Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More

Rating: 
Amazon Price: $44.99 $26.81 You save: $18.18 (40%). (as of January 20, 2018 12:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from all corners of the social web, including Facebook, Twitter, LinkedIn, Google+, GitHub, email, websites, and blogs.
Employ the Natural Language Toolkit, NetworkX, and other scientific computing tools to mine popular social web sites Apply advanced text-mining techniques, such as clustering and TF-IDF, to extract meaning from human language data Bootstrap interest graphs from GitHub by discovering affinities among people, programming languages, and coding projects Build interactive visualizations with D3.js, an extraordinarily flexible HTML5 and JavaScript toolkit Take advantage of more than two-dozen Twitter recipes, presented in O’Reilly’s popular "problem/solution/discussion" cookbook format
The example code for this unique data science book is maintained in a public GitHub repository. It’s designed to be easily accessible through a turnkey virtual machine that facilitates interactive learning with an easy-to-use collection of IPython Notebooks.

The Hidden Face of Terrorism: The Dark Side of Social Engineering

The Hidden Face of Terrorism: The Dark Side of Social Engineering, From Antiquity to September 11As the cliché reminds us, information is power. In this age of computer systems and technology, an increasing majority of the world's information is stored electronically. It makes sense then that as an industry we rely on high-tech electronic protection systems to guard that information. As a professional hacker, I get paid to uncover weaknesses in those systems and exploit them. Whether breaking into buildings or slipping past industrial-grade firewalls, my goal has always been the same: extract the informational secrets using any means necessary. After hundreds of jobs, I discovered the secret to bypassing every conceivable high-tech security system. This book reveals those secrets, and as the title suggests, it has nothing to do with high technology. As it turns out, the secret isn't much of a secret at all. Hackers have known about these techniques for years. Presented in a light, accessible style, you'll get to ride shotgun with the authors on successful real-world break-ins as they share photos, videos and stories that prove how vulnerable the high-tech world is to no-tech attacks.

As you browse this book, you'll hear old familiar terms like “dumpster diving”, “social engineering”, and “shoulder surfing”. Some of these terms have drifted into obscurity to the point of becoming industry folklore; the tactics of the pre-dawn information age. But make no mistake; these and other old-school tactics work with amazing effectiveness today. In fact, there's a very good chance that someone in your organization will fall victim to one or more of these attacks this year. Will they be ready?

. Dumpster Diving
Be a good sport and don't read the two “D” words written in big bold letters above, and act surprised when I tell you hackers can accomplish this without relying on a single bit of technology (punny).
. Tailgating
Hackers and ninja both like wearing black, and they do share the ability to slip inside a building and blend with the shadows.
. Shoulder Surfing
If you like having a screen on your laptop so you can see what you're working on, don't read this chapter.
. Physical Security
Locks are serious business and lock technicians are true engineers, most backed with years of hands-on experience. But what happens when you take the age-old respected profession of the locksmith and sprinkle it with hacker ingenuity?
. Social Engineering with Jack Wiles
Jack has trained hundreds of federal agents, corporate attorneys, CEOs and internal auditors on computer crime and security-related topics. His unforgettable presentations are filled with three decades of personal “war stories” from the trenches of Information Security and Physical Security.
. Google Hacking
A hacker doesn't even need his own computer to do the necessary research. If he can make it to a public library, Kinko's or Internet cafe, he can use Google to process all that data into something useful.
. P2P Hacking
Let's assume a guy has no budget, no commercial hacking software, no support from organized crime and no fancy gear. With all those restrictions, is this guy still a threat to you? Have a look at this chapter and judge for yourself.
. People Watching
Skilled people watchers can learn a whole lot in just a few quick glances. In this chapter we'll take a look at a few examples of the types of things that draws a no-tech hacker's eye.
. Kiosks
What happens when a kiosk is more than a kiosk? What happens when the kiosk holds airline passenger information? What if the kiosk holds confidential patient information? What if the kiosk holds cash?
. Vehicle Surveillance
Most people don't realize that some of the most thrilling vehicular espionage happens when the cars aren't moving at all!

Price: $14.50

Click here to buy from Amazon

Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More

Rating: 
Amazon Price: N/A (as of January 20, 2018 05:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How can you tap into the wealth of social web data to discover who’s making connections with whom, what they’re talking about, and where they’re located? With this expanded and thoroughly revised edition, you’ll learn how to acquire, analyze, and summarize data from all corners of the social web, including Facebook, Twitter, LinkedIn, Google+, GitHub, email, websites, and blogs.

Employ the Natural Language Toolkit, NetworkX, and other scientific computing tools to mine popular social web sitesApply advanced text-mining techniques, such as clustering and TF-IDF, to extract meaning from human language dataBootstrap interest graphs from GitHub by discovering affinities among people, programming languages, and coding projectsBuild interactive visualizations with D3.js, an extraordinarily flexible HTML5 and JavaScript toolkitTake advantage of more than two-dozen Twitter recipes, presented in O’Reilly’s popular "problem/solution/discussion" cookbook format
Continue reading “Mining the Social Web: Data Mining Facebook, Twitter, LinkedIn, Google+, GitHub, and More”

The Best Damn Google Seo Book – Black & White Edition: Search Engine Optimization Techniques That Will Increase Your Search Engine Ranking!

Rating: 
Amazon Price: $29.99 $29.99 (as of January 20, 2018 04:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This short Google SEO book will cover pretty much everything you need to know about Search Engine Optimization in a non-confusing matter. When it comes to Internet and/or Web Marketing today you must have an understanding of exactly what SEO is, it's purposes, and most of all, how to implement it when designing your web pages. Understanding Search Engine Optimization is critical for proper Web Development. Search Engines are how most of the sites are going to generate the bulk of their site traffic. So I wanted to create a quick reference book that's easy to understand for both the Novice and Advanced Webmaster alike.

Piracy: The Intellectual Property Wars from Gutenberg to Gates

Piracy: The Intellectual Property Wars from Gutenberg to GatesSince the rise of Napster and other file-sharing services in its wake, most of us have assumed that intellectual piracy is a product of the digital age and that it threatens creative expression as never before. The Motion Picture Association of America, for instance, claimed that in 2005 the film industry lost $2.3 billion in revenue to piracy online. But here Adrian Johns shows that piracy has a much longer and more vital history than we have realized—one that has been largely forgotten and is little understood.

Piracy explores the intellectual property wars from the advent of print culture in the fifteenth century to the reign of the Internet in the twenty-first. Brimming with broader implications for today’s debates over open access, fair use, free culture, and the like, Johns’s book ultimately argues that piracy has always stood at the center of our attempts to reconcile creativity and commerce—and that piracy has been an engine of social, technological, and intellectual innovations as often as it has been their adversary. From Cervantes to Sonny Bono, from Maria Callas to Microsoft, from Grub Street to Google, no chapter in the story of piracy evades Johns’s graceful analysis in what will be the definitive history of the subject for years to come.

Price: $35.00

Click here to buy from Amazon