You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This is the first summary of archaeological contributions to our understanding of the War of 1812 by examining recent excavations and field surveys on fortifications, encampments, landscapes, shipwrecks, and battles in the different regions of the United States and Canada.
OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD maintains author Michael Lucas's trademark straightforward and practical approach that readers have enjoyed for years. You'll learn the intricacies of the platform, the technical details behind certain design decisions, and best practices, with bits of humor sprinkled throughout. This edition has been completely updated for OpenBSD 5.3, including new coverage of OpenBSD's boot system, security features like W^X and ProPolice, and advanced networking techniques. You'll learn how to: –Manage ne...
Ask anyone who the biggest name in gay porn is and they'll tell you, "Michael Lucas." Ask what he's like and you'll get the gamut of replies: He's a smart, shrewd businessman who studied law and loves the opera. A witty raconteur who doesn't drink, smoke or do drugs. A loyal son who is close to his family. Bracingly honest. Ruthless. A hot top with a killer body. Sexy. Razor-tongued and iron-fisted. Michael Lucas has been called everything on his climb from rent boy to running the most successful gay porn business in the entire world--but he's never been called boring. Now, in this no-holds-barred biography, Corey Taylor delivers a delicious portrait of gay porn's hottest maverick. From the ...
What are the forces shaping today's business world? Understanding Business Environments provides key readings which introduce the student to the factors underlying the business environment. Including chapters by gurus such as Anthony Giddens, Stuart Hall and Will Hutton, the book covers: * social forces including the social structure and long-term social change * technological factors including Information Technology and new production technologies * economic factors including the impact of macroeconomic policy and of the financial system * political factors including the legal environment and government-business relations.
Secure Shell (SSH) lets systems administrators securely manage remote systems. But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job. This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running: SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will: Eliminate passwords. Manage access to your SSH server by users, groups, addresses, and more Securely move files around your network Forward graphic displays from one host to another Forward TCP connections Centrally manage host keys and client configurations Use SSH as a secure transport for other applications Secure applications run over SSH Build Virtual Private Networks with OpenSSH And more! This book simplifies the work of anyone using SSH. Small enough to read and implement quickly, exhaustive enough to include everything most of us need plus a little more. Master SSH with SSH Mastery.
'Punchily written ... He leaves the reader with a sense of the gross injustice of a world where health outcomes are so unevenly distributed' Times Literary Supplement 'Splendid and necessary' Henry Marsh, author of Do No Harm, New Statesman There are dramatic differences in health between countries and within countries. But this is not a simple matter of rich and poor. A poor man in Glasgow is rich compared to the average Indian, but the Glaswegian's life expectancy is 8 years shorter. The Indian is dying of infectious disease linked to his poverty; the Glaswegian of violent death, suicide, heart disease linked to a rich country's version of disadvantage. In all countries, people at relative...
Only Footnotes. Because that's why you read his books. Academics hate footnotes. Michael W Lucas loves them. What he does with them wouldn't pass academic muster, but that doesn't mean the reader should skip them. The footnotes are the best part! Why not read only the footnotes, and skip all that other junk? After literal minutes of effort, Only Footnotes collects every single footnote from all of Lucas' books to date.* Recycle those cumbersome treatises stuffed with irrelevant facts! No more flipping through pages and pages of actual technical knowledge looking for the offhand movie reference or half-formed joke. This slender, elegant volume contains everything the man ever passed off as his dubious, malformed "wisdom." Smart books have footnotes. Smarter books are only footnotes. *plus additional annotations from the author. Because sometimes even a footnote needs a footnote.
DNS The world’s most successful distributed database—and the most naïve. The Domain Name System is one of the Internet’s oldest protocols, designed for a network without hostile users. Intruders targeting a network start by investigating their DNS. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. Learning DNSSEC required wading through years of obsolete tutorials, dead ends, and inscrutable standards. Until now. This new edition of DNSSEC Mastery will have DNS administrators deploying DNSSEC with industry-standard software in hours instead of weeks. You will: · Understand what DNSSEC provides · Configure your servers to resist attack · Verify your environment supports modern DNS · Debug DNSSEC and the Chain of Trust · Sign your zones and attach them to the Chain of Trust · Conceal zone data with NSEC3 · Automate DNSSEC maintenance · Roll over keys to maintain integrity · Implement DNSSEC on private networks · Securely distribute security-critical information via DNS And more! DNSSEC Mastery transforms DNS from a headache to a solution.
No, you are not paranoid. They are out to read your email. In this engaging and oddly reassuring text, practitioner Lucas describes Pretty Good Privacy (PGP) and Open Source GPG for moderately skilled computer geeks who are unfamiliar with public-key cryptography but want a cheap solution to security woes. He covers cryptography, installing OPENPGP
If Agatha Christie ran Unix cons The BSD North conference draws some of the smartest people in the world. These few days will validate Dale Whitehead’s work—or expose him as a fraud. When a tragic death devastates the conference, only Dale suspects murder. Computer geeks care about code. But do they care enough… to kill?