Books by "Paul B. Ash"

5 books found

Coal-mine Fatalities in December, 1924

Coal-mine Fatalities in December, 1924

by J. E. Crawshaw, Joseph Edgar Tiffany, Albert John Kraemer, Arthur William Fahrenwald, Charles Edwin Van Barneveld, Clyde Elmer Williams, Donald B. Dow, Edmund Spriggs Leaver, Ernest Albion Hersam, F. W. Lane, George Edward McElroy, J. J. Jakosky, James Washington Paul, John Ferdinand Barkley, Louis Downer Tracy, Ludwig Schmidt, Lynton Dewitt Wyant, Marie Farnsworth, Maurice Bacon Cooke, Richard Duddleston Leitch, Royd Ray Sayers, Sidney H. Katz, Walter Alfred Selvig, William Marsh Myers, William Melvin Weigel, William Waugh Adams, William Parks Yant, Allan Shakespeare Richardson, Alva Britt Hooker, C. W. Davis, Carl Ernest Reistle, Carl Otto Anderson, Clifford Pinkney Bowie, Donald Henry Zellers, Edward Phillip Barrett, H. M. Lawrence, Harold Monroe Thorne, Harold Putnam Greenwald, J. J. McKitterick, L. G. Marsh, Bernard Marvin Larsen, J. A. Woolf, J. H. Hildebrand, J. S. Desmond

1924

No detailed description available for "The Manufacture of Chocolate and other Cacao Preparations".

Form and Development of White Pine Stands in Relation to Growing Space

Form and Development of White Pine Stands in Relation to Growing Space

by Paul M. Reed, Albert Collins Cline, E. E. Tarbox, Henry Byron Peirson, J. Nelson Spaeth, John Beebe Downs, Paul Rupert Gast, Reuben Tom Patton, Richard Thornton Fisher, Robert Marshall, Robert Wallace Averill, Suren Rubenian Gevorkiantz, Neil Wetmore Hosley, Walter Boardman Averill, Wingate Irving Stevens

1921

Cybersecurity Ops with bash

Cybersecurity Ops with bash

by Paul Troncone, Carl Albing Ph.D.

2019 · "O'Reilly Media, Inc."

If you hope to outmaneuver threat actors, speed and efficiency need to be key components of your cybersecurity operations. Mastery of the standard command-line interface (CLI) is an invaluable skill in times of crisis because no other software application can match the CLI’s availability, flexibility, and agility. This practical guide shows you how to use the CLI with the bash shell to perform tasks such as data collection and analysis, intrusion detection, reverse engineering, and administration. Authors Paul Troncone, founder of Digadel Corporation, and Carl Albing, coauthor of bash Cookbook (O’Reilly), provide insight into command-line tools and techniques to help defensive operators collect data, analyze logs, and monitor networks. Penetration testers will learn how to leverage the enormous amount of functionality built into nearly every version of Linux to enable offensive operations. In four parts, security practitioners, administrators, and students will examine: Foundations: Principles of defense and offense, command-line and bash basics, and regular expressions Defensive security operations: Data collection and analysis, real-time log monitoring, and malware analysis Penetration testing: Script obfuscation and tools for command-line fuzzing and remote access Security administration: Users, groups, and permissions; device and software inventory