This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of highrisk physical trespassing: the original "hacking." Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons - and the trespassing and social engineering talents she had developed while "hacking" at MIT. The company tested its clients' security by every means possible - not just coding, but donning disguises and sneaking past guards and secretaries into the Csuite. Alien now runs a boutique hacking outfit that caters to some of the world's biggest and most vulnerable institutions - banks, retailers, government agencies. Her work combines devilish charm, oldschool deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, characterdriven, pacey treatment it deserves.
Eamon Dolan/Houghton Mifflin Harcourt
|
9780544903210
|
Hardcover
Verified
By Caulfield, Mike
An indispensable guide for telling fact from fiction on the internet - often in less than 30 seconds.. The internet brings information to our fingertips almost instantly. The result is that we often jump to thinking too fast, without taking a few moments to verify the source before engaging with a claim or viral piece of media. Information literacy expert Mike Caulfield and educational researcher Sam Wineburg are here to enable us to take a moment for due diligence with this informative, approachable guide to the internet. With this illustrated tool kit, you will learn to identify red flags, get quick context, and make better use of common websites like Google and Wikipedia that can help and hinder in equal measure. This how-to guide will teach you how to use the web to verify the web, quickly and efficiently, including how to * Verify news stories and other events in as little as thirty seconds (seriously) * Determine if the article you're citing is by a reputable scholar or a quack * Detect the slippery tactics scammers use to make their sites look credible * Decide in a minute if that shocking video is truly shocking * Deduce who's behind a site - even when its ownership is cleverly disguised * Uncover if that feature story is actually a piece planted by a foreign government * Use Wikipedia wisely to gain a foothold on new topics and leads for digging deeper.
University of Chicago Press
|
9780226822068
|
First Edition
Sandworm
By Greenberg, Andy
From Wired senior writer Andy Greenberg comes the true story of the desperate hunt to identify and track an elite team of Russian agents bent on digital sabotageIn 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses--from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage--the largest, most devastating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the line between digital and physical conflict, between wartime and peacetime, have begun to blur--with world-shaking implications.
Doubleday
|
9780385544405
|
Hardcover
HTML and CSS
By Duckett, Jon
A full-color introduction to the basics of HTML and CSS from the publishers of Wrox! Every day, more and more people want to learn some HTML and CSS. Joining the professional web designers and programmers are new audiences who need to know a little bit of code at work update a content management system or e-commerce store and those who want to make their personal blogs more attractive. Many books teaching HTML and CSS are dry and only written for those who want to become programmers, which is why this book takes an entirely new approach. Introduces HTML and CSS in a way that makes them accessible to everyonehobbyists, students, and professionalsand its full-color throughout Utilizes information graphics and lifestyle photography to explain the topics in a simple way that is engaging Boasts a unique structure that allows you to progress through the chapters from beginning to end or just dip into topics of particular interest at your leisure This educational book is one that you will enjoy picking up, reading, then referring back to.
Wiley; 1 edition
|
9781118871645
|
Print book
Introducing Algorithms in C
By Manelli, Luciano
Study elementary and complex algorithms with clear examples and implementations in C. This book introduces data types (simple and structured) and algorithms with graphical and textual explanations. In the next sections, you'll cover simple and complex standard algorithms with their flowcharts: everything is integrated with explanations and tables to give a step-by-step evolution of the algorithms. The main algorithms are: the sum of three or n numbers in a loop, decimal-to-binary conversion, maximum and minimum search, linear/sequential search, binary search, bubble sort, selection sort, merging of two sorted arrays, reading characters from a file, stack management, and factorial and Fibonacci sequences. The last section of Introducing Algorithms in C is devoted to the introduction of the C language and the implementation of the code, which is connected to the studied algorithms.
Apress
|
9781484256220
|
Paperback
Microsoft Word Made Easy
By Hawkins, Rob
Microsoft Word is an incredible application, feature-rich and easy to use if you know how. It can help with the simplest of jobs, from letters and essays to more complex documents using calculations or images, such as expenses claims and posters. You can even create a web page and make PDFs. Everyone, at home or in almost any job, needs to know how to use this fundamental modern tool, so this timely new book provides information on all the basic capabilities and gives guidance on some of the more advanced techniques. Covering most versions of the software, it features step-by-step guides and clear, accessible text, accompanied by helpful screenshots. This 2017 edition is updated to include Word 2016.
