Book 6 : Descent of Angels

Image

filetype : ePUB

Descriptions :

Zahariel El’Zurias, a boy native to Caliban, is inducted into the Order, an organisation of knights dedicated to defending the people of Caliban from its many predatory beasts. His induction takes the form of mock interrogation where he is questioned by three of the Order’s leaders: Lion El’JonsonLuther and Cypher. He passes the induction and trains as a knight-supplicant alongside his best friend and cousin Nemiel, with whom he shares a competitive rivalry. While the boys train, the knights of the Order continue to carry out Jonson’s grand plan to hunt Caliban’s Great Beasts to extinction, though the Lion reveals to Zahariel during an minor initiation that the hunt is almost at an end with the near-impenetrable Northwilds the only remaining stronghold of the beasts. During a scouting mission led by Zahariel’s hero Amadis, Zahariel’s squad comes under attack by a Great Beast and takes casualties. Zahariel risks his own life to keep the beast distracted from his friends, and while Amadis kills the beast he ensures that Zahariel is recognised for his actions, earning him attention from the Order’s upper echelons. Amadis begins mentoring Zahariel and Nemiel’s jealousy makes their rivalry less friendly than before, though they remain close.

Continue reading

Arduino Programming in 24 Hours, Sams Teach Yourself

Image

filetype : ePUB

Descriptions :

n just 24 sessions of one hour or less, Sams Teach Yourself Arduino Programming in 24 Hours teaches you C programmingon Arduino, so you can start creating inspired “DIY” hardwareprojects of your own! Using this book’s straightforward, step-by-stepapproach, you’ll walk through everything from setting up yourprogramming environment to mastering C syntax and features, interfacing your Arduino to performing full-fledged prototyping.Every hands-on lesson and example builds on what you’ve alreadylearned, giving you a rock-solid foundation for real-world success!

Continue reading

Creative Intelligence: Harnessing the Power to Create, Connect, and Inspire

Image

filetype : ePUB

Descriptions :

Offering insights from the spheres of anthropology, psychology, education, design, and business, Creative Intelligence by Bruce Nussbaum, a leading thinker, commentator, and curator on the subjects of design, creativity, and innovation, is first book to identify and explore creative intelligence as a new form of cultural literacy and as a powerful method for problem-solving, driving innovation, and sparking start-up capitalism.

Continue reading

Code To Zero

Image

filetype : ePUB

Descriptions :

January, 1958—the darkest hour of the cold war and the early dawn of the space race. On the launch pad at Cape Canaveral sits America’s best hope to catch up with the Russians—the Explorer I satellite. But at the last moment, the launch is delayed due to weather, even though everyone can see it is a perfectly sunny day.

Continue reading

Beginning Sensor Networks with Arduino and Raspberry Pi

Image

filetype : ePUB

Descriptions :

Beginning Sensor Networks with Arduino and Raspberry Pi teaches you how to build sensor networks with Arduino, Raspberry Pi, and XBee radio modules, and even shows you how to turn your Raspberry Pi into a MySQL database server to store your sensor data!

Continue reading

C++ Timesaving Techniques For Dummies

Image

filetype : PDF

Descriptions :

  • Seasoned C++ programmer Matthew Telles shows developers at any level of experience how to save hours by improving, refactoring, and debugging their code
  • Some of the techniques covered include mastering asserts, creating a complete class, hiding a method of a base class, freeing blocks of memory, implementing a simple locking mechanism, creating debugging macros, checking for errors at run-time, finding and fixing memory leaks, and reducing code complexity

Continue reading

The Three Waves of Volunteers and the New Earth

Image

filetype : ePUB

Descriptions :

In 1945 when the atomic bombs were dropped in WWII, our “protectors” and “watchers” in outer space saw that Earth was on a collision course with disaster. The prime directive of non-interference prevented them from taking any action, but then they came up with a brilliant plan to save Earth and assist her in her ascension. They couldn’t interfere from the “outside,” but maybe they could influence from the “inside.” So the call went out for volunteers to come and help. “Earth is in trouble – who wants to volunteer?”
Continue reading

Foundations of Computation – Carol Critchlow, David Eck

Image

Description

Foundations of Computation is a free textbook for a one-semester course in theoretical computer science. It has been used for several years in a course at Hobart and William Smith Colleges. The course has no prerequisites other than introductory computer programming. The first half of the course covers material on logic, sets, and functions that would often be taught in a course in discrete mathematics. The second part covers material on automata, formal languages, and grammar that would ordinarily be encountered in an upper level course in theoretical computer science. Continue reading

XML Hacks 100 Industrial-Strength Tips and Tools – Michael Fitzgerald

Image

filetype : ePUB

Descriptions :

Developers and system administrators alike are uncovering the true power of XML, the Extensible Markup Language that enables data to be sent over the Internet from one computer platform to another or one application to another and retain its original format. Flexible enough to be customized for applications as diverse as web sites, electronic data interchange, voice mail systems, wireless devices, web services, and more, XML is quickly becoming ubiquitous.

