Wednesday 12 January 2011

Max Planck und die moderne Physik



Max Planck und die moderne Physik
Dieter Hoffmann | 2010-01-01 00:00:00 | Springer | 340 | Physics
Max Planck (1858-1947) zahlt zu den herausragenden Physikern des zwanzigsten Jahrhunderts. Seine Quantenhypothese aus dem Jahre 1900 wurde zur Grundlage fur die Entwicklung der Quantentheorie und bildet eine der zentralen Saulen der modernen Physik. Obwohl heute fast nur noch als Vater der Quantentheorie wahrgenommen, ist Plancks physikalisches Wirken damit keineswegs erschopfend charakterisiert. Seine Beitrage zur Thermodynamik und insbesondere zum Entropiebegriff begrundeten seinen Ruf als einer der fuhrenden theoretischen Physiker seiner Zeit und schlugen zugleich die Brucke zu seinen Untersuchungen zur Theorie der Warmestrahlung, die ihn zum Planckschen Wirkungsquantum und zur Quantenhypothese fuhren sollte. Daruber hinaus haben aber auch noch viele andere Gebiete der theoretischen Physik wichtige Impulse von ihm empfangen. So gehorte er zu den fruhen Forderern der Relativitatstheorie und des jungen Einstein, hat er mit der Fokker-Planck-Gleichung eine der Grundgleichungen fur die Physik stochastischer Systeme geliefert. Mit dem vorliegenden Buch, das auf ein Symposium des Fachverbandes Geschichte der Physik der Deutschen Physikalischen anlasslich des 150. Geburtstage von Max Planck zuruck geht, versuchen anerkannte Physikhistoriker das gesamte Spektrum von Plancks physikalischem Schaffen herauszuarbeiten und seine Bedeutung fur die Entwicklung der modernen Physik umfassend zu wurdigen.
Download this book!

Free Ebooks Download

The Fountain of Privilege: Political Foundations of Markets in Old Regime France and England (California Series on Social Choice and Political Economy)



The Fountain of Privilege: Political Foundations of Markets in Old Regime France and England (California Series on Social Choice and Political Economy)
Hilton L. Root | 1994-11-16 00:00:00 | University of California Press | 280 | Economics
Hilton Root's new book applies contemporary economic and political theory to answer long-standing historical questions about modernization. It contrasts political stability in Georgian England with the collapse of the Old Regime in France. Why did a century of economic expansion rupture France's political foundations while leaving those of Britain intact? Comparing the political and financial institutions of the two states, Root argues that the French monarchy's tight control of markets created unresolvable social conflicts whereas England's broader power base permitted the wider distribution of economic favors, resulting in more flexible and efficient markets.
Reviews
In a comparative study about government policies and the possibilities of 'rent-seeking' in France and England, Hilton Root makes a compelling case of how different political institutions in these two countries determined the workings of markets. While using the insights from economic and political theory, and applying these to the field of social history, Root has written a well articulated and enlightening book about how political institutions constrain the evolution of markets. This book should be of interest not only to students of early modern Europe, but also to political scientists and economists, who might find it interseting to see how social science theory can be applied to historical data.

Download this book!

Free Ebooks Download

Algebraic Methods for Nonlinear Control Systems



Algebraic Methods for Nonlinear Control Systems
Giuseppe Conte, Claude H. Moog, Anna Maria Perdon | 2006-01-01 00:00:00 | Springer | 178 | Mathematics
A self-contained introduction to algebraic control for nonlinear systems suitable for researchers and graduate students.

The most popular treatment of control for nonlinear systems is from the viewpoint of differential geometry yet this approach proves not to be the most natural when considering problems like dynamic feedback and realization. Professors Conte, Moog and Perdon develop an alternative linear-algebraic strategy based on the use of vector spaces over suitable fields of nonlinear functions. This algebraic perspective is complementary to, and parallel in concept with, its more celebrated differential-geometric counterpart.

Algebraic Methods for Nonlinear Control Systems describes a wide range of results, some of which can be derived using differential geometry but many of which cannot. They include:

classical and generalized realization in the nonlinear context;

accessibility and observability recast within the linear-algebraic setting;

discussion and solution of basic feedback problems like input-to-output linearization, input-to-state linearization, non-interacting control and disturbance decoupling;

results for dynamic and static state and output feedback.

Dynamic feedback and realization are shown to be dealt with and solved much more easily within the algebraic framework.

Originally published as Nonlinear Control Systems, 1-85233-151-8, this second edition has been completely revised with new text chapters on modeling and systems structure are expanded and that on output feedback added de novo examples and exercises. The book is divided into two parts: the first being devoted to the necessary methodology and the second to an exposition of applications to control problems.
Download this book!

Free Ebooks Download

Architecture of Reliable Web Applications Software



Architecture of Reliable Web Applications Software
| 2006-12-04 00:00:00 | | 0 | Web Application Development


Architecture of Reliable Web Applications Software presents new concepts regarding the reliability, availability, manageability, performance, scalability, and secured-ability of applications, particularly the ones that run over the Web. Architecture of Reliable Web Applications Software examines the causes of failure in a Web-based information system development project, and indicates that to exploit the unprecedented opportunities offered by e-service applications, businesses and users alike need a highly available, reliable, and efficient telecommunication infrastructure. Architecture of Reliable Web Application Software proposes a scalable QoS-aware architecture for the management of QoS-aware Web services to provide QoS management support for both Web services providers and consumers. It also introduces Hyper-services as a unified application model for semantic Web frameworks and proposes Conceptual Model Driven Software Development as a means of easy adoption to them.


Download this book!

Free Ebooks Download

The Principles of Astronomical Telescope Design



The Principles of Astronomical Telescope Design
Jingquan Cheng | 2009-01-01 00:00:00 | Springer | 634 | Astronomy and Cosmology
This book presents a complete summary of the author's twenty five years of experience in telescope design. It provides a general introduction to every aspect of telescope design. It also discusses the theory behind telescope design in depth, which makes it a good reference book for professionals. It covers Radio, Infrared, Optical, X-Ray and Gamma-Ray wavelengths. Originally published in Chinese.
Download this book!

Free Ebooks Download

Schule der Elite



Schule der Elite
Wolf W. Lasko | 2004-11-30 00:00:00 | Books on Demand GmbH | 268 | Subjects

Download this book!

Free Ebooks Download

The Art of Concurrency: A Thread Monkey's Guide to Writing Parallel Applications



The Art of Concurrency: A Thread Monkey's Guide to Writing Parallel Applications
| 2009-05-19 00:00:00 | | 0 | Programming


If you're looking to take full advantage of multi-core processors with concurrent programming, this practical book provides the knowledge and hands-on experience you need. The Art of Concurrency is one of the few resources to focus on implementing algorithms in the shared-memory model of multi-core processors, rather than just theoretical models or distributed-memory architectures. The book provides detailed explanations and usable samples to help you transform algorithms from serial to parallel code, along with advice and analysis for avoiding mistakes that programmers typically make when first attempting these computations. Written by an Intel engineer with over two decades of parallel and concurrent programming experience, this book will help you:

Understand parallelism and concurrency Explore differences between programming for shared-memory and distributed-memory Learn guidelines for designing multithreaded applications, including testing and tuning Discover how to make best use of different threading libraries, including Windows threads, POSIX threads, OpenMP, and Intel Threading Building Blocks Explore how to implement concurrent algorithms that involve sorting, searching, graphs, and other practical computations

The Art of Concurrency shows you how to keep algorithms scalable to take advantage of new processors with even more cores. For developing parallel code algorithms for concurrent programming, this book is a must.

User review
Not a bad book if you can get over the style and sloppy code
This book is kind of a dull read for (in my opinion) interesting material. The writing style is informal, but self-importantly so (lots of `I did this` and `I've said this before`). Even discounting that, the writer cannot make the subject very interesting. Partly because he eschews figures or flowcharts or itemized steps for walls of text, partly because the writing itself is disjointed and not very good. Remember, informal != good.