Flame Tree Publishing
|
9781786641762
|
Paperback
The Vagina Bible
By Gunter, Jennifer
Does eating sugar cause yeast infections? Does pubic hair have a function? Should you have a vulvovaginal care regimen? Will your vagina shrivel up if you go without sex? What's the truth about the HPV vaccine? So many important questions, so much convincing, confusing, contradictory misinformation! In this age of click bait, pseudoscience, and celebrity-endorsed products, it's easy to be overwhelmed - whether it's websites, advice from well-meaning friends, uneducated partners, and even healthcare providers. So how do you separate facts from fiction? OB-GYN Jen Gunter, an expert on women's health - and the internet's most popular go-to doc - comes to the rescue with a book that debunks the myths and educates and empowers women. From reproductive health to the impact of antibiotics and probiotics, and the latest trends, including vaginal steaming, vaginal marijuana products, and jade eggs, Gunter takes us on a factual, fun-filled journey.
Citadel
|
9780806539317
|
Paperback
My iPhone
By Miser, Brad
Step-by-step instructions with callouts to iPhone images that show you exactly what to do. Help when you run into iPhone problems or limitations. Tips and Notes to help you get the most from your iPhone. Full-color, step-by-step tasks walk you through getting and keeping your iPhone working just the way you want. The tasks include how to: Connect to the Internet, Bluetooth devices, Wi-Fi networks, and other iPhones, iPod touches, and iPads; take advantage of AirDrop to instantly share with other iOS and Mac users around you Use Siri to get information, write texts and emails, set reminders/appointments, and more just by speaking to your iPhone Customize your iPhone with folders, wallpaper, ringtones, and much more Use iCloud, Exchange, Google, and other cloud services to keep consistent calendar, contact, and other information on all your devices Communicate via phone, FaceTime, conference calls, text, email, and more Make your text messages come alive by adding Digital Touches and effects and sharing photos and video Get the most out of Safari to browse the Web and Mail to manage all of your email from one Inbox Listen to music, use the Wallet to manage boarding passes and loyalty cards; pay for purchases safely and securely with Apple Pay; and use other great iPhone apps Capture and edit photos and video; use great camera features such as burst, timed and time-lapse video, slow-motion video, and Live Photos View your photos in memories and use them for wallpaper and for your contacts or share them via email, AirDrop, or texts; use iCloud to automatically save and share your photos Find, download, install, and use awesome iPhone apps.
Que Publishing
|
9780789760395
|
Paperback
Cyber Smart
By Mcdonough, Bart R.
An easy-to-read guide to protecting your digital life and your family onlineThe rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from:Identify theftCompromising your childrenLost moneyLost access to email and social media accountsDigital security is one of the most important, and least understood, aspects of our daily lives. But it doesn't have to be. Thanks to its clear instruction, friendly tone, and practical strategies, Cyber Smart will help you rest more easily, knowing you and your family are protected from digital attack.
Wiley
|
9781119559610
|
Paperback
Programming Arduino
By Monk, Simon
An up-to-date Arduino programming guide -- no prior programming experience required!This fully updated guide shows, step by step, how to quickly and easily program all Arduino models using its modified C language and the Arduino IDE. Electronics guru Simon Monk gets you up to speed quickly, teaching all concepts through simple language and clear instruction. Programming Arduino®: Getting Started with Sketches, Third Edition features dozens of easy-to-follow examples and high-quality illustrations. All of the sample sketches featured in the book can be used as is or modified to suit your needs. You will also get all new coverage of using Arduino as a framework for programming other popular boards.Configure your Arduino and start writing sketchesUnderstand the basics of C language and the Arduino IDEAdd functions, arrays, and strings to your sketchesSet up Arduino's digital and analog I/OUse Arduino-compatible boards including ESP32, Pico, and micro:bitWork with built-in and custom Arduino librariesWrite sketches that store data in EPROM or flash memoryInterface with a wide range of displays, including LCDsConnect to the Internet and configure Arduino as a web serverDevelop interesting and useful programs for the Internet of Things.
Breaking and Entering
By Smith, Jeremy N.
This taut, true thriller dives into a dark world that touches us all, as seen through the brilliant, breakneck career of an extraordinary hacker - a woman known only as Alien. When she arrived at MIT in the 1990s, Alien was quickly drawn to the school's tradition of highrisk physical trespassing: the original "hacking." Within a year, one of her hallmates was dead and two others were arraigned. Alien's adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons - and the trespassing and social engineering talents she had developed while "hacking" at MIT. The company tested its clients' security by every means possible - not just coding, but donning disguises and sneaking past guards and secretaries into the Csuite. Alien now runs a boutique hacking outfit that caters to some of the world's biggest and most vulnerable institutions - banks, retailers, government agencies. Her work combines devilish charm, oldschool deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, characterdriven, pacey treatment it deserves.
