Parallel Computing for Data Science: With Examples in R, C++ and CUDA (Chapman & Hall/CRC The R Series)

Rating: 
Amazon Price: N/A (as of June 20, 2018 07:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Parallel Computing for Data Science: With Examples in R, C++ and CUDA is one of the first parallel computing books to concentrate exclusively on parallel data structures, algorithms, software tools, and applications in data science. It includes examples not only from the classic "n observations, p variables" matrix format but also from time series, network graph models, and numerous other structures common in data science. The examples illustrate the range of issues encountered in parallel programming.

With the main focus on computation, the book shows how to compute on three types of platforms: multicore systems, clusters, and graphics processing units (GPUs). It also discusses software packages that span more than one type of hardware and can be used from more than one type of programming language. Readers will find that the foundation established in this book will generalize well to other languages, such as Python and Julia.

Macintosh Terminal Pocket Guide

Rating: 
Amazon Price: N/A (as of June 20, 2018 08:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Unlock the secrets of the Terminal and discover how this powerful tool solves problems the Finder can’t handle. With this handy guide, you’ll learn commands for a variety of tasks, such as killing programs that refuse to quit, renaming a large batch of files in seconds, or running jobs in the background while you do other work.

Get started with an easy-to-understand overview of the Terminal and its partner, the shell. Then dive into commands neatly arranged into two dozen categories, including directory operations, file comparisons, and network connections. Each command includes a concise description of its purpose and features.Log into your Mac from remote locationsSearch and modify files in powerful waysSchedule jobs for particular days and timesLet several people use one Mac at the same timeCompress and uncompress files in a variety of formatsView and manipulate Mac OS X processesCombine multiple commands to perform complex operationsDownload and install additional commands from the Internet

Cyber Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between

Rating: 
Amazon Price: $29.00 $17.94 You save: $11.06 (38%). (as of June 19, 2018 16:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As we live more of our lives online and entrust personal information to the cloud, we need to be much more aware and proactive about protecting ourselves. Are you safe from hackers? Not without taking precautions. Your identity can be stolen, your company's intellectual property can be copied and sold, and even hacks that just a few years ago sounded like science fiction will soon be possible: vehicle systems can already be hacked, and our power grid can be manipulated or sabotaged by terrorists.

But knowledge is power. In this easy-to-read, fascinating and fully illustrated book, you learn how hackers make money, and what they target – along with concrete, hands-on hints for fighting back, whether you’re a concerned parent or a top executive.
Continue reading “Cyber Survival Manual: From Identity Theft to The Digital Apocalypse and Everything in Between”

Coding for Penetration Testers: Building Better Tools

Rating: 
Amazon Price: N/A (as of June 20, 2018 09:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Coding for Penetration Testers: Building Better Tools, Second Edition provides readers with an understanding of the scripting languages that are commonly used when developing tools for penetration testing, also guiding users through specific examples of custom tool development and the situations where such tools might be used.

While developing a better understanding of each language, the book presents real-world scenarios and tool development that can be incorporated into a tester's toolkit. This completely updated edition focuses on an expanded discussion on the use of Powershell, and includes practical updates to all tools and coverage.Discusses the use of various scripting languages in penetration testingPresents step-by-step instructions on how to build customized penetration testing tools using Perl, Ruby, Python, and other languagesProvides a primer on scripting, including, but not limited to, web scripting, scanner scripting, and exploitation scriptingIncludes all-new coverage of Powershell

The Cybersecurity to English Dictionary

Rating: 
Amazon Price: $9.99 $9.99 (as of June 19, 2018 23:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The speed of change in the world of cybersecurity is amazing. If you attend any meeting where cybersecurity is discussed, it can be like listening to a foreign language: blue team, black hat, metamorphic malware, steganography What are these people talking about?

This dictionary began life as the reference section at the back of 'Cybersecurity for Beginners' and has now taken on a life of its own, with hundreds of the primary cybersecurity terms defined.
Continue reading “The Cybersecurity to English Dictionary”