Publisher: 8

57265
Loading...
EBOOK

Thoreau: wstawaj wolny od trosk przed świtem i poszukuj przygód

Jacek Podsiadło

Jacek Podsiadło Wychwyt Grahama Thoreau: wstawaj wolny od trosk przed świtem i poszukuj przygód Językiem i wargami tak nieporadnymi w mowie, sprawnie uruchamiam rytmy ukryte w niej jak mechanizm w pudle instrumentu. Traperskim nożem przekrawam na pół mydło z powodu różnicy płci, bo natryski dla pań i panów są na campingu osobne, Kopię w drzwi, za którymi kryje się ktoś, kto rzucał w nas z okn... Jacek Podsiadło ur.7 lutego 1964 Najważniejsze dzieła:Nieszczęście doskonałe (1987), Niczyje, boskie (1998), Wychwyt Grahama (1999), Kra (2005), Przez sen (2014), Włos Bregueta (2016) Poeta, prozaik, tłumacz, dziennikarz, felietonista. Publikował w wielu czasopismach literackich, a jego twórczość przetłumaczono na angielski, niemiecki, słowacki, słoweński i ukraiński. Czołowy obok Marcina Świetlickiego poeta pokolenia bruLionu. Głosił poglądy anarchistyczne i pacyfistyczne. W latach 1993-2008 prowadził audycję Studnia w Radiu Opole, a od 2009 roku prowadzi internetowe Domowe Radio Studnia. Kupując książkę wspierasz fundację Nowoczesna Polska, która propaguje ideę wolnej kultury. Wolne Lektury to biblioteka internetowa, rozwijana pod patronatem Ministerstwa Edukacji Narodowej. W jej zbiorach znajduje się kilka tysięcy utworów, w tym wiele lektur szkolnych zalecanych do użytku przez MEN, które trafiły już do domeny publicznej. Wszystkie dzieła są odpowiednio opracowane - opatrzone przypisami oraz motywami.

57266
Loading...
EBOOK

Thorley Weir

E.F. Benson

This story is about becoming an artist. A surprisingly joyful path to this goal. Too much information in one direction. However, for the attentive reader, it will be useful and interesting. All actions take place in England at the beginning of the 20th century. This novel contains everything: luxury and poorness, romance and art.

57267
Loading...
EBOOK

Those Extraordinary Twins

Mark Twain

Siamese twins twins Chang and Eng Bunker, who were born with fused bodies. They lived 63 years, had good health, were married, had normal children. In 1829 they were brought to America, then they were taken and shown in Europe. Knowing the twins personally, the author took the liberty of telling about the curious details of their private life, which never penetrated the press.

57268
Loading...
EBOOK

Those Folk of Bulboro

Edgar Wallace

An Edgar Wallace detective thriller novel. The plot revolves around the nephew of a small town English doctor who takes over his uncles practice and runs into trouble with a religious fanatic. This book is in a new vein for Edgar Wallace, for it is not a story of mystery but a real novel, and goes to show where his versatility could take him if he wished, for Those Folk of Bulboro proves him to be the possessor of all the requisite gifts which go to make the really popular novelist against the writer of detective fiction. He has always been noted for his ability to sketch character vividly in a few strokes, and here his touch is as sure as ever, and the story he tells is sympathetic, true to life and deeply interesting.

57269
Loading...
EBOOK

Those Other Days

E. Phillips Oppenheim

A collection of nineteen stories, by Edward Phillips Oppenheim, mostly from the 1890s and early 1900s, published in magazines, and collected in 1913. Ghost stories, bizarre adventures, strange appearances and disappearances, and improbable love are the themes of these very enjoyable stories by the master storyteller. Young men courting women, psychic phenomena, and humorous characters abound. Those Other Days stories are almost Victorian in their diction and flavor, with some of the fascination of the period for supernatural events. If you havent discovered the joys of Oppenheims stories, which are clearly written and literary there is a good place to start. Highly recommended!

57270
Loading...
EBOOK

Threat Hunting with Elastic Stack. Solve complex security challenges with integrated prevention, detection, and response

Andrew Pease

Threat Hunting with Elastic Stack will show you how to make the best use of Elastic Security to provide optimal protection against cyber threats. With this book, security practitioners working with Kibana will be able to put their knowledge to work and detect malicious adversary activity within their contested network.You'll take a hands-on approach to learning the implementation and methodologies that will have you up and running in no time. Starting with the foundational parts of the Elastic Stack, you'll explore analytical models and how they support security response and finally leverage Elastic technology to perform defensive cyber operations.You’ll then cover threat intelligence analytical models, threat hunting concepts and methodologies, and how to leverage them in cyber operations. After you’ve mastered the basics, you’ll apply the knowledge you've gained to build and configure your own Elastic Stack, upload data, and explore that data directly as well as by using the built-in tools in the Kibana app to hunt for nefarious activities.By the end of this book, you'll be able to build an Elastic Stack for self-training or to monitor your own network and/or assets and use Kibana to monitor and hunt for adversaries within your network.

57271
Loading...
EBOOK

Threat Modeling Best Practices. Proven frameworks and practical techniques to secure modern systems

Derek Fisher

Threat modeling has become a cornerstone of modern cybersecurity, yet it is often overlooked, leaving security gaps that attackers can exploit. With the rise in system complexity, cloud adoption, AI-driven threats, and stricter compliance requirements, security teams need a structured approach to proactively spot and stop risks before attackers do. This book delivers exactly that, offering actionable insights for applying industry best practices and emerging technologies to secure systems. It breaks down the fundamentals of threat modeling and walks you through key frameworks and tools such as STRIDE, MITRE ATT&CK, PyTM, and Attack Paths, helping you choose the right model and create a roadmap tailored to your business. You'll learn how to use leading threat modeling tools, identify and prioritize potential threats, and integrate these practices into the software development life cycle to detect risks early. The book also examines how AI can enhance analysis and streamline security decision-making for faster, stronger defenses.By the end, you'll have everything you need to build systems that anticipate and withstand evolving threats, keeping your organization secure in an ever-changing digital landscape.*Email sign-up and proof of purchase required

57272
Loading...
EBOOK

Threat Modeling Gameplay with EoP. A reference manual for spotting threats in software architecture

Brett Crawley, Adam Shostack

Are you looking to navigate security risks, but want to make your learning experience fun? Here's a comprehensive guide that introduces the concept of play to protect, helping you discover the threats that could affect your software design via gameplay.Each chapter in this book covers a suit in the Elevation of Privilege (EoP) card deck (a threat category), providing example threats, references, and suggested mitigations for each card. You’ll explore the methodology for threat modeling—Spoofing, Tampering, Repudiation, Information Disclosure, and Elevation of Privilege (S.T.R.I.D.E.) with Privacy deck and the T.R.I.M. extension pack. T.R.I.M. is a framework for privacy that stands for Transfer, Retention/Removal, Inference, and Minimization. Throughout the book, you’ll learn the meanings of these terms and how they should be applied. From spotting vulnerabilities to implementing practical solutions, the chapters provide actionable strategies for fortifying the security of software systems.By the end of this book, you will be able to recognize threats, understand privacy regulations, access references for further exploration, and get familiarized with techniques to protect against these threats and minimize risks.