The Tainted Web

The Tainted Web
Author: Amy Sumida
Publisher: CreateSpace
Total Pages: 328
Release: 2013-08-29
Genre: Fiction
ISBN: 9781492274148

Married life has proven to be complicated for Vervain Lavine. Maybe it's the pressure of being the last dragon-sidhe in existence, the hope of an entire race of faeries. Or maybe it's the fact that her husband lives in the Faerie Realm where he rules the Kingdom of Fire. Or then again, it could be because he married her after abducting her and stealing her memories of her four other lovers. That's a tough one. He did do a lot to make it up to her though, and she's forgiven Arach but that doesn't mean that the Godhunter is ready to hang up her fighting leathers in exchange for becoming a dragon mommy. Before she can decide what to do about the Faerie King, another problem arises in the form of a god who seems to be able to control the Internet. Internet crime takes on a whole new meaning under his influence and it becomes clear that his nefarious deeds must be stopped. But can the Godhunter find a way to destroy the God of the Internet before she's caught in his Tainted Web?

Computers and Programming

Computers and Programming
Author: Lisa McCoy
Publisher: Infobase Publishing
Total Pages: 174
Release: 2010
Genre: Business & Economics
ISBN: 1438131135

Examines the ins and outs of the computer science industry, providing tips for success, an in-depth glossary of industry jargon, and an overview of the current state of the industry.

The Web Application Hacker's Handbook

The Web Application Hacker's Handbook
Author: Dafydd Stuttard
Publisher: John Wiley & Sons
Total Pages: 770
Release: 2008
Genre: Computers
ISBN: 0470170778

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results. The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger", Dafydd developed the popular Burp Suite of web application hack tools.

The Georgics

The Georgics
Author: Publius Vergilius Maro
Publisher: Good Press
Total Pages: 86
Release: 2021-04-10
Genre: Poetry
ISBN:

Virgil was arguably the finest Latin poet there was. This book of poetry is written in praise of Italy: its bounty; its climate; its way of life. It is about the bucolic life, about the beauty of working the land but Virgil's poetry makes it so much more. It also includes the story of Orpheus and Eurydice contemporaneously popularised by Virgil's friend Ovid.

The Social Media Reader

The Social Media Reader
Author: Michael Mandiberg
Publisher: NYU Press
Total Pages: 301
Release: 2012
Genre: Computers
ISBN: 0814763022

With the rise of web 2.0 and social media platforms taking over vast tracts of territory on the internet, the media landscape has shifted drastically in the past 20 years, transforming previously stable relationships between media creators and consumers. The Social Media Reader is the first collection to address the collective transformation with pieces on social media, peer production, copyright politics, and other aspects of contemporary internet culture from all the major thinkers in the field. Culling a broad range and incorporating different styles of scholarship from foundational pieces and published articles to unpublished pieces, journalistic accounts, personal narratives from blogs, and whitepapers, The Social Media Reader promises to be an essential text, with contributions from Lawrence Lessig, Henry Jenkins, Clay Shirky, Tim O'Reilly, Chris Anderson, Yochai Benkler, danah boyd, and Fred von Loehmann, to name a few. It covers a wide-ranging topical terrain, much like the internet itself, with particular emphasis on collaboration and sharing, the politics of social media and social networking, Free Culture and copyright politics, and labour and ownership.Theorizing new models of collaboration, identity, commerce, copyright, ownership, and labour, these essays outline possibilities for cultural democracy that arise when the formerly passive audience becomes active cultural creators, while warning of the dystopian potential of new forms of surveillance and control.

Post-Modem: The Interwebs Explained

Post-Modem: The Interwebs Explained
Author: Jason Klamm
Publisher: Lulu.com
Total Pages: 216
Release: 2015-11-07
Genre: Humor
ISBN: 1329037464

You know absolutely nothing about The Internet, even if you think you do. Whether an expert or a ""newber,"" Post-Modem is guaranteed to tell you something you would have never known about The Internet without picking up this book. How did housewives in the 50s combine a turntable and a HAM radio to get Wi-Fi? What is the connection between ""Mad Men""'s Jon Hamm and AskJeeves? (hint: you might want to ask Jon Hamm ) Is Richard Dawkins real? How did Stalin create the first LOLCat via Sputnik? Post-Modem is the unabridged, unedited history of the Internet you've always needed. Rob Kutner (The Daily Show, Conan) says: "With an inspired mix of real historical texture, ballsy anachronism, countless whip-smart jokes, and spot-on 'archival photos, ' Jason Klamm spins a delightful John Hodgman-esque look at the Internet throughout history and today."

