Author: Felicity Savage
Publisher: Knights Hill Publishing
ISBN:
Category : Fiction
Languages : en
Pages : 593
Book Description
The epic battle joined in EVER Part One: The War in the Waste continues in the second volume of Felicity Savage's groundbreaking trilogy, The Daemon in the Machine. Fleeing the trap laid for them by the treacherous David Burns, Crispin and Mickey strike out for Okimako, where Mickey is reunited with the family he abandoned to join the Disciples. Crispin struggles to reconcile his apocryphal visions with the political realities of Okimako. Meanwhile, on the far side of the continent, Rae faces the appalling truth about the cult to which she has attached herself. Kirekune is winning the war in the Wraithwaste, but a Significant victory will have terrible consequences for humans and daemons alike.
The Daemon in the Machine
The Demon in the Machine
Author: Paul Davies
Publisher: Penguin UK
ISBN: 0241309603
Category : Science
Languages : en
Pages : 297
Book Description
'A gripping new drama in science ... if you want to understand how the concept of life is changing, read this' Professor Andrew Briggs, University of Oxford When Darwin set out to explain the origin of species, he made no attempt to answer the deeper question: what is life? For generations, scientists have struggled to make sense of this fundamental question. Life really does look like magic: even a humble bacterium accomplishes things so dazzling that no human engineer can match it. And yet, huge advances in molecular biology over the past few decades have served only to deepen the mystery. So can life be explained by known physics and chemistry, or do we need something fundamentally new? In this penetrating and wide-ranging new analysis, world-renowned physicist and science communicator Paul Davies searches for answers in a field so new and fast-moving that it lacks a name, a domain where computing, chemistry, quantum physics and nanotechnology intersect. At the heart of these diverse fields, Davies explains, is the concept of information: a quantity with the power to unify biology with physics, transform technology and medicine, and even to illuminate the age-old question of whether we are alone in the universe. From life's murky origins to the microscopic engines that run the cells of our bodies, The Demon in the Machine is a breath-taking journey across the landscape of physics, biology, logic and computing. Weaving together cancer and consciousness, two-headed worms and bird navigation, Davies reveals how biological organisms garner and process information to conjure order out of chaos, opening a window on the secret of life itself.
Publisher: Penguin UK
ISBN: 0241309603
Category : Science
Languages : en
Pages : 297
Book Description
'A gripping new drama in science ... if you want to understand how the concept of life is changing, read this' Professor Andrew Briggs, University of Oxford When Darwin set out to explain the origin of species, he made no attempt to answer the deeper question: what is life? For generations, scientists have struggled to make sense of this fundamental question. Life really does look like magic: even a humble bacterium accomplishes things so dazzling that no human engineer can match it. And yet, huge advances in molecular biology over the past few decades have served only to deepen the mystery. So can life be explained by known physics and chemistry, or do we need something fundamentally new? In this penetrating and wide-ranging new analysis, world-renowned physicist and science communicator Paul Davies searches for answers in a field so new and fast-moving that it lacks a name, a domain where computing, chemistry, quantum physics and nanotechnology intersect. At the heart of these diverse fields, Davies explains, is the concept of information: a quantity with the power to unify biology with physics, transform technology and medicine, and even to illuminate the age-old question of whether we are alone in the universe. From life's murky origins to the microscopic engines that run the cells of our bodies, The Demon in the Machine is a breath-taking journey across the landscape of physics, biology, logic and computing. Weaving together cancer and consciousness, two-headed worms and bird navigation, Davies reveals how biological organisms garner and process information to conjure order out of chaos, opening a window on the secret of life itself.
Daemon
Author: Daniel Suarez
Publisher: Penguin
ISBN: 1101007516
Category : Fiction
Languages : en
Pages : 482
Book Description
Daniel Suarez’s New York Times bestselling debut high-tech thriller is “so frightening even the government has taken note” (Entertainment Weekly). Daemons: computer programs that silently run in the background, waiting for a specific event or time to execute. They power almost every service. They make our networked world possible. But they also make it vulnerable... When the obituary of legendary computer game architect Matthew Sobol appears online, a previously dormant daemon activates, initiating a chain of events that begins to unravel our interconnected world. This daemon reads news headlines, recruits human followers, and orders assassinations. With Sobol’s secrets buried with him, and as new layers of his daemon are unleashed, it’s up to Detective Peter Sebeck to stop a self-replicating virtual killer before it achieves its ultimate purpose—one that goes far beyond anything Sebeck could have imagined...
