Browse Results

Showing 24,901 through 24,925 of 59,381 results

Guilty of Journalism: The Political Case against Julian Assange

by Kevin Gosztola

From an acclaimed independent journalist, this carefully-documented analysis of the government&’s case against Julian Assange and its implications for press freedom acts as a crucial, compelling guidebook to Assange&’s upcoming trial.The legal action against Julian Assange is poised to culminate in a trial in the United States in 2023, and this book will help the public understand the proceedings. The establishment media's coverage of WikiLeaks founder Julian Assange's extradition case has focused on his deteriorating health and what CBS News called his &“secret family,&” but most of this coverage failed to detail the complex issues at stake against Assange. Guilty of Journalism outlines how WikiLeaks exposed the reality of American wars, the United States government&’s unprecedented indictment against Assange as a publisher, and the media&’s role in persuading the public to &“shoot the messenger.&”This new book by Kevin Gosztola, who has spent the last decade covering Assange, WikiLeaks, and the wider war on whistleblowers, tells the full story based on testimony from dozens of witnesses. It examines abuses of power by the CIA and the FBI, including a spying operation that targeted Assange&’s family, lawyers, and doctors. Guilty of Journalism offers a balanced and comprehensive perspective on all the events leading up to what press freedom advocates have called the trial of the century.Guilty of Journalism is a joint production of The Censored Press and Seven Stories Press.

Guinness World Records 2013 Gamers Edition

by Guinness World Records

Welcome to the brand new Guinness World Records Gamer's Edition! Now in its sixth edition, this year's book is completely updated with incredible new records and the very best images from this year's most amazing titles. There are exciting news stories and fascinating nuggets of trivia detailing recent and upcoming developments in the world of gaming, along with Top Ten charts ranking the most impressive scores of the very best gaming achievements. Discover a dazzling array of essential facts and figures about record-breaking videogames and the highest-scoring players. You can also try our entertaining quiz to test just how much you know about the games you love. Other new features include the "Vs" face-off, in which game characters battle one another. There's also "Flashback", bringing you insights from gaming in days gone by. Get to know gaming better with our "How to spot this genre" box, and improve your own playing skills by following our "Power Up!" tips and hints. "Wow" will surprise you with remarkable gaming facts, and get "One Up" on other gamers with this dazzling trivia feature. There are also gaming recommendations, number-based facts, and stunning-looking features about zombies, female gaming icons and game-related movies. Guinness World Records Gamer's 2013 is the ultimate videogame guide!

Guinness World Records 2014 Gamer's Edition

by Guinness World Records Limited

The Guinness World Records Gamer's Edition is the ultimate guide to videogames. The all-new 2014 book is bursting with news and views from the gaming world, alongside the latest and very best records relating to the world's most popular games. Amazing trivia sits alongside hard facts and top tips on how to achieve greater feats on the games you love. <P><P>This edition brings you: An At A Glance feature on every game spread for those who crave the essential lowdown on each game's genre, characters and strategy. <P><P> A Best of the Rest wrap up all of the games we couldn't squeeze into the other pages, widening the already panoramic scope of the book. <P><P> A Reader's poll that reports back on the most fundamental question you can ask any gamer - what is the greatest videogame of all? <P><P>With a brand-new, visually dynamic design intended to reflect exciting developments in technology, Guinness World Records Gamer's Edition continues to be the world's greatest videogaming almanac!

Gumoil Photographic Printing, Revised Edition

by Karl Koenig

There is renewed interest among art photographers in a number of historic printing techniques because of the remarkable effects they produce. The reader will discover how to create beautifully tinted mono- and polychromatic gum and oil images using the author's version of this 19th century technique. Step-by-step illustrated instructions with directions for further experimentation provide a perfect source for learning this new, yet old, printing technique. Gumoil printing involves contact-printing a positive transparency onto gum-coated paper. Oil paint is then applied and rubbed into nongummed areas of the print. With bleach etching, mono- and polychromatic variations are possible. A chapter on digital printing combines the new and the historic, making this technique even more accessible for the art photographer.