Verified
By Caulfield, Mike
An indispensable guide for telling fact from fiction on the internet - often in less than 30 seconds.. The internet brings information to our fingertips almost instantly. The result is that we often jump to thinking too fast, without taking a few moments to verify the source before engaging with a claim or viral piece of media. Information literacy expert Mike Caulfield and educational researcher Sam Wineburg are here to enable us to take a moment for due diligence with this informative, approachable guide to the internet. With this illustrated tool kit, you will learn to identify red flags, get quick context, and make better use of common websites like Google and Wikipedia that can help and hinder in equal measure. This how-to guide will teach you how to use the web to verify the web, quickly and efficiently, including how to * Verify news stories and other events in as little as thirty seconds (seriously) * Determine if the article you're citing is by a reputable scholar or a quack * Detect the slippery tactics scammers use to make their sites look credible * Decide in a minute if that shocking video is truly shocking * Deduce who's behind a site - even when its ownership is cleverly disguised * Uncover if that feature story is actually a piece planted by a foreign government * Use Wikipedia wisely to gain a foothold on new topics and leads for digging deeper.
Sandworm
By Greenberg, Andy
From Wired senior writer Andy Greenberg comes the true story of the desperate hunt to identify and track an elite team of Russian agents bent on digital sabotageIn 2014, the world witnessed the start of a mysterious series of cyberattacks. Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes grew ever more brazen. They culminated in the summer of 2017, when the malware known as NotPetya was unleashed, penetrating, disrupting, and paralyzing some of the world's largest businesses--from drug manufacturers to software developers to shipping companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. Hospitals went dark. NotPetya spread around the world, inflicting an unprecedented ten billion dollars in damage--the largest, most devastating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in history: a group known as Sandworm. Working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.A chilling, globe-spanning detective story, Sandworm considers the danger this force poses to our national security and stability. As the Kremlin's role in foreign government manipulation comes into greater focus, Sandworm exposes the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield. It reveals how the line between digital and physical conflict, between wartime and peacetime, have begun to blur--with world-shaking implications.
HTML and CSS
By Duckett, Jon
A full-color introduction to the basics of HTML and CSS from the publishers of Wrox! Every day, more and more people want to learn some HTML and CSS. Joining the professional web designers and programmers are new audiences who need to know a little bit of code at work update a content management system or e-commerce store and those who want to make their personal blogs more attractive. Many books teaching HTML and CSS are dry and only written for those who want to become programmers, which is why this book takes an entirely new approach. Introduces HTML and CSS in a way that makes them accessible to everyonehobbyists, students, and professionalsand its full-color throughout Utilizes information graphics and lifestyle photography to explain the topics in a simple way that is engaging Boasts a unique structure that allows you to progress through the chapters from beginning to end or just dip into topics of particular interest at your leisure This educational book is one that you will enjoy picking up, reading, then referring back to.
Introducing Algorithms in C
By Manelli, Luciano
Study elementary and complex algorithms with clear examples and implementations in C. This book introduces data types (simple and structured) and algorithms with graphical and textual explanations. In the next sections, you'll cover simple and complex standard algorithms with their flowcharts: everything is integrated with explanations and tables to give a step-by-step evolution of the algorithms. The main algorithms are: the sum of three or n numbers in a loop, decimal-to-binary conversion, maximum and minimum search, linear/sequential search, binary search, bubble sort, selection sort, merging of two sorted arrays, reading characters from a file, stack management, and factorial and Fibonacci sequences. The last section of Introducing Algorithms in C is devoted to the introduction of the C language and the implementation of the code, which is connected to the studied algorithms.
Microsoft Word Made Easy
By Hawkins, Rob
Microsoft Word is an incredible application, feature-rich and easy to use if you know how. It can help with the simplest of jobs, from letters and essays to more complex documents using calculations or images, such as expenses claims and posters. You can even create a web page and make PDFs. Everyone, at home or in almost any job, needs to know how to use this fundamental modern tool, so this timely new book provides information on all the basic capabilities and gives guidance on some of the more advanced techniques. Covering most versions of the software, it features step-by-step guides and clear, accessible text, accompanied by helpful screenshots. This 2017 edition is updated to include Word 2016.