Continue reading

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier – Suelette Dreyfuss

Image

filetype : ePUB

Descriptions :

Underground is the compelling true story of the rise of the computer underground and the crimes of an elite group of hackers who took on the forces of the establishment.

Continue reading

Ubuntu Hacks: Tips & Tools for Exploring, Using, and Tuning Linux – Jonathan Oxer, Kyle Rankin, Bill Childers

Image

filetype : ePUB

Descriptions :

Ubuntu Linux–the most popular Linux distribution on the planet–preserves the spirit embodied in the ancient African word “ubuntu,” which means both “humanity to others” and “I am what I am because of who we all are.” Ubuntu won the “Linux Journal” Reader’s Choice Award for best Linux distribution and is consistently the top-ranked Linux variant on DistroWatch.com. The reason this distribution is so widely popular is that Ubuntu is designed to be useful, usable, customizable, and always available for free worldwide.

Continue reading

Network Security Hacks 100 Industrial-Strength Tips & Tools – Andrew Lockhart

Image

filetype : ePUB

Descriptions :

To the uninitiated, the title may seem like an oxymoron: after all, aren’t hacks what network security is supposed to prevent? But if you’re network administrator, this book’s title not only makes sense; it makes a lot of sense. You know that a busy administrator needs a hatful of devilishly effective security hacks to keep your 12-hour days from becoming all-nighters.

Continue reading

Hacking VoIP: Protocols, Attacks, and Countermeasures – Himanshu Dwivedi

Image

filetype : ePUB

Descriptions :

Voice over Internet Protocol (VoIP) networks have freed users from the tyranny of big telecom, allowing people to make phone calls over the Internet at very low or no cost. But while VoIP is easy and cheap, it’s notoriously lacking in security. With minimal effort, hackers can eavesdrop on conversations, disrupt phone calls, change caller IDs, insert unwanted audio into existing phone calls, and access sensitive information.

Continue reading

Hacking: The Next Generation – Nitesh Dhanjani, Billy Rios, Brett Hardin

Image

filetype : ePUB

Descriptions :

With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.

Continue reading

Hacking: The Art of Exploitation, 2nd Edition – Jon Erickson

Image

filetype : ePUB

Descriptions :

Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.

Continue reading

Hack Attack: How the truth caught up with Rupert Murdoch – Nick Davies

Image

filetype : ePUB

Descriptions :

At first, it seemed like a small story. The royal editor of the News of the World was caught listening to the voice-mail messages of staff at Buckingham Palace. He and a private investigator were jailed, and the case was closed. But Nick Davies, special correspondent for The Guardian, knew that it didn’t add up. He began to investigate, and ended up exposing a world of crime and cover-up, of fear and favor–the long shadow of Rupert Murdoch’s media empire.

Continue reading

Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques – Thomas Wilhem

Image

filetype : ePUB

Descriptions :

Ninja Hacking offers insight on how to conduct unorthodox attacks on computing networks, using disguise, espionage, stealth, and concealment. This book blends the ancient practices of Japanese ninjas, the historical Ninjutsu techniques in particular, with the present hacking methodologies.

Continue reading

The Basics of Hacking and Penetration Testing : Ethical Hacking and Penetration Testing Made Easy – Patrick Engebretson

Image

filetype : ePUB

Descriptions :

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you  to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

  • Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews
  • Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.
  • Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.
  • Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

Read More :

Get Yours :

Get Yours NOW

Multiupfile link

No Tech Hacking: A Guide to Social Engineering, Dumpster Diving, and Shoulder Surfing – Johnny Long

Image

filetype : ePUB

Descriptions :

Johnny Long’s last book sold 12,000 units worldwide. Kevin Mitnick’s last book sold 40,000 units in North America.
Continue reading

Google Hacking for Penetration Testers – Johnny Long

Image

filetype : ePUB

Descriptions :

This book helps people find sensitive information on the Web.
Google is one of the 5 most popular sites on the Internet with more than 380 million unique users per month (Nielsen/NetRatings 8/05). But, Google s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web including: social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers Volume 2 shows the art of manipulating Google used by security professionals and system administrators to find this sensitive information and self-police their own organizations.