Guns, An American Conversation: How to Bridge Political Divides

by The Editors at Spaceship Media

Based on an article by Pulitzer Prize–winning reporters, the fascinating results of an important nationwide conversation about guns: Can complete strangers representing every point along the political divide engage in civil and productive discourse on the topic of gun control?As Americans, we spend a lot of time talking about guns. We have arguments, protests, declarations, and slogans about what kind of weapons can be sold and to whom. But the one thing we rarely have when it comes to firearms is a real conversation, and not just with members of our own tribe, but with people whose ideas don&’t align with ours. That is perhaps why the country is so divided when it comes to reducing gun violence. Guns, an American Conversation follows up on a handful of strangers—teachers and gun-rights advocates, hunters and police officers, mothers and fathers across the United States—brought together in a larger group of 150 people, for a month-long moderated Facebook group chat. The goal of the project—which expanded on earlier efforts—was to foster a civil, yet honest, dialogue between people whose backgrounds and beliefs led them to have opposing views on the issue. Not just a journalistic account, Guns attempts to map out common territory in a nation driven by profound divides. It includes sidebars, charts, and graphics that list additional information about gun control in the United States and provide the reader with tools to continue the discussion in their own lives. This book might not change your mind about gun control, but it will help you learn to cross divides in conversation.

Guns and Crime: The Data Don't Lie

by Mark Gius

Guns and Crime: The Data Don’t Lie investigates the ways in which the current data on guns and crime are inadequate and inaccurate. Although the majority of murders in the United States are committed with guns, research on gun ownership, the supply of guns, and the relationship between guns and crime is less thorough than studies done for many other aspects of public safety policy. This book explores the weaknesses in current findings, and extrapolates the implications of policymaking based on these faulty foundations. As the gun debate continues to rage in North America, this text offers a cautionary voice to the discourse—before practitioners and policy makers can create a solution to gun violence, they must first improve the quality of the facts they use to make their case. Intended for criminology, statistics, sociology, and economics students, Guns and Crime is also suitable for interested laypersons and practitioners hoping to better understand the mythos surrounding guns in America.

Gut-Busting Puns for Minecrafters: Endermen, Explosions, Withers, and More (Jokes for Minecrafters)

by Brian Boone Amanda Brack

It can’t get punnier than this!

Gut gepackt – Kein Bit zu viel: Kompression digitaler Daten verständlich erklärt (essentials)

by Olaf Manz

Bei der heutigen Datenflut, die auf Speichermedien und im Internet kursiert, ist die Kompression digitaler Daten nach wie vor ein immens wichtiger Aspekt bei Datenübertragung und -speicherung. Dieses essential erläutert ohne theoretischen Überbau und mit elementaren mathematischen und informatischen Methoden die wichtigsten Kompressionsverfahren, so unter anderem die Entropiecodierungen von Shannon-Fano und von Huffman, sowie die Wörterbuchcodierungen der Lempel-Ziv-Familie. Ausführlich eingegangen wird auch auf Irrelevanzreduktion und die Quantisierung bei optischen und akustischen Signalen, die die Unzulänglichkeiten des menschlichen Auges und Ohres zur Datenkompression ausnutzen. Illustriert wird das Ganze anhand gängiger Praxisanwendungen aus dem alltäglichen Umfeld. Die Aufbereitung erlaubt den Einsatz beispielsweise in Arbeitsgruppen an MINT-Schulen, bei Einführungskursen an Hochschulen und ist auch für interessierte Laien geeignet.

Gut gerüstet gegen Überwachung im Web: Wie Sie verschlüsselt mailen, chatten und surfen

