Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Real-Time Big Data Analytics: Emerging Architecture


Mike Barlow - 2013
    The data world was revolutionized a few years ago when Hadoop and other tools made it possible to getthe results from queries in minutes. But the revolution continues. Analysts now demand sub-second, near real-time query results. Fortunately, we have the tools to deliver them. This report examines tools and technologies that are driving real-time big data analytics.

The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary


Eric S. Raymond - 1999
    According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy. Already, billions of dollars have been made and lost based on the ideas in this book. Its conclusions will be studied, debated, and implemented for years to come. According to Bob Young, "This is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of Linux-based operating systems, and to the success of open source users and the companies that supply them."The interest in open source software development has grown enormously in the past year. This revised and expanded paperback edition includes new material on open source developments in 1999 and 2000. Raymond's clear and effective writing style accurately describing the benefits of open source software has been key to its success. With major vendors creating acceptance for open source within companies, independent vendors will become the open source story in 2001.

Topology


James R. Munkres - 1975
    Includes many examples and figures. GENERAL TOPOLOGY. Set Theory and Logic. Topological Spaces and Continuous Functions. Connectedness and Compactness. Countability and Separation Axioms. The Tychonoff Theorem. Metrization Theorems and paracompactness. Complete Metric Spaces and Function Spaces. Baire Spaces and Dimension Theory. ALGEBRAIC TOPOLOGY. The Fundamental Group. Separation Theorems. The Seifert-van Kampen Theorem. Classification of Surfaces. Classification of Covering Spaces. Applications to Group Theory. For anyone needing a basic, thorough, introduction to general and algebraic topology and its applications.

The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System


Bill Blunden - 2009
    Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0

What's New in Java 7?


Madhusudhan Konda - 2011
    Madhusudhan Konda provides an overview of these, including strings in switch statements, multi-catch exception handling, try-with-resource statements, the new File System API, extensions of the JVM, support for dynamically-typed languages, and the fork and join framework for task parallelism.

Tales from the Dugout: Football at the Sharp End


Richard Gordon - 2015
    When the action heats up on the pitch, emotions in the dugout boil over. Grown men lose control. The normally sane turn into irrational agitators. And every decision, no matter how minor, is hotly contested. Tales From The Dugout is a fantastically entertaining collection of incidents and memories gathered from managers, players, referees, linesmen and broadcasters, which encapsulates the unique environment of the technical area and reveals how even limited exposure to it can transform people unrecognisably. And when the red mist descends, the consequences can be almost unbelievable - and frequently hilarious. With contributions from a host of those who have been at the sharp end and lived to tell the tale, Tales From The Dugout is a unique insight into life in the technical area. There are tales from Scotland manager Gordon Strachan, Craig Brown, Pat Nevin, Kenny Clark, Pat Bonner, Scott Booth, Terry Butcher, Jimmy Calderwood, Billy Dodds, Jim Duffy, Alex McLeish, Alex Smith, Willie Young and Chick Young - amongst many others. And brilliant stories about legends of the game like Tommy Burns, Walter Smith, Martin O'Neill, Ally McCoist, Jim McLean and, of course, Sir Alex Ferguson. And it explains why that small area by the side of the pitch is no place for the faint-hearted.

The Winning of America Series: The Frontiersman


Allan W. Eckert
    The Winning of America Series: The Frontiersman

Lone Wolf (A Jess Williams Western #54)


Robert J. Thomas - 2016
    After running down a ruthless killer by the name of Dorr Munn, Jess finds himself in the town of Howell, Texas, where he meets a man by the name of Champ Kiel. Kiel makes the mistake of challenging Jess and against his nature, Jess spares Kiel. Four men rob the bank in Howell, killing the bank manager and a teller. During their escape, they trample an old woman to death. A large personal bounty is placed on the men’s heads and Jess finds himself forced to team up with Kiel on the hunt for them. Their hunt takes them on a long and dangerous trek across a large part of Texas and Jess finds help from the most unexpected partner he’s ever worked with…Shadow.

