Network Warrior


Gary A. Donahue - 2007
    What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers


Kevin D. Mitnick - 2005
    In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including:A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.

Crime Fiction: Private Eye Thriller


B.A. Savage - 2016
    When he finds, Coleman's dead he may be pursuing the wrong suspect. Shallow Grave When Stone is hired to pick up a jar of face cream from a Frenchman named Lorenzo Carlos, he thinks it's going to be a quick one thousand bucks, but faith has its own plans. Stone's life is threatened by a cosmetic company owner that has a soft voice but an itchy trigger finger, leading to an explosion that rocks the foundation of the case. All this for a jar of face cream? There's something wrong in Central City, and it's Stone’s job to find out the truth. Wishful Thinking When a carnival employee hires Randall Stone to investigate his girlfriend, a girl is murdered in a fire accidentally blowing a secret wide open. Cold Fury When Stone meets a beautiful woman in the Lake View Bar, she shows him a clipping out of the Personal columns of the newspaper. An attorney wanted to know the whereabouts of Mary Patton, wife of the late, Ben Patton, who died seven years ago in the Philippine Islands. Mr. Patton left a legacy of one hundred and fifty thousand dollars for his wife. She hired Stone to claim her inheritance and he meet a man with his code of vigilante justice and Randall Stone’s on the top of his list.Die to Be Rich When Stone's hired to pick up an envelope for Mellissa, it's supposed to be a simple case, but nothing is as it seems when you’re a private eye. On the way back from the pickup, Stone is covered by two thugs that use him as a punching bag. Now Stone carries out his own brand of justice on the streets of Central City. You’re Going to Die Mr. Stone When a Puerto Rican man walks into Stone’s office and tells him; he’s going to die Stone’s asked to deliver a letter to the man who’s trying to kill the Puerto Rican. A guy just released from prison named Tony Ramirez. And when two men are murdered, Stone tries to find the link between the dead men and lottery racket in the Northpark area. It’s Called Murder Scott Braga has one wish, to talk to his son before he leaves Central City and has 12 hours before he goes. He hires Randall Stone to find his son on Fifth Street one of the most dangerous areas in town. When a murder happens, Stone tries to identify the real culprit. Sweet Letters of Death When a man hoping to find a companion or even a soul mate gets taken for a considerable amount of money through a mail order bride he hires Randall Stone to get his money back. Stone races to expose them before it happens to someone else. Tales of: Detective, Police Detective, Police, Murder, Investigation, Death, Violence, Blood, Shootout, Police Officer, Shot to Death, Corpse, Revenge, Fight, Gun, Murder Investigation, Gunfight, Husband Wife Relationship, Fistfight Neo Noir, Interrogation, Police Investigation, Deception Blood Splatter, Gangst

The Old Coaching Inn: A Cornish Mystery


Daphne Neville - 2020
    

Computer Networks


Andrew S. Tanenbaum - 1981
    In this revision, the author takes a structured approach to explaining how networks function.

Offline: Free Your Mind from Smartphone and Social Media Stress


Imran Rashid - 2018
    In Offline, they deliver an eye-opening research-based journey into the world of tech giants, smartphones, social engineering, and subconscious manipulation. This provocative work shows you how digital devices change individuals and communities for better and worse.A must-read if you or your kids use smartphones or tablets and spend time browsing social networks, playing online games or even just browsing sites with news and entertainment.   Learn how to recognize ‘mind hacks’ and avoid the potentially disastrous side-effects of digital pollution. Unplug from the matrix. Learn digital habits that work for you.

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code


Michael Hale Ligh - 2010
    Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

My Days with Baasha: The Rajnikanth Phenomenon


Suresh Krissna - 2012
    

Trio


Cath Staincliffe - 2002
    The women meet up in a home for unmarried mothers to await the births of their babies. "Trio" follows the lives of the mothers and daughters over the ensuing years.

Shoplift


Claire Sheehy - 2020
     Hunting a murderer in the seething mass of people shopping in the North West's biggest shopping centre, Lizzie finds herself trapped in a glass lift with four other people when it suddenly stops between floors.A young girl looking ready to give birth at any moment begins to panic, an old man tries to take charge whilst the other captives in the lift, an engaged couple whose relationship worries Lizzie, are desperate to get out.The lights go out, the shopping centre is evacuated. Lizzie has to rely on her wits to keep everyone calm and get the lift down to safety without alerting the murderer that she's onto them.

IMPOSITION: Detectives hunt a serial killer in this gripping mystery (The DI Gardener crime fiction series Book 5)


Ray Clark - 2020
    

WIFEY : Tales of a Contract Killer


Kateri Young - 2014
    A woman left to survive alone at the age of 10 with $20,000.00 that her parents left her. What will become of her life? What will she do to support herself? After meeting four like-minded woman, they figure out a way to support themselves. They decide to take a job only women can do without being detected. So is born the Ghost Squad, Contract Killers for hire. If the price is right, they are your women!

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Web 2.0: A Strategy Guide


Amy Shuen - 2007
    If you're executign strategy and want to know how the Web is changing business, this is the book you need.

Unauthorised Access: Physical Penetration Testing for IT Security Teams


Wil Allsopp - 2009
    IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.Teaches IT security teams how to break into their own facility in order to defend against such attacks, which is often overlooked by IT security teams but is of critical importance Deals with intelligence gathering, such as getting access building blueprints and satellite imagery, hacking security cameras, planting bugs, and eavesdropping on security channels Includes safeguards for consultants paid to probe facilities unbeknown to staff Covers preparing the report and presenting it to management In order to defend data, you need to think like a thief-let Unauthorised Access show you how to get inside.