- Table View
- List View
From the acclaimed Vanity Fair and GQ journalist--an unprecedented, in-depth portrait of the man whose return to Apple precipitated one of the biggest turnarounds in business history. From the emergence of Apple Computer in the late 1970s and early 1980s to its current resurgence, charismatic leader Steve Jobs has captivated the public. Both revered and reviled for his dictatorial manner and stunning successes, Jobs has transcended his legend in Silicon Valley to take on some of the heaviest hitters in Hollywood. Now, in The Second Coming of Steve Jobs, Alan Deutschman presents the most revealing portrait yet of this fascinating, complex character--an in-depth look at the many layers of Steve Jobs, a man who is at turns a brilliant cult figure and an abusive, egomaniacal kid. This story begins back in 1985 when Jobs was exiled from Apple, and then it goes on to chronicle the rise and fall of his own company, NeXT; the enormous success of Jobs's film animation studio, Pixar; and finally his triumphant return to Apple in the late 1990s, with Jobs taking the title of CEO in January 2000. Displaying an uncanny skill at the negotiation table and an intuitive sense of brilliant design that could capture the public's fascination with products like the iMac, along with a celebrity's ability to command the spotlight, Jobs has been able to catapult himself to the top of the Silicon Valley and Hollywood establishments. Based on interviews with scores of people--rivals, colleagues, friends--who have worked with Jobs over the years, The Second Coming of Steve Jobs gets under the hood of this extraordinarily complex man: how and why he almost gave up on his career; the details of his negotiations with Disney's Jeffrey Katzenberg and Michael Eisner, and of the culture clash between Silicon Valley and Hollywood; his methods of leadership, management, creativity, and innovation; his friendship and rivalry with Bill Gates--and much more. In an unsentimental and powerful voice, Deutschman reveals a man who suffered his midlife crisis at thirty, compressing it into just three months; struggled between self-imposed exile and the allure of public life; and became the baby boomer icon who was constantly blurring the lines between businessman, rock star, and beatnik. The Second Coming of Steve Jobs is a compelling look at an individual who has changed the face of technology and entertainment for the twenty-first century. This candid account of Steve Jobs's tumultuous and provocative career will answer the many questions left unanswered by this incredibly private character who has come to represent the Silicon Valley American dream.
Ludlow and Wallace take us behind the scenes of the Herald as they report on the emergence of a fascinating universe of virtual spaces that will become the next generation of the World Wide Web: a 3-D environment that provides richer, more expressive interactions than the Web we know today.
We've always dreamed of perfect places: Eden, heaven, Oz Â- places over the rainbow, beyond death and loss. Now, through computer technology, we can inhabit those worlds together. Each week, between 35 and 50 million people worldwide abandon reality for virtual worlds. In Boston, Massachusetts, a group of nine disabled men and women inhabit one virtual body, which frees them from their lifelong struggle to be seen and heard. The Pentagon has begun to develop virtual worlds to help in real-world battles. In Korea, where one particular game has 8 million residents, virtual violence has spread into the real world. Fortunes have been made, and mafia gangs have emerged to muscle in on the profits. In these new computer-generated places, which at first glance seem free from trouble and sorrow, you can create a new self. With the click of a mouse you can select eye colour, face shape, height, even wings. You can build houses, make and sell works of art, earn real money, get married and divorced. On websites like eBay, people sell virtual clothes and rent virtual property for real cash - for a total of £400 million worth each year. Tim Guest takes us on a revelatory journey through the electronic looking-glass, as he investigates one of the most bizarre phenomena of the 21st century.
A revolution is under way.<P> In recent years, Google's autonomous cars have logged thousands of miles on American highways and IBM's Watson trounced the best human Jeopardy! players. Digital technologies--with hardware, software, and networks at their core--will in the near future diagnose diseases more accurately than doctors can, apply enormous data sets to transform retailing, and accomplish many tasks once considered uniquely human.<P> In The Second Machine Age MIT's Erik Brynjolfsson and Andrew McAfee--two thinkers at the forefront of their field--reveal the forces driving the reinvention of our lives and our economy. As the full impact of digital technologies is felt, we will realize immense bounty in the form of dazzling personal technology, advanced infrastructure, and near-boundless access to the cultural items that enrich our lives.<P> Amid this bounty will also be wrenching change. Professions of all kinds--from lawyers to truck drivers--will be forever upended. Companies will be forced to transform or die. Recent economic indicators reflect this shift: fewer people are working, and wages are falling even as productivity and profits soar.<P> Drawing on years of research and up-to-the-minute trends, Brynjolfsson and McAfee identify the best strategies for survival and offer a new path to prosperity. These include revamping education so that it prepares people for the next economy instead of the last one, designing new collaborations that pair brute processing power with human ingenuity, and embracing policies that make sense in a radically transformed landscape.<P> A fundamentally optimistic book, The Second Machine Age will alter how we think about issues of technological, societal, and economic progress.
While the global economy languishes, one place just keeps growing despite failing banks, uncertain markets, and high unemployment: Silicon Valley. In the last two years, more than 100 incubators have popped up there, and the number of angel investors has skyrocketed. Today, 40 percent of all venture capital investments in the United States come from Silicon Valley firms, compared to 10 percent from New York. In Secrets of Silicon Valley, entrepreneur and media commentator Deborah Perry Piscione takes us inside this vibrant ecosystem where meritocracy rules the day. She explores Silicon Valley's exceptionally risk-tolerant culture, and why it thrives despite the many laws that make California one of the worst states in the union for business. Drawing on interviews with investors, entrepreneurs, and community leaders, as well as a host of case studies from Google to Paypal, Piscione argues that Silicon Valley's unique culture is the best hope for the future of American prosperity and the global business community and offers lessons from the Valley to inspire reform in other communities and industries, from Washington, DC to Wall Street.
Despite their myriad manifestations and different targets, nearly all attacks on computer systems have one fundamental cause: the code used to run far too many systems today is not secure. Flaws in its design, implementation, testing, and operations allow attackers all-too-easy access. Secure Coding: Principles & Practices looks at the problem of bad code in a new way. This concise and highly readable book is packed with advice based on the authors' decades of experience in the computer security field.
A step-by-step guide to identifying and defending against attacks on the virtual environment As more and more data is moved into virtual environments the need to secure them becomes increasingly important. Useful for service providers as well as enterprise and small business IT professionals the book offers a broad look across virtualization used in various industries as well as a narrow view of vulnerabilities unique to virtual environments. A companion DVD is included with recipes and testing scripts. Examines the difference in a virtual model versus traditional computing models and the appropriate technology and procedures to defend it from attack Dissects and exposes attacks targeted at the virtual environment and the steps necessary for defense Covers information security in virtual environments: building a virtual attack lab, finding leaks, getting a side-channel, denying or compromising services, abusing the hypervisor, forcing an interception, and spreading infestations Accompanying DVD includes hands-on examples and code This how-to guide arms IT managers, vendors, and architects of virtual environments with the tools they need to protect against common threats.
In recent years, Windows NT and 2000 systems have emerged as viable platforms for Internet servers, but securing Windows for Internet use is a complex task. This concise guide simplifies the task by paring down installation and configuration instructions into a series of security checklists for security administration, including hardening servers for use as "bastion hosts," performing secure remote administration with OpenSSH, TCP Wrappers, VNC, and the new Windows 2000 Terminal Services.
If you use Windows 2003 Server at a small to medium-sized organization, or use Microsoft's Small Business Server, this thorough yet concise tutorial offers the hands-on advice you need for securing your network. Securing Windows Server 2003 not only shows you how to put Windows security tools to work, but guides you through ways to plan and implement a secure operating environment.
Human factors and usability issues have traditionally played a limited role in security research and secure systems development. Security experts have largely ignored usability issues--both because they often failed to recognize the importance of human factors and because they lacked the expertise to address them. But there is a growing recognition that today's security problems can be solved only by addressing issues of usability and human factors. Increasingly, well-publicized security breaches are attributed to human errors that might have been prevented through more usable software. Indeed, the world's future cyber-security depends upon the deployment of security technology that can be broadly used by untrained computer users. Still, many people believe there is an inherent trade-off between computer security and usability. It's true that a computer without passwords is usable, but not very secure. A computer that makes you authenticate every five minutes with a password and a fresh drop of blood might be very secure, but nobody would use it. Clearly, people need computers, and if they can't use one that's secure, they'll use one that isn't. Unfortunately, unsecured systems aren't usable for long, either. They get hacked, compromised, and otherwise rendered useless. There is increasing agreement that we need to design secure systems that people can actually use, but less agreement about how to reach this goal. Security and Usability is the first book-length work describing the current state of the art in this emerging field. Edited by security experts Dr. Lorrie Faith Cranor and Dr. Simson Garfinkel, and authored by cutting-edge security and human-computer interaction (HCI) researchers world-wide, this volume is expected to become both a classic reference and an inspiration for future research. Security and Usability groups 34 essays into six parts: Realigning Usability and Security-- with careful attention to user-centered design principles, security and usability can be synergistic. Authentication Mechanisms-- techniques for identifying and authenticating computer users. Secure Systems-- how system software can deliver or destroy a secure user experience. Privacy and Anonymity Systems-- methods for allowing people to control the release of personal information. Commercializing Usability: The Vendor Perspective-- specific experiences of security and software vendors (e.g., IBM, Microsoft, Lotus, Firefox, and Zone Labs) in addressing usability. The Classics-- groundbreaking papers that sparked the field of security and usability. This book is expected to start an avalanche of discussion, new ideas, and further advances in this important field.
<div xmlns="http://www.w3.org/1999/xhtml"><p>With expert insights, this introduction to the Security Development Lifecycle (SDL) provides you with a history of the methodology and guides you through each stage of the proven process\u2014from design to release\u2014that helps minimize security defects.</p></div>
As a system administrator or security professionals, you probably find yourself inundated each day with a deluge of log files from seemingly countless devices, servers, and applications on your network ranging from Windows Server to Snort to your PIX firewall and everything in between. At times, the task of "seeing the forest through the trees" to extract useful, repeatable information from these logs may seem almost impossible. This unique book will show you how to use a combination of open source software such as Tcpdstats, and Snort perfmonitor to create succinct, meaningful reports that give you the big picture of your network's overall health and well being. So, if you need to analyze and prioritize everything from how much of your bandwidth is devoted to browsing ESPN.com, to the most targeted machines in your IDS logs, this is the book for you. This book teaches IT professionals how to analyze, manage, and automate their security log files to generate useful, repeatable information that can be use to make their networks more efficient and secure using primarily open source tools. The book begins by discussing the "Top 10" security logs that every IT professional should be regularly analyzing. These 10 logs cover everything from the top workstations sending/receiving data through a firewall to the top targets of IDS alerts. The book then goes on to discuss the relevancy of all of this information. Next, the book describes how to script open source reporting tools like Tcpdstats to automatically correlate log files from the various network devices to the "Top 10" list. By doing so, the IT professional is instantly made aware of any critical vulnerabilities or serious degradation of network performance. All of the scripts presented within the book will be available for download from the Syngress Solutions Web site.
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of Juniper Networks' Security Engineering team and a few guest experts reveal how to use, tweak, and push the most popular network security applications, utilities, and tools available using Windows, Linux, Mac OS X, and Unix platforms. Designed to be browsed, Security Power Tools offers you multiple approaches to network security via 23 cross-referenced chapters that review the best security tools on the planet for both black hat techniques and white hat defense tactics. It's a must-have reference for network administrators, engineers and consultants with tips, tricks, and how-to advice for an assortment of freeware and commercial tools, ranging from intermediate level command-line operations to advanced programming of self-hiding exploits. Security Power Tools details best practices for: Reconnaissance -- including tools for network scanning such as nmap; vulnerability scanning tools for Windows and Linux; LAN reconnaissance; tools to help with wireless reconnaissance; and custom packet generation Penetration -- such as the Metasploit framework for automated penetration of remote computers; tools to find wireless networks; exploitation framework applications; and tricks and tools to manipulate shellcodes Control -- including the configuration of several tools for use as backdoors; and a review of known rootkits for Windows and Linux Defense -- including host-based firewalls; host hardening for Windows and Linux networks; communication security with ssh; email security and anti-malware; and device security testing Monitoring -- such as tools to capture, and analyze packets; network monitoring with Honeyd and snort; and host monitoring of production servers for file changes Discovery -- including The Forensic Toolkit, SysInternals and other popular forensic tools; application fuzzer and fuzzing techniques; and the art of binary reverse engineering using tools like Interactive Disassembler and Ollydbg A practical and timely network security ethics chapter written by a Stanford University professor of law completes the suite of topics and makes this book a goldmine of security information. Save yourself a ton of headaches and be prepared for any network security dilemma with Security Power Tools.
Attackers are increasingly focusing their attention on the application layer; visionary banks have responded by proactively testing their entire suite of applications. It is not enough any more to test only the public facing Internet banking application. The ease with which many attacks can be carried out now requires that all applications, including internal applications, be tested. "Security Testing Handbook for Banking Applications" is a specialized guide to testing a wide range of banking applications. The book is intended as a companion to security professionals, software developers and QA professionals who work with banking applications. The book is a manual for compliance with current and future regulatory compliance requirements; it may also be seen simply as a practical and comprehensive guide to best practice application security to support every person involved in this field. The authors are all part of a large Application Security team at Paladion; between them they have tested over three hundred banking applications. Within this book the authors share their experiences of using a structured approach to security testing, look at the checklist used for testing, discuss different banking applications and see how these can be tested effectively.
This handy little book is an indispensable reference to information presented in O'Reilly's larger volumes, sed & awk, 2nd Edition and Effective awk Programming. A perfect pocket- sized guide, sed & awk Pocket Reference offers a concise summary of regular expressions and pattern matching, and summaries of sed and awk. The book emphasizes the kinds of practical problems that sed and awk can help users solve, with many example scripts and programs. Also included is a summary of sed and awk's functions and commands, with expanded coverage of TCP/IP networking and internationalization with gawk.
The sed & awk Pocket Reference is a handy, quick reference guide to frequently used functions, commands, and regular expressions used for day-to-day text processing needs. This book is a companion to both sed & awk, Second Edition and Effective awk Programming, Third Edition.
sed & awk describes two text manipulation programs that are mainstays of the UNIX programmer's toolbox. This edition covers the sed and awk programs as they are mandated by the POSIX standard and includes discussion of the GNU versions of these programs.
The Select Series: Steps for Success, Projects for Perspective. The Select family of texts boasts a lively look and feel that takes a step-by-step approach to teaching Word 2002 tasks. Not only does the student step through the tasks, but the emphasis on projects in this series gives the student practical knowledge of Word 2002. Microsoft Certified to the EXPERT level, these texts contain the depth of coverage your students need.
This innovative text simplifies the process of choosing a major from a sometimes overwhelming array of majors and related career fields. It will assist not only the "undecided" student with selecting a major, but also the "major-changer" who is exploring alternative options. A step-by-step process leads students through personal and academic assessment as well as occupational information searches. Through thought-provoking activities, they can explore their academic, career, and personal interests and goals. Students can investigate academic majors from many perspectives, including a search of majors in general, majors on their campus, and majors based on their academic and occupational interests. Highlights of this text include: *A Natural Decision-Making Progression. Students are directly and personally involved in activities that involve exploration, reflection, and choice. *Extensive Major Exploration. Three distinct approaches help students narrow their list to realistic alternatives. *Incorporation of Academic and Career Interests, Abilities, and Values. Self-assessment gives students information on which to base their choice of a major. *Formulation of a Graduation Plan. Students use their academic transcripts to summarize all they have learned and develop a plan for the future. Features include: *Majors Exploration *Career Advice *Web Links *Tips from Successful Students *Student Bulletin Boards *Faculty Resources
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system--including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE--all of it free and open source. SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days--when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system--are prevented on a properly administered SELinux system. The key, of course, lies in the words "properly administered." A system administrator for SELinux needs a wide range of knowledge, such as the principles behind the system, how to assign different privileges to different groups of users, how to change policies to accommodate new software, and how to log and track what is going on. And this is where SELinux is invaluable. Author Bill McCarty, a security consultant who has briefed numerous government agencies, incorporates his intensive research into SELinux into this small but information-packed book. Topics include: A readable and concrete explanation of SELinux concepts and the SELinux security model Installation instructions for numerous distributions Basic system and user administration A detailed dissection of the SELinux policy language Examples and guidelines for altering and adding policies With SELinux , a high-security computer is within reach of any system administrator. If you want an effective means of securing your Linux system--and who doesn't?--this book provides the means.
Selling the Dream: How to Promote Your Product, Company, or Ideas - And Make A Difference - Using Everyday Evangelismby Guy Kawasaki
Former product manager for Apple Computers, Guy Kawasaki, discusses a new selling technique he names "evangelism."
Selling Used Books Online: The Complete Guide to Bookselling at Amazon's Marketplace and Other Online Sitesby Stephen Windwalker Genevieve Kazdin
Discusses how to get started selling used books online, with an emphasis on amazon.com. Also covers the basics of starting and running a business.
The development of the Semantic Web, with machine-readable content, has the potential to revolutionize the World Wide Web and its use. A Semantic Web Primer provides an introduction and guide to this still emerging field, describing its key ideas, languages, and technologies. Suitable for use as a textbook or for self-study by professionals, it concentrates on undergraduate-level fundamental concepts and techniques that will enable readers to proceed with building applications on their own and includes exercises, project descriptions, and annotated references to relevant online materials. A Semantic Web Primer provides a systematic treatment of the different languages (XML, RDF, OWL, and rules) and technologies (explicit metadata, ontologies, and logic and inference) that are central to Semantic Web development as well as such crucial related topics as ontology engineering and application scenarios. This substantially revised and updated second edition reflects recent developments in the field, covering new application areas and tools. The new material includes a discussion of such topics as SPARQL as the RDF query language; OWL DLP and its interesting practical and theoretical properties; the SWRL language (in the chapter on rules); OWL-S (on which the discussion of Web services is now based). The new final chapter considers the state of the art of the field today, captures ongoing discussions, and outlines the most challenging issues facing the Semantic Web in the future. Supplementary materials, including slides, online versions of many of the code fragments in the book, and links to further reading, can be found at www.semanticwebprimer.org.
Select your format based upon: 1) how you want to read your book, and 2) compatibility with your reading tool. To learn more about using Bookshare with your device, visit the "Using Bookshare" page in the Help Center.
Here is an overview of the specialized formats that Bookshare offers its members with links that go to the Help Center for more information.
- Bookshare Web Reader - a customized reading tool for Bookshare members offering all the features of DAISY with a single click of the "Read Now" link.
- DAISY (Digital Accessible Information System) - a digital book file format. DAISY books from Bookshare are DAISY 3.0 text files that work with just about every type of access technology that reads text. Books that contain images will have the download option of ‘DAISY Text with Images’.
- BRF (Braille Refreshable Format) - digital Braille for use with refreshable Braille devices and Braille embossers.
- MP3 (Mpeg audio layer 3) - Provides audio only with no text. These books are created with a text-to-speech engine and spoken by Kendra, a high quality synthetic voice from Ivona. Any device that supports MP3 playback is compatible.
- DAISY Audio - Similar to the Daisy 3.0 option above; however, this option uses MP3 files created with our text-to-speech engine that utilizes Ivona's Kendra voice. This format will work with Daisy Audio compatible players such as Victor Reader Stream and Read2Go.