Browse Results

Showing 8,976 through 9,000 of 61,611 results

Broadband RF and Microwave Amplifiers

by Andrei Grebennikov Narendra Kumar Binboga Yarman

Broadband RF and Microwave Amplifiers provides extensive coverage of broadband radio frequency (RF) and microwave power amplifier design, including well-known historical and recent novel schematic configurations, theoretical approaches, circuit simulation results, and practical implementation strategies. The text begins by introducing two-port networks to illustrate the behavior of linear and nonlinear circuits, explaining the basic principles of power amplifier design, and discussing impedance matching and broadband power amplifier design using lumped and distributed parameters. The book then: Shows how dissipative or lossy gain-compensation-matching circuits can offer an important trade-off between power gain, reflection coefficient, and operating frequency bandwidth Describes the design of broadband RF and microwave amplifiers using real frequency techniques (RFTs), supplying numerous examples based on the MATLAB® programming process Examines Class-E power amplifiers, Doherty amplifiers, low-noise amplifiers, microwave gallium arsenide field-effect transistor (GaAs FET)-distributed amplifiers, and complementary metal-oxide semiconductor (CMOS) amplifiers for ultra-wideband (UWB) applications Broadband RF and Microwave Amplifiers combines theoretical analysis with practical design to create a solid foundation for innovative ideas and circuit design techniques.

Broadband as a Video Platform: Strategies for Africa (The Economics of Information, Communication, and Entertainment)

by Eli M. Noam Judith O'Neill Darcy Gerbarg

This volume features contributions from a conference held in Lusaka, Zambia, to explore the role and prospects of broadband in Africa as a video platform--with emphasis on the strategies and building blocks for deployment and advancement. While it may seem that such networks and their applications are not a realistic scenario for developing countries, it would be short-sighted and economically dangerous to ignore the emerging trends. The pace of introduction of next-generation networks in industrialized countries is rapid and the developing world will not be able to stand aside. The risks of falling behind are great and in any country there will be elements of business and society who wish to forge ahead. Policymakers and network architects need to be prepared. Media companies and broadcasters, in particular, must be alert to the new developments as should be medical and educational institutions. The availability of advanced high-speed business application tools in a country will affect its participation in international transactions and its economic growth. This volume features contributions from industry leaders, policymakers and scholars, representing a variety of perspectives, including technology and infrastructure management, economic development, marketing, education and health. The authors collectively discuss how broadband deployment as a platform with sufficient speed for video may be encouraged by public policy and regulation and how investment in broadband for this and related purposes can improve the quality of life and experience in Sub Saharan Africa in media and data, while being a financeable, commercially sound business.

Broadcast and Internet Indecency: Defining Free Speech

by Jeremy Harris Lipschultz

This book explores broadcast and Internet indecency from social and legal perspectives, using current cases and examples. Case law is used as a starting point from which to explore the social and legal boundaries of speech.

Broadcasting, Cable, The Internet, And Beyond: An Introduction To Modern Electronic Media

by Joseph R. Dominick Barry L. Sherman Fritz J. Messere

This survey of the field of modern electronic media includes the new technologies, regulations, programming, and competition that affect our world and the broadcasting industry. The text conveys the excitement of the industry in a highly accessible style that makes even the most difficult information understandable.

Broadening Cultural Horizons in Social Marketing: Comparing Case Studies from Asia-Pacific

by Lynne Eagle Rachel Hay Abhishek Bhati

This book presents a series of empirically based case studies conducted by social change scholars from Asia-Pacific, showcasing the latest social marketing approaches geared at improving societal well-being in the region. Cutting across cultural perspectives, the contents gather ideas on social marketing campaigns and strategies from around the region and use these case studies as a platform to address concomitant challenges in employing marketing tools to positively change social behaviour. The selection of case studies covers and compares aspects of public health and well-being, and public environmental consciousness in terms of driving attitudes towards implementing improved sustainability in developing and developed countries. Drawing on related policies and legislation, and examining social behaviour at the individual, community, and organisational levels, the authors propose innovative new methods in social marketing and social change research. The book is of interest to researchers and practitioners in social marketing, business ethics, behavioural science, public health, and development studies.