Publisher: Penguin
ISBN: 1101007516
Category : Fiction
Languages : en
Pages : 482
Book Description
Daniel Suarez’s New York Times bestselling debut high-tech thriller is “so frightening even the government has taken note” (Entertainment Weekly). Daemons: computer programs that silently run in the background, waiting for a specific event or time to execute. They power almost every service. They make our networked world possible. But they also make it vulnerable... When the obituary of legendary computer game architect Matthew Sobol appears online, a previously dormant daemon activates, initiating a chain of events that begins to unravel our interconnected world. This daemon reads news headlines, recruits human followers, and orders assassinations. With Sobol’s secrets buried with him, and as new layers of his daemon are unleashed, it’s up to Detective Peter Sebeck to stop a self-replicating virtual killer before it achieves its ultimate purpose—one that goes far beyond anything Sebeck could have imagined...
Through the Daemon's Gate
Author: Dean Swinford
Publisher: Routledge
ISBN: 1135515603
Category : History
Languages : en
Pages : 240
Book Description
This book tells the story of the early modern astronomer Johannes Kepler’s Somnium, which has been regarded by science historians and literary critics alike as the first true example of science fiction. Kepler began writing his complex and heavily-footnoted tale of a fictional Icelandic astronomer as an undergraduate and added to it throughout his life. The Somnium fuses supernatural and scientific models of the cosmos through a satirical defense of Copernicanism that features witches, lunar inhabitants, and a daemon who speaks in the empirical language of modern science. Swinford’s looks at the ways that Kepler’s Somnium is influenced by the cosmic dream, a literary genre that enjoyed considerable popularity among medieval authors, including Geoffrey Chaucer, Dante, John of Salisbury, Macrobius, and Alan of Lille. He examines the generic conventions of the cosmic dream, also studying the poetic and theological sensibilities underlying the categories of dreams formulated by Macrobius and Artemidorus that were widely used to interpret specific symbols in dreams and to assess their overall reliability. Swinford develops a key claim about the form of the Somnium as it relates to early science: Kepler relies on a genre that is closely connected to a Ptolemaic, or earth-centered, model of the cosmos as a way of explaining and justifying a model of the cosmos that does not posit the same connections between the individual and the divine that are so important for the Ptolemaic model. In effect, Kepler uses the cosmic dream to describe a universe that cannot lay claim to the same correspondences between an individual’s dream and the order of the cosmos understood within the rules of the genre itself. To that end, Kepler’s Somnium is the first example of science fiction, but the last example of Neoplatonic allegory.
Publisher: Routledge
ISBN: 1135515603
Category : History
Languages : en
Pages : 240
Book Description
This book tells the story of the early modern astronomer Johannes Kepler’s Somnium, which has been regarded by science historians and literary critics alike as the first true example of science fiction. Kepler began writing his complex and heavily-footnoted tale of a fictional Icelandic astronomer as an undergraduate and added to it throughout his life. The Somnium fuses supernatural and scientific models of the cosmos through a satirical defense of Copernicanism that features witches, lunar inhabitants, and a daemon who speaks in the empirical language of modern science. Swinford’s looks at the ways that Kepler’s Somnium is influenced by the cosmic dream, a literary genre that enjoyed considerable popularity among medieval authors, including Geoffrey Chaucer, Dante, John of Salisbury, Macrobius, and Alan of Lille. He examines the generic conventions of the cosmic dream, also studying the poetic and theological sensibilities underlying the categories of dreams formulated by Macrobius and Artemidorus that were widely used to interpret specific symbols in dreams and to assess their overall reliability. Swinford develops a key claim about the form of the Somnium as it relates to early science: Kepler relies on a genre that is closely connected to a Ptolemaic, or earth-centered, model of the cosmos as a way of explaining and justifying a model of the cosmos that does not posit the same connections between the individual and the divine that are so important for the Ptolemaic model. In effect, Kepler uses the cosmic dream to describe a universe that cannot lay claim to the same correspondences between an individual’s dream and the order of the cosmos understood within the rules of the genre itself. To that end, Kepler’s Somnium is the first example of science fiction, but the last example of Neoplatonic allegory.