Plus, the code is sloppy. Almost everywhere a main routine has a loop pthread_create'ing new threads, `new` is used to allocate and free is used to deallocate a pointer. This is the most egregious one; one can take issue with a lot of others (for example, why is the code C++ if 99% of it is C? Why is the pointer allocated in the main thread but freed in the worker thread?).


The thing I liked about the book is that it covers a lot of relevant topics, including modern ones such as MapReduce. It should reward someone with the patience to overlook its flaws.

User review
An excellent book, but,,.
I thought this was an excellent book. The previous reviewer was correct, it's an outstanding overview of how to create parallel algorithms without being too academic. My only real complaint is that the font was too small. Perhaps it's my age (I'm 46), but frankly if I'm going to spend hours with a book and use it as a reference, I want the font to be easy on my eyes. If in the second edition, the author makes the font bigger and adds a few more pages, then this will *the* book to read on parallel algorithms.

User review
Solid book on concurrent programming
This is a new book on concurrent programming that splits the difference between academic tomes on the subject and cookbook code dump type texts.


The author assumes that readers have some basic knowledge of data structures and algorithms and asymptotic efficiency of algorithms (Big-Oh notation) that is typically taught in an undergraduate computer science curriculum. Readers familiar with Introduction to Algorithms should do the trick. He also assumes that the reader is an experienced C programmer (he uses C throughout the book) and knows something about OpenMP, Intel Threading Building Blocks, POSIX threads, or Windows Threads libraries and has a good idea of which of these tools will be used in their own situations. The author does not focus on using one programming paradigm here, since, for the most part, the functionality of these overlap. Instead he presents a variety of threading implementations across a wide spectrum of algorithms that are featured in the latter portion of the book.


The current product description does not show the table of contents, so I do that next:


Chapter 1, `Want to go faster` anticipates and answers some of the questions you might have about concurrent programming. This chapter explains the differences between parallel and concurrent, and describes the four-step threading methodology. The chapter ends with some background on concurrent programming and some of the differences and similarities between distributed-memory and shared-memory programming and execution models.


Chapter 2, `Concurrent or Not Concurrent` collects a lot of the author's wisdom on initial approaches that apply to a large percentage of code you're likely to encounter. Also, the author lets you know that not every bit of computation can be made concurrent, no matter how hard you try. There are examples of the kinds of algorithms and computations that are not friendly to concurrency in Section 2.2. When any of those examples can be modified to allow for concurrent execution, hints and tips are included about how to do that.


Chapter 3, `Proving Correctness and Measuring Performance` takes a look at topics related to the final two steps of the threading methodology. The first is knowing when your concurrent algorithms will run correctly or at least having a good idea that you've done a good job of designing an error-free concurrent algorithm. The second topic covers some of the ways you can measure how well your concurrent code is executing in parallel.


Chapter 4, `Eight Simple Rules` should give you more success in writing the best and most efficient threaded implementation of your applications. In upcoming chapters, when discussing the design and implementation of specific algorithms, the author drops in a reference to one or more of these eight rules.


Chapter 5, Threading Libraries, reviews some of the details of the threading libraries used in subsequent chapters to implement the algorithms. The author assumes that you are already familiar with at least one of these threading methods. Proficiency is not expected, but you should have at least tried your hand at some threaded coding examples before.


If you are unfamiliar with any of the threading libraries, this chapter should provide you with enough details to understand the algorithms implemented with such a library and any library-specific features that are used. Otherwise, this should be a review. You can skip over this chapter and come back when you might have a question about syntax or threading without fear of loss of continuity.


Chapter 6, is entitled `Parallel Sum and Prefix Scan`. Summing the elements of an array or finding all partial sums of the elements in an array are basic algorithmic problems. The solution to these problems is easy to describe in a single sentence or two. The concurrent versions of these algorithms, known as parallel sum and prefix scan respectively, are simple and easy to understand. Since they are so simple, these problems have been extensively analyzed and are used as bellwether algorithms within the parallel programming community. Description, design, analysis, and implementation of these two algorithms is intended to prepare you for the rest of the algorithms contained in the text.


Chapter 7, `Map Reduce`, is about an algorithmic framework of the same name, like divide-and-conquer or backtracking, rather than a specific algorithm. The pair of operations, map and reduce, is found in LISP and other functional languages. MapReduce has been getting a lot of interest lately as an algorithmic framework that can be executed concurrently.


Chapter 8, `Sorting` examines concurrent sorting. First considered are compare-exchange sorts such as bubble sort. These are sorting algorithms that use the results from comparing two keys to determine the relative order of the elements with those keys. Movement of data items will be based on those results and will be the exchange of the positions of the two items under consideration. The final algorithm considered is radix sort, which compares bits within keys to determine movement of data.


Chapter 9, `Searching`, discusses two algorithms you can use to search through a collection of data and shows how to make them concurrent to decrease the time needed to locate items of interest. For simplicity, it is assumed that all keys within a data set to be searched are unique. Strategies for dealing with multiple duplicate keys are only mentioned briefly.


Chapter 10, `Graph Algorithms`, talks briefly about what a graph is and how it is represented and then how it is traversed using both depth-first and breadth-first search algorithms. It is very well illustrated.


Chapter 11,`Threading Tools`, mentions some debugging and performance tools that you can use on threaded applications. The set of tools covered in this chapter is not exhaustive and is meant to show you ways to track down problems in a much quicker manner than if you performed the hunt yourself.


All in all, this is a very useful yet not over-academic book. I would say that you should probably have read something along the lines of Using OpenMP: Portable Shared Memory Parallel Programming (Scientific and Engineering Computation), or at least read that book in parallel with this one. If you're not interested in OpenMP, you would of course read a book on a different technique for concurrent programming.


Download this book!

Free Ebooks Download

Modern Project Management



Modern Project Management
Tarun Soota | 2005-01-01 00:00:00 | New Age International (P) Ltd. | 235 | Management
The self contained text attempts to provide a broad foundation to the project management aspects to bridge the gap between the students and the professionals. In doing so, it discusses fairly extensively, the basic of project management and treats systematically and comprehensively, the various parameters such as feasibility study and structuring and controlling the most important resources of the project. The role of the project manager in project direction, coordination and control has been elaborated at length. Network concepts used in project management forms an important part of this book. Numerous worked out real life problems illustrate the application of the theories considered.
In consonance with the growth of industry and its modernization, and the need to minimize the time required for completion of the project advances in project management have been included.
Replete with line diagrams, this elegant volume will serve as an excellent text for the undergraduate in mechanical/production/industrial engineering, and would be of immense value to the professional project managers.
Download this book!

Free Ebooks Download

Everyday Practical Electronics, February 2003 ~ VOL. 32. No. 2


Everyday Practical Electronics, February 2003 ~ VOL. 32. No. 2
Wimborne Publishing | 2003-01-01 00:00:00 | Wimborne Publishing | 69 | Popular
Projects and Circuits
BRAINIBOT BUGGY by Mark Stuart and Peter Balch 92
A low-cost, easy-build buggy that has a mind of its own!
WIND TUNNEL by John Becker 105
Scientifically investigate Nature̢۪s second essential element
INGENUITY UNLIMITED hosted by Alan Winstanley 114
Single-Cylinder Ignition; Reaction Timer
BACK TO BASICS – Part 1. Hearing Aid, Audio Power Amplifier 130
by Bart Trepak. Illustrating how transistors can create useful designs
TESLA HIGH VOLTAGE TRANSFORMER by Raymond Haigh 143
Spectacularly create your own sizzling DIY lightning!
Series and Features
NEW TECHNOLOGY UPDATE by Ian Poole 98
Carbon nano-tubes are likely to have a serious impact on
semiconductor technology
CIRCUIT SURGERY by Alan Winstanley and Ian Bell 102
More on MOSFETs; Switching Speed of A.C. Motors
IN THE BAG by Terry de Vaux-Balbirnie 117
Have you ever wondered how your car airbags work?
NET WORK – THE INTERNET PAGE surfed by Alan Winstanley 122
The Last Keyword in Sales; Favourite Sites
TECHNO TALK by Andy Emmerson 136
Hotspots to the Rescue
INTERFACE by Robert Penfold 138
Direct control of PC serial lines using MSCOMM
Regulars and Services
EDITORIAL 91
NEWS – Barry Fox highlights technology’s leading edge 99
Plus everyday news from the world of electronics
BACK ISSUES Did you miss these? Many now on CD-ROM! 123
READOUT John Becker addresses general points arising 126
SHOPTALK with David Barrington 129
The essential guide to component buying for EPE projects
PLEASE TAKE NOTE PIC Intruder Alarm (Apr ̢۪02); PIC-pocket
Battleships (Oct ̢۪02); BioPIC Heartbeat Monitor (May ̢۪02) 129
CD-ROMS FOR ELECTRONICS 140
A wide range of CD-ROMs for hobbyists, students and engineers
DIRECT BOOK SERVICE 152
A wide range of technical books available by mail order, plus more CD-ROMs
PRINTED CIRCUIT BOARD AND SOFTWARE SERVICE 155
PCBs for EPE projects. Plus EPE project software
ELECTRONICS MANUALS 156
Essential reference works for hobbyists, students and service engineers
ADVERTISERS INDEX 160
Download this book!

