Browse Results

Showing 30,001 through 30,025 of 53,657 results

Blender Master Class: A Hands-On Guide to Modeling, Sculpting, Materials, and Rendering

by Ben Simonds

Blender is a powerful and free 3D graphics tool used by artists and designers worldwide. But even experienced designers can find it challenging to turn an idea into a polished piece.For those who have struggled to create professional-quality projects in Blender, author Ben Simonds offers this peek inside his studio. You’ll learn how to create 3D models as you explore the creative process that he uses to model three example projects: a muscular bat creature, a futuristic robotic spider, and ancient temple ruins. Along the way, you’ll master the Blender interface and learn how to create and refine your own models.You’ll also learn how to:–Work with reference and concept art in Blender and GIMP to make starting projects easier–Block in models with simple geometry and build up more complex forms–Use Blender’s powerful sculpting brushes to create detailed organic models–Paint textures with Blender and GIMP and map them onto your 3D artwork–Light, render, and composite your models to create striking imagesEach chapter walks you through a piece of the modeling process and offers detailed explanations of the tools and concepts used. Filled with full-color artwork and real-world tips, Blender Master Class gives you the foundation you need to create your own stunning masterpieces.DVD includes files for each project in the book, as well as extra textures, brushes, and other resources.Covers Blender 2.6x

The Practice of Network Security Monitoring: Understanding Incident Detection and Response

by Richard Bejtlich

Network security is not simply about building impenetrable walls -- determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions. In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks -- no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. You'll learn how to: Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.

Learn You Some Erlang for Great Good!: A Beginner's Guide

by Fred Hebert

Erlang is the language of choice for programmers who want to write robust, concurrent applications, but its strange syntax and functional design can intimidate the uninitiated. Luckily, there’s a new weapon in the battle against Erlang-phobia: Learn You Some Erlang for Great Good!Erlang maestro Fred Hébert starts slow and eases you into the basics: You’ll learn about Erlang’s unorthodox syntax, its data structures, its type system (or lack thereof!), and basic functional programming techniques. Once you’ve wrapped your head around the simple stuff, you’ll tackle the real meat-and-potatoes of the language: concurrency, distributed computing, hot code loading, and all the other dark magic that makes Erlang such a hot topic among today’s savvy developers.As you dive into Erlang’s functional fantasy world, you’ll learn about:–Testing your applications with EUnit and Common Test–Building and releasing your applications with the OTP framework–Passing messages, raising errors, and starting/stopping processes over many nodes–Storing and retrieving data using Mnesia and ETS–Network programming with TCP, UDP, and the inet module–The simple joys and potential pitfalls of writing distributed, concurrent applicationsPacked with lighthearted illustrations and just the right mix of offbeat and practical example programs, Learn You Some Erlang for Great Good! is the perfect entry point into the sometimes-crazy, always-thrilling world of Erlang.

The Book of GIMP: A Complete Guide to Nearly Everything

by Karine Delvare Olivier Lecarme

GIMP is a free alternative to Adobe Photoshop with tons of professional-grade features. But with so many powerful tools and menu options, GIMP can be difficult to master. Whether you're struggling to get started or trying to master some of GIMP's more complex features, you'll find the answers you're looking for in The Book of GIMP.The tutorials in the first half of the book walk you through essential GIMP skills, like resizing and cropping images, touching up spots and scratches, and customizing your work area. Illustrated, step-by-step instructions show you how to:–Improve the lighting and composition of images–Remove distortions and noise to make old and damaged photos look like new–Create stunning panoramas and digital collages using a series of photos–Make, edit, and export custom textures, logos, and animated GIFs–Work with selections, channels, and masks to edit images like a pro–Create colorful digital art, layer by layerThe book's second half offers a comprehensive reference to GIMP's many features, including color balancing, masks, filters, and plug-ins. You'll find tools described in unparalleled detail, with coverage of nearly every option and parameter.With illustrated tutorials and detailed references, The Book of GIMP is sure to become your one-stop guide to just about everything GIMP.