Broadening the Scope of Research on Mathematical Problem Solving: A Focus on Technology, Creativity and Affect (Research in Mathematics Education)

by Keith Jones Susana Carreira Nélia Amado

The innovative volume seeks to broaden the scope of research on mathematical problem solving in different educational environments. It brings together contributions not only from leading researchers, but also highlights collaborations with younger researchers to broadly explore mathematical problem-solving across many fields: mathematics education, psychology of education, technology education, mathematics popularization, and more. The volume’s three major themes—technology, creativity, and affect—represent key issues that are crucially embedded in the activity of problem solving in mathematics teaching and learning, both within the school setting and beyond the school. Through the book’s new pedagogical perspectives on these themes, it advances the field of research towards a more comprehensive approach on mathematical problem solving. Broadening the Scope of Research on Mathematical Problem Solving will prove to be a valuable resource for researchers and teachers interested in mathematical problem solving, as well as researchers and teachers interested in technology, creativity, and affect.

Broken Agile: Second Edition

by Tim Brizard

Learn how to be successful in adopting Agile and see good and bad examples of how Agile can be adopted. Broken Agile, Second Edition contains stories from years of real world experience on Agile teams and projects. The stories in each chapter are both educational and entertaining. Each chapter focuses on specific Agile values and principles. The stories in each chapter are used to illustrate how Agile values and principles are sometimes misunderstood or misapplied on Agile teams and projects. You will read how Agile is used in the real world and the consequences of poor adaptations of the Agile software development methodology. These stories will help you in your journey to adopt Agile software development. What you'll learn What are good and bad examples of how Agile can be adopted What are some specific Agile values and principles How some of these are misunderstood or misapplied How Agile is used in the real world What are the consequences of poor adoption of the Agile software methodology How some companies have been successful in adopting Agile Who this book is for This book is for experienced software developers in their journey to adopt Agile Software development. It is very useful for those considering implementation of Agile processes. Table of Contents 1. Introduction 2. Scale Success 3. Communication 4. Poor Foundations 5. Long Run Plan for Success 6. Adjusting in Time 7. Sending the Wrong Signals 8. Balancing Life and Work 9. Fake It Until You Make It 10. Building Unity 11. Keeping Engaged 12. Fundamental Mis-Understandings 13. Challenges with Estimations 14. Transparency 15. Specifications and Testing 16. Some Process Required 17. Physical vs. Virtual 18. Final Thoughts

Broken Code: Inside Facebook and the Fight to Expose Its Harmful Secrets

by Jeff Horwitz

By an award-winning technology reporter for The Wall Street Journal, a behind-the-scenes look at the manipulative tactics Facebook used to grow its business, how it distorted the way we connect online, and the company insiders who found the courage to speak out"Broken Code fillets Facebook&’s strategic failures to address its part in the spread of disinformation, political fracturing and even genocide. The book is stuffed with eye-popping, sometimes Orwellian statistics and anecdotes that could have come only from the inside." —New York Times Book ReviewOnce the unrivaled titan of social media, Facebook held a singular place in culture and politics. Along with its sister platforms Instagram and WhatsApp, it was a daily destination for billions of users around the world. Inside and outside the company, Facebook extolled its products as bringing people closer together and giving them voice.But in the wake of the 2016 election, even some of the company&’s own senior executives came to consider those claims pollyannaish and simplistic. As a succession of scandals rocked Facebook, they—and the world—had to ask whether the company could control, or even understood, its own platforms.Facebook employees set to work in pursuit of answers. They discovered problems that ran far deeper than politics. Facebook was peddling and amplifying anger, looking the other way at human trafficking, enabling drug cartels and authoritarians, allowing VIP users to break the platform&’s supposedly inviolable rules. They even raised concerns about whether the product was safe for teens. Facebook was distorting behavior in ways no one inside or outside the company understood. Enduring personal trauma and professional setbacks, employees successfully identified the root causes of Facebook's viral harms and drew up concrete plans to address them. But the costs of fixing the platform—often measured in tenths of a percent of user engagement—were higher than Facebook's leadership was willing to pay. With their work consistently delayed, watered down, or stifled, those who best understood Facebook&’s damaging effect on users were left with a choice: to keep silent or go against their employer.Broken Code tells the story of these employees and their explosive discoveries. Expanding on &“The Facebook Files,&” his blockbuster, award-winning series for The Wall Street Journal, reporter Jeff Horwitz lays out in sobering detail not just the architecture of Facebook&’s failures, but what the company knew (and often disregarded) about its societal impact. In 2021, the company would rebrand itself Meta, promoting a techno-utopian wonderland. But as Broken Code shows, the problems spawned around the globe by social media can&’t be resolved by strapping on a headset.

