Spoofing and Proofing the Classics


Book Description

Using shaggy dog stories based on classic literature, the Polettes address common spelling and grammatical errors and the ways in which children can be taught to read critically to recognize them. Stories such as Rapunzel, Alice, The Hare and the Tortoise, and King Arthur, purposely embedded with common errors, have been pretested in teacher workshops given by Nancy Polette and in Dr. Keith Polette's classes at the University of Texas, El Paso. Teachers found them specific enough to be used directly in the writing instruction curriculum and fun for students to read and try to figure out.




Hack Proofing Your Network


Book Description

A new edition the most popular Hack Proofing book around! IT professionals who want to run secure networks, or build secure software, need to know about the methods of hackers. The second edition of the best seller Hack Proofing Your Network, teaches about those topics, including: · The Politics, Laws of Security, Classes of Attack, Methodology, Diffing, Decrypting, Brute Force, Unexpected Input, Buffer Overrun, Sniffing, Session Hijacking, Spoofing, Server Holes, Client Holes, Trojans and Viruses, Reporting Security Problems, Choosing Secure Systems The central idea of this book is that it's better for you to find the holes in your network than it is for someone else to find them, someone that would use them against you. The complete, authoritative guide to protecting your Windows 2000 Network. - Updated coverage of an international bestseller and series flagship - Covers more methods of attack and hacker secrets - Interest in topic continues to grow - network architects, engineers and administrators continue to scramble for security books - Written by the former security manager for Sybase and an expert witness in the Kevin Mitnick trials - A great addition to the bestselling "Hack Proofing..." series - Windows 2000 sales have surpassed those of Windows NT - Critical topic. The security of an organization's data and communications is crucial to its survival and these topics are notoriously difficult to grasp - Unrivalled web support at [email protected]




Hack Proofing Your Network


Book Description

Hack Proofing Your Network







Chinese Revolution and Chinese Literature


Book Description

This volume has brought together essays to explore, analyse and interpret the revolutionary tradition in modern Chinese literature over the past century from various angles. The authors examines the bodily or carnal dimension, especially the hidden implication of sexual passion, in revolutionary literature, formulate feminist critiques of the conception of women in literary expressions of revolution, explore the function of revolution as historical discourse and in historiographical representation, and discuss the reworking of “revolutionary classics” in recent literary and artistic endeavours. Here, revolution (in history and in literature) is conceptualized neither as an unquestionably progressive and creative force for a new world, nor an absolutely pejorative concept that necessarily leads to sociopolitical turmoil and tragedy. Insofar as “postrevolutionary writings” cannot but reappropriate the revolutionary spirit as their unavoidable and inseparable traumatic kernel, studies in revolutionary literature and culture, too, go through the zigzag experience of revolution in order to scrutinize its complex implications.







Hack Proofing Your E-commerce Web Site


Book Description

From the authors of the bestselling Hack Proofing Your Network!Yahoo!, E-Bay, Amazon. Three of the most popular, well-established, and lavishly funded Web sites in existence, yet hackers managed to penetrate their security systems and cripple these and many other Web giants for almost 24 hours. E-Commerce giants, previously thought to be impenetrable are now being exposed as incredibly vulnerable. This book will give e-commerce architects and engineers insight into the tools and techniques used by hackers to compromise their sites. The security of e-commerce sites is even more imperative than non-commerce sites, because the site has the added responsibility of maintaining the security of their customer's personal and financial information.Hack Proofing Your E-Commerce Site will provide computer architects and engineers all of the information they need to design and implement security measures. * Heightened media awareness of malicious attacks against "secure" sites guarantees a wide audience * Uses forensics-based analysis to give the reader insight to the mind of a hacker. This understanding is crucial for security professionals to defend against attacks




School Library Journal


Book Description




The Little Black Book of Scams


Book Description

The Canadian edition of The Little Black Book of Scams is a compact and easy to use reference guide filled with information Canadians can use to protect themselves against a variety of common scams. It debunks common myths about scams, provides contact information for reporting a scam to the correct authority, and offers a step-by-step guide for scam victims to reduce their losses and avoid becoming repeat victims. Consumers and businesses can consult The Little Black Book of Scams to avoid falling victim to social media and mobile phone scams, fake charities and lotteries, dating and romance scams, and many other schemes used to defraud Canadians of their money and personal information.




Motion Picture Classic


Book Description