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers


Kevin D. Mitnick - 2005
    In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Blue Team Handbook: Incident Response Edition: A condensed field guide for the Cyber Security Incident Responder.


Don Murdoch - 2014
    The BTHb includes essential information in a condensed handbook format. Main topics include the incident response process, how attackers work, common tools for incident response, a methodology for network analysis, common indicators of compromise, Windows and Linux analysis processes, tcpdump usage examples, Snort IDS usage, packet headers, and numerous other quick reference topics. The book is designed specifically to share "real life experience," so it is peppered with practical techniques from the authors' extensive career in handling incidents. Whether you are writing up your cases notes, analyzing potentially suspicious traffic, or called in to look over a misbehaving server - this book should help you handle the case and teach you some new techniques along the way.

Conceptual Mathematics: A First Introduction to Categories


F. William Lawvere - 1997
    Written by two of the best-known names in categorical logic, Conceptual Mathematics is the first book to apply categories to the most elementary mathematics. It thus serves two purposes: first, to provide a key to mathematics for the general reader or beginning student; and second, to furnish an easy introduction to categories for computer scientists, logicians, physicists, and linguists who want to gain some familiarity with the categorical method without initially committing themselves to extended study.

Unauthorised Access: Physical Penetration Testing for IT Security Teams


Wil Allsopp - 2009
    IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.

White Alpha Billionaire's Surprise Black Baby Daughter (BWWM Romance)


Nicki Jackson - 2017
     I never thought I'd run into him again...how many years has it been? We used to be inseparable. But Jordan Voight's a hot playboy with deep pockets, now. Five years ago, I got pregnant with his baby. And he couldn't take the distance. So we broke up. Seeing him again woke something up inside of me...deep, down, between my thighs... Jordan's more than just an old flame: he's the father of my child. And I don't know if I should give him a second chance, but he's almost too sexy for me to refuse... Note: White Alpha Billionaire's Surprise Black Baby Daughter is 40k of hot, sexy passion between an alpha billionaire and his old flame.

F-4 Phantom: A Pilot's Story


Robert Prest - 2017
    One of the best military aviaton memoirs ever written’ Rowland White, author of Vulcan 607 ‘I only have to think Speed, and I am at 600 knots in seconds. Think Height and I am gazing down from a eight-mile-high perch within one minute. Think Freedom and I am wrested away from a dank, cold world, cloudbase at 300 feet, through a brief shock of cloud to emerge into a golden blue world, another dimension, crystal clear for miles and miles’ Fighter Pilot. Robert Prest had never wanted to be anything else. And even as a boy he had set his sights on flying the awesome McDonnell Douglas F-4 Phantom. The big, twin-engined interceptor offered an irresistible combination of charisma, power and performance. Air combat, strike, gunnery, bombing and rocketry, the F-4 was jack-of-all-trades, master of most. From the lonely pursuit of Soviet intruders out over the North Sea and strength-sapping high-g dogfights, to maintaining Quick Reaction Alert on Germany’s Eastern border, ready to scramble Battle Flight at a moment’s notice, Prest and his fellow aviators stood toe-to-toe with a powerful opponent. But the defence of the West came at a cost, and comrades in arms would pay with their lives. No other book so vividly brings to life the high-pressure, high stakes, high-speed world of an RAF fighter pilot on the Cold War frontline. But it’s more than that. In capturing a sense of the wonder and magic of flying, Prest’s book ranks aviation classics from writers like Saint-Exupéry, Richard Bach, Cecil Lewis and Ernest Gann. ‘The best book I’ve ever read about flying fast jets for the Cold War RAF. Both thrilling and elegaic, F-4 Phantom makes poetry of complex, exacting world of the fighter pilot. This is as close as you’ll ever get to flying the Phantom yourself.’ Rowland White, author of Vulcan 607 ‘What First Light does for Spitfires and the Battle of Britain, Robert Prest does for the F-4 Phantom in RAF service … Superbly written.’ Royal Aeronautical Society Insight Perfect for fans of books like Skyfaring, Apache, First Light, Tornado Down, Fate is the Hunter or Sagittarius Rising