Search results for ""author matthew baker""
Dzanc Books The Sentence
The Sentence is wholly unique: a graphic novel told in the form of a sentence diagram. A single 6732-word sentence, diagrammed in full.Set in a parallel-universe United States in which the government has recently been overthrown by a military coup, the story is narrated by a lonely young grammar professor, Riley, who is suddenly branded a traitor by the new regime. Bewildered by the charges, and fearing a death sentence, Riley manages to flee to an anarchist commune in the wilderness. After a lifetime of feeling alienated, of desperately longing for friendship, Riley is astonished to be accepted and loved by the anarchists—to come to love the anarchists in return. But when the anarchists reveal a plot to assassinate the authoritarian dictator of the country, Riley is forced to choose whether to support the plot—to return to the capital and help the anarchists bomb the headquarters—or to lose their newfound family forever.
£20.69
APress Secure Web Application Development: A Hands-On Guide with Python and Django
Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications.The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.Topics covered include:A framework for deciding what needs to be protected and how stronglyConfiguring services such as databases and web serversSafe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPSSafe REST APIsServer-side attacks and defenses such as injection and cross-site scriptingClient-side attacks and defenses such as cross-site request forgerySecurity techniques such as CORS, CSPPassword management, authentication and authorization, including OAuth2Best practices for dangerous operations such as password change and resetUse of third-party components and supply chain security (Git, CI/CD etc)What You'll Learn Review the defenses that can used to prevent attacks Model risks to better understand what to defend and how Choose appropriate techniques to defend against attacks Implement defenses in Python/Django applications Who This Book Is For Developers who already know how to build web applications but need to know more about security Non-professional software engineers, such as scientists, who must develop web tools and want to make their algorithms available to a wider audience. Engineers and managers who are responsible for their product/company technical security policy
£54.99
Biteback Publishing Smile for the Camera: The Double Life of Cyril Smith
No politician pandered to the media's appetite for personality more than Liberal MP Cyril Smith. Instantly recognisable for his colossal build, Smith was a larger-than-life character in a world of dull grey men. Yet 'Big Cyril' was anything but the roly-poly gentle giant of popular imagination.In November 2012, Rochdale MP Simon Danczuk outed Smith in Parliament as a serial child abuser. Now, in this devastating expose, he describes how Smith used his profile to groom and sexually abuse young boys, frequently in institutions he had helped to establish. His victims, often troubled boys from broken homes, had no voice against their attacker and, though rumours abounded, Smith's appalling crimes went unnoticed by the public and unpunished by the authorities.Smile for the Camera is not just about a terrible abuse of power. It's about those who knew that abuse was taking place but looked the other way, making the corridors of Westminster a safe haven for paedophiles like Cyril Smith.This updated edition of the book that sparked a criminal investigation brings shocking new material to light, asking urgent questions of those who allowed Smith to prey on young children for decades without question
£10.99
Louisiana State University Press Hybrid Creatures: Stories
Hybrid Creatures, Matthew Baker's sharp and innovative collection, follows four very different protagonists as they search for, and struggle with, connection: an amateur hacker attempts to track down his vanished mentor; a math prodigy, the child of divorced parents, struggles with being torn between his two families; a composer takes a spontaneous trip to Nashville while mourning his husband's death and gets trapped on a hotel rooftop with a hipster; and a wayward philosopher accepts a job working for an industrial farming corporation. Through-out, Baker explores the inner dialogue of failed, floundering, and successful bonds between strangers, among family and friends, and even within a person. Pairing the emotional pursuit of connection with multiple forms of communication, Baker weaves the languages of HTML, mathematics, mu-sical notations, and propositional logic into his storytelling in order to unveil nuances of experiences and emotions. This poignant formal invention articulates loneliness, grief, doubt, and comfort in ways that are inaccessible through traditional language alone.In both form and content, Baker captures the complexities of breaking and forming connections with other people, and the various lan-guages we use to navigate this inescapable human need, resulting in a moving exploration of interpersonal bonds.
