Danny is a freelance IT specialist—that is, a hacker. He and his pal Omar are both skilled at parkour, or freerunning, a discipline designed to enable practitioners to travel between any two points regardless of obstacles. This is fortunate, because they're off on an adventure that's filled with obstacles, from locked doors to gangs of hostile pursuers. Together they follow a cryptic clue, find a missing map, figure out how to get to Timbuktu without buying a plane ticket, and join the life-and-death treasure hunt, exchanging wisecracks and solving the puzzle one step at a time.An exotic setting and gripping suspense, as well as an absorbing introduction to parkour, make this thriller a genuine page-turner.
A ruthless treasure hunt takes a boy from London to sub-Saharan Africa in this pacey thriller Long ago in the ancient city of Timbuktu a student pulled off the most daring heist in African history — the theft of 100 million pounds worth of gold. The stolen treasure has remained hidden until now, when teenage hacker Danny Temple discovers a cryptic Arabic manuscript. It’s a good thing Danny is a keen traceur (free runner) because it seems that everyone in London now wants a piece of him. Danny has to run across rooftops and leap from buildings to stay one step ahead of his pursuers. His adrenalin-charged quest leads him to sub-Saharan Africa, and the mysterious cliffs of Bandiagara.
The #1 menace for computer systems worldwide, network hacking can result in mysterious server crashes, data loss, and other problems that are not only costly to fix but difficult to recognize. Author John Chirillo knows how these can be prevented, and in this book he brings to the table the perspective of someone who has been invited to break into the networks of many Fortune 1000 companies in order to evaluate their security policies and conduct security audits. He gets inside every detail of the hacker's world, including how hackers exploit security holes in private and public networks and how network hacking tools work. As a huge value-add, the author is including the first release of a powerful software hack attack tool that can be configured to meet individual customer needs.
Want to identify fiction books that boys in grades three through nine will find irresistible? This guide reveals dozens of worthwhile recommendations in categories ranging from adventure stories and sports novels to horror, humorous, and science fiction books. In Get Those Guys Reading!: Fiction and Series Books that Boys Will Love, authors Kathleen A. Baxter and Marcia A. Kochel provide compelling and current reading suggestions for younger boys—information that educators, librarians, and parents alike are desperate for. Comprising titles that are almost all well-reviewed in at least one major professional journal, or that are such big hits with kids that they've received the "stamp of approval" from the most important reviewers, this book will be invaluable to anyone whose goal is to help boys develop a healthy enthusiasm for reading. It includes chapters on adventure books; animal stories; graphic novels; historical fiction; humorous books; mystery, horror, and suspense titles; science fiction and fantasy; and sports novels. Within each chapter, the selections are further divided into books for younger readers (grades 3–6) and titles for older boys in grades 5–8. Elementary and middle school librarians and teachers, public librarians, Title One teachers, and parents of boys in grades 3–9 will all benefit greatly from having this book at hand.
Kadija is the music-loving daughter of a guardian of the sacred manuscripts of the ancient city of Timbuktu, Mali. Ali is a former shepherd boy, trained as a warrior for Allah. Tonight, the Islamist rebels are coming for Timbuktu. They will install a harsh regime of law and tear apart the peaceful world within the mud walls of the city. Television, football, radios, even music, will be banned. Kadija refuses to let go of her former life. And something in her defiance draws Ali to her. Which path will he choose?
This book delves into a review of current research, active learning strategies, Web courseware, metacognition, strategies for Web discussions, promoting student self-regulation, building interactive Web pages, basic HTML coding, managing Web sites, using databases, automated testing, and security and legal issues. It helps readers pick and choose what aspects of the Web to employ to achieve the greatest student learning gains.
Certified Ethical Hacker (CEH) Exam Cram is the perfect study guide to help you pass the updated CEH Version 11 exam. Its expert real-world approach reflects Dr. Chuck Easttom's expertise as one of the world's leading cybersecurity practitioners and instructors, plus test-taking insights he has gained from teaching CEH preparation courses worldwide. Easttom assumes no prior knowledge: His expert coverage of every exam topic can help readers with little ethical hacking experience to obtain the knowledge to succeed. This guide's extensive preparation tools include topic overviews, exam alerts, CramSavers, CramQuizzes, chapter-ending review questions, author notes and tips, an extensive glossary, and the handy CramSheet tear-out: key facts in an easy-to-review format. (This eBook edition of Certified Ethical Hacker (CEH) Exam Cram does not include access to the companion website with practice exam(s) included with the print or Premium edition.) Certified Ethical Hacker (CEH) Exam Cram helps you master all topics on CEH Exam Version 11: Review the core principles and concepts of ethical hacking Perform key pre-attack tasks, including reconnaissance and footprinting Master enumeration, vulnerability scanning, and vulnerability analysis Learn system hacking methodologies, how to cover your tracks, and more Utilize modern malware threats, including ransomware and financial malware Exploit packet sniffing and social engineering Master denial of service and session hacking attacks, tools, and countermeasures Evade security measures, including IDS, firewalls, and honeypots Hack web servers and applications, and perform SQL injection attacks Compromise wireless and mobile systems, from wireless encryption to recent Android exploits Hack Internet of Things (IoT) and Operational Technology (OT) devices and systems Attack cloud computing systems, misconfigurations, and containers Use cryptanalysis tools and attack cryptographic systems