Free Ebooks Download

Turkey Since 1970: Politics, Economics and Society



Turkey Since 1970: Politics, Economics and Society
Debbie Lovatt | 2001-06-02 00:00:00 | Palgrave Macmillan | 250 | Economics
Contemporary Turkey often appears to be juggling a plethora of agenda issues (radical Islam, terrorism, separatism, enemies without, enemies within, corruption, inflation, mafia-government links and natural disasters) with military interventions of varying degrees and short-lived, wobbly coalition governments. The contributors to Turkey Since 1970 offer clear and accessible background information to events that have aided and hindered the country's development.

Download this book!

Free Ebooks Download

An Introduction to Numerical Analysis (+Solutions to Exercises)



An Introduction to Numerical Analysis (+Solutions to Exercises)
Endre Suli, David F. Mayers | 2003-01-01 00:00:00 | Cambridge University Press | 444 | Mathematics
This textbook is written primarily for undergraduate mathematicians and also appeals to students working at an advanced level in other disciplines. The text begins with a clear motivation for the study of numerical analysis based on real-world problems. The authors then develop the necessary machinery including iteration, interpolation, boundary-value problems and finite elements. Throughout, the authors keep an eye on the analytical basis for the work and add historical notes on the development of the subject. There are numerous exercises for students.

A textbook for the theory of numerical analysis.
Many people naively believe that with the growing power of symbolic mathematics packages such as Mathematica?, knowledge in numerical analysis is increasingly irrelevant. That is not true, all programmers should have some knowledge of numerical techniques and even power users of a symbolic mathematics package should have some theoretical knowledge in numerical techniques. The packages will perform operations such as polynomial interpolation and at the very least a user should know when to use a specific type.
This book is a solid text in the basics of numerical mathematics, using more of a theoretical background than most. There are a large number of theorem-proof instances, so in that respect, it resembles a math book. The material covered is:

* Solutions of linear equations and systems of linear equations.
* Matrices, eigenvalues and eigenvectors.
* Polynomial interpolation and polynomial approximation.
* Numerical integration.
* Initial value and boundary value problems for ODEs.
* The finite element method.

There are a small number of exercises at the end of each chapter and no solutions are included.
If you are looking for a book to use in a course in numerical analysis where there is an emphasis on the theoretical background, then this one will serve your needs.

Review
"This book is a solid text in the basics of numerical mathematics, using more of a theoretical background than most. If you are looking for a book to use in a course in numerical analysis where there is an emphasis on the theoretical background, then this one will serve your needs." Journal of Recreational Mathematics

"carefully written with a good level of rigor" SIAM Review
Download this book!

Free Ebooks Download

Particles and Fields



Particles and Fields
Gilvan A Alves,Oscar J P Eboli,Victor O Rivelles | 1900-01-01 00:00:00 | World Scientific Publishing Company | 676 | Electromagnetism
Proceedings of the XI Jorge Andre Swieca Summer School, held January 14-27, 2001 in Sao Paulo, Brazil. Contains lectures on forefront areas of high energy physics, such as collider physics, neutrino phenomenology, noncommutative field theory, string theory and brain. For graduate students and researchers in high energy physics.

Download this book!

Free Ebooks Download

Exuberance: New Virtuosity in Contemporary Architecture (Architectural Design)


Exuberance: New Virtuosity in Contemporary Architecture (Architectural Design)
Marjan Colletti | 2010-01-01 00:00:00 | Wiley | 144 | Architecture
This title of AD heralds a new era of exuberance in digital design. Having overcome the alienation and otherness of the cyber, having mastered the virtual qualities and protocols of the parametric, having achieved the intricacy and elegance of the digital, and having fully embraced the potential of 3d computer software and cad/cam manufacturing technologies, it is now time for architects to show off!

Conjure up the extravagance of furniture design, the abundance of cgi in Hollywood, the profuseness of bio-techno ornamentation or the lavishness of Middle-Eastern and Asian super-urbanism. Exuberance not only celebrates new Baroque theatricality, formal sophistication and digital virtuosity; it also debates a plethora of joyful and intelligent ways in which experimental architecture manages to cope with the contemporary turmoil in global politics, economics and ecology.
Download this book!

Free Ebooks Download

Diagnostic Pathology and Molecular Genetics of the Thyroid: A Comprehensive Guide for Practicing Thyroid Pathology



Diagnostic Pathology and Molecular Genetics of the Thyroid: A Comprehensive Guide for Practicing Thyroid Pathology
Yuri E. Nikiforov,Paul W. Biddinger,Lester D.R. Thompson | 2009-02-05 00:00:00 | Lippincott Williams & Wilkins | 448 | Internal Medicine

The first comprehensive surgical pathology textbook and reference on the thyroid in over fifteen years, this book presents the most advanced concepts on the diagnostic surgical pathology, cytopathology, immunohistochemistry, and molecular genetics of neoplastic and non-neoplastic thyroid diseases. The authors provide a detailed description of the surgical pathology of thyroid diseases side-by-side with major advances in immunohistochemistry and molecular genetics that can be used in evaluating thyroid tumors and non-neoplastic diseases. By combining diagnostic surgical pathology, cytopathology, immunohistochemistry, and molecular genetics, the book effectively mimics the practice of contemporary surgical pathologists. All major chapters have a uniform style of description and include a separate section on molecular genetics.

A companion Website will include the fully searchable text and an image bank.



Download this book!

Free Ebooks Download

The 21 Most Powerful Minutes In A Leader's Day: Revitalize Your Spirit And Empower Your Leadership