£18.51
Holy Trinity Publications On the Tree of the Cross: Georges Florovsky and the Patristic Doctrine of Atonement
"Thou hast redeemed us from the curse of the Law by Thy precious Blood. By being nailed to the Cross and pierced with the Spear, Thou hast poured immortality on mankind. O our Saviour, glory to Thee." - Troparion for Holy FridayAtonement is a contested but inescapable term in contemporary English-language theological discussion. The doctrine of atonement has received little attention in Orthodox Christian circles since the work of Fr Georges Florovsky, who labored to clarify and promulgate the Orthodox teaching on atonement on the basis of his theological leitmotifs of neo-patristic synthesis and encounter with the West. Florovsky saw the doctrine of the person of Christ as the key to apprehending the pattern and the unity of God’s redemptive work. Hence he always sought to follow the Church Fathers in weaving together the themes of creation and fall, incarnation and atonement, deification and redemption, liturgy and asceticism, in the variegated yet seamless robe of true theology.The present volume is inspired by Florovsky’s legacy. It is composed of two parts. The first is a collection of papers on atonement by contemporary scholars from a patristic symposium in honor of Florovsky held at Princeton Theological Seminary and Princeton University in 2011. The second part is a collection of writings on atonement by Florovsky himself, including previously unpublished manuscripts and other works otherwise hard to access. This book offers incisive and informed neo-patristic voices to any contemporary discussion of atonement, thus responding to the perennial legacy and task to which Fr Georges Florovsky exhorted Orthodox theological reflection.
£17.99
John Wiley & Sons Inc LTE - The UMTS Long Term Evolution: From Theory to Practice
"Where this book is exceptional is that the reader will not just learn how LTE works but why it works" Adrian Scrase, ETSI Vice-President, International Partnership Projects Following on the success of the first edition, this book is fully updated, covering the latest additions to LTE and the key features of LTE-Advanced. This book builds on the success of its predecessor, offering the same comprehensive system-level understanding built on explanations of the underlying theory, now expanded to include complete coverage of Release 9 and the developing specifications for LTE-Advanced. The book is a collaborative effort of more than 40 key experts representing over 20 companies actively participating in the development of LTE, as well as academia. The book highlights practical implications, illustrates the expected performance, and draws comparisons with the well-known WCDMA/HSPA standards. The authors not only pay special attention to the physical layer, giving an insight into the fundamental concepts of OFDMA-FDMA and MIMO, but also cover the higher protocol layers and system architecture to enable the reader to gain an overall understanding of the system. Key New Features: Comprehensively updated with the latest changes of the LTE Release 8 specifications, including improved coverage of Radio Resource Management RF aspects and performance requirements Provides detailed coverage of the new LTE Release 9 features, including: eMBMS, dual-layer beamforming, user equipment positioning, home eNodeBs / femtocells and pico cells and self-optimizing networks Evaluates the LTE system performance Introduces LTE-Advanced, explaining its context and motivation, as well as the key new features including: carrier aggregation, relaying, high-order MIMO, and Cooperative Multi-Point transmission (CoMP). Includes an accompanying website containing a complete list of acronyms related to LTE and LTE-Advanced, with a brief description of each (http://www.wiley.com/go/sesia_theumts) This book is an invaluable reference for all research and development engineers involved in implementation of LTE or LTE-Advanced, as well as graduate and PhD students in wireless communications. Network operators, service providers and R&D managers will also find this book insightful.
£87.95
Pearson Education (US) Cisco Intersight: A Handbook for Intelligent Cloud Operations
Use Cisco Intersight to streamline, unify, and secure IT operations across data centers, clouds, and the edge The Cisco Intersight cloud operations platform delivers intelligent visualization, optimization, and orchestration for applications and infrastructure across any hybrid cloud environment. Using it, you can operate and maintain traditional infrastructure with the agility of cloud-native infrastructure, as you enhance stability and governance in cloud-native environments. This unique guide shows how to use Intersight to transform heterogeneous IT environments and simplify operations throughout your organization. It has been authored by Cisco insiders with 150+ years of combined experience across every key role associated with enterprise datacenters and cloud technology. The authors cover all facets of Intersight architecture, planning, and administration--from foundational concepts and security to operating infrastructure, servers, networks, storage, virtualization, and workloads--with chapters on Kubernetes, orchestration, programmability, and Infrastructure as Code. Cisco Intersight: A Handbook for Intelligent Cloud Operations is for every IT operator, administrator, manager, and director responsible for operations, programming/automation, information gathering, or monitoring, as well as decision-makers evaluating Intersight or leading implementation. Whatever your role in operating disparate data centers, clouds, and edge environments, Intersight will radically simplify your work--and this guide will help you maximize its value. Understand the platform architecture underlying Intersight's capabilities Establish a cohesive approach to securing all your services Explore Intersight's infrastructure operations capabilities, and integrate with other ops platforms Deploy, configure, operate, and update Cisco UCS servers and network infrastructure Centralize storage management, from Cisco HyperFlex to traditional storage Control virtualized compute infrastructure, on-premises or in the cloud Simplify deployment and management of Kubernetes clusters and service meshes Use Workload Optimization to continually assure performance, minimize cost, and maximize utilization Operationalize repeatable activities across the enterprise Get started with Intersight programmability, learning from easy examples Learn how "code-ifying" infrastructure can improve compliance and reduce risk
£57.77