Python for Kids: A Playful Introduction To Programming

by Jason Briggs

Python is a powerful, expressive programming language that’s easy to learn and fun to use! But books about learning to program in Python can be kind of dull, gray, and boring, and that’s no fun for anyone.Python for Kids brings Python to life and brings you (and your parents) into the world of programming. The ever-patient Jason R. Briggs will guide you through the basics as you experiment with unique (and often hilarious) example programs that feature ravenous monsters, secret agents, thieving ravens, and more. New terms are defined; code is colored, dissected, and explained; and quirky, full-color illustrations keep things on the lighter side.Chapters end with programming puzzles designed to stretch your brain and strengthen your understanding. By the end of the book you’ll have programmed two complete games: a clone of the famous Pong and "Mr. Stick Man Races for the Exit"—a platform game with jumps, animation, and much more.As you strike out on your programming adventure, you’ll learn how to:–Use fundamental data structures like lists, tuples, and maps–Organize and reuse your code with functions and modules–Use control structures like loops and conditional statements–Draw shapes and patterns with Python’s turtle module–Create games, animations, and other graphical wonders with tkinterWhy should serious adults have all the fun? Python for Kids is your ticket into the amazing world of computer programming.For kids ages 10+ (and their parents)The code in this book runs on almost anything: Windows, Mac, Linux, even an OLPC laptop or Raspberry Pi!

Realm of Racket: Learn to Program, One Game at a Time!

by Conrad Barski David Van Horn Matthias Felleisen Northeastern University Students

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language.In Realm of Racket, you'll learn to program by creating increasingly complex games. Your journey begins with the Guess My Number game and coverage of some basic Racket etiquette. Next you'll dig into syntax and semantics, lists, structures, and conditionals, and learn to work with recursion and the GUI as you build the Robot Snake game. After that it's on to lambda and mutant structs (and an Orc Battle), and fancy loops and the Dice of Doom. Finally, you'll explore laziness, AI, distributed games, and the Hungry Henry game.As you progress through the games, chapter checkpoints and challenges help reinforce what you've learned. Offbeat comics keep things fun along the way.As you travel through the Racket realm, you'll:–Master the quirks of Racket's syntax and semantics–Learn to write concise and elegant functional programs–Create a graphical user interface using the 2htdp/image library–Create a server to handle true multiplayer gamesRealm of Racket is a lighthearted guide to some serious programming. Read it to see why Racketeers have so much fun!

The Modern Web

by Peter Gasston

Today’s web technologies are evolving at near–light speed, bringing the promise of a seamless Internet ever closer to reality. When users can browse the Web on a three-inch phone screen as easily as on a fifty-inch HDTV, what’s a developer to do?Peter Gasston’s The Modern Web will guide you through the latest and most important tools of device-agnostic web development, including HTML5, CSS3, and JavaScript. His plain-English explanations and practical examples emphasize the techniques, principles, and practices that you’ll need to easily transcend individual browser quirks and stay relevant as these technologies are updated.Learn how to:–Plan your content so that it displays fluidly across multiple devices–Design websites to interact with devices using the most up-to-date APIs, including Geolocation, Orientation, and Web Storage–Incorporate cross-platform audio and video without using troublesome plug-ins–Make images and graphics scalable on high-resolution devices with SVG–Use powerful HTML5 elements to design better formsTurn outdated websites into flexible, user-friendly ones that take full advantage of the unique capabilities of any device or browser. With the help of The Modern Web, you’ll be ready to navigate the front lines of device-independent development.

The Modern Web: Multi-Device Web Development with HTML5, CSS3, and Javascript

by Peter Gasston

A Guide to Modern Web Development: Today's web technologies are evolving at near-light speed, bringing the promise of a seamless Internet ever closer to reality. When users can browse the Web on a three-inch phone screen as easily as on a fifty-inch HDTV, whats a developer to do? Peter Gasston's "The Modern Web" will guide you through the latest and most important tools of device-agnostic web development, including HTML5, CSS3, and JavaScript. His plain-English explanations and practical examples emphasize the techniques, principles, and practices that you'll need to easily transcend individual browser quirks and stay relevant as these technologies are updated.

