Learning Web Design

Learning Web Design

Can it be more retro just do what you think. I trust you anyway, you are the designer, you know what to do. Do less with more. We exceed the clients’ expectations just do what you think. I trust you, and just do what you think. I trust you, the website doesn’t have the theme i was going for yet im not sure, try something else can you make the logo bigger yes bigger bigger still the logo is too big can you rework to make the pizza look more delicious.

Learning Web Design Read More
Adding Custom Code

Adding Custom Code

One of the things that you can do to customize your website is to add custom code. This resource will provide you with information you need to get started. If you are not comfortable with HTML, CSS and/or JavaScript coding then take a look at a couple of the other resources I’ve listed: Learning Web Design (book) and W3Schools.com which provides a wealth of info on those forms of coding.

Adding Custom Code Read More

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice

Communications of the ACM, January 2019, Vol. 62 No. 1, Pages 106-114
Research Highlights: “Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice”
By David Adrian, Karthikeyan Bhargavan, et al.

“We investigate the security of Diffie-Hellman key exchange as used in popular Internet protocols and find it to be less secure than widely believed.”

Imperfect Forward Secrecy: How Diffie-Hellman Fails in Practice Read More
Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion (2nd Edition)

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion (2nd Edition)

By Hal Abelson, Ken Ledeen, Harry Lewis, & Wendy Seltzer

“Blown to Bits, Second Edition is the brilliant, plain-English guide to digital technology, how it’s changing the world, and what you need to know to survive in tomorrow’s digital world. A best-seller when it was first published in 2010, the issues it addresses are more crucial than ever. ”

Blown to Bits: Your Life, Liberty, and Happiness After the Digital Explosion (2nd Edition) Read More
Definitive Guide to Squarespace

The Definitive Guide to Squarespace: Learn to Deliver Custom, Professional Web Experiences for Yourself and Your Clients

Published by Apress.com, 2017
By Sarah Martin

“Most up-to-date Squarespace book in the market to definitively cover every aspect of Squarespace development.”

“Teaches the principles of working with Squarespace’s tools and how to do advanced customizations not covered in any documentation.”

The Definitive Guide to Squarespace: Learn to Deliver Custom, Professional Web Experiences for Yourself and Your Clients Read More
Dawn of the Code War

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat

“The inside story of how America’s enemies launched a cyber war against us-and how we’ve learned to fight back…”

Includes links to:

  • “The Lawfare Podcast: John Carlin on ‘Dawn of the Code War’“ by Jen Patja Howell. Saturday, November 24, 2018.

  • A discussion on responses to national security threats in cyberspace from the Department of Justice, featuring John P. Carlin, Former Assistant Attorney General, National Security Division; and John C. Demers, Assistant Attorney General, National Security Division, on Tuesday, January 15, 2019 at the Center for Strategic & International Studies.

  • John Carlin on “Stay Tuned with Preet” Dec. 4, 2018.

Dawn of the Code War: America’s Battle Against Russia, China, and the Rising Global Cyber Threat Read More
Book Cover - Zucked

Zucked: Waking Up to the Facebook Catastrophe

“The New York Times bestseller about a noted tech venture capitalist, early mentor to Mark Zuckerberg, and Facebook investor, who wakes up to the serious damage Facebook is doing to our society – and sets out to try to stop it. “

Roger McNamee has been a Silicon Valley investor for 35 years. He co-founded successful funds in venture, crossover and private equity. His most recent fund, Elevation, included U2’s Bono as a co-founder. He holds a B.A. from Yale University and…

Zucked: Waking Up to the Facebook Catastrophe Read More
Data & Goliath

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World

You are under surveillance right now.

Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you’re unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.

Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World Read More
Secrets & Lies

Secrets & Lies: Digital Security in a Networked World

Welcome to the businessworld.com. It’s digital: Information is more readily accessible than ever. It’s inescapably connected: businesses are increasingly–if not totally–dependent on digital communications. But our passion for technology has a price: increased exposure to security threats. Companies around the world need to understand the risks associated with doing business electronically. The answer starts here.

Secrets & Lies: Digital Security in a Networked World Read More
Applied Cryptography

Applied Cryptography: Protocols, Algorithms, and Source Code in C

This second edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography — the technique of enciphering and deciphering messages — to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them in cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems.

Applied Cryptography: Protocols, Algorithms, and Source Code in C Read More

Hey Google, What’s a Moonshot?: How Silicon Valley Mocks Apollo

Communications of the ACM, January 2019
By Thomas Haigh

“Letting Silicon Valley steal the term “moonshot” for projects with quite different management styles, success criteria, scales, and styles of innovation hurts our collective ability to understand just what NASA achieved 50 years ago and why nothing remotely comparable is actually under way today at Google, or anywhere else.”

Hey Google, What’s a Moonshot?: How Silicon Valley Mocks Apollo Read More