The pipeline and the paradigm : Keystone XL, tar sands, and the battle to defuse the carbon bomb / Samuel Avery

Call number: TN879.5.A94 P57 2013

 There is enough carbon trapped in the Canadian tar sands to plunge the earth into irreversible climate change, and it is the Keystone XL pipeline that will set that carbon free. Is this 2,100-mile steel pipeline a vital piece of our nation’s energy future or the conduit for global climate disaster? In The Pipeline and the Paradigm, Samuel Avery investigates the economic, ecological, political, and psychological issues behind the Keystone XL — a project so controversial it has inspired the largest expression of civil disobedience since the Civil Rights movement in the 1960s. In this thoroughly researched, wholly engaging book, Avery takes readers from enormous tar sands mines in Alberta to a treetop blockade in Texas to meet the people and explore the competing interests that power the environmental issue of our time.

Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz

Call number: TK5105.59 .M48 2012

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.(Google Books)