Metal Detecting Log Book


Book Description

This metal detecting log book has been created to help you to record everything you need during your metal hunting sessions in order to identify winning strategies and improve your skills. This journal includes: pre-formatted pages to record details such as date, location, machine used, item found and their value, etc. lined pages to add notes in order to analyse yourself and improve your metal detectorist skills This log book also makes a unique and personalized gift for a coin whisperer relative or any loved one who like to hunt treasures and save small pieces of history.




Cigar Journal


Book Description




Octopus!


Book Description

“A pleasant, chatty book on a fascinating subject.” — Kirkus Reviews Octopuses have been captivating humans for as long as we have been catching them. Yet for all of our ancient fascination and modern research, we still have not been able to get a firm grasp on these enigmatic creatures. Katherine Harmon Courage dives into the mystifying underwater world of the octopus and reports on her research around the world. She reveals, for instance, that the oldest known octopus lived before the first dinosaurs; that two thirds of an octopus’s brain capacity is spread throughout its arms, meaning each literally has a mind of its own; and that it can change colors within milliseconds to camouflage itself, yet appears to be colorblind.




Talking to Strangers


Book Description

Malcolm Gladwell, host of the podcast Revisionist History and author of the #1 New York Times bestseller Outliers, offers a powerful examination of our interactions with strangers and why they often go wrong—now with a new afterword by the author. A Best Book of the Year: The Financial Times, Bloomberg, Chicago Tribune, and Detroit Free Press How did Fidel Castro fool the CIA for a generation? Why did Neville Chamberlain think he could trust Adolf Hitler? Why are campus sexual assaults on the rise? Do television sitcoms teach us something about the way we relate to one another that isn’t true? Talking to Strangers is a classically Gladwellian intellectual adventure, a challenging and controversial excursion through history, psychology, and scandals taken straight from the news. He revisits the deceptions of Bernie Madoff, the trial of Amanda Knox, the suicide of Sylvia Plath, the Jerry Sandusky pedophilia scandal at Penn State University, and the death of Sandra Bland—throwing our understanding of these and other stories into doubt. Something is very wrong, Gladwell argues, with the tools and strategies we use to make sense of people we don’t know. And because we don’t know how to talk to strangers, we are inviting conflict and misunderstanding in ways that have a profound effect on our lives and our world. In his first book since his #1 bestseller David and Goliath, Malcolm Gladwell has written a gripping guidebook for troubled times.




Metal Detecting


Book Description

If you have ever thought of taking up metal detecting as a hobby, or would like to give somebody a book on the subject, then this is the one to buy.




Tick Tock


Book Description

NYC's #1 detective, Michael Bennett, has a huge problem-the Son of Sam, the Werewolf of Wisteria and the Mad Bomber are all back. The city has never been more terrified! When a rash of horrifying crimes tears through the city, the city calls on Detective Michael Bennett, pulling him away from a seaside retreat with his ten adopted children. Not only does it tear apart their vacation, it leaves the entire family open to attack. Immediately, it becomes clear that the crimes are not the work of an amateur, but of a calculating, efficient, and deadly mastermind. Bennett enlists the help of a former colleague, FBI Agent Emily Parker. As his affection for Emily grows into something stronger, his relationship with the nanny takes an unexpected turn. All too soon, another appalling crime leads Bennett to a shocking discovery that exposes the killer's pattern and the earth-shattering enormity of his plan. From the creator of the #1 New York detective series comes the most volatile and most explosive Michael Bennett novel ever.




Wireshark for Security Professionals


Book Description

Master Wireshark to solve real-world security problems If you don’t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark’s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book’s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: Master the basics of Wireshark Explore the virtual w4sp-lab environment that mimics a real-world network Gain experience using the Debian-based Kali OS among other systems Understand the technical details behind network attacks Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark Employ Lua to extend Wireshark features and create useful scripts To sum up, the book content, labs and online material, coupled with many referenced sources of PCAP traces, together present a dynamic and robust manual for information security professionals seeking to leverage Wireshark.




The Universal Machine


Book Description

The computer unlike other inventions is universal; you can use a computer for many tasks: writing, composing music, designing buildings, creating movies, inhabiting virtual worlds, communicating... This popular science history isn't just about technology but introduces the pioneers: Babbage, Turing, Apple's Wozniak and Jobs, Bill Gates, Tim Berners-Lee, Mark Zuckerberg. This story is about people and the changes computers have caused. In the future ubiquitous computing, AI, quantum and molecular computing could even make us immortal. The computer has been a radical invention. In less than a single human life computers are transforming economies and societies like no human invention before.




Deception Point


Book Description

From the #1 New York Times bestselling author of The Da Vinci Code, Angels & Demons, and Inferno and the “master of smart thrills” (People) comes a “rocket-fast thriller” (Vince Flynn) about an astonishing NASA discovery that unravels a deadly conspiracy that leads all the way to the White House. When a NASA satellite spots evidence of an astoundingly rare object buried deep in the Arctic ice, the floundering space agency proclaims a much-needed victory—one that could have profound implications for US space policy and the impending presidential election. With his re-election hanging in the balance, the President sends White House Intelligence analyst Rachel Sexton to the Milne Ice Shelf to verify the authenticity of the find. Accompanied by a team of experts, including the charismatic academic Michael Tolland, Rachel uncovers the unthinkable: evidence of scientific trickery. Before she can contact the President, she and Michael are attacked by a deadly team of assassins controlled by a mysterious power broker who will stop at nothing to hide the truth. Fleeing for their lives in an environment as desolate as it is lethal, their only hope for survival is to find out who is behind this masterful ploy. The truth, they will learn, is the most shocking deception of all in this “taut, fast-paced, barn-burner of a book” (St. Petersburg Times).