Browse Results

Showing 25,851 through 25,875 of 63,047 results

HTTP/2 in Action

by Barry Pollard

SummaryHTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behavior of your websites.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyHTTP—Hypertext Transfer Protocol—is the standard for exchanging messages between websites and browsers. And after 20 years, it's gotten a much-needed upgrade. With support for streams, server push, header compression, and prioritization, HTTP/2 delivers vast improvements in speed, security, and efficiency.About the BookHTTP/2 in Action teaches you everything you need to know to use HTTP/2 effectively. You'll learn how to optimize web performance with new features like frames, multiplexing, and push. You'll also explore real-world examples on advanced topics like flow control and dependencies. With ready-to-implement tips and best practices, this practical guide is sure to get you—and your websites—up to speed!What's InsideHTTP/2 for web developersUpgrading and troubleshootingReal-world examples and case studiesQUIC and HTTP/3About the ReaderWritten for web developers and site administrators.About the AuthorsBarry Pollard is a professional developer with two decades of experience developing, supporting, and tuning software and infrastructure.Table of ContentsPART 1 MOVING TO HTTP/2Web technologies and HTTPThe road to HTTP/2 Upgrading to HTTP/2PART 2 USING HTTP/2HTTP/2 protocol basicsImplementing HTTP/2 pushOptimizing for HTTP/2PART 3 ADVANCED HTTP/2Advanced HTTP/2 conceptsHPACK header compressionPART 4 THE FUTURE OF HTTPTCP, QUIC, and HTTP/3Where HTTP goes from here

HTTP: The Definitive Guide

by David Gourley Brian Totty Marjorie Sayer Anshu Aggarwal Sailu Reddy

Behind every web transaction lies the Hypertext Transfer Protocol (HTTP) --- the language of web browsers and servers, of portals and search engines, of e-commerce and web services. Understanding HTTP is essential for practically all web-based programming, design, analysis, and administration.While the basics of HTTP are elegantly simple, the protocol's advanced features are notoriously confusing, because they knit together complex technologies and terminology from many disciplines. This book clearly explains HTTP and these interrelated core technologies, in twenty-one logically organized chapters, backed up by hundreds of detailed illustrations and examples, and convenient reference appendices. HTTP: The Definitive Guide explains everything people need to use HTTP efficiently -- including the "black arts" and "tricks of the trade" -- in a concise and readable manner.In addition to explaining the basic HTTP features, syntax and guidelines, this book clarifies related, but often misunderstood topics, such as: TCP connection management, web proxy and cache architectures, web robots and robots.txt files, Basic and Digest authentication, secure HTTP transactions, entity body processing, internationalized content, and traffic redirection.Many technical professionals will benefit from this book. Internet architects and developers who need to design and develop software, IT professionals who need to understand Internet architectural components and interactions, multimedia designers who need to publish and host multimedia, performance engineers who need to optimize web performance, technical marketing professionals who need a clear picture of core web architectures and protocols, as well as untold numbers of students and hobbyists will all benefit from the knowledge packed in this volume.There are many books that explain how to use the Web, but this is the one that explains how the Web works. Written by experts with years of design and implementation experience, this book is the definitive technical bible that describes the "why" and the "how" of HTTP and web core technologies. HTTP: The Definitive Guide is an essential reference that no technically-inclined member of the Internet community should be without.

HTTP: The Definitive Guide

by David Gourley Brian Totty

Web technology has become the foundation for all sorts of critical networked applications and far-reaching methods of data exchange, and beneath it all is a fundamental protocol: HyperText Transfer Protocol, or HTTP. HTTP: The Definitive Guide documents everything that technical people need for using HTTP efficiently. A reader can understand how web applications work, how the core Internet protocols and architectural building blocks interact, and how to correctly implement Internet clients and servers.

