- Table View
- List View
Kali Linux Web Penetration Testing Cookbook
by Gilberto Najera-GutierrezThis book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools.
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
by Gilberto Najera-GutierrezDiscover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing. Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test – from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools. As you make your way through the book, you will learn how to use automated scanners to find security flaws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities.What you will learnSet up a secure penetration testing laboratoryUse proxies, crawlers, and spiders to investigate an entire websiteIdentify cross-site scripting and client-side vulnerabilitiesExploit vulnerabilities that allow the insertion of code into web applicationsExploit vulnerabilities that require complex setupsImprove testing efficiency using automated vulnerability scannersLearn how to circumvent security controls put in place to prevent attacksWho this book is forKali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The basics of operating a Linux environment and prior exposure to security technologies and tools are necessary.
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition: Master wireless testing techniques to survey and attack wireless networks with Kali Linux, including the KRACK attack
by Vivek Ramachandran Cameron BuchananKali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. About This Book • Learn wireless penetration testing with Kali Linux • Detect hidden wireless networks and discover their names • Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing • Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is For Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks. What You Will Learn • Understand the KRACK attack in full detail • Create a wireless lab for your experiments • Sniff out wireless packets, hidden networks, and SSIDs • Capture and crack WPA-2 keys • Sniff probe requests and track users through their SSID history • Attack radius authentication systems • Sniff wireless traffic and collect interesting data • Decrypt encrypted traffic with stolen keys In Detail As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. Style and approach Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-world coverage of the latest vulnerabilities and attacks.
Kali Linux Wireless Penetration Testing Cookbook
by Sean-Philip OriyanoOver 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposes About This Book • Expose wireless security threats through the eyes of an attacker, • Recipes to help you proactively identify vulnerabilities and apply intelligent remediation, • Acquire and apply key wireless pentesting skills used by industry experts Who This Book Is For If you are a security professional, administrator, and a network professional who wants to enhance their wireless penetration testing skills and knowledge then this book is for you. Some prior experience with networking security and concepts is expected. What You Will Learn • Deploy and configure a wireless cyber lab that resembles an enterprise production environment • Install Kali Linux 2017.3 on your laptop and configure the wireless adapter • Learn the fundamentals of commonly used wireless penetration testing techniques • Scan and enumerate Wireless LANs and access points • Use vulnerability scanning techniques to reveal flaws and weaknesses • Attack Access Points to gain access to critical networks In Detail More and more organizations are moving towards wireless networks, and Wi-Fi is a popular choice. The security of wireless networks is more important than ever before due to the widespread usage of Wi-Fi networks. This book contains recipes that will enable you to maximize the success of your wireless network testing using the advanced ethical hacking features of Kali Linux. This book will go through techniques associated with a wide range of wireless penetration tasks, including WLAN discovery scanning, WEP cracking, WPA/WPA2 cracking, attacking access point systems, operating system identification, vulnerability mapping, and validation of results. You will learn how to utilize the arsenal of tools available in Kali Linux to penetrate any wireless networking environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. By finishing the recipes, you will feel confident conducting wireless penetration tests and will be able to protect yourself or your organization from wireless security threats. Style and approach The book will provide the foundation principles, techniques, and in-depth analysis to effectively master wireless penetration testing. It will aid you in understanding and mastering many of the most powerful and useful wireless testing techniques in the industry.
Kali Linux Wireless Penetration Testing Essentials
by Marco AlamanniThis book is targeted at information security professionals, penetration testers and network/system administrators who want to get started with wireless penetration testing. No prior experience with Kali Linux and wireless penetration testing is required, but familiarity with Linux and basic networking concepts is recommended.
Kali Linux Wireless Penetration Testing: Beginner's Guide
by Vivek Ramachandran Cameron BuchananIf you are a security professional, pentester, or anyone interested in getting to grips with wireless penetration testing, this is the book for you. Some familiarity with Kali Linux and wireless concepts is beneficial.
Kali Linux – Assuring Security by Penetration Testing
by Tedi Heriyanto Shakeel Ali Lee AllenWritten as an interactive tutorial, this book covers the core of Kali Linux with real-world examples and step-by-step instructions to provide professional guidelines and recommendations for you. The book is designed in a simple and intuitive manner that allows you to explore the whole Kali Linux testing process or study parts of it individually. If you are an IT security professional who has a basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and want to use Kali Linux for penetration testing, then this book is for you.
