With more than 25,000 copies sold this new edition is completely updated and revised to include the most bizarre websites to emerge in the last few years.
Following up his hit 505 Unbelievably Stupid Web Pages, Dan Crowley again takes on the Web's weirdest and wildest in 505 Weirdest Online Stores. This is the ultimate guide to the Internet's strangest stores, where you can spend your time and money in pursuit of dehydrated water, duct tape fashion and a corporate hairball. For all those who love eBay but are tired of products that have actual uses, check out these sites: The Childhood Goat Trauma Foundation (www.goat-trauma.org) Political Talking Action Figures (www.prankplace.com/politics.htm) Lunar Land Owner (www.lunarlandowner.com) Air Sickness Bags (www.airsicknessbags.com) Michael Jackson Artwork (www.helenakadlcikova.com/michael_jackson.htm)
These twelve dazzling stories from Chimamanda Ngozi Adichie — the Orange Broadband Prize–winning author of Half of a Yellow Sun — are her most intimate works to date. In these stories Adichie turns her penetrating eye to the ties that bind men and women, parents and children, Nigeria and the United States. In “A Private Experience,” a medical student hides from a violent riot with a poor Muslim woman, and the young mother at the centre of “Imitation” finds her comfortable life in Philadelphia threatened when she learns that her husband has moved his mistress into their Lagos home. Searing and profound, suffused with beauty, sorrow and longing, this collection is a resounding confirmation of Adichie’s prodigious literary powers.
The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test
A Vintage Shorts “Short Story Month” selection from the award-winning, bestselling author Nkem is living a life of wealth and security in America, until she discovers that her husband is keeping a girlfriend back home in Nigeria. In this high-intensity story of passion and the masks we all wear, Chimamanda Ngozi Adichie, author of the acclaimed novels Half of a Yellow Sun and Americanah and winner of the Orange Prize and the National Book Critics Circle Award, explores the ties that bind men and women, parents and children, Africa and the United States. “Imitation” is a selection from Adichie’s collection The Thing Around Your Neck. An eBook short.