - 2013
Right away, you'll start working on real projects, and you'll explore all the key components and essential principles through the book's collection of experiments. You'll build the circuits first, then learn the theory behind them! This book picks up where Make: Electronics left off: you'll learn about power amplification, switching, and motors. This book also covers analog integrated circuits, randomicity, and an assortment of sensors. With step-by-step instructions, and hundreds of color photographs and illustrations, this book will help you use -- and understand -- intermediate to advanced electronics concepts and techniques.
AWS Certified Solutions Architect Official Study Guide: Associate Exam
Joe Baron - 2016
AWS has been the frontrunner in cloud computing products and services, and the AWS Certified Solutions Architect Official Study Guide for the Associate exam will get you fully prepared through expert content, and real-world knowledge, key exam essentials, chapter review questions, access to Sybex’s interactive online learning environment, and much more. This official study guide, written by AWS experts, covers exam concepts, and provides key review on exam topics, including: Mapping Multi-Tier Architectures to AWS Services, such as web/app servers, firewalls, caches and load balancers Understanding managed RDBMS through AWS RDS (MySQL, Oracle, SQL Server, Postgres, Aurora) Understanding Loose Coupling and Stateless Systems Comparing Different Consistency Models in AWS Services Understanding how AWS CloudFront can make your application more cost efficient, faster and secure Implementing Route tables, Access Control Lists, Firewalls, NAT, and DNS Applying AWS Security Features along with traditional Information and Application Security Using Compute, Networking, Storage, and Database AWS services Architecting Large Scale Distributed Systems Understanding of Elasticity and Scalability Concepts Understanding of Network Technologies Relating to AWS Deploying and Managing Services with tools such as CloudFormation, OpsWorks and Elastic Beanstalk. Learn from the AWS subject-matter experts, review with proven study tools, and apply real-world scenarios. If you are looking to take the AWS Certified Solutions Architect Associate exam, this guide is what you need for comprehensive content and robust study tools that will help you gain the edge on exam day and throughout your career.
Modern CTO: Everything you need to know, to be a Modern CTO.
Joel Beasley - 2018
―Jacob Boudreau CTO of Stord | Forbes 30 Under 30 Joel's book and show provide incredible insights for young startup developers and fellow CTOs alike. Joel offers a human perspective and real practical advice on the challenges and opportunities facing every Modern CTO. ― Christian Saucier | Entrepreneur and P2P Systems Architect I've really come to respect what Joel is doing in the community. His podcast and book are filling a much needed hole and I'm excited to see what else the future has in store. ― Don Pawlowski Chief Technology Officer at University Tees Modern CTO Everything you need to know to be a Modern CTO. Developers are not CTOs, but developers can learn how to be CTOs. In Modern CTO, Joel Beasley provides readers with an in-depth road map on how to successfully navigate the unexplored and jagged transition between these two roles. Drawing from personal experience, Joel gives a refreshing take on the challenges, lessons, and things to avoid on this journey.Readers will learn how Modern CTOs: Manage deadlines Speak up Know when to abandon ship and build a better one Deal with poor code Avoid getting lost in the product and know what UX mistakes to watch out for Manage people and create momentum … plus much more Modern CTO is the ultimate book when making the leap from developer to CTO. Update: Kindle Formatting issues resolved 5/13/18. Thank you for the feedback.
Cissp (Isc)2 Certified Information Systems Security Professional Official Study Guide
James Michael Stewart - 2003
This comprehensive book will guide readers through CISSP exam topics, including: Access ControlApplication Development SecurityBusiness Continuity and Disaster Recovery PlanningCryptographyInformation Security Governance and Risk Management Legal, Regulations, Investigations and ComplianceOperations SecurityPhysical (Environmental) SecuritySecurity Architecture and DesignTelecommunications and Network SecurityThis study guide will be complete with 100% coverage of the exam objectives, real world scenarios, hands-on exercises, and challenging review questions, both in the book as well via the exclusive Sybex Test Engine.