HUSITA7-The 7th International Conference of Human Services Information Technology Applications: Digital Inclusion—Building A Digital Inclusive Society

by C. K. Law Yu Cheung Wong John Yat Chu Fung

In today’s information society, to make a real and lasting impact on human welfare takes applications of information technology aimed at enhancing access to all. HUSITA7-The 7th International Conference of Human Services Information Technology Applications: Digital Inclusion-Building a Digital Inclusive Society presents diverse viewpoints from around the globe, examining the latest applications of digital technology for social work education and practice. These conference presentations from respected international authorities discuss the application of ICT (information and communication technology) in various facets of human service to achieve the goal of a digital inclusive society where all have access to education and informational resources. HUSITA7-The 7th International Conference of Human Services Information Technology Applications examines the development and use of information technology in professional training, including the strengths and limitations of e-learning in social work curriculums along with the rationale behind a learning object approach. Research includes findings from educators in Canada describing the development and implementation of e-learning in social work programs and the qualitative study of technological content in an MSW curriculum. Various types of Web-based learning approaches are explored with an eye toward providing more effective teaching strategies. Various technological advances and approaches toward individual empowerment are described to facilitate greater societal inclusiveness. The book is well referenced and includes several helpful tables and figures. Topics in HUSITA7-The 7th International Conference of Human Services Information Technology Applications include: the learning object approach of e-learning for social work education challenges implementing e-learning in social work education a research study of the relationship between technology content in social work education and technology use in social work practice international partnerships in Web-based teaching effective integration of emotion into the content of Web-based learning the use of indigenous knowledge in content the use of Web CT for effective address of issues such as quality of teaching and communication bringing about social inclusion through effective digital government how technological advances impact assistive technology research on the Internet self-efficacy in older person’s learning of ICT a communication tool for the speech impaired improving social work service effectiveness through knowledge management (KM) the “SenSui” disability information resource in Japan HUSITA7-The 7th International Conference of Human Services Information Technology Applications is enlightening reading for librarians, social educators, social work students, researchers interested in ICT, and human service professionals.

Haar Wavelets

by Ülo Lepik Helle Hein

This is the first book to present a systematic review of applications of the Haar wavelet method for solving Calculus and Structural Mechanics problems. Haar wavelet-based solutions for a wide range of problems, such as various differential and integral equations, fractional equations, optimal control theory, buckling, bending and vibrations of elastic beams are considered. Numerical examples demonstrating the efficiency and accuracy of the Haar method are provided for all solutions.

Habitable Future: Smart Spaces, Objects, and Devices to Support Aging (SpringerBriefs in Applied Sciences and Technology)

by Marco Sacco Tiziana Ferrante

This open-access book presents a multidisciplinary approach to the design of living spaces from an age-friendly perspective, in line with the Ambient Assisted Living (AAL) paradigm, which promotes the integration of assistive devices and technologies to create safe, comfortable environments that meet the needs of older adults and their caregivers. It outlines new operational strategies, incorporating an analysis of technological development trends focused on the well-being and health of older adults, identifying their needs and expectations through participatory processes, and establishing design requirements to foster the acceptance of interfaces and emerging devices. In light of the exponential increase in smart applications within living environments, the book emphasizes the necessity to introduce cutting-edge solutions for data transmission and processing, as well as the development of semantically driven tools to support designers in selecting and integrating assistive technologies through virtual environment simulations. The book also illustrates the methodological processes adopted in defining guidelines for the design of spaces dedicated to older adults, with attention to architectural and functional aspects in various domains: perceptual and sensory factors for the design of waiting areas in Community Houses, technological and environmental requirements for the integration of devices in home adaptation projects for Home Care and locational and typological criteria for the development of new Social Day Care Centers. These contributions are based on the experiences shared during the conference organized by the WP1 "Human-Centred Design and Evaluation, Certifications, Sustainability within the Built Environment" of Spoke9, within the framework of the Age-It/NRRP program.

