Ever since its discovery eighty-five years ago, quantum theory has been used to study the physical universe with great profit, both intellectual and financial. Over the last fifty years, however, we have found out more and more about the theory itself, and what it tells us about the universe. It seems we may have to accept non-locality - cause and effect may be light-years apart; loss of realism - nature may be fundamentally probabilistic; and... more...

John Stewart Bell (1928-1990) was one of the most important figures in twentieth-century physics, famous for his work on the fundamental aspects of the century's most important theory, quantum mechanics. While the debate over quantum theory between the supremely famous physicists, Albert Einstein and Niels Bohr, appeared to have become sterile in the 1930s, Bell was able to revive it and to make crucial advances - Bell's Theorem or Bell's Inequalities.... more...

James Clerk Maxwell (1831-1879) had a relatively brief, but remarkable life, lived in his beloved rural home of Glenlair, and variously in Edinburgh, Aberdeen, London and Cambridge. His scholarship also ranged wide - covering all the major aspects of Victorian natural philosophy. He was one of the most important mathematical physicists of all time, coming only after Newton and Einstein. In scientific terms his immortality is enshrined in... more...

The practical guide to simulating, detecting, and responding to network attacks  Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections... more...

The complete guide to today’s hard-to-defend chained attacks: performing them and preventing them   Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve their goals. Chained exploits are far more complex and far more difficult to defend. Few security or hacking books cover them well and most don’t cover... more...


Lord Kelvin was one of the greatest physicists of the Victorian era. Widely known for the development of the Kelvin scale of temperature measurement, Kelvin's interests ranged across thermodynamics, the age of the Earth, the laying of the first transatlantic telegraph table, not to mention inventions such as an improved maritime compass and a sounding device which allowed depths to be taken both quickly and while the ship was moving. He was an academic... more...

This book presents an account of all aspects of Einstein’s achievements in quantum theory, his own views, and the progress his work has stimulated since his death. While some chapters use mathematics at an undergraduate physics level, a path is provided for the reader more concerned with ideas than equations, and the book will benefit to anybody interested in Einstein and his approach to the quantum.

In this book, you learn how to: Develop perfect fluency in subnetting Understand the OSI model and the Cisco three-layer hierarchical model Connect Cisco equipment, make initial configurations, and connect to other devices to build a network Configure Cisco routers and back up and restore your Cisco IOS Software configurations Implement, verify, and troubleshoot a small, switched network Configure and verify a... more...

Fast answers and reliable solutions for all widely-used Cisco router features - all in one time-saving guide   Organized for maximum efficiency: describes actual commands and options in the sequence they should be used Helps network pros eliminate time-consuming documentation searches Extensive updates: IPv6, MPLS, AutoQoS, SIP, MGCP, voice troubleshooting, VPNs, security, and more "At-a-glance" illustrations... more...