Data Science at the Command Line: Facing the Future with Time-Tested Tools
Jeroen Janssens - 2014
You'll learn how to combine small, yet powerful, command-line tools to quickly obtain, scrub, explore, and model your data.To get you started--whether you're on Windows, OS X, or Linux--author Jeroen Janssens introduces the Data Science Toolbox, an easy-to-install virtual environment packed with over 80 command-line tools.Discover why the command line is an agile, scalable, and extensible technology. Even if you're already comfortable processing data with, say, Python or R, you'll greatly improve your data science workflow by also leveraging the power of the command line.Obtain data from websites, APIs, databases, and spreadsheetsPerform scrub operations on plain text, CSV, HTML/XML, and JSONExplore data, compute descriptive statistics, and create visualizationsManage your data science workflow using DrakeCreate reusable tools from one-liners and existing Python or R codeParallelize and distribute data-intensive pipelines using GNU ParallelModel data with dimensionality reduction, clustering, regression, and classification algorithms
TCP/IP Protocol Suite
Behrouz A. Forouzan - 1999
TCP/IP Protocol Suite teaches students and professionals, with no prior knowledge of TCP/IP, everything they need to know about the subject. This comprehensive book uses hundreds of figures to make technical concepts easy to grasp, as well as many examples, which help tie the material to the real-world. The second edition of TCP/IP Protocol Suite has been fully updated to include all of the recent technology changes in the field. Many new chapters have been added such as one on Mobile IP, Multimedia and Internet, Network Security, and IP over ATM. Additionally, out-of-date material has been overhauled to reflect recent changes in technology.
R in a Nutshell: A Desktop Quick Reference
Joseph Adler - 2009
R in a Nutshell provides a quick and practical way to learn this increasingly popular open source language and environment. You'll not only learn how to program in R, but also how to find the right user-contributed R packages for statistical modeling, visualization, and bioinformatics.The author introduces you to the R environment, including the R graphical user interface and console, and takes you through the fundamentals of the object-oriented R language. Then, through a variety of practical examples from medicine, business, and sports, you'll learn how you can use this remarkable tool to solve your own data analysis problems.Understand the basics of the language, including the nature of R objectsLearn how to write R functions and build your own packagesWork with data through visualization, statistical analysis, and other methodsExplore the wealth of packages contributed by the R communityBecome familiar with the lattice graphics package for high-level data visualizationLearn about bioinformatics packages provided by Bioconductor"I am excited about this book. R in a Nutshell is a great introduction to R, as well as a comprehensive reference for using R in data analytics and visualization. Adler provides 'real world' examples, practical advice, and scripts, making it accessible to anyone working with data, not just professional statisticians."
Getting Started with Raspberry Pi
Matt Richardson - 2012
Take advantage of several preloaded programming languages. Use the Raspberry Pi with Arduino. Create Internet-connected projects. Play with multimedia. With Raspberry Pi, you can do all of this and more.Get acquainted with hardware features on the Pi’s boardLearn enough Linux to move around the operating systemPick up the basics of Python and Scratch—and start programmingDraw graphics, play sounds, and handle mouse events with the Pygame frameworkUse the Pi’s input and output pins to do some hardware hackingDiscover how Arduino and the Raspberry Pi complement each otherIntegrate USB webcams and other peripherals into your projectsCreate your own Pi-based web server with Python
Daughters of Blessing
Lauraine Snelling - 2008
Contains A Promise for Ellie, Sophie's Dilemma, A Touch of Grace, and Rebecca's Reward.
The DI Tremayne Thriller Series: Books 1 - 6: The Complete Series
Phillip Strang - 2018
Six Edge of Your Seat Thrillers. Six Books at a Discounted Price.
Death Unholy (Book 1) - All that remained were the man’s two legs and a chair full of greasy and fetid ash. Little did DI Keith Tremayne know that it was the beginning of a trip into the murky world of paganism and its ancient rituals.
‘Do you believe in spontaneous human combustion?’ Inspector Tremayne asked his sergeant, Clare Yarwood.
Death and the Assassin’s Blade (Book 2) - It was meant to be high drama, not murder, but someone’s switched the daggers. The man’s death, in plain view of two serving police officers.