The 21 Most Powerful Minutes In A Leader's Day: Revitalize Your Spirit And Empower Your Leadership
John C. Maxwell | 2000-09-12 00:00:00 | Thomas Nelson | 224 | Leadership
In the spirit of his best-selling The 21 Irrefutable Laws of Leadership and The 21 Indispensable Qualities of a Leader, John Maxwell offers thoughts on proven leadership qualities and crucial issues that affect leadership success. These basic principles of success can be applied to business and private life, helping anyone reach their full potential. Twenty-one powerful statements help leaders maximize their assets and overcome their weaknesses, encouraging them to lead with their hearts as well as their minds. Daily readings include sections which help readers integrate and apply each day's material.
John C. Maxwell's The 21 Most Powerful Minutes in a Leader's Day is actually 21 weeks' worth of bite-sized daily lessons on leadership, based on biblical principles and the figures who embody them. Maxwell, the popular author of more than two dozen books on personal and leadership development, has always based his teachings on scriptural tenets. This time, he turns more explicitly to the Bible to illustrate principles such as effectiveness, influence, empowerment, sacrifice, and timing, which he introduced in a well-received earlier book, The 21 Irrefutable Laws of Leadership. Readings for the first four days of each week incorporate: a theme ("People teach what they know, but they reproduce what they are"); a tale that brings a relevant individual (such as Jesus, Moses, Esther, and Solomon) into the discourse on it; interpretations that shape the pertinent factors into a practical contemporary lesson; and a question to ponder that both personalizes and extends the message ("If you reproduced yourself in another leader, would you be pleased with the result?"). Each fifth day, Maxwell presents suggestions, including a specific prayer, to use in putting the ideas into practice. Maxwell's exclusively biblical approach will not be for everyone, but his points are universal in nature and generally on target. Any reader should be able to draw ideas and inspiration from them, and those who have made the Bible a part of their lives will likely find his vision particularly substantial and satisfying. --Howard Rothman
Reviews
This is and was a dynamic read. I purchased this copy for my pastor!
Reviews
I received the two books I ordered way before the selected earliest date given. We needed these books for a Small Group and they came just in time and you could not beat the price, I paid more in shipping and handling.
Reviews
John C. Maxwell provides a 21-week course of study covering 21 leadership laws based on readings from the Bible. He served as a pastor in various churches for 25 years before leaving Skyline Wesleyan in San Diego in 1995 to devote his time to writing, speaking and teaching leadership. Perhaps because he is the author of many books like this one, his writing is clear and well-suited to the purpose of educating and inspiring others, particularly those who share his Christian faith. In each chapter, Maxwell offers a brief introduction to a new principle and then supplies relevant daily Old and New Testament readings for the work-week. He focuses more on stimulating meditation and introspection than on laying out a detailed path to leadership greatness. On the fifth day of considering each principle, Maxwell invites you to use a self-assessment exercise on his Web site to help you understand the principle more fully. He also asks you to share what you have learned with others within a couple of days; the idea being that teaching a principle is the best way for you to learn it most thoroughly. getAbstract finds this to be a very useful, practical and thought-provoking book for readers who want to study leadership lessons in the light of their religious beliefs - if that's not you, then you'll want to lead the way to the next classroom instead.
Reviews
I would recommend this book to anyone --we all need to learn how to work with each other in the home --workplace--anywhere. John Maxwell does this so well guiding and teaching us truths about ourselves and others. You won't regret buying this book.



It also gives you great insights into the people of the bible. Ever wish the bible would give you more details of the peoples lives. John Maxwell has a wonderful insight into peoples lives by seeing how they handled the things God gave them to do. Also no way does he switch things around to give the bible a different meaning--
Reviews
This was a textbook for my Christian Leadership class. It has such practical and useful information. It is so enlightening and empowering. It is a must for anyone in leadership, especially Christians in leadership.

Download this book!

Free Ebooks Download

The Chemistry of Nanomaterials: Synthesis, Properties and Applications



The Chemistry of Nanomaterials: Synthesis, Properties and Applications
C. N. R. Rao | 2004-01-01 00:00:00 | Wiley | 761 | Chemistry
With this handbook the distinguished team of editors has combined the expertise of leading nanomaterials scientists to provide the latest overview of this field.

The authors cover the whole spectrum of nanomaterials, ranging from theory, synthesis, properties, characterization to application, including such new developments as:
quantum dots, nanoparticles, nanoporous materials, as well as nanowires, nanotubes and nanostructural polymers
nanocatalysis, nanolithography, nanomanipulation
methods for the synthesis of nanoparticles.

The book can thus be recommended for everybody working in nanoscience: Beginners can acquaint themselves with the exciting subject, while specialists will find answers to all their questions plus helpful suggestions for further research.
Download this book!

Free Ebooks Download

White Wolf of Avalon



White Wolf of Avalon
Eva Gordon | 2010-01-01 00:00:00 | Vanilla Heart Publishing | 300 | Fiction Other
White Wolf of Avalon
Download this book!

Free Ebooks Download

Software Reflected: The Socially Responsible Programming of Our Computers



Software Reflected: The Socially Responsible Programming of Our Computers
| 1982-11-01 00:00:00 | | 0 | Software Engineering




User review



User review



User review



User review



User review



User review



User review



User review



User review




Download this book!

Free Ebooks Download

SSL VPN : Understanding, evaluating and planning secure, web-based remote access: A comprehensive overview of SSL VPN technologies and design strategies



SSL VPN : Understanding, evaluating and planning secure, web-based remote access: A comprehensive overview of SSL VPN technologies and design strategies
Joseph Steinberg,Tim Speed,J. Steinberg,T. Speed | 2005-03-09 00:00:00 | Packt Publishing | 212 | Networking
A comprehensive overview of SSL VPN technologies and design strategies
  • Understand how SSL VPN technology works
  • Evaluate how SSL VPN could fit into your organisation?s security strategy
  • Practical advice on educating users, integrating legacy systems, and eliminating security loopholes
  • Written by experienced SSL VPN and data security professionals

In Detail Virtual Private Networks (VPNs) provide remote workers with secure access to their company network via the internet by encrypting all data sent between the company network and the user?s machine (the client). Before SSL VPN this typically required the client machine to have special software installed, or at least be specially configured for the purpose.

Clientless SSL VPNs avoid the need for client machines to be specially configured. Any computer with a Web browser can access SSL VPN systems. This has several benefits:

  • Low admin costs, no remote configuration
  • Users can safely access the company network from any machine, be that a public workstation, a palmtop or mobile phone
  • By pass ISP restrictions on custom VPNs by using standard technologies

SSL VPN is usually provided by a hardware appliance that forms part of the company network. These appliances act as gateways, providing internal services such as file shares, email servers, and applications in a web based format encrypted using SSL. Existing players and new entrants, such as Nokia, Netilla, Symantec, Whale Communications, and NetScreen technologies, are rushing our SSL VPN products to meet growing demand.

This book provides a detailed technical and business introduction to SSL VPN. It explains how SSL VPN devices work along with their benefits and pitfalls. As well as covering SSL VPN technologies, the book also looks at how to authenticate and educate users ? a vital element in ensuring that the security of remote locations is not compromised. The book also looks at strategies for making legacy applications accessible via the SSL VPN.

What you will learn from this book?

  • How SSL VPN technology works, and how it fits into existing network architectures
  • Evaluating SSL VPN for your organization
  • Understand what to look out for when talking to vendors
  • How to plan an SSL VPN implementation for your business
  • Educate staff to maintain SSL VPN security
  • Strategies for providing access to internal legacy applications via SSL VPN
  • A heads-up on likely trends and possibilities for the future of SSL VPN

Approach

The book blends technically rigorous descriptions with a friendly approach based on practical examples and scenarios. The authors write in clear, informal language and make extensive use of diagrams and images. The book begins with an overview of SSL VPN?s purpose, and the technical and business trends that are making it popular today. It then looks at how SSL VPNs work and how they fit into existing network plans. The effect of SSL VPN on the wider business environment is then considered, before looking at how SSL VPN technology is likely to develop in the future.

Who this book is written for?

This book aimed at IT network professionals and managers who are currently evaluating SSL VPN technologies. It requires a broad understanding of networking concepts, but does not require specific and detailed technical knowledge of protocols or vendor implementations.
Reviews
"SSL VPN - Understanding, evaluating and planning secure, web-based remote access" - the only thing wordy about this book is its title. The rest of the book delivers information clearly and concisely through text, diagrams and examples. "Hacker Bob" animates key passages to keep things from getting dry.



As expected, the audience for this book is techies. Basic network concepts are explained, so anyone with a technical background will understand. Any network fundamentals quickly lead to SSL VPN applications.



The authors are good about explaining "why" and providing the pros/cons of a decision. Key criteria are also provided for both technical and business decisions. I found one of the most valuable parts to be about bad architectures. The authors illustrate several common architectures and point out weaknesses. The focus on diagrams and flow was quite useful.

Download this book!