Broken News: Why the Media Rage Machine Divides America and How to Fight Back

by Chris Stirewalt

"One of America&’s most experienced and exemplary journalists has written an unsparing analysis of the dreadful consequences -- for journalism and the nation -- of &‘how the news lost a race to the bottom with itself.&’&” -- George F. Will In this national bestseller, Chris Stirewalt, a former Fox News political editor, takes readers inside America&’s broken newsrooms that have succumbed to the temptation of &“rage revenue.&” One of America&’s sharpest political analysts, Stirewalt employs his trademark wit and insight to reveal how these media organizations slant coverage – and why that drives political division and rewards outrageous conduct. The New York Times wrote that Stirewalt&’s book "is an often candid reflection on the state of political journalism and his time at Fox News, where such post-mortem assessments are not common..." Broken News is a fascinating, deeply researched, conversation-provoking study of how the news is made and how it must be repaired. Stirewalt goes deep inside the history of the industry to explain how today&’s media divides America for profit. And he offers practical advice for how readers, listeners, and viewers can (and should) become better news consumers for the sake of the republic.

Brother from a Box

by Evan Kuhlman Iacopo Bruno

One new brother--assembly required. From the author of The Last Invisible Boy.Matt Rambeau is officially a big brother--to a robot! Matt's super-computer-genius dad is always getting cool tech stuff in the mail, but the latest box Matt opens contains the most impressive thing he's ever seen: a bionically modified lifeform that looks human and calls Matt "brother" (in French)! Norman turns out to be a bit of an attention hog and a showoff, but Matt's still psyched to have a robotic sibling--even if he flirts with (ugh) girls. Then strange things start to happen. First a computer worm causes Norman to go berserk, and then odd men start showing up in unusual places. Matt soon realizes that someone is trying to steal the robot--correction--his brother!In this zany, action-packed story with spies, skateboards, and plenty of artificial intelligence, acclaimed author Evan Kuhlman gets to the heart (and motherboard) of one of the most special relationships known to man (or machine): brotherhood.

Brotopia: Breaking Up the Boys' Club of Silicon Valley

by Emily Chang

Silicon Valley is a modern utopia where anyone can change the world. Unless you're a woman. <P><P> For women in tech, Silicon Valley is not a fantasyland of unicorns, virtual reality rainbows, and 3D-printed lollipops, where millions of dollars grow on trees. <P><P>It's a "Brotopia," where men hold all the cards and make all the rules. Vastly outnumbered, women face toxic workplaces rife with discrimination and sexual harassment, where investors take meetings in hot tubs and network at sex parties.In this powerful exposé, Bloomberg TV journalist Emily Chang reveals how Silicon Valley got so sexist despite its utopian ideals, why bro culture endures despite decades of companies claiming the moral high ground (Don't Be Evil! Connect the World!)--and how women are finally starting to speak out and fight back. <P><P>Drawing on her deep network of Silicon Valley insiders, Chang opens the boardroom doors of male-dominated venture capital firms like Kleiner Perkins, the subject of Ellen Pao's high-profile gender discrimination lawsuit, and Sequoia, where a partner once famously said they "won't lower their standards" just to hire women. <P><P>Interviews with Facebook COO Sheryl Sandberg, YouTube CEO Susan Wojcicki, and former Yahoo! CEO Marissa Mayer--who got their start at Google, where just one in five engineers is a woman--reveal just how hard it is to crack the Silicon Ceiling. And Chang shows how women such as former Uber engineer Susan Fowler, entrepreneur Niniane Wang, and game developer Brianna Wu, have risked their careers and sometimes their lives to pave a way for other women. <P><P>Silicon Valley's aggressive, misogynistic, work-at-all costs culture has shut women out of the greatest wealth creation in the history of the world. It's time to break up the boys' club. <P><P>Emily Chang shows us how to fix this toxic culture--to bring down Brotopia, once and for all.