The Vagina Bible
By Gunter, Jennifer
Does eating sugar cause yeast infections? Does pubic hair have a function? Should you have a vulvovaginal care regimen? Will your vagina shrivel up if you go without sex? What's the truth about the HPV vaccine? So many important questions, so much convincing, confusing, contradictory misinformation! In this age of click bait, pseudoscience, and celebrity-endorsed products, it's easy to be overwhelmed - whether it's websites, advice from well-meaning friends, uneducated partners, and even healthcare providers. So how do you separate facts from fiction? OB-GYN Jen Gunter, an expert on women's health - and the internet's most popular go-to doc - comes to the rescue with a book that debunks the myths and educates and empowers women. From reproductive health to the impact of antibiotics and probiotics, and the latest trends, including vaginal steaming, vaginal marijuana products, and jade eggs, Gunter takes us on a factual, fun-filled journey.
My iPhone
By Miser, Brad
Step-by-step instructions with callouts to iPhone images that show you exactly what to do. Help when you run into iPhone problems or limitations. Tips and Notes to help you get the most from your iPhone. Full-color, step-by-step tasks walk you through getting and keeping your iPhone working just the way you want. The tasks include how to: Connect to the Internet, Bluetooth devices, Wi-Fi networks, and other iPhones, iPod touches, and iPads; take advantage of AirDrop to instantly share with other iOS and Mac users around you Use Siri to get information, write texts and emails, set reminders/appointments, and more just by speaking to your iPhone Customize your iPhone with folders, wallpaper, ringtones, and much more Use iCloud, Exchange, Google, and other cloud services to keep consistent calendar, contact, and other information on all your devices Communicate via phone, FaceTime, conference calls, text, email, and more Make your text messages come alive by adding Digital Touches and effects and sharing photos and video Get the most out of Safari to browse the Web and Mail to manage all of your email from one Inbox Listen to music, use the Wallet to manage boarding passes and loyalty cards; pay for purchases safely and securely with Apple Pay; and use other great iPhone apps Capture and edit photos and video; use great camera features such as burst, timed and time-lapse video, slow-motion video, and Live Photos View your photos in memories and use them for wallpaper and for your contacts or share them via email, AirDrop, or texts; use iCloud to automatically save and share your photos Find, download, install, and use awesome iPhone apps.
Cyber Smart
By Mcdonough, Bart R.
An easy-to-read guide to protecting your digital life and your family onlineThe rise of new technologies in our lives, which has taken us from powerful mobile phones to fitness trackers and smart appliances in under a decade, has also raised the need for everyone who uses these to protect themselves from cyber scams and hackers. Every new device and online service you use that improves your life also opens new doors for attackers looking to discover your passwords, banking accounts, personal photos, and anything else you want to keep secret.In Cyber Smart, author Bart McDonough uses his extensive cybersecurity experience speaking at conferences for the FBI, major financial institutions, and other clients to answer the most common question he hears: "How can I protect myself at home, on a personal level, away from the office?" McDonough knows cybersecurity and online privacy are daunting to the average person so Cyber Smart simplifies online good hygiene with five simple "Brilliance in the Basics" habits anyone can learn. With those habits and his careful debunking of common cybersecurity myths you'll be able to protect yourself and your family from:Identify theftCompromising your childrenLost moneyLost access to email and social media accountsDigital security is one of the most important, and least understood, aspects of our daily lives. But it doesn't have to be. Thanks to its clear instruction, friendly tone, and practical strategies, Cyber Smart will help you rest more easily, knowing you and your family are protected from digital attack.
Programming Arduino
By Monk, Simon
An up-to-date Arduino programming guide -- no prior programming experience required!This fully updated guide shows, step by step, how to quickly and easily program all Arduino models using its modified C language and the Arduino IDE. Electronics guru Simon Monk gets you up to speed quickly, teaching all concepts through simple language and clear instruction. Programming Arduino®: Getting Started with Sketches, Third Edition features dozens of easy-to-follow examples and high-quality illustrations. All of the sample sketches featured in the book can be used as is or modified to suit your needs. You will also get all new coverage of using Arduino as a framework for programming other popular boards.Configure your Arduino and start writing sketchesUnderstand the basics of C language and the Arduino IDEAdd functions, arrays, and strings to your sketchesSet up Arduino's digital and analog I/OUse Arduino-compatible boards including ESP32, Pico, and micro:bitWork with built-in and custom Arduino librariesWrite sketches that store data in EPROM or flash memoryInterface with a wide range of displays, including LCDsConnect to the Internet and configure Arduino as a web serverDevelop interesting and useful programs for the Internet of Things.