Think Like a Programmer: An Introduction to Creative Problem Solving

by V. Anton Spraul

The real challenge of programming isn't learning a language's syntax—it's learning to creatively solve problems so you can build something great. In this one-of-a-kind text, author V. Anton Spraul breaks down the ways that programmers solve problems and teaches you what other introductory books often ignore: how to Think Like a Programmer. Each chapter tackles a single programming concept, like classes, pointers, and recursion, and open-ended exercises throughout challenge you to apply your knowledge.You'll also learn how to:–Split problems into discrete components to make them easier to solve–Make the most of code reuse with functions, classes, and libraries–Pick the perfect data structure for a particular job–Master more advanced programming tools like recursion and dynamic memory–Organize your thoughts and develop strategies to tackle particular types of problemsAlthough the book's examples are written in C++, the creative problem-solving concepts they illustrate go beyond any particular language; in fact, they often reach outside the realm of computer science. As the most skillful programmers know, writing great code is a creative art—and the first step in creating your masterpiece is learning to Think Like a Programmer.

The Artist's Guide to GIMP, 2nd Edition: Creative Techniques for Photographers, Artists, and Designers

by Michael Hammel

As a full-featured, free alternative to Adobe Photoshop, GIMP is one of the world's most popular open source projects. The latest version of GIMP (2.8) brings long-awaited improvements and powerful new tools to make graphic design and photo manipulation even easier—but it's still a notoriously challenging program to use.The Artist's Guide to GIMP teaches you how to use GIMP without a tedious list of menu paths and options. Instead, as you follow along with Michael J. Hammel's step-by-step instructions, you'll learn to produce professional-looking advertisements, apply impressive photographic effects, and design cool logos and text effects. These extensively illustrated tutorials are perfect for hands-on learning or as templates for your own artistic experiments.After a crash course in GIMP's core tools like brushes, patterns, selections, layers, modes, and masks, you'll learn:–Photographic techniques to clean up blemishes and dust, create sepia-toned antique images, swap colors, produce motion blurs, alter depth of field, simulate a tilt-shift, and fix rips in an old photo–Web design techniques to create navigation tabs, icons, fancy buttons, backgrounds, and borders–Type effects to create depth, perspective shadows, metallic and distressed text, and neon and graffiti lettering–Advertising effects to produce movie posters and package designs; simulate clouds, cracks, cloth, and underwater effects; and create specialized lightingWhether you're new to GIMP or you've been playing with this powerful software for years, you'll be inspired by the original art, creative photo manipulations, and numerous tips for designers.Covers GIMP 2.8

FreeBSD Device Drivers: A Guide for the Intrepid

by Joseph Kong

<P>Device drivers make it possible for your software to communicate with your hardware, and because every operating system has specific requirements, driver writing is nontrivial. When developing for FreeBSD, you've probably had to scour the Internet and dig through the kernel sources to figure out how to write the drivers you need. Thankfully, that stops now. In FreeBSD Device Drivers, Joseph Kong will teach you how to master everything from the basics of building and running loadable kernel modules to more complicated topics like thread synchronization. <P>After a crash course in the different FreeBSD driver frameworks, extensive tutorial sections dissect real-world drivers like the parallel port printer driver. <P>You'll learn: <br>–All about Newbus, the infrastructure used by FreeBSD to manage the hardware devices on your system <br>–How to work with ISA, PCI, USB, and other buses–The best ways to control and communicate with the hardware devices from user space <br>–How to use Direct Memory Access (DMA) for maximum system performance <br>–The inner workings of the virtual null modem terminal driver, the USB printer driver, the Intel PCI Gigabit Ethernet adapter driver, and other important drivers <br>–How to use Common Access Method (CAM) to manage host bus adapters (HBAs)Concise descriptions and extensive annotations walk you through the many code examples. Don't waste time searching man pages or digging through the kernel sources to figure out how to make that arcane bit of hardware work with your system. FreeBSD Device Drivers gives you the framework that you need to write any driver you want, now.