Free Ebooks Download


Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)



Energy Security Challenges for the 21st Century: A Reference Handbook (Contemporary Military, Strategic, and Security Issues)
Gal Luft,Anne Korin | 2009-08-10 00:00:00 | Praeger | 372 | Economics

The impact of energy on global security and economy is clear and profound, and this is why in recent years energy security has become a source of concern to most countries. However, energy security means different things to different countries based on their geographic location, their endowment of resources their strategic and economic conditions. In this book, Gal Luft and Anne Korin with the help of twenty leading experts provide an overview of the world's energy system and its vulnerabilities that underlay growing concern over energy security. It hosts a debate about the feasibility of resource conflicts and covers issues such as the threat of terrorism to the global energy system, maritime security, the role of multinationals and non-state actors in energy security, the pathways to energy security through diversification of sources and the development of alternative energy sources. It delves into the various approaches selected producers, consumers and transit states have toward energy security and examines the domestic and foreign policy tradeoffs required to ensure safe and affordable energy supply. The explains the various pathways to energy security and the tradeoffs among them and demonstrates how all these factors can be integrated in a larger foreign and domestic policy framework. It also explores the future of nuclear power, the complex relations between energy security and environmental concerns and the role for decentralized energy as a way to enhance energy security.


Reviews
Energy Security Challenges for the 21st Century: A Reference Library offers a fine, timely book for any interested in energy and security connections. The best field experts join forces to consider the role of energy in modern life in countries around the world - and how these nations achieve energy security. 20 leading experts review the world's energy systems and vulnerabilities in a fine debate about resource conflicts, control and preservation. This should be a part of any college-level military or social issues collection.



Download this book!

Free Ebooks Download

Logic at Botik '89: Symposium on Logical Foundations of Computer Science, Pereslavl-Zalessky, USSR, July 3-8, 1989, Proceedings (Lecture Notes in Computer Science)



Logic at Botik '89: Symposium on Logical Foundations of Computer Science, Pereslavl-Zalessky, USSR, July 3-8, 1989, Proceedings (Lecture Notes in Computer Science)
Albert R. Meyer,Michael A. Taitslin | 1989-07-10 00:00:00 | Springer | 289 | Theory of Computing
The present volume contains the proceedings of Logic at Botik '89, a symposium on logical foundations of computer science organized by the Program Systems Institute of the USSR Academy of Sciences and held at Pereslavl-Zalessky, USSR, July 3-8, 1989. The scope of the symposium was very broad; the topics of interest were: complexity of formal systems, constructive mathematics in computer science, denotational and operational semantics of programs, descriptive complexity, dynamic and algorithmic logics and schematology, formal tools to describe concurrent computations, lambda calculus and related topics, foundations of logic programming, logical foundations of database theory, logics for knowledge representation, modal and temporal logics, type theory in programming, and verification of programs. Thus, the papers in this volume represent many interesting trends in logical foundations of Computer Science, ranging from purely theoretical research to practical applications of theory.

Download this book!

Free Ebooks Download

Knitting Lingerie Style: More Than 30 Basic and Lingerie-Inspired Designs



Knitting Lingerie Style: More Than 30 Basic and Lingerie-Inspired Designs
Joan McGowan-Michael, Thayer Allyson Gowdy | 2007-01-01 00:00:00 | Stewart, Tabori & Chang | 160 | Do It Yourself
The only knitting book focused on lingerie and lingerie-inspired designs

Underwear has come out. Once kept demurely concealed, lingerie now pervades every fashion category, inspiring designs for day looks, loungewear, evening clothes, and accessories. Slips have become dresses unto themselves. Bra straps are meant to peek out from under tank tops. Camisoles are worn on their own or as layers over or under other clothes. Now, with Knitting Lingerie Style, designer Joan McGowan-Michael interprets this undeniable fashion trend for the knitter and, along the way, shares fascinating stories about lingerie history. Did you know that it was airplane magnate Howard Hughes who masterminded the underwire bra?

McGowan-Michael’s 30-plus designs, stunningly photographed by Thayer Allyson Gowdy, range from the truly functional—knitted bras, slips, corsets, camisoles, and stockings—to the purely fun. The brassiere inspires a curvature-enhancing twinset. The baby doll negligee is the basis for a lacy little gown and a matching thong set that’s both luxurious and (slightly) notorious. And a ribbed, laced-front sweater is an updated—and much more comfortable!—take on the classic corset.

The only book of its kind on the market, Knitting Lingerie Style includes projects that are bold and sexy, daring us all to bare a little skin, as well as more understated and demure, with sizes ranging from petite to plus.
Download this book!

Free Ebooks Download

Early Spring: An Ecologist and Her Children Wake to a Warming World



Early Spring: An Ecologist and Her Children Wake to a Warming World
Amy Seidl | 2010-01-01 00:00:00 | Beacon Press | 192 | Geosciences
This book is really about the butterfly effect and how an action miles away can wreck havoc on your environment. The author does give some great personal insights as the actions of man cause many unintended things to happen locally and on a small level that are adding up to a grim reality. I wish some people who say global warming does not exist would read this personal account of how the weather is not "normal" anymore.
Download this book!

Free Ebooks Download

Cyberia: Life in the Trenches of Cyberspace



Cyberia: Life in the Trenches of Cyberspace
Douglas Rushkoff | 2002-04-02 00:00:00 | Clinamen Press Ltd. | 272 | Culture
This is an ideas-led, exuberant documentary about the converging strands of a new era, the empowerments of cyber-technology, and the precipitation of new ways of life. Originally written in 1994, it outlines the strands of the cyber subculture as it was emerging-- the favored drugs, the influential individuals, the hackers and their motivations, the science chaos and the complexity of fractuals. This book will endure as a reminder of how modern cyberculture came about--a note to the future form an individual perceptive enough to grasp the profound effects of the cyber revolution.
Reviews
Under the guise of being a "theory" and "lifestyle" view of the communities arising around cyberspace, this book bats around the usual suspects - chaos theory, new cultures, modern life - and then degrades into a comparison between computer use and drugs. I will not deny the role drugs, specifically marijuana and LSD, have in computers, but to claim cyberspace requires much talk about drugs because it is a similar experience (seeing pretty images and designs in front of your face, even if they're not "there" in real life) is a bit of a stretch. Because the author spends his time discussing drugs, hippies, alternative lifestyles and other tangentially-related dreck, he fails to honestly explore hacker culture or even those who are advancing the concepts of cyberspace as something other than a consensual hallucination. I wouldn't recommend this to anyone except a researcher, as with the exception of a few pop quotes from famous computer and drug users, it's contentless and a moderately tedious read.
Reviews
In 1994, Doug Rushkoff set out to write an embedded, analytic travelogue linking a series of countercultural trends dealing with emerging networks and internet technologies. Instead of conducting technopunditry from the sidelines, Rushkoff got into the fray and followed around ravers, hackers,performance artists and writers whose philosophies emerged around a new surge of technoutopianism; linked inextricably with paganism, spirituality, and Eastern Philosphy. His aproach echoes the Tom Wolfe school subjective reporting, learning the lexicon of the object of study, trying to speak the language and reveal something about its psychology. What results is some snappy, breakneck prose colored philosophically and poetically by chaos mathematics and cyberpunk literature. This makes this book eminently fun, readable, and exciting. It also makes much of its proposed social and political uses for technology widely inaccurate. In a way, ten years removed, Cyberia should be appreciated now more than ever. We know better. And all of the wide-eyed fantasizing about decentralized spirituality and some wonderful fin de siecle millenial rapture spurned on by virtual reality are no longer dangerous or deluding, they can be seen in context, as thought waves that are spilled out of more optimistic time periods with exponential technological growth. The connect the dots game that Rushkoff plays is pretty astute, as well: the hippy connection, the second wave optimism that the 90s proposed to reconcile the "defeat" of the 60s, the fulmination of rave culture around these ideas that arrived in Berkely. A good book to read this book against would be Escape Velocity by Mark Dery, which is a little more "down to Earth", covers some similar material, and contains a counterpoint to Cyberia. Rushkoff himself has distanced himself widely from the rhetoric used in this book, but even this does not discredit this as a seminal text when looking at the viewpoints of subcultures built around technology.
Reviews
Rushkoff takes the reader on an elegant tour de force of the vast realm called "cyberia." With an uncanny ability to infuse humor and insights into his subject matter, he never lets the reader down.

