Search results for ""Author Matthew Baker""
Dzanc Books The Sentence
The Sentence is wholly unique: a graphic novel told in the form of a sentence diagram. A single 6732-word sentence, diagrammed in full.Set in a parallel-universe United States in which the government has recently been overthrown by a military coup, the story is narrated by a lonely young grammar professor, Riley, who is suddenly branded a traitor by the new regime. Bewildered by the charges, and fearing a death sentence, Riley manages to flee to an anarchist commune in the wilderness. After a lifetime of feeling alienated, of desperately longing for friendship, Riley is astonished to be accepted and loved by the anarchists—to come to love the anarchists in return. But when the anarchists reveal a plot to assassinate the authoritarian dictator of the country, Riley is forced to choose whether to support the plot—to return to the capital and help the anarchists bomb the headquarters—or to lose their newfound family forever.
£20.69
APress Secure Web Application Development: A Hands-On Guide with Python and Django
Cyberattacks are becoming more commonplace and the Open Web Application Security Project (OWASP), estimates 94% of sites have flaws in their access control alone. Attacks evolve to work around new defenses, and defenses must evolve to remain effective. Developers need to understand the fundamentals of attacks and defenses in order to comprehend new techniques as they become available. This book teaches you how to write secure web applications.The focus is highlighting how hackers attack applications along with a broad arsenal of defenses. This will enable you to pick appropriate techniques to close vulnerabilities while still providing users with their needed functionality.Topics covered include:A framework for deciding what needs to be protected and how stronglyConfiguring services such as databases and web serversSafe use of HTTP methods such as GET, POST, etc, cookies and use of HTTPSSafe REST APIsServer-side attacks and defenses such as injection and cross-site scriptingClient-side attacks and defenses such as cross-site request forgerySecurity techniques such as CORS, CSPPassword management, authentication and authorization, including OAuth2Best practices for dangerous operations such as password change and resetUse of third-party components and supply chain security (Git, CI/CD etc)What You'll Learn Review the defenses that can used to prevent attacks Model risks to better understand what to defend and how Choose appropriate techniques to defend against attacks Implement defenses in Python/Django applications Who This Book Is For Developers who already know how to build web applications but need to know more about security Non-professional software engineers, such as scientists, who must develop web tools and want to make their algorithms available to a wider audience. Engineers and managers who are responsible for their product/company technical security policy
£51.25
Biteback Publishing Smile for the Camera: The Double Life of Cyril Smith
No politician pandered to the media's appetite for personality more than Liberal MP Cyril Smith. Instantly recognisable for his colossal build, Smith was a larger-than-life character in a world of dull grey men. Yet 'Big Cyril' was anything but the roly-poly gentle giant of popular imagination.In November 2012, Rochdale MP Simon Danczuk outed Smith in Parliament as a serial child abuser. Now, in this devastating expose, he describes how Smith used his profile to groom and sexually abuse young boys, frequently in institutions he had helped to establish. His victims, often troubled boys from broken homes, had no voice against their attacker and, though rumours abounded, Smith's appalling crimes went unnoticed by the public and unpunished by the authorities.Smile for the Camera is not just about a terrible abuse of power. It's about those who knew that abuse was taking place but looked the other way, making the corridors of Westminster a safe haven for paedophiles like Cyril Smith.This updated edition of the book that sparked a criminal investigation brings shocking new material to light, asking urgent questions of those who allowed Smith to prey on young children for decades without question
£10.99
John Wiley & Sons Inc LTE - The UMTS Long Term Evolution: From Theory to Practice
"Where this book is exceptional is that the reader will not just learn how LTE works but why it works" Adrian Scrase, ETSI Vice-President, International Partnership Projects Following on the success of the first edition, this book is fully updated, covering the latest additions to LTE and the key features of LTE-Advanced. This book builds on the success of its predecessor, offering the same comprehensive system-level understanding built on explanations of the underlying theory, now expanded to include complete coverage of Release 9 and the developing specifications for LTE-Advanced. The book is a collaborative effort of more than 40 key experts representing over 20 companies actively participating in the development of LTE, as well as academia. The book highlights practical implications, illustrates the expected performance, and draws comparisons with the well-known WCDMA/HSPA standards. The authors not only pay special attention to the physical layer, giving an insight into the fundamental concepts of OFDMA-FDMA and MIMO, but also cover the higher protocol layers and system architecture to enable the reader to gain an overall understanding of the system. Key New Features: Comprehensively updated with the latest changes of the LTE Release 8 specifications, including improved coverage of Radio Resource Management RF aspects and performance requirements Provides detailed coverage of the new LTE Release 9 features, including: eMBMS, dual-layer beamforming, user equipment positioning, home eNodeBs / femtocells and pico cells and self-optimizing networks Evaluates the LTE system performance Introduces LTE-Advanced, explaining its context and motivation, as well as the key new features including: carrier aggregation, relaying, high-order MIMO, and Cooperative Multi-Point transmission (CoMP). Includes an accompanying website containing a complete list of acronyms related to LTE and LTE-Advanced, with a brief description of each (http://www.wiley.com/go/sesia_theumts) This book is an invaluable reference for all research and development engineers involved in implementation of LTE or LTE-Advanced, as well as graduate and PhD students in wireless communications. Network operators, service providers and R&D managers will also find this book insightful.
£87.95