Webbots, Spiders, and Screen Scrapers, 2nd Edition

by Michael Schrenk

There's a wealth of data online, but sorting and gathering it by hand can be tedious and time consuming. Rather than click through page after endless page, why not let bots do the work for you?Webbots, Spiders, and Screen Scrapers will show you how to create simple programs with PHP/CURL to mine, parse, and archive online data to help you make informed decisions. Michael Schrenk, a highly regarded webbot developer, teaches you how to develop fault-tolerant designs, how best to launch and schedule the work of your bots, and how to create Internet agents that:–Send email or SMS notifications to alert you to new information quickly–Search different data sources and combine the results on one page, making the data easier to interpret and analyze–Automate purchases, auction bids, and other online activities to save timeSample projects for automating tasks like price monitoring and news aggregation will show you how to put the concepts you learn into practice.This second edition of Webbots, Spiders, and Screen Scrapers includes tricks for dealing with sites that are resistant to crawling and scraping, writing stealthy webbots that mimic human search behavior, and using regular expressions to harvest specific data. As you discover the possibilities of web scraping, you'll see how webbots can save you precious time and give you much greater control over the data available on the Web.

Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software

by Michael Sikorski Andrew Honig

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:–Set up a safe virtual environment to analyze malware–Quickly extract network signatures and host-based indicators–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques–Use your newfound knowledge of Windows internals for malware analysis–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers–Analyze special cases of malware with shellcode, C++, and 64-bit codeHands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You&apos;ll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you&apos;re tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

The Linux Command Line: A Complete Introduction

by William E. Shotts

<P>You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line. <P>The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you'll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. <P>In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. <P>As you make your way through the book's short, easily-digestible chapters, you'll learn how to: <br>–Create and delete files, directories, and symlinks <br>–Administer your system, including networking, package installation, and process management <br>–Use standard input and output, redirection, and pipelines <br>–Edit files with Vi, the world’s most popular text editor–Write shell scripts to automate common or boring tasks–Slice and dice text files with cut, paste, grep, patch, and sed <P>Once you overcome your initial "shell shock," you'll find that the command line is a natural and expressive way to communicate with your computer. Just don't be surprised if your mouse starts to gather dust.

The Tangled Web

by Michal Zalewski

<p>In <em>The Tangled Web</em>, Michal Zalewski, one of the world&apos;s top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they&apos;re fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security.</p>

A Bug Hunter's Diary

by Tobias Klein

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime." A Bug Hunter's Diary follows security expert Tobias Klein as he tracks down and exploits bugs in some of the world's most popular software.

The Art of R Programming: A Tour of Statistical Software Design

by Norman Matloff

R is the world's most popular language for developing statistical software: Archaeologists use it to track the spread of ancient civilizations, drug companies use it to discover which medications are safe and effective, and actuaries use it to assess financial risks and keep economies running smoothly.The Art of R Programming takes you on a guided tour of software development with R, from basic types and data structures to advanced topics like closures, recursion, and anonymous functions. No statistical knowledge is required, and your programming skills can range from hobbyist to pro.Along the way, you'll learn about functional and object-oriented programming, running mathematical simulations, and rearranging complex data into simpler, more useful formats. You'll also learn to:–Create artful graphs to visualize complex data sets and functions–Write more efficient code using parallel R and vectorization–Interface R with C/C++ and Python for increased speed or functionality–Find new R packages for text analysis, image manipulation, and more–Squash annoying bugs with advanced debugging techniquesWhether you're designing aircraft, forecasting the weather, or you just need to tame your data, The Art of R Programming is your guide to harnessing the power of statistical computing.

Metasploit

by David Kennedy Devon Kearns Jim O'Gorman Mati Aharoni

<p>The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. <p>Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:–Find and exploit unmaintained, misconfigured, and unpatched systems–Perform reconnaissance and find valuable information about your target–Bypass anti-virus technologies and circumvent security controls–Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery–Use the Meterpreter shell to launch further attacks from inside the network–Harness standalone Metasploit utilities, third-party tools, and plug-ins–Learn how to write your own Meterpreter post exploitation modules and scriptsYou'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

