Browse Results

Showing 53,426 through 53,450 of 53,721 results

Programming the Raspberry Pi: Getting Started with Python

by Simon Monk

<P>The Raspberry Pi is rapidly becoming a worldwide phenomena.<P> People are waking up to the possibility of a $35 (U.S.) computer that can be put to use in all sorts of settings--from a desktop workstation to a media center to a controller for a home automation system.

CompTIA A+ Certification Study Guide (Exams 220-801 & 220-802), Eighth Edition

by Jane Holcombe Charles Holcombe

This Study Guide helps you prepare for and pass the required exams so you can begin to reap the career benefits of CompTIA A+ certification. This book will also serve you as a valuable professional resource after your exams. The book is organized in such a way as to serve as an in-depth review for the 2012 CompTIA A+ exams: Exam 220-801 and Exam 220-802. Each chapter covers a major aspect of the exams, with an emphasis on the "why" as well as the "how to" of IT support in the areas of installation, configuration, and maintenance of devices, PCs, and software; networking and security/forensics; diagnosis, resolution, and documentation of common hardware and software issues; troubleshooting; virtualization; desktop imaging; and deployment.

Network Security: A Beginner's Guide (Third Edition)

by Eric Maiwald

Security Smarts for the Self-Guided IT Professional Defend your network against a wide range of existing and emerging threats. Written by a Certified Information Systems Security Professional with more than 20 years of experience in the field, Network Security: A Beginner's Guide, Third Edition is fully updated to include thelatest and most effective security strategies. You'll learn about the four basic types of attacks, how hackers exploit them, and how to implement information security services to protect information and systems. Perimeter, monitoring, and encryption technologies arediscussed in detail. The book explains how to create and deploy an effective security policy, manage and assess risk, and perform audits. Information security best practices and standards, including ISO/IEC 27002, arecovered in this practical resource. Network Security: A Beginner's Guide, ThirdEdition features: Lingo--Common security terms defined so that you're in the know on the job IMHO--Frank and relevant opinions based on theauthor's years of industry experience Budget Note--Tips for getting security technologies and processes into your organization's budget In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to applynew skills and techniques at work

The Laws of Subtraction: 6 Simple Rules for Winning in the Age of Excess Everything

by Matthew May

Winner of a 2013 Small Business Book Award for Economics The world is more overwhelming than ever before. Our work is deeper and more demanding than ever. Our businesses are more complicated and difficult to manage than ever. Our economy is more uncertain than ever. Our resources are scarcer than ever. There is endless choice and feature overkill in all but the best experiences. Everybody knows everything about us. The simple life is a thing of the past. Everywhere, there's too much of the wrong stuff and not enough of the right. The noise is deafening, the signal weak. Everything is too complicated and time-sucking. Welcome to the age of excess everything. Success in this new age looks different and demands a new skill: Subtraction. Subtraction is defined simply as the art of removing anything excessive, confusing, wasteful, unnatural, hazardous, hard to use, or ugly . . . or the discipline to refrain from adding it in the first place. And if subtraction is the new skill to be acquired, we need a guide to developing it. Enter The Laws of Subtraction. Through a dozen of the most compelling stories of breakthrough innovation culled from 2,000 cases and bolstered by uniquely personal essays contributed by over 50 of the most creative minds in business today, The Laws of Subtraction outlines six simple rules for winning in the age of excess everything, and delivers a single yet powerful idea: When you remove just the right things in just the right way, something very good happens. The Laws of Subtraction features contributions by over 50 highly regarded thinkers, creatives, and executives. On Law #1: What Isn't There Can Often Trump What Is "When you reduce the number of doors that someone can walk through, more people walk through the one that you want them to walk through. " -- SCOTT BELSKY, founder and CEO of Behance and author of Making Ideas Happen On Law #2: The Simplest Rules Create the Most Effective Experience "Keeping it simple isn't easy. By exploiting subtraction in innovation, we've been able to create an environment of freedom and creativity that allows us to thrive. " -- BRAD SMITH, CEO, Intuit On Law #3: Limiting Information Engages the Imagination "Subtraction can mean the difference between a highly persuasive presentation and a long, convoluted, and confusing one. Why say more when you can say less?" -- CARMINE GALLO, author of The Apple Experience On Law #4: Creativity Thrives Under Intelligent Constraints "Here's the key to the conundrum for managers who want to stoke the innovation fire: That close cousin of scarcity, constraint, can indeed foster creativity. " -- TERESA AMABILE, author of The Progress Principle On Law #5: Break Is the Important Part of Breakthrough "If you kill the butterflies in your stomach, you'll kill the dream. Embrace the feeling. Save the butterflies. " -- JONATHAN FIELDS, author of Uncertainty On Law #6: Doing Something Isn't Always Better Than Doing Nothing "When we're faced with the greatest odds against us, often we need to edit rather than add. " -- CHIP CONLEY, cofounder of Joie de Vivre Hospitality and author of Emotional Equations