Hack and HHVM: Programming Productivity Without Breaking Things

by Owen Yamauchi

How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi—a member of Facebook’s core Hack and HHVM teams—shows you how to get started with these battle-tested open-source tools.You’ll explore static typechecking and several other features that separate Hack from its PHP origins, and learn how to set up, configure, deploy, and monitor HHVM. Ideal for developers with basic PHP knowledge or experience with other languages, this book also demonstrates how these tools can be used with existing PHP codebases and new projects alike.Learn how Hack provides static typechecking while retaining PHP’s flexible, rapid development capabilityWrite typesafe code with Hack’s generics featureExplore HHVM, a just-in-time compilation runtime engine with full PHP compatibilityDive into Hack collections, asynchronous functions, and the XHP extension for PHPUnderstand Hack’s design rationale, including why it omits some PHP featuresUse Hack for multitasking, and for generating HTML securelyLearn tools for working with Hack code, including PHP-to-Hack migration

Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career

by Ken Underhill Christophe Foulon Tia Hopkins Mari Galloway

Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetration tester, malware analyst, digital forensics analyst, CISO, and more rolesUnderstand different key areas in each role and prepare for themBook DescriptionThis book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas.Complete with the authors' answers to different cybersecurity interview questions, this easy-to-follow and actionable book will help you get ready and be confident. You'll learn how to prepare and form a winning strategy for job interviews. In addition to this, you'll also understand the most common technical and behavioral interview questions, learning from real cybersecurity professionals and executives with years of industry experience.By the end of this book, you'll be able to apply the knowledge you've gained to confidently pass your next job interview and achieve success on your cybersecurity career path.What you will learnUnderstand the most common and important cybersecurity rolesFocus on interview preparation for key cybersecurity areasIdentify how to answer important behavioral questionsBecome well versed in the technical side of the interviewGrasp key cybersecurity role-based questions and their answersDevelop confidence and handle stress like a proWho this book is forThis cybersecurity book is for college students, aspiring cybersecurity professionals, computer and software engineers, and anyone looking to prepare for a job interview for any cybersecurity role. The book is also for experienced cybersecurity professionals who want to improve their technical and behavioral interview skills. Recruitment managers can also use this book to conduct interviews and tests.

Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles

by Christophe Foulon Ken Underhill Tia Hopkins

Ace your cybersecurity interview by unlocking expert strategies, technical insights, and career-boosting tips for securing top roles in the industryKey FeaturesMaster technical and behavioral interview questions for in-demand cybersecurity positions Improve personal branding, communication, and negotiation for interview success Gain insights into role-specific salary expectations, career growth, and job market trendsBook DescriptionThe cybersecurity field is evolving fast, and so are its job interviews. Hack the Cybersecurity Interview, Second Edition is your go-to guide for landing your dream cybersecurity job—whether you're breaking in or aiming for a senior role. This expanded edition builds on reader feedback, refines career paths, and updates strategies for success. With a real-world approach, it preps you for key technical and behavioral questions, covering roles like Cybersecurity Engineer, SOC Analyst, and CISO. You'll learn best practices for answering with confidence and standing out in a competitive market. The book helps you showcase problem-solving skills, highlight transferable experience, and navigate personal branding, job offers, and interview stress. Using the HACK method, it provides a structured approach to adapt to different roles and employer expectations. Whether you're switching careers, advancing in cybersecurity, or preparing for your first role, this book equips you with the insights, strategies, and confidence to secure your ideal cybersecurity job.What you will learnIdentify common interview questions for different roles Answer questions from a problem-solving perspectiveBuild a structured response for role-specific scenario questionsTap into your situational awareness when answering questionsShowcase your ability to handle evolving cyber threatsGrasp how to highlight relevant experience and transferable skillsLearn basic negotiation skillsLearn strategies to stay calm and perform your best under pressure Who this book is forThis book is ideal for anyone who is pursuing or advancing in a cybersecurity career. Whether professionals are aiming for entry-level roles or executive ones, this book will help them prepare for interviews across various cybersecurity paths. With common interview questions, personal branding tips, and technical and behavioral skill strategies, this guide equips professionals to confidently navigate the interview process and secure their ideal cybersecurity job.

Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers

by Emily Crose

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers, veteran information security professional Emily Crose delivers a deep dive into the history of the United States government's nuanced relationship with hacker culture and the role the latter has played in the former's domestic policy and geopolitics. In the book, you'll learn about significant events that have changed the way the hacking community has been perceived by the public, the state, and other hackers. The author explains how the US government managed to weaponize a subculture widely seen as misanthropic and awkward into a lever of geopolitical power. You'll also discover how: The release of the Morris worm and the Melissa virus changed the way hackers were seen and treated in the United States Different government agencies, including the National Security Agency and NASA treated – and were treated by – domestic hackers Hacking went from being an exclusive hobby for socially awkward nerds to a substantial lever of geopolitical power in just a few decades Perfect for anyone with an interest in hacking, tech, infosec, and geopolitics, Hack to the Future is a must-read for those who seek to better their understanding of the history of hacking culture and how we got to where we are today.

Hackathons: From Idea to Successful Implementation

by Andreas Kohne Volker Wehmeier

This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant’s perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. The book is structured as follows: At first the basics and the history of hackathons are described in chapter 1. Afterwards the three phases of a hackathon are described in detail. This is started in chapter 2 with the description of the individual measures which are to be accomplished before the actual event. Here not only technical or organizational aspects are described, but also the important legal aspects are discussed. Subsequently, it is shown what is necessary to carry out a hackathon successfully. For this purpose the actual execution with all its steps is described in chapter 3. Next, chapter 4 looks at the follow-ups, which are often neglected or even completely forgotten. Chapter 5 describes from a participant’s point of view the reasons for participating in a hackathon and which aspects guarantee a successful participation. In the following chapter 6 the criticism of the format of the hackathons and their execution is also examined in detail. Eventually, the most important points are summarized in chapter 7, before chapter 8 gives a view into the future of hackathons. Subsequently chapter 9 collects statements and opinions of representatives from industry, science and administration on the topic of hackathons. The book is rounded off in chapter 10 with detailed checklists, which can be directly used for the successful planning, operation and follow-up of hackathons. The book is written for everyone with an interest in how hackathons work, how to create them, and how to successfully participate. It especially targets people in industry or young students who want to run or participate in a hackathon.

Hackathons: Von der Idee zur erfolgreichen Umsetzung

by Andreas Kohne Volker Wehmeier

Erfahren Sie in diesem Buch mehr über das Phänomen HackathonsEs gibt Events, die ermöglichen es ihren Akteuren, interdisziplinär in einen kreativen Dialog zu treten. Dieses Buch widmet sich den sogenannten Hackathons – einem Veranstaltungsformat, das sich seit Jahren großer Beliebtheit erfreut. Die Erfolgsgeschichte begann wie so oft in Amerika, mittlerweile wird das disruptive Brainstorming jedoch weltweit erfolgreich durchgeführt, umin kürzester Zeit Technologien, Geschäftsmodelle und Produkte zu entwickeln.neues Personal zu rekrutieren.interdisziplinäre Teams effizient zusammenzubringen.Das Ergebnis kann u. a. eine kollaborative Software- und Hardwareentwicklung sein. Dieses Buch von Andreas Kohne und Volker Wehmeier widmet sich nicht nur der Frage, was ein Hackathon ist, sondern erklärt Ihnen zudem, wie Sie einen Hackathon organisieren und worauf Sie bei der Durchführung eines solchen Events achten sollten.Programmieren, Recruiting und InnovationenDie Entwicklung neuer Ideen, Konzepte und Lösungen sowie das Testen verschiedener Projekte stehen stets im Fokus der Teilnehmer unterschiedlicher Branchen. Gleichzeitig bieten sie Start-ups die perfekte Gelegenheit, um ihr Geschäftsmodell von Experten bewerten zu lassen. Sie können sich vorstellen, wie wichtig daher die Planung eines solchen Events für alle Beteiligten ist. In diesem Buch über Hackathons erhalten Sie einen ebenso praxisnahen wie kompakten Überblick über folgende Bereiche:PlanungDurchführungNachbereitungMehrwertUm Ihnen den Einstieg in die Thematik zu erleichtern, finden Sie am Ende des Werkes neben prägnanten Checklisten auch Ablaufübersichten. Das Buch fokussiert sich nicht nur auf die Veranstalter eines Hackathons. Es berücksichtigt ebenfalls die Teilnehmersicht sowie die Stimmen aus der Wirtschaft und Verwaltung. Dadurch erhalten Sie umfassenden Input von beiden Seiten.

Hacked (Red Rhino Nonfiction)

by M. G. Higgins

<p>Look out! Your computer data is not safe. There are hackers who will steal it. Sell it. Or destroy it. The hackers are getting smarter. They leave little trace as to their identities. And there are dangerous consequences for individuals, corporations, and governments. <p>Engage your most struggling readers in grades 3-8 with Red Rhino Nonfiction! This new series features high-interest topics in every content area. Visually appealing full-color photographs and illustrations, fun facts, and short chapters keep emerging readers focused. Written at a 1.5-1.9 readability level, these books include pre-reading comprehension questions and a 20-word glossary for comprehension support.</p>

Hacked: Kali Linux And Wireless Hacking Ultimate Guide With Security And Penetration Testing Tools, Practical Step By Step Computer Hacking Book

by Alan Norman

Hacking book is intended to serve as an intermediate-level guide to some common penetration testing tools and skills – particularly those of wireless hacking and of maintaining anonymity. The book concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking book! Get answers from an experienced IT expert to every single question you have related to the learning you do in this book including: - installing Kali Linux - using VirtualBox - basics of Linux - Staying anonymous with Tor - Proxychains, Virtual Private Networks (VPN) - Macchanger, Nmap - cracking wifi - aircrack - cracking Linux passwords What are the requirements? - Reliable and fast internet connection. - Wireless networking card. - Kali Linux Distribution - Basic IT skills What will you get from the hacking book? Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional! - You will learn the basics of network - Deal with a lot of Kali Linux tools - Learn some Linux commands Tips for remaining anonymous in hacking and penetration testing activities. Protect your WiFi network against all the attacks Gain access to any client account in the WiFi network A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords. Step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.

Hacken für Dummies (Für Dummies)

by Kevin Beaver

Um einen Hacker zu überlisten, müssen Sie sich in die Denkweise des Hackers hineinversetzen. Deshalb lernen Sie mit diesem Buch, wie ein Bösewicht zu denken. Der Fachmann für IT-Sicherheit Kevin Beaver teilt mit Ihnen sein Wissen über Penetrationstests und typische Schwachstellen in IT-Systemen. Er zeigt Ihnen, wo Ihre Systeme verwundbar sein könnten, sodass Sie im Rennen um die IT-Sicherheit die Nase vorn behalten. Denn wenn Sie die Schwachstellen in Ihren Systemen kennen, können Sie sie besser schützen und die Hacker kommen bei Ihnen nicht zum Zug!

Hacken für Dummies (Für Dummies)

by Kevin Beaver

Um einen Hacker zu überlisten, müssen Sie sich in dessen Denkweise hineinversetzen. Deshalb lernen Sie mit diesem Buch, wie ein Bösewicht zu denken. Der Fachmann für IT-Sicherheit Kevin Beaver teilt mit Ihnen sein Wissen über Penetrationstests und typische Schwachstellen in IT-Systemen. Er zeigt Ihnen, wo Ihre Systeme verwundbar sein könnten, sodass Sie im Rennen um die IT-Sicherheit die Nase vorn behalten. Denn nur wenn Sie die Schwachstellen in Ihren Systemen kennen, können Sie sich richtig dagegen schützen und die Hacker kommen bei Ihnen nicht zum Zug!

Hacker Cracker: A Journey from the Mean Streets of Brooklyn to the Frontiers of Cyberspace

by David Chanoff Ejovi Nuwere

Like other kids in the Bedford-Stuyvesant neighborhood of Brooklyn, Ejovi Nuwere grew up among thugs and drug dealers. When he was eleven, he helped form a gang; at twelve, he attempted suicide. In his large, extended family, one uncle was a career criminal, one a graduate student with his own computer. By the time Ejovi was fourteen, he was spending as much time on the computer as his uncle was. Within a year he was well on his way to a hacking career that would lead him to one of the most audacious and potentially dangerous computer break-ins of all time, secret until now. Before he finished high school he had created a hidden life in the hacker underground and an increasingly prominent career as a computer security consultant. At the age of twenty-two, he was a top security specialist for one of the world's largest financial houses. Hacker Cracker is at once the most candid revelation to date of the dark secrets of cyberspace and the simple, unaffected story of an inner-city child's triumph over shattering odds to achieve unparalleled success.

Hacker Culture A to Z: A Fun Guide to the People, Ideas, and Gadgets That Made the Tech World

by Kim Crawley

Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history.If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones.Understand the relationship between hacker culture and cybersecurityGet to know the ideas behind the hacker ethos, like "knowledge should be free" Explore topics and publications central to hacker culture, including 2600 MagazineAppreciate the history of cybersecurityLearn about key figures in the history of hacker cultureUnderstand the difference between hackers and cybercriminals

Hacker Culture and the New Rules of Innovation

by Tim Rayner

Fifteen years ago, a company was considered innovative if the CEO and board mandated a steady flow of new product ideas through the company’s innovation pipeline. Innovation was a carefully planned process, driven from above and tied to key strategic goals. Nowadays, innovation means entrepreneurship, self-organizing teams, fast ideas and cheap, customer experiments. Innovation is driven by hacking, and the world’s most innovative companies proudly display their hacker credentials. Hacker culture grew up on the margins of the computer industry. It entered the business world in the twenty-first century through agile software development, design thinking and lean startup method, the pillars of the contemporary startup industry. Startup incubators today are filled with hacker entrepreneurs, running fast, cheap experiments to push against the limits of the unknown. As corporations, not-for-profits and government departments pick up on these practices, seeking to replicate the creative energy of the startup industry, hacker culture is changing how we think about leadership, work and innovation. This book is for business leaders, entrepreneurs and academics interested in how digital culture is reformatting our economies and societies. Shifting between a big picture view on how hacker culture is changing the digital economy and a detailed discussion of how to create and lead in-house teams of hacker entrepreneurs, it offers an essential introduction to the new rules of innovation and a practical guide to building the organizations of the future.

Hacker States (The Information Society Series)

by Adam Fish Luca Follis

How hackers and hacking moved from being a target of the state to a key resource for the expression and deployment of state power.In this book, Luca Follis and Adam Fish examine the entanglements between hackers and the state, showing how hackers and hacking moved from being a target of state law enforcement to a key resource for the expression and deployment of state power. Follis and Fish trace government efforts to control the power of the internet; the prosecution of hackers and leakers (including such well-known cases as Chelsea Manning, Edward Snowden, and Anonymous); and the eventual rehabilitation of hackers who undertake “ethical hacking” for the state. Analyzing the evolution of the state's relationship to hacking, they argue that state-sponsored hacking ultimately corrodes the rule of law and offers unchecked advantage to those in power, clearing the way for more authoritarian rule. Follis and Fish draw on a range of methodologies and disciplines, including ethnographic and digital archive methods from fields as diverse as anthropology, STS, and criminology. They propose a novel “boundary work” theoretical framework to articulate the relational approach to understanding state and hacker interactions advanced by the book. In the context of Russian bot armies, the rise of fake news, and algorithmic opacity, they describe the political impact of leaks and hacks, hacker partnerships with journalists in pursuit of transparency and accountability, the increasingly prominent use of extradition in hacking-related cases, and the privatization of hackers for hire.

Hacker's Guide to Project Management

by Andrew Johnston

Managing a software development project is a complex process. There are lots of deliverables to produce, standards and procedures to observe, plans and budgets to meet, and different people to manage. Project management doesn't just start and end with designing and building the system. Once you've specified, designed and built (or bought) the system it still needs to be properly tested, documented and settled into the live environment. This can seem like a maze to the inexperienced project manager, or even to the experienced project manager unused to a particular environment.A Hacker's Guide to Project Management acts as a guide through this maze. It's aimed specifically at those managing a project or leading a team for the first time, but it will also help more experienced managers who are either new to software development, or dealing with a new part of the software life-cycle. This book:describes the process of software development, how projects can fail and how to avoid those failuresoutlines the key skills of a good project manager, and provides practical advice on how to gain and deploy those skillstakes the reader step-by-step through the main stages of the project, explaining what must be done, and what must be avoided at each stagesuggests what to do if things start to go wrong!The book will also be useful to designers and architects, describing important design techniques, and discussing the important discipline of Software Architecture.This new edition:has been fully revised and updated to reflect current best practices in software developmentincludes a range of different life-cycle models and new design techniquesnow uses the Unified Modelling Language throughout

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous

by Gabriella Coleman

Here is the ultimate book on the worldwide movement of hackers, pranksters, and activists that operates under the non-name Anonymous, by the writer the Huffington Post says "knows all of Anonymous' deepest, darkest secrets."Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her inside-outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters--such as Topiary, tflow, Anachaos, and Sabu--emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of "trolling," the ethics and metaphysics of hacking, and the origins and manifold meanings of "the lulz."

Hackers & Painters: Big Ideas from the Computer Age

by Paul Graham

"The computer world is like an intellectual Wild West, in which you can shoot anyone you wish with your ideas, if you're willing to risk the consequences. " --from Hackers & Painters: Big Ideas from the Computer Age, by Paul GrahamWe are living in the computer age, in a world increasingly designed and engineered by computer programmers and software designers, by people who call themselves hackers. Who are these people, what motivates them, and why should you care?Consider these facts: Everything around us is turning into computers. Your typewriter is gone, replaced by a computer. Your phone has turned into a computer. So has your camera. Soon your TV will. Your car was not only designed on computers, but has more processing power in it than a room-sized mainframe did in 1970. Letters, encyclopedias, newspapers, and even your local store are being replaced by the Internet.Hackers & Painters: Big Ideas from the Computer Age, by Paul Graham, explains this world and the motivations of the people who occupy it. In clear, thoughtful prose that draws on illuminating historical examples, Graham takes readers on an unflinching exploration into what he calls "an intellectual Wild West."The ideas discussed in this book will have a powerful and lasting impact on how we think, how we work, how we develop technology, and how we live. Topics include the importance of beauty in software design, how to make wealth, heresy and free speech, the programming language renaissance, the open-source movement, digital design, internet startups, and more.

Hackers: Heroes of the Computer Revolution - 25th Anniversary Edition

by Steven Levy

This 25th anniversary edition of Steven Levy's classic book traces the exploits of the computer revolution's original hackers -- those brilliant and eccentric nerds from the late 1950s through the early '80s who took risks, bent the rules, and pushed the world in a radical new direction. With updated material from noteworthy hackers such as Bill Gates, Mark Zuckerberg, Richard Stallman, and Steve Wozniak, Hackers is a fascinating story that begins in early computer research labs and leads to the first home computers.Levy profiles the imaginative brainiacs who found clever and unorthodox solutions to computer engineering problems. They had a shared sense of values, known as "the hacker ethic," that still thrives today. Hackers captures a seminal period in recent history when underground activities blazed a trail for today's digital world, from MIT students finagling access to clunky computer-card machines to the DIY culture that spawned the Altair and the Apple II.

Hacking APIs: Breaking Web Application Programming Interfaces

by Corey J. Ball

Hacking APIs is a crash course in web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure.Hacking APIs is a crash course on web API security testing that will prepare you to penetration-test APIs, reap high rewards on bug bounty programs, and make your own APIs more secure. You&’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you&’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you&’ll learn to perform common attacks, like those targeting an API&’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You&’ll also learn techniques for bypassing protections against these attacks. In the book&’s nine guided labs, which target intentionally vulnerable APIs, you&’ll practice: • Enumerating APIs users and endpoints using fuzzing techniques • Using Postman to discover an excessive data exposure vulnerability • Performing a JSON Web Token attack against an API authentication process • Combining multiple API attack techniques to perform a NoSQL injection • Attacking a GraphQL API to uncover a broken object level authorization vulnerability By the end of the book, you&’ll be prepared to uncover those high-payout API bugs other hackers aren&’t finding and improve the security of applications on the web.

Refine Search

Showing 25,851 through 25,875 of 63,047 results