by Johanna C. Czeschik Matthias Lindhorst Roswitha Jehle

Schnelle und einfache Schutzmaßnahmen gegen NSA , BN D, kriminelle Hacker und kommerzielle Datenkraken Sie möchten nicht, dass jemand Ihre E-Mails mitliest, Ihr Surfverhalten analysiert oder Ihre Kreditkartendaten ausspäht? Wie leicht es für Angreifer ist, Ihre Daten im Internet abzufangen, aber auch mit welchen einfachen Maßnahmen Sie sich dagegen schützen können, erfahren Sie in diesem Buch. Zum Einsatz kommt dabei überwiegend Open-Source-Software, die nicht nur kostenlos, sondern in der Regel sogar sicherer als kommerzielle Lösungen ist. Neben leicht nachvollziehbaren Schritt-für-Schritt-Anleitungen erhalten Sie viele praktische Tipps für bessere Passwörter und den Umgang mit sensiblen Daten. Die notwendigen technischen Grundlagen werden leicht verständlich und mithilfe vieler Abbildungen erklärt. Fangen Sie mit diesem Buch an, Ihre digitale Privatsphäre zurückzuerobern!Sie erfahren unter anderem,wie Sie Ihren Browser sicherer machen und anonym über das Tor-Netzwerk surfen.welche Vor- und Nachteile die verschiedenen Mailprogramme haben.wie Sie Ihre E-Mails mit PGP oder S/MIME ganz einfach verschlüsseln.welche Alternativen zu WhatsApp, Skype & Co. es gibt.

Gwent: Art of The Witcher Card Game

by CD Projekt Red

Whether played on the exotic felt tabletop in a palatial casino, or on the rough-hewn bar in a tavern's smoky din, the game of Gwent is never a dull one! With cards that feature fantastic art that only adds to the strategic thrill of crushing one's opponent, Gwent: The Witcher Card Game offers a singular gaming experience. Now, Dark Horse is proud to present each cards' gorgeous artwork in a stunning hardbound volume. Celebrate wondrous artistry and cutthroat gameplay with The Gwent Gallery: Art of the Witcher Card Game!

GWT in Action

by Robert Hanson Jason Essington Anna Tokke Adam Tacy

SummaryGWT in Action, Second Edition is a completely revised edition of the best-selling GWT book. It covers the new features introduced in GWT 2.4 and 2.5, as well as the best development practices that have emerged in the GWT community. It begins with a rapid-fire introduction to GWT and Ajax to get you up to speed with GWT concepts and tools. Then, you'll explore key concepts like managing events, interacting with the server, creating UI components, building your user interface declaratively using UiBinder ... and more.About the TechnologyGoogle Web Toolkit works on a simple idea. Write your web application in Java, and GWT crosscompiles it into JavaScript. It is open source, supported by Google, and version 2.5 now includes a library of high-quality interface components and productivity tools that make using GWT a snap. The JavaScript it produces is really good.About this BookGWT in Action, Second Edition is a revised edition of the best-selling GWT book. In it, you'll explore key concepts like managing events, interacting with the server, and creating UI components. As you move through its engaging examples, you'll absorb the latest thinking in application design and industry-grade best practices, such as implementing MVP, using dependency injection, and code optimization. Written for Java developers, the book requires no prior knowledge of GWT. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.What's InsideCovers GWT 2.4 and upEfficient use of large data setsOptimizing with client bundles, deferred binding, and code splittingUsing generators and dependency injectionAbout the AuthorsAdam Tacy and Robert Hanson coauthored the first edition of GWT in Action. Jason Essington is a Java developer and an active contributor to the GWT mailing list and the GWT IRC channel. Anna Tökke is a programmer and solutions architect working with GWT on a daily basis.Table of ContentsPART 1 BASICSGWTBuilding a GWT application: saying "Hello World!"Building a GWT application: enhancing Hello WorldPART 2 NEXT STEPSCreating your own widgetsUsing client bundlesInterface design with UiBinderCommunicating with GWT-RPCUsing RequestFactoryThe Editor frameworkData-presentation (cell) widgetsUsing JSNI—JavaScript Native InterfaceClassic Ajax and HTML formsInternationalization, localization, and accessibilityPART 3 ADVANCEDAdvanced event handling and event bussesBuilding MVP-based applicationsDependency injectionDeferred bindingGeneratorsMetrics and code splitting

