The Last Connection


Book Description

More of the adventures and poems of the juggernaut spirit clashing with physical reality that might either belie or prove his true status in the black hole. The fact it exists became, “quite a coup by him of French lettered desire as I began toiling on this reverie on a midnight dreary feeling cold and weary,” was a little of the eloquence I perused and felt as I gimbaled my way through the seething morass into the ethereal light. Thanks to this unorthodox alchemy, the Speed of Light’s original concepts have been broadened by using the technique of seeing a glimmer of something almost other-dimensional than pulling it coolly into reality after first applying some moderating effects to make it palatable to those who otherwise couldn’t understand.




The Last Chapter


Book Description

The Last Chapter is a contemporary, post-apocalyptic romantic tale. Written in a lighthearted narrative it follows the preparations of the two main characters, not only for their future survival, but also in their desperate hunt for other survivors who may, or may not, prove as deadly as the plague they had survived.




The Costs of Connection


Book Description

Just about any social need is now met with an opportunity to "connect" through digital means. But this convenience is not free—it is purchased with vast amounts of personal data transferred through shadowy backchannels to corporations using it to generate profit. The Costs of Connection uncovers this process, this "data colonialism," and its designs for controlling our lives—our ways of knowing; our means of production; our political participation. Colonialism might seem like a thing of the past, but this book shows that the historic appropriation of land, bodies, and natural resources is mirrored today in this new era of pervasive datafication. Apps, platforms, and smart objects capture and translate our lives into data, and then extract information that is fed into capitalist enterprises and sold back to us. The authors argue that this development foreshadows the creation of a new social order emerging globally—and it must be challenged. Confronting the alarming degree of surveillance already tolerated, they offer a stirring call to decolonize the internet and emancipate our desire for connection.




The Science of Human Nature


Book Description

DigiCat Publishing presents to you this special edition of "The Science of Human Nature" (A Psychology for Beginners) by William Henry Pyle. DigiCat Publishing considers every written word to be a legacy of humankind. Every DigiCat book has been carefully reproduced for republishing in a new modern format. The books are available in print, as well as ebooks. DigiCat hopes you will treat this work with the acknowledgment and passion it deserves as a classic of world literature.




Advances in Databases and Information Systems


Book Description

This volume is the second one of the 16th East-European Conference on Advances in Databases and Information Systems (ADBIS 2012), held on September 18-21, 2012, in Poznań, Poland. The first one has been published in the LNCS series. This volume includes 27 research contributions, selected out of 90. The contributions cover a wide spectrum of topics in the database and information systems field, including: database foundation and theory, data modeling and database design, business process modeling, query optimization in relational and object databases, materialized view selection algorithms, index data structures, distributed systems, system and data integration, semi-structured data and databases, semantic data management, information retrieval, data mining techniques, data stream processing, trust and reputation in the Internet, and social networks. Thus, the content of this volume covers the research areas from fundamentals of databases, through still hot topic research problems (e.g., data mining, XML data processing), to novel research areas (e.g., social networks, trust and reputation, and data stream processing). The editors of this volume believe that its content will inspire the researchers with new ideas for future development. It may also serve as an overview of the ongoing work in the field of databases and information systems.




Last Seen


Book Description

How far would you go to teach someone a lesson?It was a romantic weekend, one Kahra Daniels hadn't experienced in a long time. But, when Kahra discovers that not only is the man she's seeing married, but living happily as a family with children in New York, things take a turn for the worst.Stripped of her pride and ordered to be taken away by the very man she thought she could love, a new, dark door opens within her. "This isn't over," she promises before being thrown into a cell for 30 days. It is during her lonely nights there that she develops a plan to assassinate anyone he's last seen with. Her logic is simple: once the bodies begin piling up, the cops will turn to him after realizing he's the only common denominator.Fueled by her own traumatic past and sometimes unstoppable flashbacks, Kahra soon puts her plan into action, and as the body count rises, so do the stakes.




The Mobile Communications Handbook


Book Description

In a single volume, The Mobile Communications Handbook 2nd. Edition covers the entire field - from principles of analog and digital communications to cordless telephones, wireless local area networks (LANs), and international technology standards. The amazing scope of the handbook ensures that it will be the primary reference for every aspect of mobile communications.




Digital Forensics Basics


Book Description

Use this hands-on, introductory guide to understand and implement digital forensics to investigate computer crime using Windows, the most widely used operating system. This book provides you with the necessary skills to identify an intruder's footprints and to gather the necessary digital evidence in a forensically sound manner to prosecute in a court of law. Directed toward users with no experience in the digital forensics field, this book provides guidelines and best practices when conducting investigations as well as teaching you how to use a variety of tools to investigate computer crime. You will be prepared to handle problems such as law violations, industrial espionage, and use of company resources for private use. Digital Forensics Basics is written as a series of tutorials with each task demonstrating how to use a specific computer forensics tool or technique. Practical information is provided and users can read a task and then implement it directly on their devices. Some theoretical information is presented to define terms used in each technique and for users with varying IT skills. What You’ll Learn Assemble computer forensics lab requirements, including workstations, tools, and more Document the digital crime scene, including preparing a sample chain of custody form Differentiate between law enforcement agency and corporate investigationsGather intelligence using OSINT sources Acquire and analyze digital evidence Conduct in-depth forensic analysis of Windows operating systems covering Windows 10–specific feature forensicsUtilize anti-forensic techniques, including steganography, data destruction techniques, encryption, and anonymity techniques Who This Book Is For Police and other law enforcement personnel, judges (with no technical background), corporate and nonprofit management, IT specialists and computer security professionals, incident response team members, IT military and intelligence services officers, system administrators, e-business security professionals, and banking and insurance professionals




Core PHP Programming


Book Description

This is a comprehensive tutorial and reference to the PHP5 programming language. The authors cover every facet of real-world PHP5 development, taking students from basic syntax to advanced object-oriented development.




Advanced Penetration Testing for Highly-Secured Environments


Book Description

An intensive hands-on guide to perform professional penetration testing for highly-secured environments from start to finish. You will learn to provide penetration testing services to clients with mature security infrastructure. Understand how to perform each stage of the penetration test by gaining hands-on experience in performing attacks that mimic those seen in the wild. In the end, take the challenge and perform a virtual penetration test against a fictional corporation. If you are looking for guidance and detailed instructions on how to perform a penetration test from start to finish, are looking to build out your own penetration testing lab, or are looking to improve on your existing penetration testing skills, this book is for you. Although the books attempts to accommodate those that are still new to the penetration testing field, experienced testers should be able to gain knowledge and hands-on experience as well. The book does assume that you have some experience in web application testing and as such the chapter regarding this subject may require you to understand the basic concepts of web security. The reader should also be familiar with basic IT concepts, and commonly used protocols such as TCP/IP.