A summer’s night, a production of Julius Caesar among the ruins of an Anglo-Saxon fort. The assassination scene, the man collapses to the ground, Brutus defending his actions, Mark Antony’s rebuke. Death and the Lucky Man (Book 3) - Sixty-eight million pounds and DEAD! Someone had once told Detective Inspector Keith Tremayne that some people were lucky and some weren’t. Tremayne knew only one thing: the man lying dead in a pool of blood had qualified on the lucky after winning the lottery, but now his luck had run out. Death at Coombe Farm (Book 4) – A warring family. A disputed inheritance. A recipe for death! If it hadn’t been for the circumstances, Detective Inspector Keith Tremayne would have said the view was outstanding. Up high, overlooking the farmhouse in the valley below, the panoramic vista of Salisbury Plain stretching out beyond. The only problem was that near where he stood with his sergeant, Clare Yarwood, there was a body, and it wasn’t a pleasant sight. Tremayne had never been keen on farms, and especially horses, although Clare loved them. Tremayne assumed she wouldn’t be so fond of the one that trampled Claude Selwood to death. Death by a Dead Man’s Hand (Book 5) - A murdered brother. A missing treasure trove of stolen gold bars. A family dying in the hunt for it.! Ethan Mitchell knew the exact amount of time since his arrest for murder: eighteen years, five months and three days. After so long in prison, many things confused him on his release, but one thing he was sure of was that people do not come back from the dead. However, one month before his release from prison for the murder of a man, he had received a letter. It had only two sentences. Time will not save you. St Mark’s Church, three in the afternoon, the first Wednesday after your release. He had recognised the writing. After all, hadn’t they grown up together. The signature was unmistakable: it was his brother Martin’s. But that’s not possible, Mitchell thought. I killed him, spent seventeen years in prison for his murder. A voice echoed through the church; Ethan felt the hairs on the back of his neck stand up. ‘Martin, it can’t be,’ Ethan said. ‘You’re dead. I killed you.’ At ten feet from Ethan the man reached into his right-hand jacket pocket. He levelled the gun that he taken removed and emptied three bullets into Ethan, the noise echoing around the church. Death in the Village (Book 6) - A woman with a venomous tongue, dead and hanging from a beam in her garage! Nobody was sad that the woman was dead, and she’s not the last to die. DI Tremayne sees a pattern developing, which can only mean one thing – more deaths.
Real Ghost Stories: Disturbing Paranormal Stories Based On True Events
Eve S. Evans - 2019
Learn more in The Collector.Some things seem ordinary to the naked eye, but sometimes a camera catches things invisible to the naked eye. This one will give you chills in It's Only A Photo.
BWWM Club
J.A. Fielding - 2015
In this book you get 6 classic BWWM stories in 1 - that's 828 pages of interracial goodness! All of the books in this bundle can be enjoyed as stand alone stories. That said, all have further parts in the series, so if you like one more than the rest you can pick up more books with the same characters when you're ready. Books in this collection are: 1. My Russian Dream: When she woke that morning, the last thing Sophie expected was to not only meet the man of her dreams, but to enter into a fast moving whirlwind romance with a mysterious Russian billionaire. Will it all be too much for Sophie? Or will this be her dream playing out like she's always felt she deserved? 2. Passion Abroad: Have you ever felt like you just need to get away from it all? Well that's exactly how Erica feels, and she's going to do something about it! The tale of a holiday romance which turns into a round the world trip with a passionate and loving new partner. 3. Home Is Where The Heart Is: When a handsome English billionaire is looking for homes to add to his portfolio, Julie is assigned the job of helping him out. But will this billionaire have another reason for his interest in her? 4. Find Me Online: After filtering through a ton of pervs on a popular interracial dating site, Cherelle finally finds someone who catches her eye. But is there more to her catch Michael than she originally realizes? And will he be the man she is looking for? 5. Is Mr White Mr Right: One of the original BWWM books, and largely held as a classic in the genre. Natasha Black is a strong African American woman, who has always been career focused and level headed. Nothing has ever been able to knock her off her game... until now! Enter 'McDreamy', the hunk of a boss at her new dream job. Will she be able to stay career focused while getting advances from possibly the man of her dreams? 6. My Billionaire Cowboy: What does a fashion stylist and a fashionably challenged cowboy have in common?! You're about to find out... Kate is the proud owner of her own fashion boutique. Bruce is a successful business man who now spends his time on his passion: working his ranch. When fate brings these two opposites together, there's no denying there's something there. But is Kate at a point in her life where she is willing to throw caution to the wind and allow herself to be swept off of her feet by an unexpected love? Authors of these books: J A Fielding, Esther Banks and Cher Etan; all authors from Saucy Romance Books. To see more great stories by us, simply search BWWM Club on Amazon Kindle. Suitable for over 18s only due to all stories having scenes of a sexual nature.
Hacking the Xbox: An Introduction to Reverse Engineering
Andrew Huang - 2003
The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.
Unauthorised Access: Physical Penetration Testing for IT Security Teams
Wil Allsopp - 2009
IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.