The pulse of his books is reminiscent of the feeling you get at clubs when things are happening at a fast clip and a heated beat. The intelligence and forward-thinking Rushkoff offer make him unique and well worth the read.

Bravo!
Reviews
I found this book truly intriguing. The bits about the rave culture were a little off, and in the cases of his ecstasy coverage, very far off, but in general, it hits very close to the mark. I and many others that I associate with touch on the Technoshamanic view of the world. Rushkoff does an exceedingly good job demonstrating the relationships between psychadelics and innovation in areas like silicon valley and chaos theory mathematics. Read for yourself, judge for yourself.
Reviews
I read lots of these books. I have read most of Neal Stephenson's, Bruce Sterling's, and William Gibson's novels. This is a good book if you have interests in this area. The people who gave bad reviews are just not smart enough to understand the book's content, if they even finished reading it.

Download this book!

Free Ebooks Download


Community, Trade, and Networks: Southern Fujian Province from the Third to the Thirteenth Century (Cambridge Studies in Chinese History, Literature and Institutions)



Community, Trade, and Networks: Southern Fujian Province from the Third to the Thirteenth Century (Cambridge Studies in Chinese History, Literature and Institutions)
Hugh R. Clark | 1991-08-30 00:00:00 | Cambridge University Press | 278 | Economics
The study traces the economic and demographic history of a corner of China's southeast coast from the third to the thirteenth centuries, looking at the relationship between changes in the agrarian and urban economies of the area and their connections to the expanding role of domestic and foreign trade. It provides a previously unexplored perspective on the role of commercialized production and trade in a regional economy in the premodern era and demonstrates that trade was able to drive change in a premodern economy in a way that has not generally been recognized.

Download this book!

Free Ebooks Download

Globalization and National Financial Systems (World Bank Publication)



Globalization and National Financial Systems (World Bank Publication)
James A. Hanson,Patrick Honohan,Giovanni Majnoni | 2003-03-19 00:00:00 | A World Bank Publication | 294 | Economics
Finance is a key dimension of globalization, given the ease with which capital flows between countries and the impact such flows can have on countries with weak national financial systems.. Yet analysts and policy-makers often remain focused on the domestic financial market until a crisis, seemingly still thinking of finance as primarily national. The result is that they behave reactively and often belatedly to the pressures from abroad.

Globalization and National Financial Systems breaks new ground by exploring the new challenges, constraints, and opportunities presented to the national financial systems of developing countries, all of which are small when viewed against the background of global finance. Banking, securities, contractual savings, as well as systemic macroeconomic aspects are all considered.

In its discussion of such dimensions as creeping dollarization, offshore deposits, foreign bank entry, international outsourcing of financial services, the role of economies of scale and international risk diversification, and the emergence of an international regulatory framework, the volume takes the reader far beyond standard treatments of financial policy.

It is an excellent resource for banking and investment professionals, economists, and all those interested in globalization and emerging economies.

Download this book!

Free Ebooks Download


Lamps from the Athenian Agora (Excavations of the Athenian Agora Picture Books, No. 9)



Lamps from the Athenian Agora (Excavations of the Athenian Agora Picture Books, No. 9)
Judith Perlzweig | 1964-11-21 00:00:00 | American School of Classical Studies | 32 | Social Science
At night, the darkness of the ancient Agora would have been pierced by the lights of oil lamps, and thousands of fragments of these distinctive objects have been found. This booklet shows the development of different styles and includes a very useful identification guide. The author discusses the manufacture of lamps, a major industry with over 50 known Athenian workshops in the 3rd and 4th Centuries AD. She also provides illustrations of particularly fine examples, including ornate festival lamps with many nozzles and bizarre shapes.

Download this book!

Free Ebooks Download

Office Practice of Neurology



Office Practice of Neurology
Martin Allen Samuels MD DSc(hon) FAAN MACP,Steve K. Feske MD | 2003-03-25 00:00:00 | Churchill Livingstone | 1536 | Internal Medicine
This title's practical and applicable information makes it a perfect clinical resource for the practicing neurologist. It focuses on common problems and chronic problems that require long-term management, and it provides guidelines and pathways through the decision-making process that prove invaluable in practice. With an expanded section on multiple sclerosis, updated and revised information in nearly every section, and decision-approach summary tables at the beginning of every chapter, the second edition promises to stay in the limelight as the definitive text for neurologists and internists in the outpatient setting.
Reviews
Excellent guide book for neurological practitioner. Simple and systematic description in every chapter and many chapters dealing with numerous clinical topics. But weak index because this is the 1st Ed.

Download this book!

Free Ebooks Download

Point-to-set Maps and Mathematical Programming (Mathematical programming study)



Point-to-set Maps and Mathematical Programming (Mathematical programming study)
P. Huard | 1900-01-01 00:00:00 | Elsevier Science Ltd | 198 | Mathematics

Download this book!

Free Ebooks Download

The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall



The Book of PF: A No-Nonsense Guide to the OpenBSD Firewall
| 2008-01-11 00:00:00 | | 0 | Operating System


OpenBSD's stateful packet filter, PF, offers an amazing feature set and support across the major BSD platforms. Like most firewall software though, unlocking PF's full potential takes a good teacher. Peter N.M. Hansteen's PF website and conference tutorials have helped thousands of users build the networks they need using PF. The Book of PF is the product of Hansteen's knowledge and experience, teaching good practices as well as bare facts and software options. Throughout the book, Hansteen emphasizes the importance of staying in control by having a written network specification, using macros to make rule sets more readable, and performing rigid testing when loading in new rules.

Today's system administrators face increasing challenges in the quest for network quality, and The Book of PF can help by demystifying the tools of modern *BSD network defense. But, perhaps more importantly, because we know you like to tinker, The Book of PF tackles a broad range of topics that will stimulate your mind and pad your resume, including how to: Create rule sets for all kinds of network traffic, whether it is crossing a simple home LAN, hiding behind NAT, traversing DMZs, or spanning bridges Use PF to create a wireless access point, and lock it down tight with authpf and special access restrictions Maximize availability by using redirection rules for load balancing and CARP for failover Use tables for proactive defense against would-be attackers and spammers Set up queues and traffic shaping with ALTQ, so your network stays responsive Master your logs with monitoring and visualization, because you can never be too paranoid

The Book of PF is written for BSD enthusiasts and network admins at any level of expertise. With more and more services placing high demands on bandwidth and increasing hostility coming from the Internet at-large, you can never be too skilled with PF.



User review
Weak. Really weak.
This book, unfirtunately, is not much more than a mix of manuals and well-known HowTo's spread over Internet. I could as well print them to have them at hand.


Printed on thinner paper, with less intervals, it could also save some space.


Overall: the book looks bigger and smarter than it reads.

User review
Could be a little better
I was used to using IPTables in Linux, so making a transition to PF was a little of a struggle for me. This book was very helpful for getting me started, but I wish it had more examples on how to complete various situations. A couple of times I had to Google my questions to complete my firewall config.

User review
Well written, but light in much of its coverage
Hansteen has put together a mostly well written, OS-independent guide to PF. He states he `made a conscious decision early on to introduce you to its methods via interesting and useful configurations, rather than make this book the complete reference`, and I feel this book mostly accomplishes that goal. He points to the man pages as the complete reference, though I disagree on that to some extent, as they lack detailed coverage and practical usage examples in some areas.


There is no introductory coverage of any of the BSDs, which is fine for the scope of the book and those topics are already well covered elsewhere, but don't expect to pick this up and get anywhere with it if you have no prior BSD experience. You'll first need to seek resources on your BSD of choice and have a decent understanding of the OS. Basic networking knowledge is also a prerequisite.