Kali Linux: Windows Penetration Testing
by Bo Weaver Wolf HaltonIf you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems and the BASH terminal emulator along with Windows desktop and command line would be highly beneficial.
Kalman Filtering Under Information Theoretic Criteria
by Jose C. Principe Nanning Zheng Badong Chen Lujuan DangThis book provides several efficient Kalman filters (linear or nonlinear) under information theoretic criteria. They achieve excellent performance in complicated non-Gaussian noises with low computation complexity and have great practical application potential. The book combines all these perspectives and results in a single resource for students and practitioners in relevant application fields. Each chapter starts with a brief review of fundamentals, presents the material focused on the most important properties and evaluates comparatively the models discussing free parameters and their effect on the results. Proofs are provided at the end of each chapter. The book is geared to senior undergraduates with a basic understanding of linear algebra, signal processing and statistics, as well as graduate students or practitioners with experience in Kalman filtering.
Kalman-Filter: Einführung in die Zustandsschätzung und ihre Anwendung für eingebettete Systeme
by Reiner Marchthaler Sebastian DinglerDieses Lehrbuch befasst sich leicht verständlich mit der Theorie der Kalman-Filterung. Die Autoren geben damit eine Einführung in Kalman-Filter und deren Anwendung für eingebettete Systeme. Zusätzlich wird anhand konkreter Praxisbeispiele der Kalman-Filterentwurf demonstriert – Teilschritte werden im Buch ausführlich erläutert.Kalman-Filter sind die erste Wahl, um Störsignale auf den Sensorsignalen zu eliminieren. Dies ist von besonderer Bedeutung, da viele technische Systeme ihre prozessrelevanten Informationen über Sensoren gewinnen. Jeder Messwert eines Sensors weißt jedoch aufgrund verschiedener Ursachen einen Messfehler auf. Würde ein System nur auf Basis dieser ungenauen Sensorinformationen arbeiten, so wären viele Anwendungen, wie zum Beispiel ein Navigationssystem oder autonome arbeitende Systeme, nicht möglich.Das Buch ist geeignet für interessierte Bachelor- und Master-Studierende der Fachrichtungen Informatik, Maschinenbau, Elektrotechnik undMechatronik. Ebenso ist das Buch eine Hilfe für Ingenieure und Wissenschaftler, die ein Kalman-Filter z. B. für die Datenfusion oder die Schätzung unbekannter Größen in Echtzeitanwendungen einsetzen möchten.
Kanban Change Leadership
by Siegfried Kaltenecker Klaus LeopoldExplains how and why Kanban offers a new approach to change in 21st Century businesses This book provides an understanding of what is necessary to properly understand change management with Kanban as well as how to apply it optimally in the workplace. The book emphasizes critical aspects, several traps which users repeatedly fall into, and presents some practical guidelines for Kanban change management to help avoid these traps. The authors have organized the book into three sections. The first section focuses on the foundations of Kanban, establishing the technical basis of Kanban and indicating the mechanisms required to enact change. In the second section, the authors explain the context of Kanban change management--the options for change, how they can be set in motion, and their consequences for a business. The third section takes the topics from the previous sections and relates them to the social system of business--the goal is to guide readers in the process of building a culture of continuousimprovement by reviewing real case studies and seeing how Kanban is applied in various situations. Kanban Change Leadership: Explains how to implement sustainable system-wide changes using Kanban principles Addresses the principles and core practices of Kanban including visualization, WIP limits, classes of service, operation and coordination, metrics, and improvement Describes implementation, preparation, assessment, training, feedback, commissioning, and operation processes in order to create a culture of continuous improvement Kanban Change Leadership is an educational and comprehensive text for: software and systems engineers; IT project managers; commercial and industrial executives and managers; as well as anyone interested in Kanban.
Kanban in 30 Days
by Jannika Bjorkholm Tomas BjorkholmIf you want to simplify your processes, improve collaboration and manage projects successfully, this guide to Kanban is an essential companion. Created primarily for software developers, but packed with insights and tips for anyone that understands the challenges of project management, this is your rapid route into innovative and Agile ways of working.