Browsers, Devices, and Fonts: A Designer's Guide to Fonts and How They Function on the Web

by Gary Rozanc

Part technical and part theoretical, this practical guide to web typography helps designers understand how the typographic choices they make in layout and prototyping programs behave once they are turned into live code. Through a series of demos, this book teaches designers how to create typographic specific webpages by learning just enough HTML and CSS to be able to view the pages in different browsers, devices, and operating systems. With live webpages to evaluate, designers will learn how to test those pages for supported features and performance, ensuring font choices look as good in the browser as it does in their layout program, delivering a speedy experience to the users. Key Features Demonstrates the minimal amount of HTML and CSS necessary to be able to create webpages to see typographic choices in the browser. Discusses responsive design and how to evaluate and test those choices for performance and usability prior to front-end development. Demonstrates how to review your own typographic, image, and layout choices in the browser through a series of demos in the book.

Bruce Schneier on Trust Set

by Bruce Schneier

Save almost 25% on this two-book set from Bruce Schneier covering issues of social trust and securityThis set includes two books from security expert Bruce Schneier, Liars and Outliers: Enabling the Trust that Society Needs to Thrive and Carry On: Sounds Advice from Schneier on Security. In Liars and Outliers, Schneier covers the topic of trust in society and how issues of trust are critical to solving problems as diverse as corporate responsibility, global warming, and the political system. Insightful and entertaining, the weaves together ideas from across the social and biological sciences to explain how society induces trust and how trust facilitates and stabilizes society.Carry On features more than 140 articles by Schneier, including more than twenty unpublished articles, covering such security issues as crime and terrorism, human security, privacy and surveillance, the psychology of security, security and technology, travel and security, and more.A two-book set from a renowned author, technologist, and security expertCovers such current topics as the Internet as surveillance state, Chinese cyberattackes, privacy and social networking, aviation security, and moreIdeal for IT professionals, security and networking engineers, hackers, consultants, and technology vendorsTogether, these two books offer deep and practical insight into a wide range of security topics for professionals in technology fields, as well as anyone interested in the larger philosophical issues of security.

Bryan Peterson Photography School: A Master Class in Creating Outstanding Images

by Bryan Peterson

A master class from the acclaimed photographer, bestselling author, and popular teacher, featuring lessons and workshops previously available only through the Bryan Peterson School of PhotographyHave you ever dreamed of attending a photography class led by one of the most respected professional photographers in the world? Step right up! Bryan Peterson invites readers to participate in his famous workshops, sharing all his best tips and tricks for capturing subjects and landscapes in a magical moment. Using before-and-after examples from real-life students, Bryan reveals the keys to improving your craft with the right angle, aperture, lens, and filters. Including lessons in shutter speed, white balance, light meter, lens choice and point of view, Photoshop, and so much more, Bryan Peterson Photography School is a unique opportunity to hone your skills and learn how to produce impeccable photographs.

Bryan Peterson's Understanding Composition Field Guide: How to See and Photograph Images with Impact

by Bryan F. Peterson

Learn to "see" more compelling images with this on-the-go field guide from Bryan Peterson! What makes an image amazing? Believe it or not, it is not about the content. What makes a photo compelling is the arrangement of that content--in other words, its composition. The right composition gives your images impact and emotion; the wrong one leaves them flat. In this handy, take-anywhere guide, renowned photographer, instructor, and bestselling author Bryan Peterson frees amateur photographers from the prejudices of what is "beautiful" or "ugly" so that they can instead focus on color, line, light, and pattern. Get the tools you need to show your distinct voice and point of view in every image you shoot. With this guide in your camera bag, you'll be equipped not only to "see" beautiful images but to successfully shoot them each and every time. Also available as an ebook

Brüche, Verhältnisse und Wurzeln: Grundlagen wiederentdecken und interessante Anwendungen neu kennenlernen (essentials)

by Renate Motzer

Renate Motzer führt in die Welt der Brüche ein und bringt sie in Verbindung mit Dezimalzahlen. Sie zeigt anschaulich, dass Brüche als Anteile eines Ganzen verstanden werden können, aber auch als Verhältnisse von zwei Größen. Die Autorin zeigt verständlich auf, warum Wurzeln nicht exakt durch Brüche angegeben werden können, wie man gute Näherungen findet und warum eine ungewöhnliche Bruchaddition zu paradoxen Ergebnissen führen kann. Weiterhin erläutert sie praxisnah die Anwendung von Brüchen beim Prozentrechnen und in der Wahrscheinlichkeitsrechnung und geht schließlich auf verschiedene Möglichkeiten ein, Mittelwerte zu bilden.