The Armour of Contempt
Author: Dan Abnett
Publisher: Games Workshop
ISBN: 9781844164028
Category : Fiction
Languages : en
Pages : 0
Book Description
Fantasy-roman.
Publisher: Games Workshop
ISBN: 9781844164028
Category : Fiction
Languages : en
Pages : 0
Book Description
Fantasy-roman.
Author:
Publisher: CRC Press
ISBN: 1135439621
Category :
Languages : en
Pages : 1142
Book Description
Publisher: CRC Press
ISBN: 1135439621
Category :
Languages : en
Pages : 1142
Book Description
A Guide to Kernel Exploitation
Author: Enrico Perla
Publisher: Elsevier
ISBN: 1597494879
Category : Computers
Languages : en
Pages : 466
Book Description
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold. - Covers a range of operating system families — UNIX derivatives, Mac OS X, Windows - Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions - Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
Publisher: Elsevier
ISBN: 1597494879
Category : Computers
Languages : en
Pages : 466
Book Description
A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows. Concepts and tactics are presented categorically so that even when a specifically detailed vulnerability has been patched, the foundational information provided will help hackers in writing a newer, better attack; or help pen testers, auditors, and the like develop a more concrete design and defensive structure.The book is organized into four parts. Part I introduces the kernel and sets out the theoretical basis on which to build the rest of the book. Part II focuses on different operating systems and describes exploits for them that target various bug classes. Part III on remote kernel exploitation analyzes the effects of the remote scenario and presents new techniques to target remote issues. It includes a step-by-step analysis of the development of a reliable, one-shot, remote exploit for a real vulnerabilitya bug affecting the SCTP subsystem found in the Linux kernel. Finally, Part IV wraps up the analysis on kernel exploitation and looks at what the future may hold. - Covers a range of operating system families — UNIX derivatives, Mac OS X, Windows - Details common scenarios such as generic memory corruption (stack overflow, heap overflow, etc.) issues, logical bugs and race conditions - Delivers the reader from user-land exploitation to the world of kernel-land (OS) exploits/attacks, with a particular focus on the steps that lead to the creation of successful techniques, in order to give to the reader something more than just a set of tricks
Hadoop: The Definitive Guide
Author: Tom White
Publisher: "O'Reilly Media, Inc."
ISBN: 1449311520
Category : Computers
Languages : en
Pages : 687
Book Description
With the latest edition of this comprehensive resource, readers will learn how to use Apache Hadoop to build and maintain reliable, scalable, distributed systems. Ideal for programmers and administrators wanting to set up and analyze datasets of any size.
Publisher: "O'Reilly Media, Inc."
ISBN: 1449311520
Category : Computers
Languages : en
Pages : 687
Book Description
With the latest edition of this comprehensive resource, readers will learn how to use Apache Hadoop to build and maintain reliable, scalable, distributed systems. Ideal for programmers and administrators wanting to set up and analyze datasets of any size.
Cad Frameworks
Author: Pieter van der Wolf
Publisher: Springer Science & Business Media
ISBN: 1461527686
Category : Technology & Engineering
Languages : en
Pages : 231
Book Description
Since the early 1980s, CAD frameworks have received a great deal of attention, both in the research community and in the commercial arena. It is generally agreed that CAD framework technology promises much: advanced CAD frameworks can turn collections of individual tools into effective and user-friendly design environments. But how can this promise be fulfilled? CAD Frameworks: Principles and Architecture describes the design and construction of CAD frameworks. It presents principles for building integrated design environments and shows how a CAD framework can be based on these principles. It derives the architecture of a CAD framework in a systematic way, using well-defined primitives for representation. This architecture defines how the many different framework sub-topics, ranging from concurrency control to design flow management, relate to each other and come together into an overall system. The origin of this work is the research and development performed in the context of the Nelsis CAD Framework, which has been a working system for well over eight years, gaining functionality while evolving from one release to the next. The principles and concepts presented in this book have been field-tested in the Nelsis CAD Framework. CAD Frameworks: Principles and Architecture is primarily intended for EDA professionals, both in industry and in academia, but is also valuable outside the domain of electronic design. Many of the principles and concepts presented are also applicable to other design-oriented application domains, such as mechanical design or computer-aided software engineering (CASE). It is thus a valuable reference for all those involved in computer-aided design.