There are some areas that are covered very minimally, to the extent that without seeking additional material, you will likely have difficulty with your implementation unless it is very basic. I agree with most of the complaints noted in Betjlich's review. Given the stated scope of the book, I'm not quite as critical. I do think the stated scope is too limited though.


This book is adequate if you want to get up and running with a basic configuration. Anything more complex will leave you seeking additional resources.


I think this is a worthwhile read if you want to setup a PF firewall, and understand the limits of a book that comes in at 134 pages excluding the appendices. The second edition could be much better though.



User review
A very accessible book on OpenBSD's PF firewall
If you're looking for information about the OpenBSD packet filter program `pf`, you may have noticed a gaping hole on bookstore shelves. Two books that I have read on pf are `Building Firewalls with OpenBSD and PF, 2nd Edition` by Jacek Artymiak and the No Starch Press title, `The Book of PF`, by Peter N.M. Hansteen.


`The Book of PF` is by far the easier of the two books to digest and will help you get up to speed very quickly. It's a short book, weighing in at 145 pages. The example rule sets are simple to follow and very thoroughly documented.


Hansteen helps you navigate through pf's basic configuration and then takes you through more advanced topics like wireless networks and how to deal with 'bigger or trickier networks'. There is also a treatment of OpenBSD's spamd program, designed to help you combat spam on your network.


You'll find a chapter on Alternate Queuing (ALTQ) and Common Address Redundancy Protocol (CARP). ALTQ provides a way to shape the traffic on your network and was integrated into pf for the OpenBSD 3.3 release. CARP was added to OpenBSD in release 3.5 to address the issue of high availability and uninterrupted service.


A chapter covering Logging, Monitoring, and Statistics helps bring it all together for the network administrator. Hansteen closes out the text with a chapter titled `Getting Your Setup Just Right` that provides a last-minute review of some of the most important configuration options.


If you're interested in `The Book of PF`, most likely you're already familiar with OpenBSD - one of the most secure operating systems available today. If you're ready to enhance OpenBSD's default security, pick up a copy of this book and spend some time with the pf program.

User review
The Defacto Book on OpenBSD firewalls
This book is great for all types of OpenBSD users. If you just want a to build a home router with better performance and more control, then this book is all you'll need. If you're looking to build an enterprise load balancer, this book is an excellent resource that you'd be hard pressed to live with out.


Download this book!

Free Ebooks Download

Electronic Government Strategies and Implementation



Electronic Government Strategies and Implementation
Wayne Huang, Keng Siau, Kwok Kee Wei, Keng Siau | 2005-03-22 00:00:00 | Idea Group Publishing | 300 | Computer Science
Digital government is a new frontier of the development of electronic commerce. Electronic Government Strategies and Implementation is a timely piece to address the issues involved in strategically implementing digital government, which is a collection of high-quality papers that covers the various aspects of digital government strategic issues and implementations from the perspectives of both developed and developing countries. Most published articles and/or papers on eGovernment implementation strategies, if not all, are based upon experience of developed countries, rather than developing countries. This book combines eGovernment implementation experiences from both developed and developing countries, and is useful to researchers and practitioners in the area as well as instructors teaching courses related to digital government and/or electronic commerce.
Download this book!

Free Ebooks Download

Advances in Digital Forensics III (IFIP International Federation for Information Processing) (IFIP Advances in Information and Communication Technology)



Advances in Digital Forensics III (IFIP International Federation for Information Processing) (IFIP Advances in Information and Communication Technology)
Philip Craiger | 2007-08-23 00:00:00 | Springer | 378 | Digital Law

ADVANCES IN DIGITAL FORENSICS III

Edited by: Philip Craiger and Sujeet Shenoi

Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Networked computing, wireless communications and portable electronic devices have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence. Digital forensics also has myriad intelligence applications. Furthermore, it has a vital role in information assurance -- investigations of security breaches yield valuable information that can be used to design more secure systems.

Advances in Digital Forensics III describes original research results and innovative applications in the emerging discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include:

- Legal Issues

- Insider Threat Detection

- Rootkit Detection

- Authorship Attribution

- Forensic Techniques

- File System Forensics

- Network Forensics

- Portable Electronic Device Forensics

- Evidence Analysis and Management

- Formal Methods

This book is the third volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of twenty-four edited papers from the Third Annual IFIP WG 11.9 Conference on Digital Forensics, held at the National Center for Forensic Science, Orlando, Florida, USA in the spring of 2007.

Advances in Digital Forensics III is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities.



Download this book!

Free Ebooks Download

Asthma in the Workplace, Second Edition, (Clinical Allergy and Immunology)



Asthma in the Workplace, Second Edition, (Clinical Allergy and Immunology)
David Bernstein | 1999-06-15 00:00:00 | Informa Healthcare | 742 | Popular Economics
Univ. of Cincinnati, OH. Research for occupational medicine physicians, epidemiologists, and respiratory medicine physicians. Includes all aspects of occupational asthma, including disease mechanisms, clinical diagnosis and treatment, and categories of causative agents. Previous edition: c1993.

Download this book!

Free Ebooks Download

Beautiful Security: Leading Security Experts Explain How They Think



Beautiful Security: Leading Security Experts Explain How They Think
| 2009-05-06 00:00:00 | | 0 | Computer Security


In this thought-provoking anthology, today's security experts describe bold and extraordinary methods used to secure computer systems in the face of ever-increasing threats. Beautiful Security features a collection of essays and insightful analyses by leaders such as Ben Edelman, Grant Geyer, John McManus, and a dozen others who have found unusual solutions for writing secure code, designing secure applications, addressing modern challenges such as wireless security and Internet vulnerabilities, and much more. Among the book's wide-ranging topics, you'll learn how new and more aggressive security measures work--and where they will lead us. Topics include: Rewiring the expectations and assumptions of organizations regarding security
Security as a design requirement
Evolution and new projects in Web of Trust
Legal sanctions to enforce security precautions
An encryption/hash system for protecting user data
The criminal economy for stolen information
Detecting attacks through context

Go beyond the headlines, hype, and hearsay. With Beautiful Security, you'll delve into the techniques, technology, ethics, and laws at the center of the biggest revolution in the history of network security. It's a useful and far-reaching discussion you can't afford to miss.



User review
A solid set of case histories and examples of how to build better security measures
BEAUTIFUL SECURITY: LEADING SECURITY EXPERTS EXPLAIN HOW THEY THINK provides a collection of essays on digital security and comes from experts who explain how social networking and other popular trends hurt online security efforts - and how to design new networks around these trends. Analysis of criminal attempts and logic patterns offer network security libraries a solid set of case histories and examples of how to build better security measures. Highly recommended.



User review
Well-written with broad coverage of a critical topic
Like O'Reilly's Beautiful Teams, this book's a series of essays by industry experts, this time focused on security. The various authors do a great job of covering topics from social engineering to forcing firms to focus on security. The chapters are all well-written, although a few do better jobs of keeping the material interesting and flowing.


You'll find plenty of security-related history in the book. Phil Zimmerman's chapter on PGP's Web Of Trust is one example. Pieter Zatko's discussion of his work on the LH0phtCrack is another. Both stories help expose mindsets which, sadly, haven't changed a whole lot.


Security, as with testing or overall quality, is at its most fundamental roots a culture issue. Not every story focuses on this aspect, but pointing out bad culture is a common theme through many of the chapters. Zatko's discussion of `Learned Helplessness,` John McManus's Security by Design, and Jim Routh's Forcing Firms to Focus are all great reads on this line. Many of the stories correctly emphasize that security isn't just about someone hacking code - it's a much broader issue.


As with any good security book, there's plenty of well-done content which will likely scare you in to re-thinking how you and your company approach security. Beautiful Security can help you identify practices, problems, and mindsets which leave you, your company, or your clients at risk.


Overall it's a very useful, highly readable book on a critical subject.

User review
A Resilient Text
Beautiful Security goes well beyond the confines of traditional security books that dive into technical minutia and bore you to tears. Yes there is technical jargon to be seen throughout, but the real hook to this collection of ideas and best practices is the thinking and logic the various contributors gracefully convey through the pages within. A section that spoke about an issue on my desk at the moment was the Improving Perspective with Host Logging - specifically the section regarding building a more resilient detection model.