GWT in Practice

by Robert Cooper Charlie Collins

If you're a web developer, you know that you can use Ajax to add rich, user-friendly, dynamic features to your applications. With the Google Web Toolkit (GWT), a new Ajax tool from Google that automatically converts Java to JavaScript, you can build Ajax applications using the Java language.GWT in Practice is an example-driven, code-rich book designed for web developers already familiar with the basics of GWT who now want hands-on experience. After a quick review of GWT fundamentals, GWT in Practice presents scores of handy, reusable solutions to the problems you face when you need to move beyond "Hello World" and "proof of concept" applications. This book skips the theory and looks at the way things really work when you're building. I also shows you where GWT fits into the Enterprise Java Developer's toolset. Written by expert authors Robert Cooper and Charlie Collins, this book combines sharp insight with hard-won experience. Readers will find thorough coverage of all aspects of GWT development from the basic GWT concepts to in depth real world example applications.The first part of the book is a rapid introduction to the GWT methodology The second part of the book then delves into several practical examples which further demonstrate core aspects of the toolkit The book concludes by presenting several larger GWT applications including drag and drop support for UI elements, data binding, processing streaming data, handling application state, automated builds, and continuous integration.Along the way GWT in Practice covers many additional facets of working with the toolkit. Various development tools are used throughout the book, including Eclipse, NetBeans, IDEA, Ant, Maven, and, of course, the old fashioned command line. The book also addresses integrating GWT with existing applications and services along with enterprise and team development.

H-Systems: Observability, Diagnosability, and Predictability of Hybrid Dynamical Systems (Communications and Control Engineering)

by Elena De Santis Maria Domenica Di Benedetto

This book focuses on the observability of hybrid systems. It enables the reader to determine whether and how a hybrid system’s state can be reconstructed from sometimes necessarily partial information. By explaining how available measurements can be used to deduce past and future behaviours of a system, the authors extend this study of observability to embrace the properties of diagnosability and predictability. H-systems shows how continuous and discrete dynamics and their interaction affect the observability of this general class of hybrid systems and demonstrates that hybrid characteristics are not simply generalizations of well-known aspects of traditional dynamics. The authors identify conditions for state reconstruction, prediction and diagnosis of the occurrence of possibly faulty states. The formal approach to proving those properties for hybrid systems is accompanied by simple illustrative examples. For readers who are interested in the use of state estimation for controller design, the book also provides design methods for hybrid state observers and covers their application in some industrial cases. The book’s tutorial approach to the various forms of observability of hybrid systems helps to make H-systems of interest to academic researchers and graduate students working in control and to practitioners using control in an industrial environment.

H4cker5 Wanted: An Examination of the Cybersecurity Labor Market

by Martin C. Libicki David Senty Julia Pollak

The perceived shortage of cybersecurity professionals working on national security may endanger the nation's networks and be a disadvantage in cyberspace conflict. RAND examined the cybersecurity labor market, especially in regard to national defense. Analysis suggests market forces and government programs will draw more workers into the profession in time, and steps taken today would not bear fruit for another five to ten years.

Haar Wavelets

by Ülo Lepik Helle Hein

This is the first book to present a systematic review of applications of the Haar wavelet method for solving Calculus and Structural Mechanics problems. Haar wavelet-based solutions for a wide range of problems, such as various differential and integral equations, fractional equations, optimal control theory, buckling, bending and vibrations of elastic beams are considered. Numerical examples demonstrating the efficiency and accuracy of the Haar method are provided for all solutions.

Hack and HHVM: Programming Productivity Without Breaking Things

by Owen Yamauchi

How can you take advantage of the HipHop Virtual Machine (HHVM) and the Hack programming language, two new technologies that Facebook developed to run their web servers? With this practical guide, Owen Yamauchi—a member of Facebook’s core Hack and HHVM teams—shows you how to get started with these battle-tested open-source tools.You’ll explore static typechecking and several other features that separate Hack from its PHP origins, and learn how to set up, configure, deploy, and monitor HHVM. Ideal for developers with basic PHP knowledge or experience with other languages, this book also demonstrates how these tools can be used with existing PHP codebases and new projects alike.Learn how Hack provides static typechecking while retaining PHP’s flexible, rapid development capabilityWrite typesafe code with Hack’s generics featureExplore HHVM, a just-in-time compilation runtime engine with full PHP compatibilityDive into Hack collections, asynchronous functions, and the XHP extension for PHPUnderstand Hack’s design rationale, including why it omits some PHP featuresUse Hack for multitasking, and for generating HTML securelyLearn tools for working with Hack code, including PHP-to-Hack migration