Publisher: Springer Science & Business Media
ISBN: 1461527686
Category : Technology & Engineering
Languages : en
Pages : 231
Book Description
Since the early 1980s, CAD frameworks have received a great deal of attention, both in the research community and in the commercial arena. It is generally agreed that CAD framework technology promises much: advanced CAD frameworks can turn collections of individual tools into effective and user-friendly design environments. But how can this promise be fulfilled? CAD Frameworks: Principles and Architecture describes the design and construction of CAD frameworks. It presents principles for building integrated design environments and shows how a CAD framework can be based on these principles. It derives the architecture of a CAD framework in a systematic way, using well-defined primitives for representation. This architecture defines how the many different framework sub-topics, ranging from concurrency control to design flow management, relate to each other and come together into an overall system. The origin of this work is the research and development performed in the context of the Nelsis CAD Framework, which has been a working system for well over eight years, gaining functionality while evolving from one release to the next. The principles and concepts presented in this book have been field-tested in the Nelsis CAD Framework. CAD Frameworks: Principles and Architecture is primarily intended for EDA professionals, both in industry and in academia, but is also valuable outside the domain of electronic design. Many of the principles and concepts presented are also applicable to other design-oriented application domains, such as mechanical design or computer-aided software engineering (CASE). It is thus a valuable reference for all those involved in computer-aided design.
Virtualization for Security
Author: John Hoopes
Publisher: Syngress
ISBN: 0080879357
Category : Computers
Languages : en
Pages : 378
Book Description
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives. Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.About the TechnologiesA sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.Virtualization has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.
Publisher: Syngress
ISBN: 0080879357
Category : Computers
Languages : en
Pages : 378
Book Description
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for intrusion and malware detection, prevention, recovery, and analysis. Taking a practical approach in a growing market underserved by books, this hands-on title is the first to combine in one place the most important and sought-after uses of virtualization for enhanced security, including sandboxing, disaster recovery and high availability, forensic analysis, and honeypotting.Already gaining buzz and traction in actual usage at an impressive rate, Gartner research indicates that virtualization will be the most significant trend in IT infrastructure and operations over the next four years. A recent report by IT research firm IDC predicts the virtualization services market will grow from $5.5 billion in 2006 to $11.7 billion in 2011. With this growth in adoption, becoming increasingly common even for small and midsize businesses, security is becoming a much more serious concern, both in terms of how to secure virtualization and how virtualization can serve critical security objectives. Titles exist and are on the way to fill the need for securing virtualization, but security professionals do not yet have a book outlining the many security applications of virtualization that will become increasingly important in their job requirements. This book is the first to fill that need, covering tactics such as isolating a virtual environment on the desktop for application testing, creating virtualized storage solutions for immediate disaster recovery and high availability across a network, migrating physical systems to virtual systems for analysis, and creating complete virtual systems to entice hackers and expose potential threats to actual production systems.About the TechnologiesA sandbox is an isolated environment created to run and test applications that might be a security risk. Recovering a compromised system is as easy as restarting the virtual machine to revert to the point before failure. Employing virtualization on actual production systems, rather than just test environments, yields similar benefits for disaster recovery and high availability. While traditional disaster recovery methods require time-consuming reinstallation of the operating system and applications before restoring data, backing up to a virtual machine makes the recovery process much easier, faster, and efficient. The virtual machine can be restored to same physical machine or an entirely different machine if the original machine has experienced irreparable hardware failure. Decreased downtime translates into higher availability of the system and increased productivity in the enterprise.Virtualization has been used for years in the field of forensic analysis, but new tools, techniques, and automation capabilities are making it an increasingly important tool. By means of virtualization, an investigator can create an exact working copy of a physical computer on another machine, including hidden or encrypted partitions, without altering any data, allowing complete access for analysis. The investigator can also take a live ?snapshot? to review or freeze the target computer at any point in time, before an attacker has a chance to cover his tracks or inflict further damage.