Welcome to our book review site go-pdf.online!

You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.

Sign up

Summary of Phil Lapsley's Exploding the Phone
  • Language: en
  • Pages: 57

Summary of Phil Lapsley's Exploding the Phone

Please note: This is a companion version & not the original book. Sample Book Insights: #1 In 1967, Jake Locke got a letter from someone who claimed to have his notebook. It was written in some sort of alien hieroglyphics, and his roommate said it looked like Russian. Locke didn’t know what to think. #2 The author responded to an ad placed in the newspaper by a spy ring. He was sent a letter in Russian, and then a postcard with a handful of questions. He spent every waking hour working on the postcard questions. #3 An inward is a special telephone operator who can help you make calls that would otherwise be difficult to make. You can’t call an inward by dialing their number, but you can call them up and ask them to complete a call to someone. #4 One postcard question down, one to go: What equipment were the students at MIT using. Locke found an article in the Crimson about some MIT students who got in trouble for playing with the telephone. He found out that the library was close to his dorm.

Exploding the Phone
  • Language: en
  • Pages: 432

Exploding the Phone

“A rollicking history of the telephone system and the hackers who exploited its flaws.” —Kirkus Reviews, starred review Before smartphones, back even before the Internet and personal computers, a misfit group of technophiles, blind teenagers, hippies, and outlaws figured out how to hack the world’s largest machine: the telephone system. Starting with Alexander Graham Bell’s revolutionary “harmonic telegraph,” by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once peopl...

DSP Processor Fundamentals
  • Language: en
  • Pages: 228

DSP Processor Fundamentals

This cutting-edge, practical guide brings you an independent, comprehensive introduction to DSP processor technology. A thorough tutorial and overview of DSP architectures, this book incorporates a broad range of today's product offerings in examples that illustrate DSP features and capabilities. This book is especially useful to electronic systems designers, processor architects, engineering managers, and product planners.

Linux Network Administrator's Guide
  • Language: en
  • Pages: 516

Linux Network Administrator's Guide

This introduction to networking on Linux now covers firewalls, including the use of ipchains and Netfilter, masquerading, and accounting. Other new topics in this second edition include Novell (NCP/IPX) support and INN (news administration).

Computational Science - ICCS 2003
  • Language: en
  • Pages: 1164

Computational Science - ICCS 2003

The four-volume set LNCS 2657, LNCS 2658, LNCS 2659, and LNCS 2660 constitutes the refereed proceedings of the Third International Conference on Computational Science, ICCS 2003, held concurrently in Melbourne, Australia and in St. Petersburg, Russia in June 2003. The four volumes present more than 460 reviewed contributed and invited papers and span the whole range of computational science, from foundational issues in computer science and algorithmic mathematics to advanced applications in virtually all application fields making use of computational techniques. These proceedings give a unique account of recent results in the field.

Cyberpunk
  • Language: en
  • Pages: 404

Cyberpunk

Using the exploits of three international hackers, Cyberpunk explores the world of high-tech computer rebels and the subculture they've created. In a book as exciting as any Ludlum novel, the authors show how these young outlaws have learned to penetrate the most sensitive computer networks and how difficult it is to stop them.

Hacker, Hoaxer, Whistleblower, Spy
  • Language: en
  • Pages: 497

Hacker, Hoaxer, Whistleblower, Spy

  • Type: Book
  • -
  • Published: 2015-10-06
  • -
  • Publisher: Verso Books

The ultimate book on the worldwide movement of hackers, pranksters, and activists collectively known as Anonymous—by the writer the Huffington Post says “knows all of Anonymous’ deepest, darkest secrets” “A work of anthropology that sometimes echoes a John le Carré novel.” —Wired Half a dozen years ago, anthropologist Gabriella Coleman set out to study the rise of this global phenomenon just as some of its members were turning to political protest and dangerous disruption (before Anonymous shot to fame as a key player in the battles over WikiLeaks, the Arab Spring, and Occupy Wall Street). She ended up becoming so closely connected to Anonymous that the tricky story of her ins...

The Country of the Blind
  • Language: en
  • Pages: 369

The Country of the Blind

FINALIST FOR THE PULITZER PRIZE Named one of the best books of the year by: THE NEW YORKER • THE WASHINGTON POST • THE ATLANTIC • NPR • PUBLISHERS WEEKLY • LITHUB "Fascinating...The great strength of this memoir is its voracious, humble curiosity." - The Atlantic, The 10 Best Books of the Year A witty, winning, and revelatory personal narrative of the author’s transition from sightedness to blindness and his quest to learn about blindness as a rich culture all its own. We meet Andrew Leland as he’s suspended in the liminal state of the soon-to-be blind: he’s midway through his life with retinitis pigmentosa, a condition that ushers those who live with it from sightedness to b...

Actually Useful Internet Security Techniques
  • Language: en
  • Pages: 400

Actually Useful Internet Security Techniques

Internet security continues to be one of the most talked about topics in the media today. This guide provides the most current, practical and actually useful security techniques in a comprehensive, easy-to-understand manner. It effectively portrays by example how to configure and maintain a computer and network against the security exposures of the Internet.

Social Engineering
  • Language: en
  • Pages: 342

Social Engineering

  • Type: Book
  • -
  • Published: 2022-03-08
  • -
  • Publisher: MIT Press

Manipulative communication—from early twentieth-century propaganda to today’s online con artistry—examined through the lens of social engineering. The United States is awash in manipulated information about everything from election results to the effectiveness of medical treatments. Corporate social media is an especially good channel for manipulative communication, with Facebook a particularly willing vehicle for it. In Social Engineering, Robert Gehl and Sean Lawson show that online misinformation has its roots in earlier techniques: mass social engineering of the early twentieth century and interpersonal hacker social engineering of the 1970s, converging today into what they call ...