|
Showing 1 - 15 of
15 matches in All Departments
Sal Mineo is probably most well-known for his unforgettable,
Academy Award-nominated turn opposite James Dean in "Rebel Without
a Cause" and his tragic murder at the age of thirty-seven. Finally,
in this riveting new biography filled with exclusive, candid
interviews with both Mineo's closest female and male lovers and
never-before-published photographs, Michael Gregg Michaud tells the
full story of this remarkable young actor's life, charting his
meteoric rise to fame and turbulent career and private life.
One of the hottest stars of the 1950s, Mineo grew up as the son of
Sicilian immigrants in a humble Bronx flat. But by age eleven, he
appeared on Broadway in Tennessee Williams's "The Rose Tattoo, "
and then as Prince Chulalongkorn in the original Broadway
production of "The King and I" starring Yul Brynner and Gertrude
Lawrence. This sultry-eyed, dark-haired male ingenue of sorts
appeared on the cover of every major magazine, thousands of
star-struck fans attended his premieres, and millions bought his
records, which included several top-ten hits.
His life offstage was just as exhilarating: full of sports cars,
motor boats, famous friends, and some of the most beautiful young
actresses in Hollywood. But it was fourteen-year-old Jill Haworth,
his costar in "Exodus"--the film that delivered one of the greatest
acting roles of his life and earned him another Academy Award
nomination and a Golden Globe win--with whom he fell in love and
moved to the West Coast. But by the 1960s, a series of professional
missteps and an increasingly tumultuous private life reversed his
fortunes.
By the late sixties and early seventies, grappling with the
repercussions of publicly admitting his homosexuality and
struggling to reinvent himself from an aging teen idol, Mineo
turned toward increasingly self-destructive behavior. Yet his
creative impulses never foundered. He began directing and producing
controversial off-Broadway plays that explored social and sexual
taboos. He also found personal happiness in a relationship with
male actor Courtney Burr. Tragically, on the cusp of turning a new
page in his life, Mineo's life was cut short in a botched robbery.
Revealing a charming, mischievous, creative, and often scandalous
side of Mineo few have known before now, "Sal Mineo" is an
intimate, moving biography of a distinctive Hollywood star.
"From the Hardcover edition."
The new edition of this classic text continues its mission of
describing the application of basic epidemiologic principles in
real time, place, and person to solve problems of an urgent or
emergency nature. Based on decades of experience in both infectious
and noninfectious diseases at the Centers for Disease Control and
Prevention, this book describes in clear and practical terms the
distinct approach, tasks, and actions needed for successful field
investigations. Guidance is given on such issues as how to perform
surveillance, manage and execute field investigatins, collect and
analyze data, perform surveys, adapt a personal computer for field
use, and communicate the findings. Specific advice is also given on
such subjects as dealing with the media; investigations in health
care, day care, and international settings; and the legal aspects
of field studies. An entire chapter covers the proper collection,
handling, and testing of infectious and noninfectious agents in the
field. This edition contains new chapters on environmental
investigations and immunization practices for the field
epidemiologist. The boko is based both on science and experience.
It deals with real problems, real places, and real people: nature's
experiment rather than carefully designed studies in a laboratory
or clinical setting. So, in the lexicon of the epidemiologist, the
book addresses issues relating to observational- not experimental-
epidemiology.
In this best-of-breed study guide, leading experts Michael Gregg
and Omar Santos help you master all the topics you need to know to
succeed on your Certified Ethical Hacker exam and advance your
career in IT security. The authors' concise, focused approach
explains every exam objective from a real-world perspective,
helping you quickly identify weaknesses and retain everything you
need to know. Every feature of this book supports both efficient
exam preparation and long-term mastery: * Opening topics lists
identify the topics you need to learn in each chapter and list
EC-Council's official exam objectives * Key Topics figures, tables,
and lists call attention to the information that's most crucial for
exam success * Exam Preparation Tasks enable you to review key
topics, define key terms, work through scenarios, and answer review
questions...going beyond mere facts to master the concepts that are
crucial to passing the exam and enhancing your career * Key Terms
are listed in each chapter and defined in a complete glossary,
explaining all the field's essential terminology This study guide
helps you master all the topics on the latest CEH exam, including *
Ethical hacking basics * Technical foundations of hacking *
Footprinting and scanning * Enumeration and system hacking * Social
engineering, malware threats, and vulnerability analysis *
Sniffers, session hijacking, and denial of service * Web server
hacking, web applications, and database attacks * Wireless
technologies, mobile security, and mobile attacks * IDS, firewalls,
and honeypots * Cryptographic attacks and defenses * Cloud
computing, IoT, and botnets
An all-star cast of authors analyze the top IT security threats for
2008 as selected by the editors and readers of Infosecurity
Magazine. This book, compiled from the Syngress Security Library,
is an essential reference for any IT professional managing
enterprise security. It serves as an early warning system, allowing
readers to assess vulnerabilities, design protection schemes and
plan for disaster recovery should an attack occur. Topics include
Botnets, Cross Site Scripting Attacks, Social Engineering, Physical
and Logical Convergence, Payment Card Industry (PCI) Data Security
Standards (DSS), Voice over IP (VoIP), and Asterisk Hacking.
Each threat is fully defined, likely vulnerabilities are
identified, and detection and prevention strategies are considered.
