The Crown of Thorns

Author:

Publisher:Ballantine Books

ISBN:0804139032

Total Pages:400

Viewed:972

GET BOOK

Books Description:

Nominated as one of America’s best-loved novels by PBS’s The Great American Read Six days ago, astronaut Mark Watney became one of the first people to walk on Mars. Now, he's sure he'll be the first person to die there. After a dust storm nearly kills him and forces his crew to evacuate while thinking him dead, Mark finds himself stranded and completely alone with no way to even signal Earth that he’s alive—and even if he could get word out, his supplies would be gone long before a rescue could arrive. Chances are, though, he won't have time to starve to death. The damaged machinery, unforgiving environment, or plain-old "human error" are much more likely to kill him first. But Mark isn't ready to give up yet. Drawing on his ingenuity, his engineering skills—and a relentless, dogged refusal to quit—he steadfastly confronts one seemingly insurmountable obstacle after the next. Will his resourcefulness be enough to overcome the impossible odds against him?

Related Titles:

Getting Started with Adafruit FLORA

Author:Becky Stern,Tyler Cooper

Publisher:Maker Media, Inc.

ISBN:1457183188

Total Pages:112

Viewed:1051

GET BOOK

Books Description:

This book introduces readers to building wearable electronics projects using Adafruit's tiny FLORA board: at 4.4 grams, and only 1.75 inches in diameter, and featuring Arduino compatibility, it's the most beginner-friendly way to create wearable projects. This book shows you how to plan your wearable circuits, sew with electronics, and write programs that run on the FLORA to control the electronics. The FLORA family includes an assortment of sensors, as well as RGB LEDs that let you add lighting to your wearable projects.

Discovering Statistics Using R

Author:Andy Field,Jeremy Miles,Zoë Field

Publisher:SAGE

ISBN:144628915X

Total Pages:992

Viewed:1129

GET BOOK

Books Description:

Lecturers - request an e-inspection copy of this text or contact your local SAGE representative to discuss your course needs. Watch Andy Field's introductory video to Discovering Statistics Using R Keeping the uniquely humorous and self-deprecating style that has made students across the world fall in love with Andy Field's books, Discovering Statistics Using R takes students on a journey of statistical discovery using R, a free, flexible and dynamically changing software tool for data analysis that is becoming increasingly popular across the social and behavioural sciences throughout the world. The journey begins by explaining basic statistical and research concepts before a guided tour of the R software environment. Next you discover the importance of exploring and graphing data, before moving onto statistical tests that are the foundations of the rest of the book (for example correlation and regression). You will then stride confidently into intermediate level analyses such as ANOVA, before ending your journey with advanced techniques such as MANOVA and multilevel models. Although there is enough theory to help you gain the necessary conceptual understanding of what you're doing, the emphasis is on applying what you learn to playful and real-world examples that should make the experience more fun than you might expect. Like its sister textbooks, Discovering Statistics Using R is written in an irreverent style and follows the same ground-breaking structure and pedagogical approach. The core material is augmented by a cast of characters to help the reader on their way, together with hundreds of examples, self-assessment tests to consolidate knowledge, and additional website material for those wanting to learn more. Given this book's accessibility, fun spirit, and use of bizarre real-world research it should be essential for anyone wanting to learn about statistics using the freely-available R software.

Deployment Guide for InfoSphere Guardium

Author:Whei-Jen Chen,Boaz Barkai,Joe M DiPietro,Vladislav Langman,Daniel Perlov,Roy Riah,Yosef Rozenblit,Abdiel Santos,IBM Redbooks

Publisher:IBM Redbooks

ISBN:0738439355

Total Pages:472

Viewed:1216

GET BOOK

Books Description:

IBM® InfoSphere® Guardium® provides the simplest, most robust solution for data security and data privacy by assuring the integrity of trusted information in your data center. InfoSphere Guardium helps you reduce support costs by automating the entire compliance auditing process across heterogeneous environments. InfoSphere Guardium offers a flexible and scalable solution to support varying customer architecture requirements. This IBM Redbooks® publication provides a guide for deploying the Guardium solutions. This book also provides a roadmap process for implementing an InfoSphere Guardium solution that is based on years of experience and best practices that were collected from various Guardium experts. We describe planning, installation, configuration, monitoring, and administrating an InfoSphere Guardium environment. We also describe use cases and how InfoSphere Guardium integrates with other IBM products. The guidance can help you successfully deploy and manage an IBM InfoSphere Guardium system. This book is intended for the system administrators and support staff who are responsible for deploying or supporting an InfoSphere Guardium environment.