The Hack Is Back: Techniques to Beat Hackers at Their Own Games

by Jesse Varsalone Christopher Haller

Have you wondered how hackers and nation-states gain access to confidential information on some of the most protected systems and networks in the world? Where did they learn these techniques and how do they refine them to achieve their objectives? How do I get started in a career in cyber and get hired? We will discuss and provide examples of some of the nefarious techniques used by hackers and cover how attackers apply these methods in a practical manner.The Hack Is Back is tailored for both beginners and aspiring cybersecurity professionals to learn these techniques to evaluate and find risks in computer systems and within networks. This book will benefit the offensive-minded hacker (red-teamers) as well as those who focus on defense (blue-teamers). This book provides real-world examples, hands-on exercises, and insider insights into the world of hacking, including: Hacking our own systems to learn security tools Evaluating web applications for weaknesses Identifying vulnerabilities and earning CVEs Escalating privileges on Linux, Windows, and within an Active Directory environment Deception by routing across the TOR network How to set up a realistic hacking lab Show how to find indicators of compromise Getting hired in cyber! This book will give readers the tools they need to become effective hackers while also providing information on how to detect hackers by examining system behavior and artifacts. By following the detailed and practical steps within these chapters, readers can gain invaluable experience that will make them better attackers and defenders. The authors, who have worked in the field, competed with and coached cyber teams, acted as mentors, have a number of certifications, and have tremendous passions for the field of cyber, will demonstrate various offensive and defensive techniques throughout the book.

Hack the Cybersecurity Interview: Navigate Cybersecurity Interviews with Confidence, from Entry-level to Expert roles

by null Christophe Foulon null Ken Underhill null Tia Hopkins

Uncover the secrets to acing interviews, decode the diverse roles in cybersecurity, and soar to new heights with expert adviceKey FeaturesConfidently handle technical and soft skill questions across various cybersecurity rolesPrepare for Cybersecurity Engineer, penetration tester, malware analyst, digital forensics analyst, CISO, and more rolesUnlock secrets to acing interviews across various cybersecurity rolesBook DescriptionThe cybersecurity field is evolving rapidly, and so are the interviews for cybersecurity roles. Hack the Cybersecurity Interview, Second Edition, is the essential guide for anyone aiming to navigate this changing landscape. This edition, updated and expanded, addresses how to fi nd cybersecurity jobs in tough job markets and expands upon the original cybersecurity career paths. It offers invaluable insights into various cybersecurity roles, such as cybersecurity engineer, penetration tester, cybersecurity product manager, and cybersecurity project manager, focusing on succeeding in interviews. This book stands out with its real-world approach, expert insights, and practical tips. It's not just a preparation guide; it's your key to unlocking success in the highly competitive field of cybersecurity. By the end of this book, you will be able to answer behavioural and technical questions and effectively demonstrate your cybersecurity knowledge.What you will learnMaster techniques to answer technical and behavioural questions and effectively demonstrate your cybersecurity knowledgeGain insights into the evolving role of cybersecurity and its impact on job interviewsDevelop essential soft skills, like stress management and negotiation, crucial for landing your dream jobGrasp key cybersecurity-role-based questions and their answersDiscover the latest industry trends, salary information, andcertification requirementsLearn how to fi nd cybersecurity jobs even in tough job marketsWho this book is forThis book is a must-have for college students, aspiring cybersecurity professionals, computer and software engineers, and anyone preparing for a cybersecurity job interview. It's equally valuable for those new to the field and experienced professionals aiming for career advancement.

Hack the Cybersecurity Interview: A complete interview preparation guide for jumpstarting your cybersecurity career

by Ken Underhill Christophe Foulon Tia Hopkins Mari Galloway

Get your dream job and set off on the right path to achieving success in the cybersecurity field with expert tips on preparing for interviews, understanding cybersecurity roles, and moreKey FeaturesGet well-versed with the interview process for cybersecurity job rolesPrepare for SOC analyst, penetration tester, malware analyst, digital forensics analyst, CISO, and more rolesUnderstand different key areas in each role and prepare for themBook DescriptionThis book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas.Complete with the authors' answers to different cybersecurity interview questions, this easy-to-follow and actionable book will help you get ready and be confident. You'll learn how to prepare and form a winning strategy for job interviews. In addition to this, you'll also understand the most common technical and behavioral interview questions, learning from real cybersecurity professionals and executives with years of industry experience.By the end of this book, you'll be able to apply the knowledge you've gained to confidently pass your next job interview and achieve success on your cybersecurity career path.What you will learnUnderstand the most common and important cybersecurity rolesFocus on interview preparation for key cybersecurity areasIdentify how to answer important behavioral questionsBecome well versed in the technical side of the interviewGrasp key cybersecurity role-based questions and their answersDevelop confidence and handle stress like a proWho this book is forThis cybersecurity book is for college students, aspiring cybersecurity professionals, computer and software engineers, and anyone looking to prepare for a job interview for any cybersecurity role. The book is also for experienced cybersecurity professionals who want to improve their technical and behavioral interview skills. Recruitment managers can also use this book to conduct interviews and tests.

Hack to The Future: How World Governments Relentlessly Pursue and Domesticate Hackers

by Emily Crose

Understand the history of hacking culture and the genesis of a powerful modern subculture In Hack to the Future: How World Governments Relentlessly Pursue and Domesticate Hackers, veteran information security professional Emily Crose delivers a deep dive into the history of the United States government's nuanced relationship with hacker culture and the role the latter has played in the former's domestic policy and geopolitics. In the book, you'll learn about significant events that have changed the way the hacking community has been perceived by the public, the state, and other hackers. The author explains how the US government managed to weaponize a subculture widely seen as misanthropic and awkward into a lever of geopolitical power. You'll also discover how: The release of the Morris worm and the Melissa virus changed the way hackers were seen and treated in the United States Different government agencies, including the National Security Agency and NASA treated – and were treated by – domestic hackers Hacking went from being an exclusive hobby for socially awkward nerds to a substantial lever of geopolitical power in just a few decades Perfect for anyone with an interest in hacking, tech, infosec, and geopolitics, Hack to the Future is a must-read for those who seek to better their understanding of the history of hacking culture and how we got to where we are today.

The Hackable City: Digital Media and Collaborative City-Making in the Network Society

by Michiel De Lange Martijn De Waal

This open access book presents a selection of the best contributions to the Digital Cities 9 Workshop held in Limerick in 2015, combining a number of the latest academic insights into new collaborative modes of city making that are firmly rooted in empirical findings about the actual practices of citizens, designers and policy makers. It explores the affordances of new media technologies for empowering citizens in the process of city making, relating examples of bottom-up or participatory practices to reflections about the changing roles of professional practitioners in the processes, as well as issues of governance and institutional policymaking.

Hackathons: Von der Idee zur erfolgreichen Umsetzung

by Andreas Kohne Volker Wehmeier

Erfahren Sie in diesem Buch mehr über das Phänomen HackathonsEs gibt Events, die ermöglichen es ihren Akteuren, interdisziplinär in einen kreativen Dialog zu treten. Dieses Buch widmet sich den sogenannten Hackathons – einem Veranstaltungsformat, das sich seit Jahren großer Beliebtheit erfreut. Die Erfolgsgeschichte begann wie so oft in Amerika, mittlerweile wird das disruptive Brainstorming jedoch weltweit erfolgreich durchgeführt, umin kürzester Zeit Technologien, Geschäftsmodelle und Produkte zu entwickeln.neues Personal zu rekrutieren.interdisziplinäre Teams effizient zusammenzubringen.Das Ergebnis kann u. a. eine kollaborative Software- und Hardwareentwicklung sein. Dieses Buch von Andreas Kohne und Volker Wehmeier widmet sich nicht nur der Frage, was ein Hackathon ist, sondern erklärt Ihnen zudem, wie Sie einen Hackathon organisieren und worauf Sie bei der Durchführung eines solchen Events achten sollten.Programmieren, Recruiting und InnovationenDie Entwicklung neuer Ideen, Konzepte und Lösungen sowie das Testen verschiedener Projekte stehen stets im Fokus der Teilnehmer unterschiedlicher Branchen. Gleichzeitig bieten sie Start-ups die perfekte Gelegenheit, um ihr Geschäftsmodell von Experten bewerten zu lassen. Sie können sich vorstellen, wie wichtig daher die Planung eines solchen Events für alle Beteiligten ist. In diesem Buch über Hackathons erhalten Sie einen ebenso praxisnahen wie kompakten Überblick über folgende Bereiche:PlanungDurchführungNachbereitungMehrwertUm Ihnen den Einstieg in die Thematik zu erleichtern, finden Sie am Ende des Werkes neben prägnanten Checklisten auch Ablaufübersichten. Das Buch fokussiert sich nicht nur auf die Veranstalter eines Hackathons. Es berücksichtigt ebenfalls die Teilnehmersicht sowie die Stimmen aus der Wirtschaft und Verwaltung. Dadurch erhalten Sie umfassenden Input von beiden Seiten.