Bs25999

by Tony Drewitt

This book furnishes readers with an understanding of the basics of business continuity, including: a definition of what business continuity means; how managing operational business continuity risk can be achieved using an approach increasingly recognised world-wide; the important distinction between operational, commercial and strategic risks in business; the role played by operational resilience measures, business continuity strategies and planning in managing operational risks; how to demonstrate some form of return on investment in a business continuity management system (BCMS); and, the role of business continuity in corporate governance and how to develop a mechanism that provides directors and stakeholders with appropriate assurance about the management and control of business continuity risks. Corporate bodies will find this book useful at a number of stages in any business continuity project, including: at the decision-making stage, project initiation stage, and, as part of an ongoing awareness campaign, being made available to all staff and to new starters as part of their introduction to the company.

Bubble Witch Saga 2: O Guia de Jogo não oficial

by Mike Brandish Joshua Abbott

Além de comprar esse e-book, sinta-se livre para assinar nosso programa de suplementos grátis. Copiando o link abaixo, você recebe acesso aos últimos updates dos apps onlines e vídeo-games mais populares. Assine aqui: http://emailsignupform.subscribemenow.com/ Guia de Dicas e Estratégias avançadas: Esse é o guia mais completo e detalhado que encontrará online. Disponível para download instantâneo no seu celular, e-reader ou em papel. Com o sucesso dos meus centenas de guias escritos, eu escrevi mais um guia profissional para os jogadores veteranos. Ele dá dicas específicas e estratégias para progredir no jogo, vencer seus oponentes, conseguir mais barras de ouro e muito mais! Aqui está o que encontrará quando comprar esse guia avançado do jogo. - Dicas e estratégias profisisonais. - Hacks e Trapaças. - Segredos, Cheats, Conteúdo desbloqueável e macetes usados pelos jogadores profissionais! - Como conseguir muito Cash/Moedas - E MUITAS OUTRAS COISAS! Todas as versões desse guia tem fotos para ajudar a compreender o jogo. Não há outro guia tão completo e avançado quanto este. Você se beneficiará e se sentirá mais feliz com ele do que com os outros guias menos eficientes lá fora. Compre agora e esmague a competição! Se torne um jogador profissional hoje mesmo! Para suporte e mais informações de nossos produtos, por favor visite http://www.hiddenstuffentertainment.com/ Aviso Legal Este produto não está associado, afiliado, endossado, certificado ou patrocinado pelo dono do Copyright original. Todas as marcas registradas que aparecem nesse livro são propriedade de seus respectivos donos.

BuddyPress For Dummies

by Lisa Sabin-Wilson

Use BuddyPress to create the ultimate site experience BuddyPress is a suite of free WordPress plugins and themes, each adding a distinct new feature. It contains all the features you would expect from WordPress, but it aims to let members socially interact. With this fun and friendly guide, you'll learn how to customize BuddyPress so that it matches the style of your Web site. You'll walk through the necessary steps for modifying and customizing BuddyPress themes and you'll discover how to extend BuddyPress through the use of addons and plugins. With BuddyPress, you'll be well on your way to creating the ultimate user experience on your site. Shows you how to set up the WordPress foundation required to run BuddyPress Walks you through installing BuddyPress on a WordPress-powered site Explains the different BuddyPress components, including extended profiles, private messaging, friends, groups, the wire, activity streams, blog tracking, status updates, and more Details ways to troubleshoot BuddyPress once it is up and running Demonstrates how to extend BuddyPress through the use of addons and plugins Bring all your social community subscriptions together in BuddyPress!

BuddyPress Theme Development

by Tammie Lister

This book is a hands-on tutorial guide to using BuddyPress.This book is great for designers and developers who are looking to learn how to develop BuddyPress themes. It's assumed that the reader has some understanding of Wordpress and is familiar with CSS and HTML.