Homeland

Author:Cory Doctorow

Publisher:Tor Teen

ISBN:1466805870

Total Pages:400

Viewed:1778

GET BOOK

Books Description:

In Cory Doctorow's wildly successful Little Brother, young Marcus Yallow was arbitrarily detained and brutalized by the government in the wake of a terrorist attack on San Francisco—an experience that led him to become a leader of the whole movement of technologically clued-in teenagers, fighting back against the tyrannical security state. A few years later, California's economy collapses, but Marcus's hacktivist past lands him a job as webmaster for a crusading politician who promises reform. Soon his former nemesis Masha emerges from the political underground to gift him with a thumbdrive containing a Wikileaks-style cable-dump of hard evidence of corporate and governmental perfidy. It's incendiary stuff—and if Masha goes missing, Marcus is supposed to release it to the world. Then Marcus sees Masha being kidnapped by the same government agents who detained and tortured Marcus years earlier. Marcus can leak the archive Masha gave him—but he can't admit to being the leaker, because that will cost his employer the election. He's surrounded by friends who remember what he did a few years ago and regard him as a hacker hero. He can't even attend a demonstration without being dragged onstage and handed a mike. He's not at all sure that just dumping the archive onto the Internet, before he's gone through its millions of words, is the right thing to do. Meanwhile, people are beginning to shadow him, people who look like they're used to inflicting pain until they get the answers they want. Fast-moving, passionate, and as current as next week, Homeland is every bit the equal of Little Brother—a paean to activism, to courage, to the drive to make the world a better place. At the Publisher's request, this title is being sold without Digital Rights Management Software (DRM) applied.

The Mueller Report

Author:Robert S. Mueller, III,Special Counsel's Office Dept of Justice

Publisher:Melville House

ISBN:1612197825

Total Pages:768

Viewed:1954

GET BOOK

Books Description:

Perhaps the most anticipated publication in American history, this is the full text, Volumes 1 and 2, of special counsel Robert Mueller's investigation. It is THE REPORT AND NOTHING BUT THE REPORT, in a beautifully typeset edition, with full searchability in ebook formats. It is, word for word, presented exactly as released by the Attorney General of the United States, with no positioning -- such as a celebrity introduction -- that would give it bias or impede its clarity. One of the most-talked-about investigations in American history, the subject of constant media discussion and speculation, non-stop and controversial attacks from the president, and the eager anticipation of a public wondering what the truth is, this long-awaited publication is an historic event. The Mueller Report continues Melville House's "tradition of publishing pivotal public documents."—The New York Times

Practical Mobile Forensics

Author:Satish Bommisetty,Rohit Tamma,Heather Mahalik

Publisher:Packt Publishing Ltd

ISBN:1783288329

Total Pages:328

Viewed:1056

GET BOOK

Books Description:

The book is an easy-to-follow guide with clear instructions on various mobile forensic techniques. The chapters and the topics within are structured for a smooth learning curve, which will swiftly empower you to master mobile forensics. If you are a budding forensic analyst, consultant, engineer, or a forensic professional wanting to expand your skillset, this is the book for you. The book will also be beneficial to those with an interest in mobile forensics or wanting to find data lost on mobile devices. It will be helpful to be familiar with forensics in general but no prior experience is required to follow this book.

Firewalls Don't Stop Dragons

Author:Carey Parker

Publisher:Apress

ISBN:1484238524

Total Pages:400

Viewed:1959

GET BOOK

Books Description:

Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats. Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen. Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes: Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra Expanded coverage on mobile device safety Expanded coverage on safety for kids online More than 150 tips with complete step-by-step instructions and pictures What You’ll Learn Solve your password problems once and for all Browse the web safely and with confidence Block online tracking and dangerous ads Choose the right antivirus software for you Send files and messages securely Set up secure home networking Conduct secure shopping and banking online Lock down social media accounts Create automated backups of all your devices Manage your home computers Use your smartphone and tablet safely Safeguard your kids online And more! Who This Book Is For Those who use computers and mobile devices, but don’t really know (or frankly care) how they work. This book is for people who just want to know what they need to do to protect themselves—step by step, without judgment, and with as little jargon as possible.

IBM Power Systems HMC Implementation and Usage Guide

Author:Scott Vetter,Sylvain Delabarre,Sorin Hanganu,Thomas Libor PhD,IBM Redbooks

Publisher:IBM Redbooks

ISBN:0738441554

Total Pages:622

Viewed:959

GET BOOK

Books Description:

The IBM® Hardware Management Console (HMC) provides to systems administrators a tool for planning, deploying, and managing IBM Power SystemsTM servers. This IBM Redbooks® publication is an extension of IBM Power Systems HMC Implementation and Usage Guide, SG24-7491 and also merges updated information from IBM Power Systems Hardware Management Console: Version 8 Release 8.1.0 Enhancements, SG24-8232. It explains the new features of IBM Power Systems Hardware Management Console Version V8.8.1.0 through V8.8.4.0. The major functions that the HMC provides are Power Systems server hardware management and virtualization (partition) management. Further information about virtualization management is in the following publications: IBM PowerVM Virtualization Managing and Monitoring, SG24-7590 IBM PowerVM Virtualization Introduction and Configuration, SG24-7940 IBM PowerVM Enhancements What is New in 2013, SG24-8198 IBM Power Systems SR-IOV: Technical Overview and Introduction, REDP-5065 The following features of HMC V8.8.1.0 through HMC V8.8.4.0 are described in this book: HMC V8.8.1.0 enhancements HMC V8.8.4.0 enhancements System and Partition Templates HMC and IBM PowerVM® Simplification Enhancement Manage Partition Enhancement Performance and Capacity Monitoring HMC V8.8.4.0 upgrade changes

Penetration Testing

Author:Georgia Weidman

Publisher:No Starch Press

ISBN:1593275951

Total Pages:528

Viewed:1281

GET BOOK

Books Description:

Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: –Crack passwords and wireless network keys with brute-forcing and wordlists –Test web applications for vulnerabilities –Use the Metasploit Framework to launch exploits and write your own Metasploit modules –Automate social-engineering attacks –Bypass antivirus software –Turn access to one machine into total control of the enterprise in the post exploitation phase You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

Automate the Boring Stuff with Python, 2nd Edition

Author:Al Sweigart

Publisher:No Starch Press

ISBN:1593279930

Total Pages:592

Viewed:1869

GET BOOK

Books Description:

The second edition of this best-selling Python book (over 500,000 copies sold!) uses Python 3 to teach even the technically uninclined how to write programs that do in minutes what would take hours to do by hand. There is no prior programming experience required and the book is loved by liberal arts majors and geeks alike. If you've ever spent hours renaming files or updating hundreds of spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you? In this fully revised second edition of the best-selling classic Automate the Boring Stuff with Python, you'll learn how to use Python to write programs that do in minutes what would take you hours to do by hand--no prior programming experience required. You'll learn the basics of Python and explore Python's rich library of modules for performing specific tasks, like scraping data off websites, reading PDF and Word documents, and automating clicking and typing tasks. The second edition of this international fan favorite includes a brand-new chapter on input validation, as well as tutorials on automating Gmail and Google Sheets, plus tips on automatically updating CSV files. You'll learn how to create programs that effortlessly perform useful feats of automation to: • Search for text in a file or across multiple files • Create, update, move, and rename files and folders • Search the Web and download online content • Update and format data in Excel spreadsheets of any size • Split, merge, watermark, and encrypt PDFs • Send email responses and text notifications • Fill out online forms Step-by-step instructions walk you through each program, and updated practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks. Don't spend your time doing work a well-trained monkey could do. Even if you've never written a line of code, you can make your computer do the grunt work. Learn how in Automate the Boring Stuff with Python, 2nd Edition.