Continue reading

Gray Hat Python – Justin Seitz

Image

filetype : ePUB

Descriptions :

Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it’s easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.

Continue reading

Coding Freedom: The Ethics and Aesthetics of Hacking – E. Gabriella Coleman

Image

filetype : ePUB

Descriptions :

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software–and to hacking as a technical, aesthetic, and moral project–reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source software (F/OSS) movement in the United States and Europe, Coding Freedom details the ethics behind hackers’ devotion to F/OSS, the social codes that guide its production, and the political struggles through which hackers question the scope and direction of copyright and patent law. In telling the story of the F/OSS movement, the book unfolds a broader narrative involving computing, the politics of access, and intellectual property.

Continue reading

Hacking Vim 7.2: Kim Schulz

Image

filetype : ePUB

Descriptions :

Vim is one of the most powerful open-source editors used by programmers and system administrators around the world. While Vim itself is inherently a powerful editor, personalizing it to suit your needs can be a daunting task. However, it is possible to do so with the help of this book.

Continue reading

The Blue Nowhere: A Novel

Image

filetype : ePUB

Descriptions :

Jeffrey Deaver may usually be a writer of traditional thrillers, but with The Blue Nowhere he joins the small group of authors who can convincingly depict the world of the computer hacker (Neal Stephenson and William Gibson being the best known of the others).

The basic plot of The Blue Nowhere is a computerised version of the Eddie Murphy film 48 Hours; a hacker is let out of prison to help the LAPD Computer Crimes Unit track down another hacker, who has the screen name Phate, who has turned serial killer. The actual crime plot is pretty hackneyed, but the computing background means that the novel is more than just a run of the mill police procedural. (The style, by the way, is similar to Michael Connelly.)

Continue reading

Exploding the Phone : The Untold Story of the Teenagers and Outlaws who Hacked Ma Bell

Image

filetype : ePUB

Descriptions :

Before smartphones, back even before the Internet and personal computer, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary “harmonic telegraph,” by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.

Continue reading

The Chronicles of Master Li and Number Ten Ox – Barry Hughart, Kaja Foglio

Image

Filetype : ePUB

Descriptions

When I got out of Andover in the 1950s I suffered from fairly severe depression, but this was back when the only such term recognized by the medical profession was ‘depressive’ following ‘manic’ which was one bad gig until some genius renamed it ‘bipolar disorder’ and after that it couldn’t harm a fly. Since I wasn’t lucky enough to qualify for manic and clinical depression didn’t exist they diagnosed schizophrenia and packed me off to a booby hatch. (Which was not entirely a bad thing. Man, the scene at Kings Count Psychotic Ward was like awesome!) Then I was promoted to a slightly less odorous asylum where Doctor Oscar Diethelm expounded upon the delights of going snickety-snick on my frontal lobes, and while it would take too long to explain I managed to escape to Columbia University. There I found myself groping through weird landscapes obscured by clouds of pot behind which pimpled prophets of the Beat Generation shrieked, ‘Our minds destroyed by madness, starving, hysterical, naked, dragging through black streets at dawn looking for an angry fix, or what the f*ck, something like that. Yo, daddy-o!’ and I said to myself, ‘Barry, you have found a home.’

Continue reading

The Merchant and the Alchemist’s Gate – Ted Chiang

Image

Filetype : ePUB

Descriptions

Fuwaad ibn Abbas, a fabric merchant, tells this story to the Caliph of Baghdad, perhaps in the classic “Arabian Nights” period of the Caliphate, as “a warning to those who would be warned and a lesson to those who would learn.”

Continue reading

Tortured Souls: The Legend of Primordium – Clive Barker, Bob Eggleton

Image

Filetype : ePUB

Descriptions

Tortured Souls is one of the most vividly imagined, tightly compressed novellas ever written by the incomparable Clive Barker. At once violent and erotic, brutal and strangely beautiful, it takes us into the heart of the legendary “first city” known as Primordium, the site of political upheaval, passionate encounters, and astonishing acts of transformation.