Budowa prostych robotów. Niezwyk?e projekty ze zwyk?ych materia?ów

by Kathy Ceceri

Roboty dla ka?dego, wykonane ze wszystkiegoCo to jest robot? Gdyby zada? to pytanie przypadkowej osobie na ulicy, z pewno?ci? odpowiedzia?aby, ?e jest to konstrukcja zbudowana z drogich materia?ów, zawieraj?ca skomplikowane uk?ady elektroniczne oraz profesjonalne oprogramowanie. Nic bardziej b??dnego! Czy wiesz, ?e prostego robota mo?esz zbudowa? nawet z papieru? Si?gnij po t? ksi??k? i zacznij prac? nad swoim pierwszym projektem!Autorka tego podr?cznika udowodni Ci, ?e ka?dy mo?e wcieli? si? w rol? konstruktora, nawet bez zaawansowanych umiej?tno?ci elektronicznych. W dodatku mo?e wykorzysta? w tym celu najró?niejsze materia?y. Dzi?ki informacjom zawartym w tej ksi??ce zbudujesz robota zasilanego energi? s?oneczn? oraz takiego, który porusza si? dzi?ki wibracjom. Ponadto w trakcie lektury kolejnych rozdzia?ów przekonasz si?, jak wykorzysta? p?ytk? Arduino do zapanowania nad robotem wykonanym z e-tekstyliów. Poznasz te? ciekawostki zwi?zane z drukiem 3D, platform? littleBits oraz robotami BEAM. Przekonaj si?, jak ?atwo mo?esz spe?ni? swoje marzenia o budowie robota!Lektura ksi??ki Budowa prostych robotów pozwoli Ci skonstruowa?: Papierowego i gumowego (pompowanego) robota, który b?dzie porusza? si? reaguj?c na Twoje polecenia; Ruchom?, napr??eniowo-integraln? konstrukcj? no?n? robota nap?dzan? za pomoc? komponentów littleBits; Hybryd? ko?a i nóg; Chmar? ?lizgaj?cych si? robotów poruszaj?cych si? dzi?ki drganiom; Robota BEAM zasilanego energi? s?oneczn?, poruszaj?cego si? dzi?ki drganiom; Ploter wykonuj?cy rysunki za pomoc? mazaka; Robota wyposa?onego w Arduino o korpusie wykonanym z e-tekstyliów;Naucz si? budowa? proste roboty!

Budowanie mikrous?ug

by Sam Newman

Wykorzystaj potencja? architektury us?ug!Architektura mikrous?ug to sposób na odej?cie od du?ych, monolitycznych aplikacji. Wyspecjalizowane us?ugi realizuj?ce konkretne zadania i komunikuj?ce si? z otoczeniem pozwalaj? na lepsze zapanowanie nad kodem, s? ?atwiejsze do przetestowania oraz bardziej elastyczne. Jednak oprócz zalet maj? te? wady. Si?gnij po t? ksi??k? i dowiedz si?, jak najlepiej radzi? sobie z architektur? mikrous?ug!Autor przedstawia w ksi??ce skuteczne techniki projektowania i korzystania z architektury mikrous?ug. W trakcie lektury kolejnych rozdzia?ów poznasz w szczegó?ach ide? mikrous?ug, korzy?ci ich stosowania, sposoby modelowania us?ug oraz skuteczne techniki dzielenia du?ej aplikacji na mikrous?ugi. Ponadto zapoznasz si? z mo?liwymi sposobami integracji: zdalne wywo?anie procedur, REST i zdarzenia — to tylko niektóre z poruszanych kwestii. Na sam koniec zaznajomisz si? z najlepszymi metodami testowania i monitorowania us?ug, zapewnisz im bezpiecze?stwo dzi?ki kluczom API oraz innym technikom. Ta ksi??ka jest obowi?zkow? lektur? dla wszystkich osób chc?cych tworzy? nowoczesne systemy bazuj?ce na architekturze mikrous?ug. Odkryj, jak mo?na dostosowa? projekt systemu do celów Twojej organizacji stosuj?c architektur? mikrous?ug Zapoznaj si? z mo?liwo?ciami integracji us?ug z pozosta?? cz??ci? systemu Zastosuj przyrostowe podej?cie do podzia?u monolitycznych baz kodu Wdra?aj pojedyncze mikrous?ugi korzystaj?c z techniki ci?g?ej integracji Zbadaj z?o?ono?? testowania i monitorowania rozproszonych us?ug Zarz?dzaj zabezpieczeniami stosuj?c modele u?ytkownik-us?uga oraz us?uga-us?uga Zapoznaj si? z wyzwaniami skalowania architektury mikrous?ugPrzekonaj si?, jak architektura mikrous?ug zmieni Twoje spojrzenie na aplikacje!Sam Newman — technolog w firmie ThoughtWorks odpowiedzialny za wspomaganie klientów oraz architektur? wewn?trznych systemów. Prelegent, autor artyku?ów dla wydawnictwa O’Reilly. Programista j?zyków Java oraz Python.

