The Killfile


Book Description

When Max Hooker finds that one of his best friends is missing without a trace and their ex-employer, the CIA, is stonewalling, he takes matters into his own hands. He finds an organization that hacks into medical databases to locate perfect heart donors for their customers. Max discovers that his friend was murdered for his heart that was a perfect match for one of the organization's clients. Revolted by the gruesome discovery he vows to find the man who lives with the heart that rightfully belongs to his friend and kill him. When he comes face-to-face with his friend's real killer, Max must make a harrowing choice.




Killfile


Book Description

The author of The Eternal World seamlessly combines history, biotechnology, action and adventure in this high-concept thriller in the spirit of James Rollins, Brad Thor, and Douglas Preston. John Smith has a special gift that seems more like a curse: he can access other peoples thoughts. He hears the the songs stuck in their heads, their most private traumas and fears, the painful memories they can’t let go. The CIA honed his skills until he was one of their most powerful operatives, but Smith fled the Agency and now works as a private consultant, trying to keep the dark potentials of his gift in check—and himself out of trouble. But now Smith is unexpectedly plunged into dangerous waters when his latest client, billionaire software genius Everett Sloan, hires him to investigate a former employee—a tech whiz kid named Eli Preston—and search his thoughts for some very valuable intellectual property he’s stolen. Before John can probe Preston’s mind, his identity is compromised and he’s on a run for his life with Sloan’s young associate, Kelsey. Hunted by shadowy enemies with deep resources and unknown motives, John and Kelsey must go off the grid. John knows their only hope for survival is using his powers to their fullest—even if means putting his own sanity at risk.




Rule the Web


Book Description

In Rule the Web, you'll learn how to: * Browse recklessly, free from viruses, ads, and spyware * Turn your browser into a secure and powerful anywhere office * Raze your old home page and build a modern Web masterpiece * Get the news so fast it'll leave skidmarks on your inbox * Fire your broker and let the Internet make you rich * Claim your fifteen megabytes of fame with a blog or podcast You use the Web to shop, do your banking, have fun, find facts, connect with family, share your thoughts with the world, and more. But aren't you curious about what else the Web can do for you? Or if there are better, faster, or easier ways to do what you're already doing? Let the world's foremost technology writer, Mark Frauenfelder, help you unlock the Internet's potential—and open up a richer, nimbler, and more useful trove of resources and services, including: EXPRESS YOURSELF, SAFELY. Create and share blogs, podcasts, and online video with friends, family, and millions of potential audience members, while protecting yourself from identity theft and fraud. DIVIDE AND CONQUER. Tackle even the most complex online tasks with ease, from whipping up a gorgeous Web site to doing all your work faster and more efficiently within your browser, from word processing to investing to planning a party. THE RIGHT WAY, EVERY TIME. Master state-of-the-art techniques for doing everything from selling your house to shopping for electronics, with hundreds of carefully researched tips and tricks. TIPS FROM THE INSIDERS. Mark has asked dozens of the best bloggers around to share their favorite tips on getting the most out of the Web.




Idoru


Book Description

“The best novel William Gibson has ever written about the world we’re entering daily. Neuromancer made Gibson famous; Idoru cements that fame.”—The Washington Post Book World 21st century Tokyo, after the millennial quake. Neon rain. Light everywhere blowing under any door you might try to close. Where the New Buildings, the largest in the world, erect themselves unaided, their slow rippling movements like the contractions of a sea-creature... Colin Laney is here looking for work. He is an intuitive fisher for patterns of information, the “signature” an individual creates simply by going about the business of living. But Laney knows how to sift for the dangerous bits. Which makes him useful—to certain people. Chia McKenzie is here on a rescue mission. She’s fourteen. Her idol is the singer Rez, of the band Lo/Rez. When the Seattle chapter of the Lo/Rez fan club decided that he might be in trouble in Tokyo, they sent Chia to check it out. Rei Toei is the idoru—the beautiful, entirely virtual media star adored by all Japan. Rez has declared that he will marry her. This is the rumor that has brought Chia to Tokyo. True or not, the idoru and the powerful interests surrounding her are enough to put all their lives in danger...




Communities in Cyberspace


Book Description

This wide-ranging introductory text looks at the virtual community of cyberspace and analyses its relationship to real communities lived out in today's societies. Issues such as race, gender, power, economics and ethics in cyberspace are grouped under four main sections and discussed by leading experts: * identity * social order and control * community structure and dynamics * collective action. This topical new book displays how the idea of community is being challenged and rewritten by the increasing power and range of cyberspace. As new societies and relationships are formed in this virtual landscape, we now have to consider the potential consequences this may have on our own community and societies. Clearly and concisely written with a wide range of international examples, this edited volume is an essential introduction to the sociology of the internet. It will appeal to students and professionals, and to those concerned about the changing relationships between information technology and a society which is fast becoming divided between those on-line and those not.




Hard Disk Power


Book Description

This complete hard disk management guide, with the newly developed Jamsa Utilities included on two bound-in disks, teaches readers the fundamentals of hard disk organization and provides an in-depth discussion on such topics as low-level formatting, controller types, and hard disk terms.




Child Pornography


Book Description

Child pornography, particularly that available via the Internet, has become a cause of huge social concern in recent years. This book examines the reality behind the often hysterical media coverage of the topic. Drawing on extensive new research findings, it examines how child pornography is used on the Internet and the social context in which such use occurs, and develops a model of offending behaviour to better help understand and deal with the processes of offending. Detailed case studies and offenders' own accounts are used to illustrate the processes involved in offending and treatment. The authors argue that we need to refine our ideas of offending, and that while severe deterrents need to be associated with possession of child pornography, a better understanding is needed of the links between possession and committing a contact offence. Only by improving our understanding of this complex and very controversial topic can we hope to deal effectively with offenders and with their child victims. This is a book which will become an essential read for anyone involved with offenders or victims from a psychological, judicial or social background.




Cyberspeak


Book Description

If you can't translate the following sentence, then you need "Cyberspeak". "Here's the URL: for that k ezine (IMHO) that had me ROFL". Translation: "Here's the Uniform Resource Locator for that extremely cool online magazine (in my humble opinion) that had me rolling on the floor laughing". Don't be at a loss for cyberwords!




Network Security Assessment


Book Description

Covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping you design and deploy networks that are immune to offensive exploits, tools, and scripts. Chapters focus on the components of your network, the different services yourun, and how they can be attacked. Each chapter concludes with advice to network defenders on how to beat the attacks.




PC/Computing


Book Description