Skiing in Utah: A History

Skiing in Utah: A History

Skiing in Utah: A History is a study of skiing in Utah from early days when it was essentially a form of transportation to the late 1970’s and the advent of ski resorts as embodied by Snowbird. The book covers various topics including ski jumping, avalanche prediction and control. It deals with specific ski areas including Alta, Brighton, Solitude, Park City and Snowbird. “In many ways the ski history of Park City and Snowbird illustrates the sport’s transition from avocation to industry.”

Skiing in Utah: A History Read More
The Perfect Weapon

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Published by Penguin Random House, June 19, 2018
By David E. Sanger

“The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes—from crippling infrastructure to sowing discord and doubt—cyber is now the weapon of choice for democracies, dictators, and terrorists.”

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age Read More
Learning Web Design

Learning Web Design

Can it be more retro just do what you think. I trust you anyway, you are the designer, you know what to do. Do less with more. We exceed the clients’ expectations just do what you think. I trust you, and just do what you think. I trust you, the website doesn’t have the theme i was going for yet im not sure, try something else can you make the logo bigger yes bigger bigger still the logo is too big can you rework to make the pizza look more delicious.

Learning Web Design Read More
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion (2nd Edition)

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion (2nd Edition)

By Hal Abelson, Ken Ledeen, Harry Lewis, & Wendy Seltzer

“Blown to Bits, Second Edition is the brilliant, plain-English guide to digital technology, how it’s changing the world, and what you need to know to survive in tomorrow’s digital world. A best-seller when it was first published in 2010, the issues it addresses are more crucial than ever. ”

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion (2nd Edition) Read More
Definitive Guide to Squarespace

The Definitive Guide to Squarespace: Learn to Deliver Custom, Professional Web Experiences for Yourself and Your Clients

Published by Apress.com, 2017
By Sarah Martin

“Most up-to-date Squarespace book in the market to definitively cover every aspect of Squarespace development.”

“Teaches the principles of working with Squarespace’s tools and how to do advanced customizations not covered in any documentation.”

The Definitive Guide to Squarespace: Learn to Deliver Custom, Professional Web Experiences for Yourself and Your Clients Read More
Dawn of the Code War

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat

“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”

Includes links to:

  • “The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.

  • A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.

  • John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat Read More
Book Cover - Zucked

Zucked: Waking Up to the Facebook Catastrophe

“The New York Times bestseller about a noted tech venture capitalist, early mentor to Mark Zuckerberg, and Facebook investor, who wakes up to the serious damage Facebook is doing to our society – and sets out to try to stop it. “

Roger McNamee has been a Silicon Valley investor for 35 years. He co-founded successful funds in venture, crossover and private equity. His most recent fund, Elevation, included U2’s Bono as a co-founder. He holds a B.A. from Yale University and…

Zucked: Waking Up to the Facebook Catastrophe Read More
Data & Goliath

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

You are under surveillance right now.

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Read More
Secrets & Lies

Secrets & Lies: Digital Security in a Networked World

Welcome to the businessworld.com. It’s digital: Information is more readily accessible than ever. It’s inescapably connected: businesses are increasingly–if not totally–dependent on digital communications. But our passion for technology has a price: increased exposure to security threats. Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.

Secrets & Lies: Digital Security in a Networked World Read More
Applied Cryptography

Applied Cryptography: Protocols, Algorithms, and Source Code in C

This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography — the technique of enciphering and deciphering messages — to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

Applied Cryptography: Protocols, Algorithms, and Source Code in C Read More