Continue reading

The Hobbit : Or There and Back Again – J.R.R. Tolkien, Peter Sis

Image

FileType : ePUB

Descriptions

J.R.R. Tolkien’s classic prelude to his Lord of the Rings trilogy featuring cover art by Caldecott Honor winning children’s book illustrator Peter Sís, this edition of The Hobbit has been specially formatted for young readers. Larger print size and wider margins provide reading ease for the youngest Tolkien fans. This quality digest edition also includes interior maps and original interior illustrations by J.R.R. Tolkien.

Continue reading

World War Z: An Oral History of the Zombie War – Max Brooks

Image

Filetype : ePUB

Description

The Zombie War came unthinkably close to eradicating humanity. Max Brooks, driven by the urgency of preserving the acid-etched first-hand experiences of the survivors from those apocalyptic years, traveled across the United States of America and throughout the world, from decimated cities that once teemed with upwards of thirty million souls to the most remote and inhospitable areas of the planet. He recorded the testimony of men, women, and sometimes children who came face-to-face with the living, or at least the undead, hell of that dreadful time. “World War Z” is the result. Never before have we had access to a document that so powerfully conveys the depth of fear and horror, and also the ineradicable spirit of resistance, that gripped human society through the plague years.

Continue reading

Under the Dome : A Novel – Stephen King

Image

FileType: ePUB

Descriptions

Don’t miss the “harrowing” (The Washington Post) #1 New York Times bestselling thriller from Stephen King that inspired the hit television series, following the apocalyptic scenario of a town cut off from the rest of the world.

Continue reading

The Practice of Network Security Monitoring – Richard Bejtlich

Image

Filetype : ePUB

Descriptions

Network security is not simply about building impenetrable walls — determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.

Continue reading

Realm of Racket : Learn to Program, One Game at a Time!

Image

File Type : ePUB

Descriptions

Realm of Racket : Learn to Program, One Game at a Time!

Racket is a descendant of Lisp, a programming language renowned for its elegance, power, and challenging learning curve. But while Racket retains the functional goodness of Lisp, it was designed with beginning programmers in mind. Realm of Racket is your introduction to the Racket language.

Continue reading

Black Hat Python : Python Programming for Hackers and Pentesters – Justin Seitz

Image

File Type : ePUB

Descriptions

“The difference between script kiddies and professionals is the difference between merely using other people’s tools and writing your own.”
—Charlie Miller, from the Foreword

When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen?

Continue reading

2D Object Detection and Recognition Models, Algorithms, and Networks – Yali Amit

Image

PREFACE :
This book is about detecting and recognizing 2D objects in gray-level images. How are models constructed? How are they trained? What are the computational approaches to efficient implementation on a computer? And finally, how can some of these computations be implemented in the framework of parallel and biologically plausible neural network architectures?

Continue reading

50 Math and Science Games for Leadership – Seah Wee Khee

Image

Did you like Math or Science in school? Have you played games that stimulated your thought processes for Math and Science? Trying to be creative in your Math, Science or leadership class? Can leadership be taught? Is leadership an Art or a Science or Math? Seeking to impact your training program with creative games? Continue reading

Data Compression: The Complete Reference – David Salomon

Image

Data compression is one of the most important fields and tools in modern computing. From archiving data, to CD ROMs, and from coding theory to image analysis, many facets of modern computing rely upon data compression.

Continue reading

Fundamentals of Database Systems

Image

Description

Clear explanations of theory and design, broad coverage of models and real systems, and an up-to-date introduction to modern database technologies result in a leading introduction to database systems. Intended for computer science majors, this text emphasizes math models, design issues, relational algebra, and relational calculus.

Continue reading

Learning PHP, MySQL & JavaScript, 4th Edition With jQuery, CSS & HTML5

Image

Book Description

Build interactive, data-driven websites with the potent combination of open-source technologies and web standards, even if you have only basic HTML knowledge. With this popular hands-on guide, you’ll tackle dynamic web programming with the help of today’s core technologies: PHP, MySQL, JavaScript, jQuery, CSS, and HTML5.

Continue reading

Learning PHP, MySQL, Javascript, CSS & HTML5 (3rd Editions)

Image

BOOK DESCRIPTIONS  :

Build interactive, data-driven websites with the potent combination of open-source technologies and web standards, even if you only have basic HTML knowledge. With this popular hands-on guide, you’ll tackle dynamic web programming with the help of today’s core technologies: PHP, MySQL, JavaScript, CSS, and HTML5.

Continue reading