The Book of Ruby: A Hands-On Guide for the Adventurous

by Chris Takemura Huw Collingbourne

Ruby is famous for being easy to learn, but most users only scratch the surface of what it can do. While other books focus on Ruby's trendier features, The Book of Ruby reveals the secret inner workings of one of the world's most popular programming languages, teaching you to write clear, maintainable code.You'll start with the basics—types, data structures, and control flows—and progress to advanced features like blocks, mixins, metaclasses, and beyond. Rather than bog you down with a lot of theory, The Book of Ruby takes a hands-on approach and focuses on making you productive from day one.As you follow along, you’ll learn to:–Leverage Ruby's succinct and flexible syntax to maximize your productivity–Balance Ruby's functional, imperative, and object-oriented features–Write self-modifying programs using dynamic programming techniques–Create new fibers and threads to manage independent processes concurrently–Catch and recover from execution errors with robust exception handling–Develop powerful web applications with the Ruby on Rails frameworkEach chapter includes a "Digging Deeper" section that shows you how Ruby works under the hood, so you'll never be caught off guard by its deceptively simple scoping, multithreading features, or precedence rules.Whether you're new to programming or just new Ruby, The Book of Ruby is your guide to rapid, real-world software development with this unique and elegant language.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler (Second Edition)

by Chris Eagle

<P>No source code? No problem. With IDA Pro, the interactive disassembler, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use. <P>Hailed by the creator of IDA Pro as "profound, comprehensive, and accurate," the second edition of The IDA Pro Book covers everything from the very first steps to advanced automation techniques. You'll find complete coverage of IDA's new Qt-based user interface, as well as increased coverage of the IDA debugger, the Bochs debugger, and IDA scripting (especially using IDAPython). But because humans are still smarter than computers, you'll even learn how to use IDA's latest interactive and scriptable interfaces to your advantage. <P>Save time and effort as you learn to: <br>–Navigate, comment, and modify disassembly <br>–Identify known library routines, so you can focus your analysis on other areas of the code <br>–Use code graphing to quickly make sense of cross references and function calls <br>–Extend IDA to support new processors and filetypes using the SDK <br>–Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more <br>–Use IDA's built-in debugger to tackle hostile and obfuscated code <P>Whether you're analyzing malware, conducting vulnerability research, or reverse engineering software, a mastery of IDA is crucial to your success. Take your skills to the next level with this 2nd edition of The IDA Pro Book.

The Book of CSS3: A Developer's Guide to the Future of Web Design

by Peter Gasston

CSS3 is behind most of the eye-catching visuals on the Web today, but the official documentation can be dry and hard to follow and browser implementations are scattershot at best.The Book of CSS3 distills the dense technical language of the CSS3 specification into plain English and shows you what CSS3 can do right now, in all major browsers. With real-world examples and a focus on the principles of good design, it extends your CSS skills, helping you transform ordinary markup into stunning, richly-styled web pages.You'll master the latest cutting-edge CSS3 features and learn how to:–Stylize text with fully customizable outlines, drop shadows, and other effects–Create, position, and resize background images on the fly– Spice up static web pages with event-driven transitions and animations–Apply 2D and 3D transformations to text and images–Use linear and radial gradients to create smooth color transitions–Tailor a website's appearance to smartphones and other devicesA companion website includes up-to-date browser compatibility charts and live CSS3 examples for you to explore.The Web can be an ugly place—add a little style to it with The Book of CSS3.

The Book of PF, 2nd Edition: A No-Nonsense Guide to the OpenBSD Firewall

by Peter N.M. Hansteen

OpenBSD's stateful packet filter, PF, is the heart of the OpenBSD firewall and a necessity for any admin working in a BSD environment. With a little effort and this book, you'll gain the insight needed to unlock PF's full potential.This second edition of The Book of PF has been completely updated and revised. Based on Peter N.M. Hansteen's popular PF website and conference tutorials, this no-nonsense guide covers NAT and redirection, wireless networking, spam fighting, failover provisioning, logging, and more. Throughout the book, Hansteen emphasizes the importance of staying in control with a written network specification, keeping rule sets readable using macros, and performing rigid testing when loading new rules.The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to:– Create rule sets for all kinds of network traffic, whether it's crossing a simple LAN, hiding behind NAT, traversing DMZs, or spanning bridges or wider networks– Create wireless networks with access points, and lock them down with authpf and special access restrictions– Maximize flexibility and service availability via CARP, relayd, and redirection– Create adaptive firewalls to proactively defend against would-be attackers and spammers– Implement traffic shaping and queues with ALTQ (priq, cbq, or hfsc) to keep your network responsive– Master your logs with monitoring and visualization tools (including NetFlow)The Book of PF is for BSD enthusiasts and network administrators at any skill level. With more and more services placing high demands on bandwidth and an increasingly hostile Internet environment, you can't afford to be without PF expertise.