Kanban in Action
by Joakim Sunden Marcus HammarbergSummaryKanban in Action is a down-to-earth, no-frills, get-to-know-the-ropes introduction to kanban. It's based on the real-world experience and observations from two kanban coaches who have introduced this process to dozens of teams. You'll learn the principles of why kanban works, as well as nitty-gritty details like how to use different color stickies on a kanban board to help you organize and track your work items.About the BookToo much work and too little time? If this is daily life for your team, you need kanban, a lean knowledge-management method designed to involve all team members in continuous improvement of your process.Kanban in Action is a practical introduction to kanban. Written by two kanban coaches who have taught the method to dozens of teams, the book covers techniques for planning and forecasting, establishing meaningful metrics, visualizing queues and bottlenecks, and constructing and using a kanban board.Written for all members of the development team, including leaders, coders, and business stakeholders. No experience with kanban is required.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideHow to focus on work in process and finish fasterExamples of successful implementationsHow team members can make informed decisionsAbout the AuthorsMarcus Hammarberg is a kanban coach and software developer with experience in BDD, TDD, Specification by Example, Scrum, and XP. Joakim Sundén is an agile coach at Spotify who cofounded the first kanban user groups in Europe.Table of ContentsPART 1 LEARNING KANBANTeam Kanbaneros gets startedPART 2 UNDERSTANDING KANBANKanban principlesVisualizing your work Work itemsWork in processLimiting work in processManaging flowPART 3 ADVANCED KANBANClasses of servicePlanning and estimatingProcess improvement Using metrics to guide improvementsKanban pitfallsTeaching kanban through games
Kanippori Iyal (Computer Science) Thoguthi- 1 Karuvikal (Tools) 12th Standard - Tamilnadu Board
by Training State Council of Educational ResearchKanippori Iyal (Computer Science) Textbook Thoguthi- 1 Karuvikal (Tools) for the 12th Standard Students, preparing for Tamil Nadu State Board Exam.
Kanippori Iyal (Computer Science) Thoguthi- 2 Porul Nokku Thozhil Nutpam (Objects Technology) 12th Standard - Tamilnadu Board
by Training State Council of Educational ResearchKanippori Iyal (Computer Science) Textbook Thoguthi- 2 Porul Nokku Thozhil Nutpam (Objects Technology) for the 12th Standard Students, preparing for Tamil Nadu State Board Exam.
Kanippori Iyal Thoguthi - I Karuththukkal (Concepts) 11th Standard - Tamilnadu Board
by Training State Council of Educational ResearchKanippori Iyal Textbook Thoguthi - I Karuththukkal (Concepts) for the 11th Standard Students, preparing for Tamil Nadu State Board Exam.
Kanippori Iyal Thoguthi -II Seimurai (Practice) 11th Standard - Tamilnadu Board
by Training State Council of Educational ResearchKanippori Iyal Textbook Thoguthi -II Seimurai (Practice) for the 11th Standard Students, preparing for Tamil Nadu State Board Exam.
Kantian Ethics and the Attention Economy: Duty and Distraction
by Clinton Castro Timothy AylsworthIn this open access book, Timothy Aylsworth and Clinton Castro draw on the deep well of Kantian ethics to argue that we have moral duties, both to ourselves and to others, to protect our autonomy from the threat posed by the problematic use of technology. The problematic use of technologies like smartphones threatens our autonomy in a variety of ways, and critics have only begun to appreciate the vast scope of this problem. In the last decade, we have seen a flurry of books making “self-help” arguments about how we could live happier, more fulfilling lives if we were less addicted to our phones. But none of these authors see this issue as one involving a moral duty to protect our autonomy.
Kanzleimarketing online: Von der Idee bis zur Umsetzung erfolgreich im Netz (essentials)
by Pia LöfflerDieses essential widmet sich dem Projekt „Online-Kanzleimarketing“ – von der ersten Idee über die Entwicklung einer nachhaltigen Marketingstrategie bis hin zur Umsetzung einzelner Marketingmaßnahmen (z.B. Erstellung einer Kanzleiwebsite, Schaltung Google Ads, Einrichtung von Social-Media-Kanälen). Neben theoretischen Grundlagen geht es vor allem um alltagsnahe, gut umsetzbare praktische Tipps und Ratschläge: für Kanzleiinhaberinnen und -inhaber genauso wie für Marketingverantwortliche in Kanzleien.
Karel J Robot: A Gentle Introduction to the Art of Object-Oriented Programming in Java
by Joseph Bergin Mark Stehlik Jim Roberts Rich PattisKarel J. Robot updates Karel the Robot and even Karel++ to provide a means of introducing novice programmers to object-oriented programming (OOP). This book maintains the simplicity of the original and yet provides instruction that is thoroughly object-oriented from the beginning. Where the original used a syntax and methodology derived from Pascal, the present text is 100% Java. In object-oriented programming, a computation is carried out by a set of interacting objects. Here, the objects are robots that exist in a simple world. There can be one or several robots assigned to a task. The programming task is divided into two parts. The first part is defining the capabilities of the robots that are needed. The second is providing a description of the task for the robots to perform. The programmer uses his or her problem solving skills on both parts of this task. This version goes beyond the earlier Karel++ to put more emphasis on polymorphism, the primary distinction between procedural programming and object-oriented programming. There is also an introduction to simple but important design patterns, such as those that have recently revolutionized software practice.