Comptia A+ Certification All-In-One Exam Guide (Exams 220-801 & 220-802)

by Michael Meyers

The bestselling CompTIA A+ reference and test preparation guide--fully revised for the new 2012 exam topics Written by the leading authority on CompTIA A+ certification and training, the new edition of this trusted resource offers complete, up-to-date coverage of CompTIA A+ exams 220-801 and 220-802. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Prepare for the exams with confidence! McGraw-Hill is a Gold-Level CompTIA Authorized Partner offering Authorized CompTIA Approved Quality Content to give you the competitive edge on exam day. This comprehensive guide also serves as an essential on-the-job reference after certification. Covers all exam objectives, including how to: Work with CPUs, RAM, BIOS settings, motherboards, power supplies, and other PC components Install, configure, and troubleshoot hard drives Manage input devices and removable media Install, upgrade, and troubleshoot Windows XP, Windows Vista, and Windows 7 Troubleshoot all common PC problems Install video and multimedia cards Work with smartphones, tablets, and other mobile devices Install and configure wired and wireless networks Connect to the Internet Protect your PC and your network Install, configure, and manage printers Work with virtualization technologies Understand safety and environmental issues Electronic content includes: Practice exams for 801 & 802 with hundreds of questions More than one hour of free video training from Mike Meyers A collection of Mike's latest favorite shareware and freeware PC tools and utilities Adobe Digital Edition eBook--free download (subject to Adobe's system requirements)

All in One CompTIA Network+: Exam N10-005 (Fifth Edition)

by Mike Meyers

Written by CompTIA certification and training expert Mike Meyers, this authoritative exam guide features learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the CompTIA Network+ exam with ease, this definitive volume also serves as an essential on-the-job reference.

Wireless Network Security

by Brock Pearson Tyler Wrightson

Security Smarts for the Self-Guided IT Professional Protect wireless networks against all real-world hacks by learning how hackers operate. "Wireless Network Security: A Beginner's Guide" discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included. This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away. "Wireless Network Security: A Beginner's Guide" features: Lingo--Common security terms defined so that you re in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work "This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. " - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012) "

HTML & XHTML Demystified

by Lee Cottrell

Hard stuff made easy! Your practical, self-paced guide to HTML and XHTML HTML and XHTML Demystified is a hands-on tutorial that gives you thorough guidance on required Web design techniques and technologies. The book also functions as a useful supplement for textbooks and classroom activities by focusing on the essentials and the most useful tags and properties, while avoiding unnecessary details. Learn to create Web pages, add graphics and links, create tables and frames, integrate forms, and more. Each chapter features valid HTML that follows all of the rules set by the W3C and incorporates the latest standards for HTML5. Web designers need to write pages that are accessible to all users, so each chapter is coded to address the accessibility requirements from the Americans with Disabilities Act and to allow the use of non-English characters. HTML and XHTML Demystified Covers HTML, XHTML, HTML5, and CSS Develops two stand-alone examples per chapter: one created by the author; the other for you to practice Helps you recognize and resolve common HTML errors Includes end-of-chapter quizzes and a final exam to reinforce learning Step-by-step coverage: HTML and The Web; Your First Web Pages; Inserting Graphics; Creating Hyperlinks; Using Lists; Building Tables; Gathering Data with Forms; Page Layout; Scripting; DHTML; Effectively Using Multimedia; Using Frames; Creating a Web Site

Gray Hat Hacking: The Ethical Hacker's Handbook (Third Edition)

by Allen Harper Shon Harris Jonathan Ness Chris Eagle Gideon Lenkey Terron Williams

This book provides a holistic review of ethical hacking. It is developed by and for security professionals who are dedicated to working in an ethical and responsible manner to improve the overall security posture of individuals, corporations, and nations.

Comptia A+ Certification: All-in-One Exam Guide (7th Edition)

by Michael Meyers

Get complete coverage of the latest release of the CompTIA A+ exams inside this fully revised and updated resource. Written by the leading authority on CompTIA A+ certification and training, this expert guide covers CompTIA A+ exams 220-701 and 220-702. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, in-depth explanations, and more than 1,000 photographs and illustrations. Designed to help you pass the CompTIA A+ exams with ease, this definitive volume also serves as an essential on-the-job IT reference. Covers all exam objectives, including how to: Work with CPUs, RAM, motherboards, power supplies, and other PC components Install, partition, and format hard drives Install, upgrade, and troubleshoot Windows 2000, Windows XP, and Windows Vista Troubleshoot PCs and implement security measures Install video and multimedia cards Work with portable PCs, PDAs, smartphones, and wireless technologies Manage printers and connect to networks and the Internet Understand safety and environmental issues Establish good communication skills and adhere to privacy policies The CD-ROM features: Practice exams for 701 & 702 600+ chapter review questions New video introduction to CompTIA A+ One-hour video training segment Mike's favorite PC tools and utilities Searchable e-book Mike Meyers, CompTIA A+, CompTIA Network+, MCP, is the industry's leading authority on CompTIA A+ certification and training. He is the president and founder of Total Seminars, LLC, a major provider of PC and network repair seminars for thousands of organizations throughout the world, and a member of CompTIA.

Turn Clicks Into Customers: Proven Marketing Techniques For Converting Online Traffic Into Revenue

by Duane Forrester

THE MAIN PURPOSE of this book is to help you monetize your Web site. While that might sound exciting, keep in mind that it takes a lot of work to accomplish. Whether you have a small or large Web site is immaterial for this discussion--scale matters less than structure and your willingness to follow specific best practices.

Computer Forensics: Secrets and Solutions (Second Edition)

by Aaron Philipp David Cowen Chris Davis

"Provides the right mix of practical how-to knowledge in a straightforward, informative fashion that ties it all the complex pieces together with real-world case studies. . . . Delivers the most valuable insight on the market. The authors cut to the chase of what people must understand to effectively perform computer forensic investigations. " --Brian H. Karney, COO, AccessData Corporation The latest strategies for investigating cyber-crime Identify and investigate computer criminals of all stripes with help from this fully updated. real-world resource. Hacking Exposed Computer Forensics, Second Edition explains how to construct a high-tech forensic lab, collect prosecutable evidence, discover e-mail and system file clues, track wireless activity, and recover obscured documents. Learn how to re-create an attacker's footsteps, communicate with counsel, prepare court-ready reports, and work through legal and organizational challenges. Case studies straight from today's headlines cover IP theft, mortgage fraud, employee misconduct, securities fraud, embezzlement, organized crime, and consumer fraud cases. Effectively uncover, capture, and prepare evidence for investigation Store and process collected data in a highly secure digital forensic lab Restore deleted documents, partitions, user activities, and file systems Analyze evidence gathered from Windows, Linux, and Macintosh systems Use the latest Web and client-based e-mail tools to extract relevant artifacts Overcome the hacker's anti-forensic, encryption, and obscurity techniques Unlock clues stored in cell phones, PDAs, and Windows Mobile devices Prepare legal documents that will hold up to judicial and defense scrutiny

24 Deadly Sins Of Software Security: Programming Flaws And How To Fix Them

by Michael Howard David LeBlanc John Viega

Fully updated to cover the latest security issues, 24 Deadly Sins of Software Security reveals the most common design and coding errors and explains how to fix each one-or better yet, avoid them from the start. Michael Howard and David LeBlanc, who teach Microsoft employees and the world how to secure code, have partnered again with John Viega, who uncovered the original 19 deadly programming sins. They have completely revised the book to address the most recent vulnerabilities and have added five brand-new sins. This practical guide covers all platforms, languages, and types of applications. Eliminate these security flaws from your code:

Hacking Exposed: Network Security Secrets and Solutions (6th Edition)

by Stuart Mcclure Joel Scambray George Kurtz

Meet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal. New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

Hacking Exposed Windows: Microsoft Security Secrets and Solutions (Third Edition)

by Joel Scambray Stuart Mcclure

Meet the challenges of Windows security with the exclusive Hacking Exposed "attack-countermeasure" approach. Learn how real-world malicious hackers conduct reconnaissance of targets and then exploit common misconfigurations and software flaws on both clients and servers. See leading-edge exploitation techniques demonstrated, and learn how the latest countermeasures in Windows XP, Vista, and Server 2003/2008 can mitigate these attacks. Get practical advice based on the authors' and contributors' many years as security professionals hired to break into the world's largest IT infrastructures. Dramatically improve the security of Microsoft technology deployments of all sizes when you learn to: Establish business relevance and context for security by highlighting real-world risks Take a tour of the Windows security architecture from the hacker's perspective, exposing old and new vulnerabilities that can easily be avoided Understand how hackers use reconnaissance techniques such as footprinting, scanning, banner grabbing, DNS queries, and Google searches to locate vulnerable Windows systems Learn how information is extracted anonymously from Windows using simple NetBIOS, SMB, MSRPC, SNMP, and Active Directory enumeration techniques Prevent the latest remote network exploits such as password grinding via WMI and Terminal Server, passive Kerberos logon sniffing, rogue server/man-in-the-middle attacks, and cracking vulnerable services See up close how professional hackers reverse engineer and develop new Windows exploits Identify and eliminate rootkits, malware, and stealth software Fortify SQL Server against external and insider attacks Harden your clients and users against the latest e-mail phishing, spyware, adware, and Internet Explorer threats Deploy and configure the latest Windows security countermeasures, including BitLocker, Integrity Levels, User Account Control, the updated Windows Firewall, Group Policy, Vista Service Refactoring/Hardening, SafeSEH, GS, DEP, Patchguard, and Address Space Layout Randomizationion

Guide to Internet Job Searching: 2002-03 Edition

by Frances E. Roehm Margaret Riley Dikel

Copublished by America's foremost career books publisher and the Public Library Association, the acclaimed Guide to Internet Job Searching helps you harness the power of the Internet to aid in your job search. The Internet has revolutionized the way people look for career opportunities, and with this guide, you, too, can efficiently and successfully explore the Web to find the right job for you. This bestselling guide shows you how to target the most interesting jobs in the most promising companies and apply for those jobs with confidence-online or on paper. And it will steer you away from electronic "dead ends" such as unproductive searches that turn up thousands of near misses. Whether you are a complete beginner or an online expert, you'll find invaluable advice inside to make your Internet job search streamlined, efficient, and effective-from logging on to landing the perfect job. Margaret Riley Dikel, author of The Riley Guide (rileyguide.com), is a private consultant specializing in the use of the Internet for employment and career information. She is an internationally recognized authority in this field, having worked for many prominent governmental agencies and public and private corporations. Frances E, Roehm is the SkokieNet librarian at the Skokie (Illinois) Public Library where she specializes in building the village's community online. She is also the webmaster for ChicagoJobs.org, a regional resource for Chicagoland job hunters and career changers, and assists individuals in using the Internet to find a job. She currently chairs the PLA Job and Career Information Services committee.

How to Be a Successful Online Student

by Sara Dulaney Gilbert

According to the National Center for Education Statistics more than 85% of public universities offer non-residential long-distance learning and courses, degrees, or career credentials.

Paradigm Shift: The New Promise of Information Technology

by Don Tapscott Art Caston

The old, unresponsive bureaucracy simply doesn't work in today's volatile, open, global business environment. However, the computing systems in today's organization seem unable to deliver the goods for corporate rebirth.

The Internet Bubble: Inside the Over-valued world of High Tech Stocks and What You Need to Know to Avoid the Coming Shakeout

by Anthony B. Perkins Michael C. Perkins

This book exposes the incredible rise of the Silicon Valley wealth machine, before the bubble burst.

Pride Before the Fall: The Trials of Bill Gates and the End of the Microsoft Era

by John Heilemann

Pride Before the Fall is the definitive account of the trial that shook an economy: United States v. Microsoft. Award-winning journalist John Heilemann uncovers the explosive truth behind the headlines: how the high-tech kingpins Bill Gates had tried to destroy, together with a motley crew of anonymous crusaders, worked in secret to help the government take down the most powerful empire of the information age. As colorful and riveting as a detective novel, Pride Before the Fall is an unforgettable tale of human ambition and human frailty - a timely saga of arrogance, hubris, ruthlessness, and revenge.e

Just for Fun: The Story of an Accidental Revolutionary

by Linus Torvalds David Diamond

In a narrative that zips along with the speed of e-mail, Torvalds gives a history of his renegade software while candidly revealing the quirky mind of a genius.