Land of Lisp: Learn to Program in Lisp, One Game at a Time! (No Starch Press Ser.)

by Conrad Barski

<P>Lisp has been hailed as the world’s most powerful programming language, but its cryptic syntax and academic reputation can be enough to scare off even experienced programmers. Those dark days are finally over—Land of Lisp brings the power of functional programming to the people! <P>With his brilliantly quirky comics and out-of-this-world games, longtime Lisper Conrad Barski teaches you the mysteries of Common Lisp. You’ll start with the basics, like list manipulation, I/O, and recursion, then move on to more complex topics like macros, higher order programming, and domain-specific languages. Then, when your brain overheats, you can kick back with an action-packed comic book interlude! <P>Along the way you’ll create (and play) games like Wizard Adventure, a text adventure with a whiskey-soaked twist, and Grand Theft Wumpus, the most violent version of Hunt the Wumpus the world has ever seen. <P>You'll learn to: <br>–Master the quirks of Lisp’s syntax and semantics <br>–Write concise and elegant functional programs <br>–Use macros, create domain-specific languages, and learn other advanced Lisp techniques <br>–Create your own web server, and use it to play browser-based games <br>–Put your Lisp skills to the test by writing brain-melting games like Dice of Doom and Orc BattleWith Land of Lisp, the power of functional programming is yours to wield.

Steal This Computer Book 4.0: What They Won't Tell You About the Internet

by Wallace Wang

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths and never accepting at face value anything authorities say or do.The completely revised fourth edition of this offbeat, non-technical book examines what hackers do, how they do it, and how you can protect yourself. Written in the same informative, irreverent, and entertaining style that made the first three editions hugely successful, Steal This Computer Book 4.0 will expand your mind and raise your eyebrows. New chapters discuss the hacker mentality, social engineering and lock picking, exploiting P2P file-sharing networks, and how people manipulate search engines and pop-up ads to obtain and use personal information. Wang also takes issue with the media for "hacking" the news and presenting the public with self-serving stories of questionable accuracy.Inside, you’ll discover:–How to manage and fight spam and spyware–How Trojan horse programs and rootkits work and how to defend against them–How hackers steal software and defeat copy-protection mechanisms–How to tell if your machine is being attacked and what you can do to protect it–Where the hackers are, how they probe a target and sneak into a computer, and what they do once they get inside–How corporations use hacker techniques to infect your computer and invade your privacy–How you can lock down your computer to protect your data and your personal information using free programs included on the book’s CDIf you’ve ever logged onto a website, conducted an online transaction, sent or received email, used a networked computer or even watched the evening news, you may have already been tricked, tracked, hacked, and manipulated. As the saying goes, just because you’re paranoid doesn’t mean they aren’t after you. And, as Wallace Wang reveals, they probably are.The companion CD contains hundreds of megabytes of 100% FREE hacking and security related programs, like keyloggers, spyware stoppers, port blockers, IP scanners, Trojan horse detectors, and much, much more. CD compatible with Windows, Mac, and Linux.

Hacking: The Art of Exploitation, 2nd Edition

by Jon Erickson

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.The included LiveCD provides a complete Linux programming and debugging environment—all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:– Program computers using C, assembly language, and shell scripts– Corrupt system memory to run arbitrary code using buffer overflows and format strings– Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening– Outsmart common security measures like nonexecutable stacks and intrusion detection systems– Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence– Redirect network traffic, conceal open ports, and hijack TCP connections– Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrixHackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.

Refine Search

Showing 30,001 through 30,025 of 53,657 results