Wherever possible, real-world examples are used to illustrate the
threats and tools for specific solutions.
* Provides IT Security Professionals with a first look at likely
new threats to their enterprise
* Includes real-world examples of system intrusions and compromised
data
* Provides techniques and strategies to detect, prevent, and
recover
* Includes coverage of PCI, VoIP, XSS, Asterisk, Social
Engineering, Botnets, and Convergence
In this best-of-breed study guide, leading expert Michael Gregg
helps you master all the topics you need to know to succeed on your
Certified Ethical Hacker Version 9 exam and advance your career in
IT security. Michael's concise, focused approach explains every
exam objective from a real-world perspective, helping you quickly
identify weaknesses and retain everything you need to know. * Every
feature of this book supports both efficient exam preparation and
long-term mastery: * Opening Topics Lists identify the topics you
need to learn in each chapter and list EC-Council's official exam
objectives * Key Topics figures, tables, and lists call attention
to the information that's most crucial for exam success * Exam
Preparation Tasks enable you to review key topics, complete memory
tables, define key terms, work through scenarios, and answer review
questions...going beyond mere facts to master the concepts that are
crucial to passing the exam and enhancing your career * Key Terms
are listed in each chapter and defined in a complete glossary,
explaining all the field's essential terminology This study guide
helps you master all the topics on the latest CEH exam, including *
Ethical hacking basics * Technical foundations of hacking *
Footprinting and scanning * Enumeration and system hacking * Linux
distro's, such as Kali and automated assessment tools * Trojans and
backdoors * Sniffers, session hijacking, and denial of service *
Web server hacking, web applications, and database attacks *
Wireless technologies, mobile security, and mobile attacks * IDS,
firewalls, and honeypots * Buffer overflows, viruses, and worms *
Cryptographic attacks and defenses * Cloud security and social
engineering
The Perfect Reference for the Multitasked SysAdmin
This is the perfect guide if network security tools is not your
specialty. It is the perfect introduction to managing an
infrastructure with freely available, and powerful, Open Source
tools. Learn how to test and audit your systems using products like
Snort and Wireshark and some of the add-ons available for both. In
addition, learn handy techniques for network troubleshooting and
protecting the perimeter.
* Take Inventory
See how taking an inventory of the devices on your network must be
repeated regularly to ensure that the inventory remains
accurate.
* Use Nmap
Learn how Nmap has more features and options than any other free
scanner.
* Implement Firewalls
Use netfilter to perform firewall logic and see how SmoothWall can
turn a PC into a dedicated firewall appliance that is completely
configurable.
* Perform Basic Hardening
Put an IT security policy in place so that you have a concrete set
of standards against which to measure.
* Install and Configure Snort and Wireshark
Explore the feature set of these powerful tools, as well as their
pitfalls and other security considerations.
* Explore Snort Add-Ons
Use tools like Oinkmaster to automatically keep Snort signature
files current.
* Troubleshoot Network Problems
See how to reporting on bandwidth usage and other metrics and to
use data collection methods like sniffing, NetFlow, and SNMP.
* Learn Defensive Monitoring Considerations
See how to define your wireless network boundaries, and monitor to
know if they re being exceeded and watch for unauthorized traffic
on your network.
*Covers the top 10 most popular open source security tools
including Snort, Nessus, Wireshark, Nmap, and Kismet
*Companion Web site contains dozens of working scripts and tools
for readers
*Follows Syngress' proven "How to Cheat" pedagogy providing readers
with everything they need and nothing they don't"
This book looks at network security in a new and refreshing way. It
guides readers step-by-step through the "stack" -- the seven layers
of a network. Each chapter focuses on one layer of the stack along
with the attacks, vulnerabilities, and exploits that can be found
at that layer. The book even includes a chapter on the mythical
eighth layer: The people layer.
This book is designed to offer readers a deeper understanding of
many common vulnerabilities and the ways in which attacker s
exploit, manipulate, misuse, and abuse protocols and applications.
The authors guide the readers through this process by using tools
such as Ethereal (sniffer) and Snort (IDS). The sniffer is used to
help readers understand how the protocols should work and what the
various attacks are doing to break them. IDS is used to demonstrate
the format of specific signatures and provide the reader with the
skills needed to recognize and detect attacks when they occur.
What makes this book unique is that it presents the material in a
layer by layer approach which offers the readers a way to learn
about exploits in a manner similar to which they most likely
originally learned networking. This methodology makes this book a
useful tool to not only security professionals but also for
networking professionals, application programmers, and others. All
of the primary protocols such as IP, ICMP, TCP are discussed but
each from a security perspective. The authors convey the mindset of
the attacker by examining how seemingly small flaws are often the
catalyst of potential threats. The book considers the general kinds
of things that may be monitored that would have alerted users of an
attack.
* Remember being a child and wanting to take something apart, like
a phone, to see how it worked? This book is for you then as it
details how specific hacker tools and techniques accomplish the
things they do.
* This book will not only give you knowledge of security tools but
will provide you the ability to design more robust security
solutions
* Anyone can tell you what a tool does but this book shows you how
the tool works"
|
You may like...
Barbie
Margot Robbie, Ryan Gosling
Blu-ray disc
R256
Discovery Miles 2 560
|