Day Trading Attention: How to Actually Build Brand and Sales in the New Social Media World

by Gary Vaynerchuk

“One thing I've learned being around Gary for the last decade is that when he sees new consumer trends or new best practices in marketing, people should listen and act on them.” — Michael Rubin, CEO of Fanatics In his seventh business book, bestselling author, entrepreneur, and investor Gary Vaynerchuk offers fresh, in-depth advice to enhance brand development, grow sales, and beat the competition using modern advertising strategies grounded in social media.In his 2013 bestseller Jab, Jab, Jab, Right Hook, Gary Vaynerchuk showed the world how to create winning content for underpriced attention channels. But since then, new platforms have emerged, others have become less relevant, and algorithms are incentivizing new styles of content. New skills are necessary to create advertising that builds brand and sales.In his latest book, Vaynerchuk argues that today’s fast-growing businesses, brands, content creators, and influencers have one thing in common: They mastered storytelling in areas of underpriced attention, which predominantly exists across a handful of social media platforms. Informed by 20+ years of business and marketing success, he contends that the biggest transformation and opportunity is the “TikTokification of Social Media.” Increasingly, platforms are distributing content based on what users are interested in, rather than who they follow. In Day Trading Attention, Gary offers detailed advice on how small businesses, large corporations, and creators can:Understand attention—what it is, where it is, where it’s underpriced, and how to leverage itProduce relevant, strategic content Use modern advertising platforms to build brand and grow sales in today’s rapidly changing environment

Inside the World of Adopt Me! (Adopt Me!)

by Uplift Games Llc

Inside the World of Adopt Me! has descriptive copy which is not yet available from the Publisher.

Web3: Charting the Internet's Next Economic and Cultural Frontier

by Alex Tapscott

A WALL STREET JOURNAL AND GLOBE AND MAIL BESTSELLER An essential introduction and guide to navigating the next Internet revolution—everything from the metaverse and NFTs to DAOs, decentralized finance, and self-sovereign identity—from the co-author of the international bestseller Blockchain Revolution.The Web, and with it the Internet, are entering a new age. We’ve moved from the “Read-only Web,” which had little functionality for interacting with content, to the “Read-Write Web,” which offered seemingly endless collaborative opportunities, from sharing with our favorite people to shopping at our favorite brands. But the profusion of cyberattacks, data hacks, and online profiling have left many of us to view digital life as a Faustian bargain in need of a major rethink.That rethink is Web3, the “Read-Write-Own Web”—a decentralized Internet where individuals own their own identities and can securely trade assets like money, securities, intellectual property, and art peer to peer. Made possible by blockchains, the foundational technology of bitcoin, Web3 promises the biggest shake up of business since the invention of double-entry bookkeeping in the Middle Ages. It is the Internet’s new frontier.In Web3, award-winning author and technology investor Alex Tapscott provides a cutting-edge guide to the Internet’s next era. Covering everything from the metaverse and non-fungible tokens to DAOs, decentralized finance, and self-sovereign identity, this indispensable, forward-thinking book describes the building blocks and often hidden technologies that will be foundational to our cultural and economic progress.

Joyful Recollections of Trauma

by Paul Scheer

From award-winning actor and comedian Paul Scheer, a candid and hilarious memoir-in-essays on coming to terms with childhood trauma and finding the joy in embracing your authentic self.Paul Scheer has entertained countless fans and podcast listeners with stories about the odd, wild, and absurd details of his life. Yet these tales have pointed to deeper, more difficult truths that the actor and comedian has kept to himself. Now, he is finally ready to share those truths for the first time—but, of course, with a healthy dose of humor.Blending the confident, affable voice that has won him a dedicated following with a refreshing level of candor, Joyful Recollections of Trauma chronicles Paul’s often shocking, admittedly tumultuous childhood and how the experiences of his youth have reverberated throughout his life. In his comedy, Paul has always been unafraid to “go there,” to play naïve, cringeworthy characters, imbuing them with disarming charm and humanity. That daring openness is on display in the pages of this memoir, but in true Paul fashion, it is also surprising, eye-opening, and side-splitting.In this madcap journey through the inner working of his mind and creative process, Paul Scheer demonstrates once again that the truth is often stranger—and funnier—than fiction. Joyful Recollections of Trauma offers a unique perspective on universal themes: growing up, working through a challenging childhood, staying true to yourself, and finding success, fulfillment, and happiness in often strange and difficult circumstances. Throughout, Paul shares both the hard-fought lessons and the laughter that can be found in the darkest parts of life, and reminds us that what matters is not what you’ve been through but who you are becoming. If you loved recent memoirs by Molly Shannon, Maria Bamford, RuPaul, and Jennette McCurdy—or any book that moves you to both laughter and tears—Joyful Recollections of Trauma is the perfect read for you.

Refine Search

Showing 53,426 through 53,450 of 53,721 results