The Hacker Playbook 2: Practical Guide To Penetration Testing


Peter Kim - 2015
    The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities


Mark Dowd - 2006
    Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.

Overland


Ewen Levick - 2019
    From vast deserts to an Indonesian fishing boat, a slow train through Burma to an armed confrontation in Laos, lullabies from middle-aged Chinese businessmen to a cold night on the Great Wall, wolves and reindeer herders, thieves and nomads: this is a vivid illustration of Asia and the people who live there, and of one ancient, stubborn motorcycle travelling through the world's wild places.

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

Adventures on 'The Way': 1100 miles on the Camino de Santiago


Graeme Harvey - 2018
    Nominated for running book of the year in The Running Awards 2019.

Smashing Node.Js: JavaScript Everywhere


Guillermo Rauch - 2012
    With more traditional web servers becoming obsolete, having knowledge on servers that achieve high scalability and optimal resource consumption using Node.js is the key to your app development success. Teaching you the essentials to making event-driven server-side apps, this book demonstrates how you can use less space and take less time for communication between web client and server.Contains numerous hands-on examples Explains implementation of real-time apps including Socket.IO and HTML5, and WebSockets Addresses practical Node.js advantages from specific design choices Demonstrates why knowledge and use of JavaScript is beneficial Includes an interactive online component with sample chapters Explains components of stand out apps including brevity and benchmarks Looking to enhance your abilities even further? Smashing Node.js: JavaScript Everywhere makes developing server-side apps accessible with its focus on JavaScript, open source, and easy-to-use language.

Gray Hat Python: Python Programming for Hackers and Reverse Engineers


Justin Seitz - 2008
    But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

Love Louder: 33 Ways to Spark Inspiration and Amplify Your Life


Preston Smiles - 2016
    As a teen he joined a local gang that was first involved in petty burglary but later escalated into more dangerous crimes. One night when Preston was fifteen, he was faced with a decision to take a routine ride of mischief with the friends or stay home. Intuition told him not to go. Within an hour, everyone in that car was shot. This tragic event shook him to his core and catapulted him to finding higher purpose for himself.Love Louder presents a positive approach for getting more love and meaning out of life. With the lessons he’s learned through the years, he distills ancient wisdom and new thought teachings into thirty-three timeless tools to living your best life and asks questions such as:-What do you truly believe you deserve? Are your actions reflecting that?-What are you a slave to? Facebook? Twitter? Alcohol? Him? Her?-Do you have the need to be “right” all the time?Love Louder can help you tackle these everyday challenges and teach you how to live with more excitement, productivity, clarity, and confidence. Full of insights and powerful anecdotes, Preston’s motivational story is a heartwarming read for anyone seeking guidance on overall happiness and fulfillment in life.

Blockchain: The Beginners Guide to Understanding the Technology Behind Bitcoin & Cryptocurrency (The Future of Money)


Artemis Caro - 2017
    As a result, many people are left with an incomplete understanding of this transformative new technology and its massive implications for the future. The goal of this book is not to plumb the depths of the mathematical wizardry used to code blockchain-based applications, but rather to serve as an introduction to the broader architecture and conceptual background behind blockchain technology. We will take a practical approach, examining how Blockchains are used in the real world. In this short, concise guide you will learn: A Brief History of Blockchain Technology Blockchain Basics: Managing Digital Transactions What is a Distributed Ledger? Blockchain Beyond Bitcoin Implications Of Blockchain: Big Data, Privacy & Personal Data Profiting from Blockchain Technologies Limitations & Challenges of Blockchain The Future of Blockchain For Centuries, people have relied on corrupt Centralized Institutions like banks and Governments to serve as intermediaries when it comes to storing and transacting financial assets. This is ALL About To Change... Make sure you take action and join the Financial Revolution by reading this book!

Visible Learning: Feedback


John Hattie - 2018
    Yet, there remains a paradox: why is feedback so powerful and why is it so variable? It is this paradox which Visible Learning: Feedback aims to unravel and resolve.Combining research excellence, theory and vast teaching expertise, this book covers the principles and practicalities of feedback, including:the variability of feedback, the importance of surface, deep and transfer contexts, student to teacher feedback, peer to peer feedback, the power of within lesson feedback and manageable post-lesson feedback.With numerous case-studies, examples and engaging anecdotes woven throughout, the authors also shed light on what creates an effective feedback culture and provide the teaching and learning structures which give the best possible framework for feedback. Visible Learning: Feedback brings together two internationally known educators and merges Hattie's world-famous research expertise with Clarke's vast experience of classroom practice and application, making this book an essential resource for teachers in any setting, phase or country.

The Tangled Web: A Guide to Securing Modern Web Applications


Michal Zalewski - 2011
    Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.

Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

The Effective Hiring Manager


Mark Horstman - 2019
    The author's step-by-step approach makes the strategies easy to implement and help to ensure ongoing success.Hiring effectively is the single greatest long-term contribution to your organization. The only thing worse than having an open position is filling it with the wrong person. The Effective Hiring Manager offers a proven process for solving these problems and helping teams and organizations thrive.The fundamental principles of hiring and interviewing How to create criteria to hire by How to create excellent interview questions How to review resumes How to conduct phone screens How to structure an interview day How to conduct each interview How to capture interview results How to make an offer How to decline a candidate How to onboard candidates Written by Mark Horstman, co-founder of Manager Tools and an expert in training managers, The Effective Hiring Manager is an A to Z handbook to the successful hiring process. The book explores, in helpful detail, what it takes to hire the right person, for the right job, and the right team.

Lessons From the Edge: Inspirational Tales of Surviving, Thriving and Extreme Adventure


Aldo Kane - 2021
    

The Wedding Officiant's Guide: How to Write and Conduct a Perfect Ceremony


Lisa Francesca - 2014
    With the officiating trend on the rise, novice officiants need a resource to guide them. In The Wedding Officiant's Guide, interfaith minister Lisa Francesca breaks down the entire officiating process, from becoming an ordained officiant and interviewing the couple to drafting and performing a moving ceremony. Written in an engaging and friendly tone, and featuring empowering advice, suggested readings, stories and lessons learned from new officiants, and practical tips from wedding planners, this inviting handbook will help new officiants write and deliver a wedding ceremony that fulfills marriage laws, delights guests, and honors the marrying couple.