Karma-based API on Apple Platforms: Building Privacy Into iOS and macOS Apps
by Manuel Carrasco MolinaLeverage the best techniques provided by Apple to build apps with maximum privacy for your users. This book explores not only the how-to steps for implementing privacy in your apps, but also answers workflow questions about what information you actually need.Do you need full access to a device’s contacts? Do you need to have location services enabled in the background constantly? This book explains how to selectively enable services and how to make apps that can continue to function even when the user refuses to share data. Understanding the needs of your users and the expectations of Apple in reviewing your app will make better apps. You'll see how to ensure that you make it through the App Store review quickly and without the need to go back and develop privacy protocols that should have been in place to begin with. Not only is developing with privacy in mind good from a moral standpoint, but it also helps you create leaner apps that set themselves up for less potential data breaches and issues later on in distribution. While a basic understanding of app creation is expected, no deep understanding of Cocoa(Touch) or Swift will be required as code will point to the Apple Documentation.What You'll LearnImportant APIs and how they affect privacyWork with the camera, Siri, maps, and other common iOS services and hardwareEffectively allow notifications and advertising without affecting privacyWho This Book Is ForApp builders interested in creating apps that respects their user’s privacy. Users willing to learn about the technicalities behind apps that respect or not their privacy
Kartographie: Visualisierung georäumlicher Daten
by Jochen SchieweWie würde unser Leben aussehen, wenn es keine (guten) Karten gäbe?Karten helfen dem Menschen, sich besser und schneller zu orientieren, zu navigieren sowie die komplexe Umwelt auf das Wesentliche zu reduzieren und schließlich besser zu verstehen. Die Visualisierung von georäumlichen Daten unterstützt Laien und Experten bei ihren alltäglichen Aufgaben im privaten, beruflichen oder wissenschaftlichen Bereich. Es werden immer mehr Karten erstellt, dank des Internets immer schneller verbreitet und auf unterschiedlichen Endgeräten wie Smartphones oder Tablets auch im Alltag genutzt. Der Trend zu immer mehr Karten bedeutet allerdings nicht, dass auch immer mehr „gute“ Karten erstellt werden – also solchen Karten, die ihren Zweck tatsächlich effizient erfüllen.Das Buch deckt die ganze spannende Breite des Faches Kartographie ab: Zum einen wird der Kern der Disziplin behandelt, der sich mit der graphischen Kodierung von georäumlichen Objekten und Eigenschaften sowie dem Raumbezug bzw. den Kartenabbildungen beschäftigt. Zum anderen werden wichtige Randbereiche für das „Rundum-Verständnis“ behandelt – z. B. die Überprüfung der Gebrauchstauglichkeit von Karten, die Erfassung und Verarbeitung der zugrundeliegenden Geodaten oder das Kartenrecht. Statt technischer oder Software-abhängiger Beschreibungen legt der Autor den Fokus auf die Vermittlung von Konzepten und Methoden der modernen Kartographie. Hierzu tragen einführende Überblicke zu den Kapiteln, zahlreiche Abbildungen sowie viele Übungsaufgaben bei.Ein wichtiges Lehrbuch, das Studierenden und Lehrenden aus vielen Disziplinen (Kartographie, Geographie oder Geodäsie, Stadt- und Regionalplanung oder Umweltwissenschaften u. v. a.) bei der Gestaltung und Nutzung solcher „guter Karten“ hilft. Auch andere, einfach „nur“ kartenbegeisterte Menschen werden von den hier beschriebenen Grundlagen der modernen Kartographie profitieren.