CompTIA Network+ N10-007 Cert Guide

Author:Anthony J. Sequeira

Publisher:Pearson IT Certification

ISBN:0134861116

Total Pages:656

Viewed:1890

GET BOOK

Books Description:

This is the eBook version of the print title. Note that only the Amazon Kindle version or the Premium Edition eBook and Practice Test available on the Pearson IT Certification web site come with the unique access code that allows you to use the practice test software that accompanies this book. All other eBook versions do not provide access to the practice test software that accompanies the print book. Access to the companion web site is available through product registration at Pearson IT Certification; or see instructions in back pages of your eBook. Learn, prepare, and practice for CompTIA Network+ N10-007 exam success with this CompTIA approved Cert Guide from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. Master CompTIA Network+ N10-007 exam topics Assess your knowledge with chapter-ending quizzes Review key concepts with exam preparation tasks Practice with realistic exam questions Learn from more than 60 minutes of video mentoring CompTIA Network+ N10-007 Cert Guide is a best-of-breed exam study guide. Best-selling author and expert instructor Anthony Sequeira shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The companion website contains a host of tools to help you prepare for the exam, including: The powerful Pearson Test Prep practice test software, complete with hundreds of exam-realistic questions. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. More than 60 minutes of personal video mentoring 40 performance-based exercises to help you prepare for the performance-based questions on the exam The CompTIA Network+ N10-007 Hands-on Lab Simulator Lite software, complete with meaningful exercises that help you hone your hands-on skills An interactive Exam Essentials appendix that quickly recaps all major chapter topics for easy reference A key terms glossary flash card application Memory table review exercises and answers A study planner to help you organize and optimize your study time A 10% exam discount voucher (a $27 value!) Well-regarded for its level of detail, assessment features, and challenging review questions and exercises, this CompTIA approved study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time. The CompTIA approved study guide helps you master all the topics on the Network+ exam, including: Computer networks and the OSI model Network components Ethernet IP addressing Routing traffic Wide Area Networks (WANs) Wireless Technologies Network performance Command-line utilities Network management Network policies and best practices Network security Troubleshooting Pearson Test Prep system requirements: Online: Browsers: Chrome version 40 and above; Firefox version 35 and above; Safari version 7; Internet Explorer 10, 11; Microsoft Edge; Opera. Devices: Desktop and laptop computers, tablets running on Android and iOS, smartphones with a minimum screen size of 4.7". Internet access required. Offline: Windows 10, Windows 8.1, Windows 7; Microsoft .NET Framework 4.5 Client; Pentium-class 1 GHz processor (or equivalent); 512 MB RAM; 650 MB disk space plus 50 MB for each downloaded practice exam; access to the Internet to register and download exam databases Lab Simulator Minimum System Requirements: Windows: Microsoft Windows 10, Windows 8.1, Windows 7 with SP1; Intel Pentium III or faster; 512 MB RAM (1GB recommended); 1.5 GB hard disk space; 32-bit color depth at 1024x768 resolution Mac: Apple macOS 10.13, 10.12, 10.11, 10.10; Intel Core Duo 1.83 Ghz or faster; 512 MB RAM (1 GB recommended); 1.5 GB hard disk space; 32-bit color depth at 1024x768 resolution Other applications installed during installation: Adobe AIR 3.8; Captive JRE 6

Demystifying Internet of Things Security

Author:Sunil Cheruvu,Anil Kumar,Ned Smith,David M. Wheeler

Publisher:Apress

ISBN:1484228960

Total Pages:488

Viewed:1486

GET BOOK

Books Description:

Break down the misconceptions of the Internet of Things by examining the different security building blocks available in Intel Architecture (IA) based IoT platforms. This open access book reviews the threat pyramid, secure boot, chain of trust, and the SW stack leading up to defense-in-depth. The IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities to simplify it. This book explores the challenges to secure these devices to make them immune to different threats originating from within and outside the network. The requirements and robustness rules to protect the assets vary greatly and there is no single blanket solution approach to implement security. Demystifying Internet of Things Security provides clarity to industry professionals and provides and overview of different security solutions What You'll Learn Secure devices, immunizing them against different threats originating from inside and outside the networkGather an overview of the different security building blocks available in Intel Architecture (IA) based IoT platformsUnderstand the threat pyramid, secure boot, chain of trust, and the software stack leading up to defense-in-depth Who This Book Is For Strategists, developers, architects, and managers in the embedded and Internet of Things (IoT) space trying to understand and implement the security in the IoT devices/platforms.

Introduction to the New Mainframe: z/VM Basics

Author:Lydia Parziale,Edi Lopes Alves,Klaus Egeler,Clive Jordan,Jason Herne,Eli M Dow,Eravimangalath P Naveen,Manoj S Pattabhiraman,Kyle Smith,IBM Redbooks

Publisher:IBM Redbooks

ISBN:0738488550

Total Pages:457

Viewed:563

GET BOOK

Books Description:

This textbook provides students with the background knowledge and skills necessary to begin using the basic functions and features of z/VM Version 5, Release 3. It is part of a series of textbooks designed to introduce students to mainframe concepts and help prepare them for a career in large systems computing. For optimal learning, students are assumed to be literate in personal computing and have some computer science or information systems background. Others who will benefit from this textbook include z/OS professionals who would like to expand their knowledge of other aspects of the mainframe computing environment. This course can be used as a prerequisite to understanding Linux on System z. After reading this textbook and working through the exercises, the student will have received a basic understanding of the following topics: The Series z Hardware concept and the history of the mainframe Virtualization technology in general and how it is exploited by z/VM Operating systems that can run as guest systems under z/VM z/VM components The z/VM control program and commands The interactive environment under z/VM, CMS and its commands z/VM planning and administration Implementing the networking capabilities of z/VM Tools to monitor the performance of z/VM systems and guest operating systems The REXX programming language and CMS pipelines Security issues when running z/VM

Implementing the IBM Storwize

Author:Jon Tate,Adam Lyon-Jones,Lee Sirett,Chris Tapsell,Paulo Tomiyoshi Takeda,IBM Redbooks

Publisher:IBM Redbooks

ISBN:0738440361

Total Pages:692

Viewed:459

GET BOOK

Books Description:

Organizations of all sizes are faced with the challenge of managing massive volumes of increasingly valuable data. However, storing this data can be costly, and extracting value from the data is becoming more and more difficult. IT organizations have limited resources, but must stay responsive to dynamic environments and act quickly to consolidate, simplify, and optimize their IT infrastructures. The IBM® Storwize® V3700 system provides a solution that is affordable, easy to use, and self-optimizing, which enables organizations to overcome these storage challenges. Storwize V3700 delivers efficient, entry-level configurations that are specifically designed to meet the needs of small and midsize businesses. Designed to provide organizations with the ability to consolidate and share data at an affordable price, Storwize V3700 offers advanced software capabilities that are usually found in more expensive systems. Built on innovative IBM technology, Storwize V3700 addresses the block storage requirements of small and midsize organizations, Storwize V3700 is designed to accommodate the most common storage network technologies. This design enables easy implementation and management. Storwize V3700 includes the following features: Web-based GUI provides point-and-click management capabilities. Internal disk storage virtualization enables rapid, flexible provisioning and simple configuration changes. Thin provisioning enables applications to grow dynamically, but only use space they actually need. Enables simple data migration from external storage to Storwize V3700 storage (one-way from another storage device). Remote Mirror creates copies of data at remote locations for disaster recovery. IBM FlashCopy® creates instant application copies for backup or application testing. This IBM Redbooks® publication is intended for pre-sales and post-sales technical support professionals and storage administrators. The concepts in this book also relate to the IBM Storwize V3500. This book was written at a software level of version 7 release 4.