User review
An eye-opening book that will challenge you
Books that collect chapters from numerous expert authors often fail to do more than be a collection of disjointed ideas. Simply combining expert essays does not always make for an interesting, cohesive read. Beautiful Security: Leading Security Experts Explain How They Think is an exception to that and is definitely worth a read. The books 16 chapters provide an interesting overview to the current and future states of security, risk and privacy. Each chapter is written by an established expert in the field and each author brings their own unique insights and approach to information security.


A premise of the book is that most people don't give security much attention until their personal or business systems are attacked or breached. The book notes that criminals often succeed by exercising enormous creativity when devising their attacks. They think outside of the box which the security people built to keep them out. Those who create defenses around digital assets must similarly use creativity when designing an information security solution.


Unfortunately, far too few organizations spend enough time thinking creatively about security. More often than not, it is simply about deploying a firewall and hoping the understaffed security team can deal with the rest of the risks.


The 16 essays, arranged in no particular theme are meant to show how fascinating information security can be. This is in defense to how security is often perceived, as an endless series of dialogue boxes and warnings, or some other block to keep a user from the web site or device they want to access. Each of the 16 essays is well-written, organized and well-argued. The following 4 chapter are particularly noteworthy.


Chapter 3 is titled Beautiful Security Metrics and details how security metrics can be effectively used, rather than simply being a vehicle for creating random statistics for management. Security metrics are a critical prerequisite for turning IT security into a science, instead of an art. With that, author Elizabeth Nichols notes that the security profession needs to change in ways that emulate the medical professional when it comes to metrics. She notes specifically that security must develop a system of vital signs and generally accepted metrics in the same way in which physicians work. The chapter also provides excellent insights on how to use metrics and how metrics, in addition to high-level questions that can be used to determine how effective security is within an organization.


Chapter 6 deals with online-advertising and the myriad problems in keeping it honest. Author Benjamin Edelman observed a problem with the online supply chain world, as opposed to brick and mortar (BAM) world, in that BAM companies have long-established procurement departments with robust internal controls, and carefully trained staff who evaluate prospective vendors to confirm legitimacy. In the online world, predominantly around Google AdSense, most advertisers and advertising networks lack any comparable rigor for evaluating their vendors. That has created a significant avenue for online advertising fraud, of which the on-line advertising is a victim to.


Edelman writes that he has uncovered hundreds of online advertising scams defrauding hundreds of thousands of users, in addition to the merchants themselves. The chapter details many of the deceptive advertisements that he has found, and shows how often web ads that tout something for free, is most often far from it.


Chapter 7 is about the PGP and the evolution of the PGP web of trust scheme. The chapter is written by PGP creator Phil Zimmerman, and current PGP CTO Jon Callas. It has been a long while since Zimmerman has written anything authoritative about PGP, so the chapter is a welcome one. Zimmerman and Callas note that while a lot has been written about PGP, much of it though containing substantial inaccuracies. The chapter provides invaluable insights into PGP and the history and use of cryptography. It also gives a thorough overview of the original PGP web of trust model, and recent enhancements bring PGP's web of trust up to date.


Chapter 9 is one of the standout chapters in the book. Mark Curphrey writes about the need to get people, processes and technology to work together so that the humans involved in information security can make better decisions. In the chapter, Curphrey deals with topical issues such as cloud computing, social networks, security economics and more. Curphrey notes that when he starts giving a presentation, he does it with the following quotation from Upton Sinclair -- `it's difficult to get a man to understand something when his salary depends on him not understanding it`. He uses the quote to challenge listeners (and readers in this case) to question the reason why they are being presented the specific ideas, which serves as a reminder of common, subtle biases for thoughts and ideas presented as fact.


In its 250 pages, Beautiful Security is both a fascinating an enjoyable read. There are numerous security books that weight a few pounds a use reams of paper, that don't have a fraction of the real content that Beautiful Security has. With other chapters from industry luminaries such as Jim Routh, Randy Sabett, Anton Chuvakin and others, Beautiful Security is a required read.


For those that have an interest in information security or those that are frustrated by it, Beautiful Security is an eye-opening book that will challenge you, and change the way you think about information security. It is a good book for those whose who think information security is simply about deploying hardware, and an even better book for those who truly get information security.

User review
Beautiful Security is Timely, Important and Readable
Beautiful Security is full of pertinent information for all of us. The book is well written, covers topics we need to know about, is very readable. Start with the first entry by Mudge: his perspective is accurate and revealing and of course he writes well so enjoy the new insights you gain by reading this book. Highly recommended.


Download this book!

Free Ebooks Download

Raising Girls



Raising Girls
Melissa Trevathan,Sissy Goff | 2007-05-01 00:00:00 | Zondervan | 256 | Inspirational
'My six-year-old fusses with her hair for hours. Is this normal?' 'Yesterday my seventh grader was all sunshine. Today she's wearing black and won't leave her room.' 'I'm worried my teenager may have an eating disorder.' In today's complex world, parenting a girl is harder than ever. It takes more than love. It takes insight into the things that make your daughter tick as she grows from childhood to young adulthood. Drawing on the authors' fifty-plus years of combined counseling experience, Raising Girls takes you inside the mind and soul of your girl. You'll obtain seasoned, expert insights on * Your daughter's different stages of development from ages zero to nineteen * How you can effectively relate to her at each stage * What is normal behavior, what isn't, and when and how to intervene * How to deal with self-destructive behavior such as eating disorders, cutting, or experimentation with alcohol * ... and much more Spiced with stories, humor, and much reassurance, Raising Girls will help you encourage your daughter, challenge her, love her, and help her discover who God is creating her to be.
Reviews
A book by Melissa Trevathan and Sissy Goff, this book is the one Amazon recommended to me as a complimentary book to "Wild Things: the Art of Nurturing Boys".

When I started reading this book, I was surprised and glad to see what a Christian focus it took - there was no trying to be sly about Christianity in this book. But, I was dismayed when I read that book authors were older women who were counselors and yet had never been married and never had children. I wondered how I could take their advice seriously, when I would be able to write off everything they said with the old, "Well, they've never lived this out. and they don't know what it's really like outside of the clinical environment." However, I came to repent of that attitude as I realised that they actually had an objective voice (or voices) that I did respect. Moms can tend to view, or skew things in a way that is biased by their own experiences; but these women didn't have that at all.

That being said, I think overall it was a helpful book - but a lot lighter fare than "Wild Things: the Art of Nurturing Boys". Although the authors spoke more about being a Christian parent; they also tended to tell a lot of stories and spend time on what I might call "fluff".

It does go into all the relationships in a girls life: her and her mother, her and her father, her and her siblings, her and her grandparents, etc.. And I think the descriptions of the different developmental stages were pretty accurate. So, the book does get my recommendation - just be aware that there is some "fluff" and that the authors are not parents.
Reviews
This book has nice insights on raising girls. I would have liked to have a little more discussion on the ages and stages, though. The chapters are a little short and I found myself wanting a little more...
Reviews
I am loving this book on raising girls -the authors speak with love and wisdom and experience! I appreciate that they are coming from a different perspective than just that of parents, but as counselors, who really know what girls today are going through.
Reviews
Sissy Goff and Melissa Trevathan have crafted such a wonderful book with priceless insight and wisdom. If you have a daughter, niece or special little girl in your life Raising Girls is a must to equip you with knowledge and skills to raise a great girl in today's world!

Susan Johnston, co-author of Princess Bubble
Reviews
This is a very thoughtful look at the problems and joys of raising girls. The authors are clearly very knowledgable and committed to helping girls to grow up to be who they were meant to be, secure in God's love and their place in the great scheme of things! I love the way they use case histories & stories to teach. As a mother of 3 girls, I found this book very straightforward in dealing with the issues that young girls and adolescents face, but also helpful and encouraging.

Download this book!

Free Ebooks Download