Book picks similar to
Securing Im and P2P Applications for the Enterprise by Paul Piccard
networking
tbr-z1-cryptanalyst
computers
general
The Buffettology Workbook
Mary Buffett - 2001
Remarkably, he did it by spurning popular Wall Street trends, adhering instead to his own unique discipline, one the world has come to know as Buffettology. In The Buffettology Workbook, internationally acclaimed writer and lecturer Mary Buffett has again joined forces with David Clark, the world's leading authority on Warren Buffett's investment methods, to create an in-depth, step-by-step guide to the concepts and equations Warren Buffett uses to create fantastic wealth.Here you will learn:
The difference between a great company and a great undervalued company
How the short-sightedness of Wall Street pundits can work to your advantage
Where to look for investments with long-term, consistent, and extraordinary growth potential
To perform the same financial calculations Buffett uses, and apply them to stocks you'd like to buy
Pursuit of Justice
Freya Atwood - 2021
A stubborn lawyer. And a deadly race against time.When news of The Golden Lake Killer rise, the police quickly claim they caught their suspect. Refusing to pay mind to it, Sam is met with a surprise once a man is begging her to defend his brother; the man believed to be the culprit.The proof against him is staggering, yet Sam refuses to give up. And as the evidence against him heightens, Sam has no other choice but to take the law in her hands…Pursuit of Justice is Freya's 1st novel in the Sam Spencer series of blood-pumping legal thrillers. If you are an avid fan of strong female leads, action-packed courtroom drama, riveting characters and mind-blowing murder mystery, then you'll love Freya's intriguing story.
Windows PowerShell Cookbook: The Complete Guide to Scripting Microsoft's Command Shell
Lee Holmes - 2007
Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.Updated for PowerShell 3.0, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including format specifiers and frequently referenced registry keys to selected .NET, COM, and WMI classes.Learn how to use PowerShell on Windows 8 and Windows Server 2012Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scriptingMaster fundamentals such as the interactive shell, pipeline, and object conceptsPerform common tasks that involve working with files, Internet-connected scripts, user interaction, and moreSolve tasks in systems and enterprise management, such as working with Active Directory and the filesystem
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang - 2014
Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
LDAP System Administration
Gerald Carter - 2003
That's what LDAP System Administration is all about.System administrators often spend a great deal of time managing configuration information located on many different machines: usernames, passwords, printer configurations, email client configurations, and network filesystem configurations, to name a few. LDAPv3 provides tools for centralizing all of the configuration information and placing it under your control. Rather than maintaining several administrative databases (NIS, Active Directory, Samba, and NFS configuration files), you can make changes in only one place and have all your systems immediately see the updated information.Practically platform independent, this book uses the widely available, open source OpenLDAP 2 directory server as a premise for examples, showing you how to use it to help you manage your configuration information effectively and securely. OpenLDAP 2 ships with most Linux(R) distributions and Mac OS(R) X, and can be easily downloaded for most Unix-based systems. After introducing the workings of a directory service and the LDAP protocol, all aspects of building and installing OpenLDAP, plus key ancillary packages like SASL and OpenSSL, this book discusses:Configuration and access controlDistributed directories; replication and referralUsing OpenLDAP to replace NISUsing OpenLDAP to manage email configurationsUsing LDAP for abstraction with FTP and HTTP servers, Samba, and RadiusInteroperating with different LDAP servers, including Active DirectoryProgramming using Net:: LDAPIf you want to be a master of your domain, LDAP System Administration will help you get up and running quickly regardless of which LDAP version you use. After reading this book, even with no previous LDAP experience, you'll be able to integrate a directory server into essential network services such as mail, DNS, HTTP, and SMB/CIFS.
Practical UNIX & Internet Security
Simson Garfinkel - 1991
Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.
Ubuntu: The Beginner's Guide
Jonathan Moeller - 2011
In the Guide, you'll learn how to: -Use the Ubuntu command line. -Manage users, groups, and file permissions. -Install software on a Ubuntu system, both from the command line and the GUI. -Configure network settings. -Use the vi editor to edit system configuration files. -Install and configure a Samba server for file sharing. -Install SSH for remote system control using public key/private key encryption. -Install a DHCP server for IP address management. -Install a LAMP server. -Install web applications like WordPress and Drupal. -Configure an FTP server. -Manage ebooks. -Convert digital media. -Manage and configure Unity, the default Ubuntu environment. -Manage and halt processes from the command line. -Set up both a VNC server and a client. -Enjoy games on Ubuntu. -And many other topics.
