Tag Archives: Technology

CEH, Certified Ethical Hacker : exam guide : all-in-one / Matt Walker

Call number: QA76.3 .W3344 2012

Get complete coverage of all the objectives included on the EC-Council’s Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.
COVERS ALL EXAM TOPICS, INCLUDING:

  • Introduction to ethical hacking
  • Cryptography
  • Reconnaissance and footprinting
  • Network scanning
  • Enumeration
  • System hacking
  • Evasion techniques
  • Social engineering and physical security
  • Hacking web servers and applications
  • SQL injection
  • Viruses, trojans, and other attacks
  • Wireless hacking
  • Penetration testing

(From Google Books)

How to design websites / Alan Pipes

Call number: TK5105.888 .P57 2011

There are books on the nuts and bolts of web design and there are books about website aesthetics, showcasing examples of good design. This book contains the essentials of both, addressing the skillsets required to produce websites that are functional and elegant, but from a graphic designer’s perspective. It demonstrates that you can design a working website in minutes without the need for expensive programs. Chapters include Code, Layout, Text and Typography, and Images and Colour Schemes. Useful “tips and tricks” panels are included, as well as step by step projects such as how to produce a portfolio site, that will be of interest to design students and to graduates of all disciplines. Inspirational “Trailblazer” case studies showcase the best of contemporary designers and their work. Blogs, Facebook, Flickr and HTML5, and new ways of using the web, such as mobile phones and netbooks, are also discussed.(From Google Books)

Talking back to Facebook : a common sense guide to raising kids in the digital age / James P. Steyer

Call number: HQ784.I58 S75 2012

Now, more than ever, parents need help in navigating their kids’ online, media-saturated lives. Jim Steyer, founder and CEO of Common Sense Media, the nation’s leading kids-and media organization, and the father of four children, knows that many parents and teachers— unlike their technology-savvy kids—may be tourists in the online world. In this essential book, Steyer—a frequent commentator on national TV and radio—offers an engaging blend of straightforward advice and anecdotes that address what he calls RAP, the major pitfalls relating to kids’ use of media and technology: relationship issues, attention/ addiction problems, and the lack of privacy. Instead of shielding children completely from online images and messages, Steyer’s practical approach gives parents essential tools to help filter content, preserve good relationships with their children, and make common sense, value-driven judgments for kids of all ages.
Not just about Facebook, this comprehensive, no-nonsense guide to the online world, media, and mobile devices belongs in the hands of all parents and educators raising kids in today’s digital age. (From Google Books)

From Text to Txting: New Media in the Classroom / by Paul Budra (Editor)

Call number: LB1028.3 .F77 2012
 

Literary scholars face a new and often baffling reality in the classroom: students spend more time looking at glowing screens than reading printed text. The social lives of these students take place in cyberspace instead of the student pub. Their favorite narratives exist in video games, not books. How do teachers who grew up in a different world engage these students without watering down pedagogy? Clint Burnham and Paul Budra have assembled a group of specialists in visual poetry, graphic novels, digital humanities, role-playing games, television studies, and, yes, even the middle-brow novel, to address this question. Contributors give a brief description of their subject, investigate how it confronts traditional notions of the literary, and ask what contemporary literary theory can illuminate about their text before explaining how their subject can be taught in the 21st-century classroom. (From Google Books)

Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure

Call number: TK5105.59 .M48 2012

Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.”

  • Obstruct APTs and web-based meta-exploits
  • Defend against UNIX-based root access and buffer overflow hacks
  • Block SQL injection, spear phishing, and embedded-code attacks
  • Detect and terminate rootkits, Trojans, bots, worms, and malware
  • Lock down remote access using smartcards and hardware tokens
  • Protect 802.11 WLANs with multilayered encryption and gateways
  • Plug holes in VoIP, social networking, cloud, and Web 2.0 services
  • Learn about the latest iPhone and Android attacks and how to protect yourself

(From Google Books)

Hacking exposed 7 : network security secrets & solutions / Stuart Mcclure, Joel Scambray, George Kurtz

Call number: TK5105.59 .M48 2012

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today’s most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new “5 Deployments” approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

    1. Network Security
    2. Server Security
    3. Mobile Security
    4. Endpoint Security
    5. Web Security

Hacking Exposed 7 applies the authors’ internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.(Google Books)

Nuclear energy : what everyone needs to know / Charles D. Ferguson

Call number: TK9145 .F47 2011

Originally perceived as a cheap and plentiful source of power, the commercial use of nuclear energy has been controversial for decades. Worries about the dangers that nuclear plants and their radioactive waste posed to nearby communities grew over time, and plant construction in the United States virtually died after the early 1980s. The 1986 disaster at Chernobyl only reinforced nuclear power’s negative image. Yet in the decade prior to the Japanese nuclear crisis of 2011, sentiment about nuclear power underwent a marked change. The alarming acceleration of global warming due to the burning of fossil fuels and concern about dependence on foreign fuel has led policymakers, climate scientists, and energy experts to look once again at nuclear power as a source of energy. In this overview, the author provides an account of the key facts about nuclear energy. What is the origin of nuclear energy? What countries use commercial nuclear power, and how much electricity do they obtain from it? How can future nuclear power plants be made safer? What can countries do to protect their nuclear facilities from military attacks? How hazardous is radioactive waste? Is nuclear energy a renewable energy source? Featuring a discussion of the recent nuclear crisis in Japan and its ramifications, he addresses these questions and more.

CEH, Certified Ethical Hacker : exam guide : all-in-one / Matt Walker

Call number: QA76.3 .W3344 2012

Get complete coverage of all the objectives included on the EC-Council’s Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive volume also serves as an essential on-the-job reference.
COVERS ALL EXAM TOPICS, INCLUDING:

  • Introduction to ethical hacking
  • Cryptography
  • Reconnaissance and footprinting
  • Network scanning
  • Enumeration
  • System hacking
  • Evasion techniques
  • Social engineering and physical security
  • Hacking web servers and applications
  • SQL injection
  • Viruses, trojans, and other attacks
  • Wireless hacking
  • Penetration testing

CD-ROM FEATURES:

  • Two practice exams
  • PDF copy of the book
  • Bonus appendix with author’s recommended tools, sites, and references

Matt Walker, CEHv7, CPTS, CNDA, CCNA, MCSE, has held a wide variety of IT security teaching, writing, and leadership roles, including director of the Network Training Center on Ramstein AB, Germany, and IT security manager for Lockheed Martin at Kennedy Space Center. He is currently a security engineer for Hewlett-Packard.

 

The end of country : dispatches from the frack zone / Seamus McGraw

Call number: HD9502 .U53 P4533 2012

“Susquehanna County, in the remote northeastern corner of Pennsylvania, is a community of stoic, low-income dairy farmers and homesteaders seeking haven from suburban sprawl–and the site of the Marcellus Shale, a natural gas deposit worth more than one trillion dollars. In The End of Country, journalist and area native Seamus McGraw opens a window on the battle for control of this land, revealing a conflict that pits petrodollar billionaires and the forces of corporate America against a band of locals determined to extract their fair share of the windfall–but not at the cost of their values or their way of life. Rich with a sense of place and populated by unforgettable personalities, McGraw tells a tale of greed, hubris, and envy, but also of hope, family, and the land that binds them all together.”–Publisher description.