Border Hacker


Book Description

An unlikely friendship, a four-thousand-mile voyage, and an impenetrable frontier—this dramatic odyssey reveals the chaos and cruelty US immigration policies have unleashed beyond our borders. Axel Kirschner was a lifelong New Yorker, all Queens hustle and bravado. But he was also undocumented. After a minor traffic violation while driving his son to kindergarten, Axel was deported to Guatemala, a country he swore he had not lived in since he was a baby. While fighting his way back through Mexico on a migrant caravan, Axel met Levi Vonk, a young anthropologist and journalist from the US. That chance encounter would change both of their lives forever. Levi soon discovered that Axel was no ordinary migrant. He was harboring a secret: Axel was a hacker. This secret would launch the two friends on a dangerous adventure far beyond what either of them could have imagined. While Axel’s abilities gave him an edge in a system that denied his existence, they would also ensnare him in a tangled underground network of human traffickers, corrupt priests, and anti-government guerillas eager to exploit his talents for their own ends. And along the way, Axel’s secret only raised more questions for Levi about his past. How had Axel learned to hack? What did he want? And was Axel really who he said he was? Border Hacker is at once an adventure saga—the story of a man who would do anything to return to his family, and the friend who would do anything to help him—and a profound parable about the violence of American immigration policy told through a single, extraordinary life.




Hacker's Guide to Visual FoxPro 6.0


Book Description

An irreverent look at how Visual FoxPro really works. Tells you the inside scoop on every command, function, property, event and method of "Tahoe." The eagerly awaited revision to the Hacker's Guide for Visual FoxPro 3.0, this completely updated book is the one you'll keep by your side for as long as you develop in Visual FoxPro.




Ambiguities of Activism


Book Description

This volume provides a critical and in-depth investigation of the relationship between alter-globalist thinking and practices and their popular discourses. It examines the ways in which several alter-globalist activist groups (like Indymedia, no-borders campaigns, and forms of climate change activism), as well as left-wing intellectuals and academics (like Michael Hardt, Al Gore, Antonio Negri, Hakim Bey, and Geert Lovink), mobilize problematic discourses, tools, and divisions in an attempt to overcome gendered, raced, and classed oppressions worldwide. The book draws out how these mobilizations and theorizations, despite (or possibly because of) their liberatory claims, are actually implicated in the intensification of global hierarchies by repeatedly invoking narratives of transcendence, connection, progress, and in particular of speed. Hoofd argues that the humanist ideals that underlie all these practices paradoxically trigger increasing disenfranchisements worldwide.




The Electronic Intrusion Threat to National Security and Emergency Preparedness Telecommunications


Book Description

Summarizes the current and historical electronic intrusion threat to U.S. national security and emergency preparedness (NS/EP) telecommunications, identifying and analyzing the threat that electronic intrusion represents to the Public Switched Network. Contents: electronic intruders (skills and techniques, insiders, industrial spies, foreign intelligence services); targeted technologies and services (data networks, international gateways, signaling networks, wireless systems, other emerging technologies); potential NS/EP implications (disruption of service, etc.); reaction strategies. Diagrams. Glossary.




Hackers & Painters


Book Description

The author examines issues such as the rightness of web-based applications, the programming language renaissance, spam filtering, the Open Source Movement, Internet startups and more. He also tells important stories about the kinds of people behind technical innovations, revealing their character and their craft.




Berek and Hacker's Gynecologic Oncology


Book Description

Berek and Hacker's Gynecologic Oncology is written for gynecologic oncologists and fellows, general gynecologists and medical and radiation oncologists and presents the general principles and medical and surgical treatment for the range of gyencologic cancers: cervical, breast, ovarian, vulvar and vaginal and uterine. Chapters are templated and evidence-based. The strength of this book is its ability to translate basic science to clinical practice. Gynecologic Oncology is one of the four gynecologic subspecialties (along with FPMRS, REI and MFM).




The New Border Wars


Book Description

An enlightening look at contemporary border tensions—from the Gaza Strip to the space race—by one of the world’s leading experts in geopolitics. Border expert Klaus Dodds journeys into the geopolitical clashes of tomorrow in an eye-opening tour of border walls both literal and figurative. In the Himalayas, the Mediterranean, and elsewhere, the tension inherent to trying to divide the world into separate parcels has not gone away. And with climate change shifting our natural borders, from mountains to glaciers to rivers, the question of how we live in a world that’s becoming warmer and wetter and growing in population looms large. With wide-ranging insight and provocative analysis, Dodds shows why we are more likely to see more walls, barriers, and securitization in our daily lives. The New Border Wars examines just what borders truly mean in the modern world: How are they built; what do they signify for citizens and governments; and how do they help us understand our political past and, most importantly, our diplomatic future?




The Idea of the Avant Garde


Book Description

The concept of the avant garde is highly contested, whether one consigns it to history or claims it for present-day or future uses. The first volume of The Idea of the Avant Garde – And What It Means Today provided a lively forum on the kinds of radical art theory and partisan practices that are possible in today’s world of global art markets and creative industry entrepreneurialism. This second volume presents the work of another 50 artists and writers, exploring the diverse ways that avant-gardism develops reflexive and experimental combinations of aesthetic and political praxis. The manifest strategies, temporalities, and genealogies of avant-garde art and politics are expressed through an international, intergenerational, and interdisciplinary convocation of ideas that covers the fields of film, video, architecture, visual art, art activism, literature, poetry, theatre, performance, intermedia and music.




The Browser Hacker's Handbook


Book Description

Hackers exploit browser vulnerabilities to attack deep within networks The Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a team of highly experienced computer security experts, the handbook provides hands-on tutorials exploring a range of current attack methods. The web browser has become the most popular and widely used computer "program" in the world. As the gateway to the Internet, it is part of the storefront to any business that operates online, but it is also one of the most vulnerable entry points of any system. With attacks on the rise, companies are increasingly employing browser-hardening techniques to protect the unique vulnerabilities inherent in all currently used browsers. The Browser Hacker's Handbook thoroughly covers complex security issues and explores relevant topics such as: Bypassing the Same Origin Policy ARP spoofing, social engineering, and phishing to access browsers DNS tunneling, attacking web applications, and proxying—all from the browser Exploiting the browser and its ecosystem (plugins and extensions) Cross-origin attacks, including Inter-protocol Communication and Exploitation The Browser Hacker's Handbook is written with a professional security engagement in mind. Leveraging browsers as pivot points into a target's network should form an integral component into any social engineering or red-team security assessment. This handbook provides a complete methodology to understand and structure your next browser penetration test.




Berek and Hacker’s Gynecologic Oncology


Book Description

Evidence-based, superbly illustrated, and easy to read, Berek & Hacker’s Gynecologic Oncology, Seventh Edition, remains your reference of choice for authoritative information on every aspect of gynecologic malignancies. Templated chapters provide quick access to guidance on everything from general principles through diagnosis and medical and surgical management. This fully revised edition offers the practical, state-of-the-art coverage you need when caring for women with preinvasive disease; ovarian, breast, uterine, cervical, vulvar, and vaginal cancers; and gestational trophoblastic disease.