Identity Theft Alert

Identity Theft Alert
Author: Steve Weisman
Publisher: Pearson Education
Total Pages: 275
Release: 2014
Genre: Business & Economics
ISBN: 0133902528

In Identity Theft Alert, award-winning author and attorney Steve Weisman shows you exactly what to do, and how to do it. Equally important, he also tells you what to stop doing: the common, inadvertent behaviors that could be setting you up as a victim. Weisman starts with a clear-eyed assessment of the problem, helping you understand just how much risk you face. Next, he helps you understand, anticipate, and prevent all these frightening forms of identity theft: Identity theft via Facebook and other social media ; Identity theft via your iPhone or Android smartphone ; Theft of your credit or debit cards, and other access to your finances ; Crime sprees performed in your name ; Medical identity theft that could lead to you getting the wrong treatment ? and could even kill you ; The fast-growing scourge of income tax identity theft, including stolen refunds. Don't be the next victim: read this book, follow its step-by-step advice, and protect yourself!

Security on the Web

Security on the Web
Author: Marvin Zelkowitz
Publisher: Academic Press
Total Pages: 366
Release: 2011-07-08
Genre: Computers
ISBN: 012385511X

Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles usually allow. As a result, many articles have become standard references that continue to be of sugnificant, lasting value in this rapidly expanding field. In-depth surveys and tutorials on new computer technology Well-known authors and researchers in the field Extensive bibliographies with most chapters Many of the volumes are devoted to single themes or subfields of computer science

The Tainted City

The Tainted City
Author: Courtney Schafer
Publisher: Skyhorse Publishing, Inc.
Total Pages: 414
Release: 2012-09-25
Genre: Fiction
ISBN: 1597804037

Dev is a desperate man. After narrowly surviving a smuggling job gone wrong, he’s now a prisoner of the Alathian Council, held hostage to ensure his friend Kiran — former apprentice to one of the most ruthless mages alive — does their bidding. But Kiran isn’t Dev’s only concern. Back in his home city of Ninavel, the child he once swore to protect faces a terrible fate if he can’t reach her in time, and the days are fast slipping away. So when the Council offers Dev freedom in exchange for his and Kiran’s assistance in a clandestine mission to Ninavel, he can’t refuse, no matter how much he distrusts their motives. Once in Ninavel the mission proves more treacherous than even Dev could have imagined. Betrayed by allies, forced to aid their enemies, he and Kiran must confront the darkest truths of their pasts if they hope to save those they love and survive their return to the Tainted City.

Cyber Situational Awareness

Cyber Situational Awareness
Author: Sushil Jajodia
Publisher: Springer Science & Business Media
Total Pages: 252
Release: 2009-10-03
Genre: Computers
ISBN: 144190140X

Motivation for the Book This book seeks to establish the state of the art in the cyber situational awareness area and to set the course for future research. A multidisciplinary group of leading researchers from cyber security, cognitive science, and decision science areas elab orate on the fundamental challenges facing the research community and identify promising solution paths. Today, when a security incident occurs, the top three questions security admin istrators would ask are in essence: What has happened? Why did it happen? What should I do? Answers to the ?rst two questions form the core of Cyber Situational Awareness. Whether the last question can be satisfactorily answered is greatly de pendent upon the cyber situational awareness capability of an enterprise. A variety of computer and network security research topics (especially some sys tems security topics) belong to or touch the scope of Cyber Situational Awareness. However, the Cyber Situational Awareness capability of an enterprise is still very limited for several reasons: • Inaccurate and incomplete vulnerability analysis, intrusion detection, and foren sics. • Lack of capability to monitor certain microscopic system/attack behavior. • Limited capability to transform/fuse/distill information into cyber intelligence. • Limited capability to handle uncertainty. • Existing system designs are not very “friendly” to Cyber Situational Awareness.