Buffer Overflow Attacks: Detect, Exploit, Prevent

by James C. Foster

Will the Code You Write Today Headline Tomorrow's BugTraq Mail List? Includes Numbered-by-Line Exploit Code Examples That Illustrate the Differences Between Stack Overflows, Heap Corruption, and Format String Bugs Provides Case Studies for Most Major Platforms and Environments, Including Windows, FreeBSD, FrontPage, and Linux Avoid Worm or Custom Exploits by Analyzing Your Source Code to Detect Buffer Overflow Vulnerabilities Forensic investigations of notorious Internet attacks, such as the SQL Slammer and Blaster Worms, reveal buffer overflows to be the sophisticated hacker's "vulnerability of choice". These worms crippled the Internet and cost billions of dollars to clean up. Now, even more powerful and insidious threats have appeared in the form of "custom exploits". These one-time only exploits are custom crafted to attack your enterprise, making them even more difficult to detect and defend. No catchy names, no media coverage; just your own personal disaster. James C. Foster's Buffer Overflow Attacks clearly demonstrates that the only way to defend against the endless variety of buffer overflow attacks is to implement a comprehensive design, coding and test plan for all of your applications. From Dave Aitel's Foreword through the last appendix, this is the only book dedicated exclusively to detecting, exploiting, and preventing buffer overflow attacks. CONTENTS OF THIS BOOK INCLUDE Buffer Overflows: The Essentials Understanding Shellcode Writing Shellcode Win32 Assembly Case Study: FreeBSD NN Exploit Code Case Study: xlockmore User Supplied Format String Vulnerability (CVE-2000-0763) Case Study: FrontPage Denial of Service Utilizing WinSock Stack Overflows Heap Corruption Format String Attacks Windows Buffer Overflows Case Study: cURL buffer overflow on Linux Case Study: OpenSSL SSLv2 Malformed Client Key Remote Buffer Overflow Vulnerability (CAN-2002-0656) Case Study: X11R6 4.2 XLOCALEDIR Overflow Case Study: Microsoft MDAC Denial of Service Case Study: Local UUX Buffer Overflow on HPUX Finding Buffer Overflows in Source Case Study: InlineEgg I Case Study: InlineEgg II Case Study: Seti@Home Exploit Code Case Study: Microsoft CodeBlue Exploit Code The Complete Data Conversion Table Useful Syscalls Additional Exploit References

Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities

by Vickie Li

Bug Bounty Bootcamp teaches you how to hack web applications. You will learn how to perform reconnaissance on a target, how to identify vulnerabilities, and how to exploit them. You&’ll also learn how to navigate bug bounty programs set up by companies to reward security professionals for finding bugs in their web applications.Bug bounty programs are company-sponsored programs that invite researchers to search for vulnerabilities on their applications and reward them for their findings. This book is designed to help beginners with little to no security experience learn web hacking, find bugs, and stay competitive in this booming and lucrative industry. You&’ll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you&’ll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you&’ll explore the mechanisms of common web vulnerabilities, like XSS, SQL injection, and template injection, and receive detailed advice on how to find them and bypass common protections. You&’ll also learn how to chain multiple bugs to maximize the impact of your vulnerabilities. Finally, the book touches on advanced techniques rarely covered in introductory hacking books but that are crucial to understand to hack web applications. You&’ll learn how to hack mobile apps, review an application&’s source code for security issues, find vulnerabilities in APIs, and automate your hacking process. By the end of the book, you&’ll have learned the tools and techniques necessary to be a competent web hacker and find bugs on a bug bounty program.

Bug Bounty Hunting Essentials

by Shahmeer Amir

This book is targeted towards white-hat hackers, or anyone who wants to understand the concept behind bug bounty hunting and understand this brilliant way of penetration testing. This book does not require any knowledge on bug bounty hunting.

Refine Search

Showing 8,976 through 9,000 of 61,611 results