This Bluetooth controlled switch can help you automate nearly any electrical device in your home with a few quick swipes on your device. Want your lights to turn on when you walk in the door? Love your old coffee pot but you wish it had a timer? This switch lets you control and bring existing electronics and appliances to life. With the device's protocol exposed through a Python open-source library, you can custom built your own application to fit any power delivery scheme imaginable!
This sparkling Handbook offers an unrivalled resource for those engaged in the cutting edge field of social network analysis. Systematically, it introduces readers to the key concepts, substantive topics, central methods and prime debates. Among the specific areas covered are: o Network theory . o Interdisciplinary applications. o Online networks. o Corporate networks. o Lobbying networks. o Deviant networks. o Measuring devices. o Key Methodologies. o Software applications. The result is a peerless resource for teachers and students which offers a critical survey of the origins, basic issues and major debates. The Handbook provides a one-stop guide that will be used by readers for decades to come.
The Growth Hacker’s Guide to the Galaxy is the ultimate compendium of growth hacks for the modern digital marketer, written by marketing veterans Jeff Goldenberg (Head of Growth at Borrowell and TechStars Mentor) and Mark Hayes (CEO of Rocketshp, and founder of one of the world's first growth hacking agencies).
Are you ready to skyrocket your companies growth? (get it?)
Continue reading “The Growth Hacker's Guide to the Galaxy: 100 Proven Growth Hacks for the Digital Marketer”
"Cypherpunks is gripping, vital reading, explaining clearly the way in which corporate and government control of the internet poses a fundamental threat to our freedom and democracy". — Oliver Stone
"Cypherpunks: Freedom and the Future of the Internet is an important wake-up call about a possible dystopian future, which is a technological reality now… While messengers of dangerous outcomes are always met at first with hostility and even mockery, history shows that we disregard such warnings as these at our peril." — Naomi Wolf
Continue reading “Cypherpunks”
There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.
Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.