Hackathons: From Idea to Successful Implementation

by Andreas Kohne Volker Wehmeier

This book provides a detailed and comprehensive overview of all phases of a hackathon and thus helps to reduce complexity, to use opportunities, to avert pitfalls and to avoid problems. In addition, it also explains from a participant’s perspective how to succeed in a hackathon. Lastly, the book is rounded off by extensive checklists, which support you in your own hackathons. The book is structured as follows: At first the basics and the history of hackathons are described in chapter 1. Afterwards the three phases of a hackathon are described in detail. This is started in chapter 2 with the description of the individual measures which are to be accomplished before the actual event. Here not only technical or organizational aspects are described, but also the important legal aspects are discussed. Subsequently, it is shown what is necessary to carry out a hackathon successfully. For this purpose the actual execution with all its steps is described in chapter 3. Next, chapter 4 looks at the follow-ups, which are often neglected or even completely forgotten. Chapter 5 describes from a participant’s point of view the reasons for participating in a hackathon and which aspects guarantee a successful participation. In the following chapter 6 the criticism of the format of the hackathons and their execution is also examined in detail. Eventually, the most important points are summarized in chapter 7, before chapter 8 gives a view into the future of hackathons. Subsequently chapter 9 collects statements and opinions of representatives from industry, science and administration on the topic of hackathons. The book is rounded off in chapter 10 with detailed checklists, which can be directly used for the successful planning, operation and follow-up of hackathons. The book is written for everyone with an interest in how hackathons work, how to create them, and how to successfully participate. It especially targets people in industry or young students who want to run or participate in a hackathon.

Hacked (Red Rhino Nonfiction)

by M. G. Higgins

<p>Look out! Your computer data is not safe. There are hackers who will steal it. Sell it. Or destroy it. The hackers are getting smarter. They leave little trace as to their identities. And there are dangerous consequences for individuals, corporations, and governments. <p>Engage your most struggling readers in grades 3-8 with Red Rhino Nonfiction! This new series features high-interest topics in every content area. Visually appealing full-color photographs and illustrations, fun facts, and short chapters keep emerging readers focused. Written at a 1.5-1.9 readability level, these books include pre-reading comprehension questions and a 20-word glossary for comprehension support.</p>

Hacked: Kali Linux And Wireless Hacking Ultimate Guide With Security And Penetration Testing Tools, Practical Step By Step Computer Hacking Book

by Alan Norman

Hacking book is intended to serve as an intermediate-level guide to some common penetration testing tools and skills – particularly those of wireless hacking and of maintaining anonymity. The book concentrates more on practical execution, and provides some step-by-step procedures for installing essential platforms and tools, as well as the theory behind some basic attacks. Gain the ability to do ethical hacking and penetration testing by taking this hacking book! Get answers from an experienced IT expert to every single question you have related to the learning you do in this book including: - installing Kali Linux - using VirtualBox - basics of Linux - Staying anonymous with Tor - Proxychains, Virtual Private Networks (VPN) - Macchanger, Nmap - cracking wifi - aircrack - cracking Linux passwords What are the requirements? - Reliable and fast internet connection. - Wireless networking card. - Kali Linux Distribution - Basic IT skills What will you get from the hacking book? Answers to every single question you have about ethical hacking and penetration testing from an experienced IT professional! - You will learn the basics of network - Deal with a lot of Kali Linux tools - Learn some Linux commands Tips for remaining anonymous in hacking and penetration testing activities. Protect your WiFi network against all the attacks Gain access to any client account in the WiFi network A complete tutorial explaining how to build a virtual hacking environment, attack networks, and break passwords. Step by step instructions for insulation VirtualBox and creating your virtual environment on Windows, Mac, and Linux.

Refine Search

Showing 24,901 through 24,925 of 59,381 results