Kipuka Blues


Book Description

After extinction? Politics. Monsters. Murder. The alien Absolute eradicated Earth’s native life, replacing a fraction of it with alien duplicates. Kevin remembers the life of a police officer, but must find a new life in the bizarrely warped landscape of northern Michigan. But even astonishingly resilient alien flesh breaks down, with enough effort. Or enough electricity. Absolute eradicated humanity. But his copies brought the worst parts of humanity with them…




Immortal Clay


Book Description

Duplicate. Infiltrate. Exterminate. Liberate? The alien ate its way out of Antarctica, devouring and duplicating every living thing it found. Humanity turned continents to glass and oceans to poison in a desperate effort to stop it—and failed. Nobody expected that once the alien copied everyone, once it owned the world, it would set the copies free. Police detective Kevin Holtzmann fled with his family into the desert, and almost survived. Now a new Kevin must figure out the terrifying new world’s rules before the world eats him alive—again. His life teeters between the yesterday’s nightmares and tomorrow’s unknown horrors. But humanity’s best and worst features survived. Life means hope, and terror, and joy, and fear. New life means new dangers. New threats. New crimes… Good thing he’s a new Kevin.




Terrapin Sky Tango


Book Description

A FAMILY AFFRAY With her father's death, mercenary thief Beaks returns to the place she hates most—her childhood home, to both pay her respects and make certain he's gone. She finds only lies. Determined to rip the truth out of the shadows, Beaks ricochets around the world, defying killers and government agents alike. With the man she loves and the secretive hacker Sister Silence, she targets a nightmare that turns suffering into profit and slaughter into joy. Family. It's worse than murder.




DNSSEC Mastery, 2nd edition


Book Description

DNS The world’s most successful distributed database—and the most naïve. The Domain Name System is one of the Internet’s oldest protocols, designed for a network without hostile users. Intruders targeting a network start by investigating their DNS. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. Learning DNSSEC required wading through years of obsolete tutorials, dead ends, and inscrutable standards. Until now. This new edition of DNSSEC Mastery will have DNS administrators deploying DNSSEC with industry-standard software in hours instead of weeks. You will: · Understand what DNSSEC provides · Configure your servers to resist attack · Verify your environment supports modern DNS · Debug DNSSEC and the Chain of Trust · Sign your zones and attach them to the Chain of Trust · Conceal zone data with NSEC3 · Automate DNSSEC maintenance · Roll over keys to maintain integrity · Implement DNSSEC on private networks · Securely distribute security-critical information via DNS And more! DNSSEC Mastery transforms DNS from a headache to a solution.




Butterfly Stomp Waltz


Book Description

50% Die Hard 50% Robin Hood 100% trouble Reeling from the death of her lover and partner, freelance “exfiltration specialist” Billie Carrie Salton breaks into a high-tech, high-security biotechnology firm to steal their sickle cell anemia cure and broadcast it to the world. In, out, announce. Easy. Except Salton’s life never works that smoothly. And a gig gone wrong only begins the disasters. Thievery, lies, and betrayals propel Salton across the world, from Atlanta, Georgia, to the heat of Portugal and the jungles of Myanmar, where she must put everything on the line to save everything she loves.




SSH Mastery


Book Description

The best-selling text on SSH, newly revised and updated! Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing. Lose the confusion. SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys rescues you from sifting through decades of obsolete online tutorials and quickly makes you an SSH journeyman. You’ll learn to · eliminate passwords · manage access by users, groups, addresses, and more · securely move files around your network · forward graphic displays · proxy TCP connections · build SOCKS proxies · centrally manage and distribute keys and configurations · use SSH as secure transport for other applications · build virtual private networks · create Certificate Authorities for truly large scale deployment Master Secure Shell with SSH Mastery! #ssh2e




Aidan Redding Against the Universes


Book Description

Physics inconvenient? Change it. Then watch it try to kill you. Solve a murder in a universe without ground to stand on. Investigate inexplicable deaths a few million years after the Big Bang. Take too many breaths and never go home again. Let the antimatter trickle between your fingers, and visit five alien universes in this first Montague Portal omnibus. Contains: Forever Falls Hydrogen Sleets Drinking Heavy Water Sticky Supersaturation No More Lonesome Blue Rings




TLS Mastery: Tux Edition


Book Description

Transport Layer Security, or TLS, makes ecommerce and online banking possible. It protects your passwords and your privacy. Let’s Encrypt transformed TLS from an expensive tool to a free one. TLS understanding and debugging is an essential sysadmin skill you must have. TLS Mastery takes you through: · How TLS works · What TLS provides, and what it doesn’t · Wrapping unencrypted connections inside TLS · Assessing TLS configurations · The Automated Certificate Management Environment (ACME) protocol · Using Let’s Encrypt to automatically maintain TLS certificates · Online Certificate Status Protocol · Certificate Revocation · CAA, HSTS, and Certificate Transparency · Why you shouldn’t run your own CA, and how to do it anyway · and more! Stop wandering blindly around TLS. Master the protocol with TLS Mastery!




Prohibition Orcs


Book Description

"I love these stories" Kristine Kathryn Rusch, Hugo- and Nebula-award winning author of The Fey ELVES WENT INTO THE WEST—TO AMERICA. GENERATIONS LATER, ORCS FOLLOWED. 1927 Detroit. Orcs fight Prohibition, avoid police, and labor hard for their children. All while doing their best to navigate the narrow human world. Men drive fancy Dodges and Cadillacs; orcs squeeze into fourth-hand Model Ts. Dwarves dominate the skilled trades; orcs push brooms. And behind everything, elves make it their life’s work to deny orcs have worth. To be an orc is to endure, but when the world tries to deny even that, an orc must act. And Uruk-Tai will do anything for his family. This long-demanded collection includes all the Prohibition Orcs tales—Spilled Mirovar, Final Gift, Drowned Mirovar, Witness November, Degreased Hopes, Woolen Torment, and the never before published A Debt of Meat. With an introduction by USA Today best-selling author Robert Jeschonek




FreeBSD Mastery: Jails


Book Description

CONFINE YOUR SOFTWARE Jails are FreeBSD’s most legendary feature: known to be powerful, tricky to master, and cloaked in decades of dubious lore. Deploying jails calls upon every sysadmin skill you have, and more—but unleashing lightweight virtualization is so worth it. FreeBSD Mastery: Jails cuts through the clutter to expose the inner mechanisms of jails and unleash their power in your service. You will: · Understand how jails achieve lightweight virtualization · Understand the base system’s jail tools and the iocage toolkit · Optimally configure jail hardware · Manage jails from the host and from within the jail · Optimize disk space usage to support hundreds or thousands of jails · Comfortably work within the limits of jails · Implement fine-grained control of jail features · Build virtual networks · Deploy hierarchical jails · Constrain jail resource usage · And more! Strip away the mystery. Read FreeBSD Mastery: Jails today! “This is the sequel to Git Commit Murder, right ?” /phk, creator of the jail system