Books in Print

Titre : Books in Print
Auteur :
Éditeur :
ISBN-13 : UOM:39015049090585
Libération : 2001

Télécharger Lire en ligne



Books in print is the major source of information on books currently published and in print in the United States. The database provides the record of forthcoming books, books in-print, and books out-of-print.

Origins of the Crash

Titre : Origins of the Crash
Auteur : Roger Lowenstein
Éditeur : Penguin
ISBN-13 : 1594200033
Libération : 2004-01-01

Télécharger Lire en ligne



A financial journalist presents an analysis of the stock market and economics of the 1990s, examining the causes of the crisis and discussing the collapse of Enron, the dot-com bubble, and the accounting scandal and Andersen.

The Art of UNIX Programming

Titre : The Art of UNIX Programming
Auteur : Eric S. Raymond
Éditeur : Addison-Wesley Professional
ISBN-13 : 0132465884
Libération : 2003-09-23

Télécharger Lire en ligne



The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers. This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of "hackers" the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.

Encyclopedia of Computer Science and Technology

Titre : Encyclopedia of Computer Science and Technology
Auteur : Harry Henderson
Éditeur : Infobase Publishing
ISBN-13 : 9781438110035
Libération : 2009-01-01

Télécharger Lire en ligne



Presents an illustrated A-Z encyclopedia containing approximately 600 entries on computer and technology related topics.

Anti hacker Tool Kit

Titre : Anti hacker Tool Kit
Auteur : Mike Shema
Éditeur : McGraw-Hill Osborne Media
ISBN-13 : 0072230207
Libération : 2004

Télécharger Lire en ligne



Presents a useful resource for network professionals looking to protect their systems. This book is a companion to Hacking Exposed.

10 PRINT CHR 205 5 RND 1 GOTO 10

Titre : 10 PRINT CHR 205 5 RND 1 GOTO 10
Auteur : Nick Montfort
Éditeur : MIT Press
ISBN-13 : 9780262304573
Libération : 2012-11-23

Télécharger Lire en ligne



This book takes a single line of code -- the extremely concise BASIC program for the Commodore 64 inscribed in the title -- and uses it as a lens through which to consider the phenomenon of creative computing and the way computer programs exist in culture. The authors of this collaboratively written book treat code not as merely functional but as a text -- in the case of 10 PRINT, a text that appeared in many different printed sources -- that yields a story about its making, its purpose, its assumptions, and more. They consider randomness and regularity in computing and art, the maze in culture, the popular BASIC programming language, and the highly influential Commodore 64 computer.

Google Hacking for Penetration Testers

Titre : Google Hacking for Penetration Testers
Auteur : Johnny Long
Éditeur : Syngress
ISBN-13 : 0080478050
Libération : 2004-12-17

Télécharger Lire en ligne



Google, the most popular search engine worldwide, provides web surfers with an easy-to-use guide to the Internet, with web and image searches, language translation, and a range of features that make web navigation simple enough for even the novice user. What many users don’t realize is that the deceptively simple components that make Google so easy to use are the same features that generously unlock security flaws for the malicious hacker. Vulnerabilities in website security can be discovered through Google hacking, techniques applied to the search engine by computer criminals, identity thieves, and even terrorists to uncover secure information. This book beats Google hackers to the punch, equipping web administrators with penetration testing applications to ensure their site is invulnerable to a hacker’s search. Penetration Testing with Google Hacks explores the explosive growth of a technique known as "Google Hacking." When the modern security landscape includes such heady topics as "blind SQL injection" and "integer overflows," it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. Readers will learn how to torque Google to detect SQL injection points and login portals, execute port scans and CGI scans, fingerprint web servers, locate incredible information caches such as firewall and IDS logs, password databases, SQL dumps and much more - all without sending a single packet to the target! Borrowing the techniques pioneered by malicious "Google hackers," this talk aims to show security practitioners how to properly protect clients from this often overlooked and dangerous form of information leakage. *First book about Google targeting IT professionals and security leaks through web browsing. *Author Johnny Long, the authority on Google hacking, will be speaking about "Google Hacking" at the Black Hat 2004 Briefing. His presentation on penetrating security flaws with Google is expected to create a lot of buzz and exposure for the topic. *Johnny Long's Web site hosts the largest repository of Google security exposures and is the most popular destination for security professionals who want to learn about the dark side of Google.

Memory Management

Titre : Memory Management
Auteur : Bill Blunden
Éditeur : Wordware
ISBN-13 : 1556223471
Libération : 2001-12

Télécharger Lire en ligne



Memory Management: Algorithms and Implementation in C/C++ describes how to construct production-quality memory managers. This approach includes both high-performance explicit memory managers and more intricate garbage collectors like those popularized by the Java Virtual Machine. Every implementation is complemented by an in-depth presentation of theory, benchmark tests, extensive source code examples, and a discussion of each implementation's trade-offs.

End the Fed

Titre : End the Fed
Auteur : Ron Paul
Éditeur : Hachette UK
ISBN-13 : 9780446568180
Libération : 2009-09-16

Télécharger Lire en ligne



In the post-meltdown world, it is irresponsible, ineffective, and ultimately useless to have a serious economic debate without considering and challenging the role of the Federal Reserve. Most people think of the Fed as an indispensable institution without which the country's economy could not properly function. But in END THE FED, Ron Paul draws on American history, economics, and fascinating stories from his own long political life to argue that the Fed is both corrupt and unconstitutional. It is inflating currency today at nearly a Weimar or Zimbabwe level, a practice that threatens to put us into an inflationary depression where $100 bills are worthless. What most people don't realize is that the Fed -- created by the Morgans and Rockefellers at a private club off the coast of Georgia -- is actually working against their own personal interests. Congressman Paul's urgent appeal to all citizens and officials tells us where we went wrong and what we need to do fix America's economic policy for future generations.

The Shadow Factory

Titre : The Shadow Factory
Auteur : James Bamford
Éditeur : Anchor
ISBN-13 : 9780385528399
Libération : 2008-10-14

Télécharger Lire en ligne



James Bamford has been the preeminent expert on the National Security Agency since his reporting revealed the agency’s existence in the 1980s. Now Bamford describes the transformation of the NSA since 9/11, as the agency increasingly turns its high-tech ears on the American public. The Shadow Factory reconstructs how the NSA missed a chance to thwart the 9/11 hijackers and details how this mistake has led to a heightening of domestic surveillance. In disturbing detail, Bamford describes exactly how every American’s data is being mined and what is being done with it. Any reader who thinks America’s liberties are being protected by Congress will be shocked and appalled at what is revealed here. From the Trade Paperback edition.