Kase on Technical Analysis Workbook: Trading and Forecasting (Bloomberg Financial)
by Cynthia A. KaseLearn all you need to know about trading and forecasting with technical analysis Kase on Technical Analysis is the ultimate guide to forecasting and trading technically, a comprehensive "all you need to know" review of the topics. Award-winning instructor, Cynthia A. Kase, CMT1, MFTA2, engineer, veteran energy trader, and one of the world's preeminent market technicians, captures her 30 plus years of experience in thirteen half-hour sessions, for more than six in-depth hours on technical analysis essentials. Viewers will develop a better understanding of charting and technical indicators, and get an inside look at cutting edge material based on Kase's own unique indicators and innovative approaches to trading and forecasting. The video describes key techniques for interpreting market behavior and developing a technical approach to trading. The workbook provides practice exercises that reinforce the concepts learned as Kase guides viewers through the various methodologies and their real-life applications to successful market interactions. Technical analysis is based on the premise that the behavior of a market reveals all that is known about it. Price action, volatility and rates of price changes may be harnessed by Kase's techniques to forecast future prices, identify low risk, high reward trading opportunities, and to cut losses while letting profits run. Kase on Technical Analysis shows how it's done, providing clear and wide-ranging instruction and expert insight that helps viewers to: Build a foundational understanding of charting and technical indicators, including an introduction to latest techniques Learn the most important technical methods for interpreting and analyzing market behavior Effectively apply technical analysis to trading strategy, risk management and market forecasting Formulate entry and exit strategies by using pattern recognition and properly applying technical indicators Technical analysis is a core discipline used by successful traders to assess market conditions and time trades. This package covers the aspects of technical analysis needed for intelligent interaction with the markets, from theory to practice, with concrete guidance toward real-world application. For traders wanting to "come up to speed" on technical analysis, for those wanting a refresher on the topic, as well as for seasoned traders looking for new ideas, Kase on Technical Analysis provides deep insight from a global authority. 1 Chartered Market Technician awarded by the Market Technicians Association 2 Master of Financial Technical Analysis awarded by the International Federation of Technical Analysts
Kawaii Engineering: Measurements, Evaluations, and Applications of Attractiveness (Springer Series on Cultural Computing)
by Michiko Ohkura“Kawaii” is a Japanese word that denotes “cute,” “lovable,” or “charming” although it does not have exactly the same meaning as those adjectives. This book proposes engineering methodologies for systematic measurement of the affective perception of kawaii, by using virtual reality and biological signals, and discusses the effectiveness of kawaii engineering for designing industrial products and services. Kawaii can draw sympathy from people and can embody a special kind of cute design, which reduces fear and makes dull information more acceptable and appealing. Following the introduction of the background of kawaii engineering in Chapter 1, Chapters 2 and 3 describe experiments on the systematic measurement and evaluation methods for kawaii products and affective evaluation experiments. Chapter 4 proposes a mathematical model to identify the physical attributes that determine kawaii in motion. Chapters 5 and 6 explain research that uses biological signals and eye-tracking. After a brief survey of psychological research on kawaii and cuteness in Chapter 7, Chapters 8 and 9 introduce the use of spoons designed to stimulate the appetite of the elderly and the practical implementation of an emotion-driven camera. Chapters 10–14 explain experimental research that examines kawaii perception of people from various cultural backgrounds. Kawaii Engineering will appeal to those who work on affective computing, product design, user experience design, virtual reality, and biological signals.
Keep Calm and Log On: Your Handbook for Surviving the Digital Revolution
by Gillian "Gus" AndrewsHow to survive the digital revolution without getting trampled: your guide to online mindfulness, digital self-empowerment, cybersecurity, creepy ads, trustworthy information, and more.Feeling overwhelmed by an avalanche of online content? Anxious about identity theft? Unsettled by the proliferation of fake news? Welcome to the digital revolution. Wait—wasn't the digital revolution supposed to make our lives better? It was going to be fun and put the world at our fingertips. What happened? Keep Calm and Log On is a survival handbook that will help you achieve online mindfulness and overcome online helplessness—the feeling that tech is out of your control—with tips for handling cybersecurity, creepy ads, untrustworthy information, and much more.Taking a cue from the famous World War II morale-boosting slogan (“Keep Calm and Carry On”), Gus Andrews shows us how to adapt the techniques our ancestors used to survive hard times, so we can live our best lives online. She explains why media and technology stress us out, and offers empowering tools for coping. Mindfulness practices can help us stay calm and conserve our attention purposefully. Andrews shares the secret of understanding our own opinions'' “family trees” in order to identify misleading “fake news.” She provides tools for unplugging occasionally, overcoming feelings that we are “bad at technology,” and taking charge of our security and privacy. Andrews explains how social media algorithms keep us from information we need and why “creepy ads” seem to follow us online. Most importantly, she urges us to work to rebuild the trust in our communities that the internet has broken.