Async in C# 5.0
Alex Davies - 2012
Along with a clear introduction to asynchronous programming, you get an in-depth look at how the async feature works and why you might want to use it in your application.Written for experienced C# programmers—yet approachable for beginners—this book is packed with code examples that you can extend for your own projects.Write your own asynchronous code, and learn how async saves you from this messy choreDiscover new performance possibilities in ASP.NET web server codeExplore how async and WinRT work together in Windows 8 applicationsLearn the importance of the await keyword in async methodsUnderstand which .NET thread is running your code—and at what points in the programUse the Task-based Asynchronous Pattern (TAP) to write asynchronous APIs in .NETTake advantage of parallel computing in modern machinesMeasure async code performance by comparing it with alternatives
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
A Place for Humility: Whitman, Dickinson, and the Natural World
Christine Gerhardt - 2014
Yet for all their metaphorical suggestiveness, Dickinson’s and Whitman’s poems about the natural world neither preclude nor erase nature’s relevance as an actual living environment. In their respective poetic projects, the earth matters both figuratively, as a realm of the imagination, and also as the physical ground that is profoundly affected by human action. This double perspective, and the ways in which it intersects with their formal innovations, points beyond their traditional status as curiously disparate icons of American nature poetry. That both of them not only approach nature as an important subject in its own right, but also address human-nature relationships in ethical terms, invests their work with important environmental overtones. Dickinson and Whitman developed their environmentally suggestive poetics at roughly the same historical moment, at a time when a major shift was occurring in American culture’s view and understanding of the natural world. Just as they were achieving poetic maturity, the dominant view of wilderness was beginning to shift from obstacle or exploitable resource to an endangered treasure in need of conservation and preservation.A Place for Humility examines Dickinson’s and Whitman’s poetry in conjunction with this important change in American environmental perception, exploring the links between their poetic projects within the context of developing nineteenth-century environmental thought. Christine Gerhardt argues that each author's poetry participates in this shift in different but related ways, and that their involvement with their culture’s growing environmental sensibilities constitutes an important connection between their disparate poetic projects. There may be few direct links between Dickinson’s “letter to the World” and Whitman’s “language experiment,” but via a web of environmentally-oriented discourses, their poetry engages in a cultural conversation about the natural world and the possibilities and limitations of writing about it—a conversation in which their thematic and formal choices meet on a surprising number of levels.
Stolen Voices: Part 1 of 3: A sadistic step-father. Two children violated. Their battle for justice.
Terrie Duckett - 2014
He broke their dreams. But they came back stronger.‘Terrie and Paul are two of the bravest people I have ever met. I have only shared the briefest glimpse into the true horrors this brother and sister have endured, but I rarely come across cases this bad. After the unspeakable abuse and shocking betrayals, two incredible human beings came through – to inspire us all.’Sara Payne OBE, co-founder of Phoenix SurvivorsTerrie and Paul’s step-father had been living with them for six months when the abuse and grooming began. What started as innocent conversations and goodnight kisses quickly developed into something far darker and depraved.Everyday Terrie was assaulted and abused; her rapes were photographed, filmed and shared. Paul was regularly taunted and mercilessly beaten. But despite the bruises and the scars, and the desperate pleas for help, no one saw their pain.But through it all they stuck together, battling for their childhoods for over a decade and masterminding creative ways to outwit their stepfather and buy themselves fleeting moments of joy.In March 2013, thirty years on, Terrie and Paul made the brave decision to give up their right to anonymity to tell of the years of abuse they endured at the hands of their recently convicted step-father and raise awareness for the ongoing battle for justice for victims of child abuse. A powerful testament of what can be achieved through courage and love, this is their inspiring story.
Murder is Medical: A Susan Wiles Schoolhouse Mystery (Susan Wiles Schoolhouse Mysteries Book 10)
Diane Weiner - 2019
Louis to find out where Evan will be doing his residency, the Match Day celebration takes a deadly turn. The dean of the medical school dies at the reception. Was it a heart attack or was it murder? Kept in St. Louis due to a personal crisis, Susan teams up with the mother of the detective assigned to the case. It's double trouble as the duo uncovers secrets worthy of murder. Meanwhile, Susan confronts her biggest fear--losing someone close to her heart. Set in the biggest small town in the country, Murder is Medical takes you through a whirlwind of suspects and emotions as the mystery is unraveled.
Untitled Rosie Lewis Memoir 2: Part 1 of 3
Rosie Lewis - 2014
Slash
Paul Stenning - 2007
This work tells the story of this one-off guitarist who came to prominence through the debauchery and stellar chart success of the American west coast's Guns N' Roses. Full description
Gifted Magick: The Children of Dark Root: Book Two
April Aasheim - 2019
This famed rose is sought by all who know of it, saturated with Other-Worldly magick. An offering from one side of the Veil to the other, a symbol of beauty and love. --From the Grimoire of Juliana Benbridge *** It's Winter Solstice Days in Dark Root, and strange happenings abound. The Hellhounds that arrived with Samhain may still be lurking in the woods, people are forgetting things--as if under a spell, and June Bug has taken adolescent rebellion to an all new level. The only common thread appears to be Erin, the pretty, new waitress at Dip Stix. Determined to solve the riddle, Maggie once again turns to the Deciphering Stone and Juliana's scrolls. What she uncovers is a story with ancient roots, and modern relevance. In fact, what Maggie discovers might just be the most important discovery of her life. Magick. Mystery. Mysticism. Maggie.