30 free programming eBooks « citizen428.blog() Since this post got quite popular I decided to incorporate some of the excellent suggestions posted in the comments, so this list now has more than 50 books in it. BTW: I’m not very strict on the definition of “ebook”, some of them are really just HTML versions of books. [UPDATED: 2012-01-18] Learning a new programming language always is fun and there are many great books legally available for free online. Here’s a selection of 30 of them:
Today I Am Releasing Ten Million Passwords Frequently I get requests from students and security researchers to get a copy of my password research data. I typically decline to share the passwords but for quite some time I have wanted to provide a clean set of data to share with the world. A carefully-selected set of data provides great insight into user behavior and is valuable for furthering password security. So I built a data set of ten million usernames and passwords that I am releasing to the public domain. But recent events have made me question the prudence of releasing this information, even for research purposes. How Apple and Amazon Security Flaws Led to My Epic Hacking In the space of one hour, my entire digital life was destroyed. First my Google account was taken over, then deleted. Next my Twitter account was compromised, and used as a platform to broadcast racist and homophobic messages. And worst of all, my AppleID account was broken into, and my hackers used it to remotely erase all of the data on my iPhone, iPad, and MacBook. In many ways, this was all my fault.
Securely connect your Android smartphone via VPN Deb Shinder explains how you can use a VPN to connect your Android smartphone to your home or work network. You know the old saying: "You can't take it with you." Well, you can, but often you don't. When you're out on the road with nothing but your phone and desperately need access to a document that's stored on your computer at home or at work, what do you do? Because a modern smartphone is really just a small computer, you can securely connect to your home LAN or company network over a VPN connection. Let's take a look at how you can do this with popular Android phones.
Sparse coding Mammalian brains consist of billions of neurons, each capable of independent electrical activity. Information in the brain is represented by the pattern of activation of this large neural population, forming a neural code. The neural code defines what pattern of neural activity corresponds to each represented information item. In the sensory system, such items may indicate the presence of a stimulus object or the value of some stimulus parameter, assuming that each time this item is represented the neural activity pattern will be the same or at least similar. One important and relatively simple property of this code is the fraction of neurons that are strongly active at any one time.
Password Haystacks: How Well Hidden is Your Needle? ... and how well hidden is YOUR needle? Every password you use can be thought of as a needle hiding in a haystack. After all searches of common passwords and dictionaries have failed, an attacker must resort to a “brute force” search – ultimately trying every possible combination of letters, numbers and then symbols until the combination you chose, is discovered. If every possible password is tried, sooner or later yours will be found.
25 Worst Passwords of 2011 Pro tip: choosing "password" as your online password is not a good idea. In fact, unless you're hoping to be an easy target for hackers, it's the worst password you can possibly choose. "Password" ranks first on password management application provider SplashData's annual list of worst internet passwords, which are ordered by how common they are. Security Rule Guidance Material In this section, you will find educational materials to help you learn more about the HIPAA Security Rule and other sources of standards for safeguarding electronic protected health information (e-PHI). Security Rule Educational Paper Series The HIPAA Security Information Series is a group of educational papers which are designed to give HIPAA covered entities insight into the Security Rule and assistance with implementation of the security standards. Security 101 for Covered Entities Administrative Safeguards Physical Safeguards
LGP - 30 PROGRAMMING MANUAL Go to On Line Documents, Go to Go to Antique Computer home page Electronic Computer Royal McBee Corporation Worst passwords of 2014 are just as awful as you can imagine - CNET Few smartwatches have so far resonated with consumers. Apple is trying to drag the entire category into the mainstream with what it calls "the most advanced timepiece ever created." The consumer technology industry has spent the last 18 months hailing wearable devices as the next big thing. But who will want a smartwatch? And, more important, why do you need one?
A brief Sony password analysis So the Sony saga continues. As if the whole thing about 77 million breached PlayStation Network accounts wasn’t bad enough, numerous other security breaches in other Sony services have followed in the ensuing weeks, most recently with SonyPictures.com. As bad guys often like to do, the culprits quickly stood up and put their handiwork on show. This time around it was a group going by the name of LulzSec. Here’s the interesting bit: