The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

700 Best Kindle Fire Apps: Including the Top 500+ Free Apps!


Steve Weber - 2014
    Your ultimate tablet experience is just one step away - selecting the applications, or apps, that provide exactly the entertainment, education, and functionality you desire. And that's where this guide will help you: finding the gems in Amazon's App Store. The App Store contains a breathtaking array of games, entertainment, utilities, and tools. Even though there are more than 700 apps described in this book, the bar was set very high--only a small percentage of the available apps are profiled here. Only those apps that deliver outstanding functionality - and whose developers have demonstrated a serious commitment to their customers - have made it into this reference guide. Nobody enjoys spending time weeding through apps that don't deliver the promised features (or contain hidden features you'd rather not have installed on your Kindle Fire). So what are you waiting for? Let's get started! Contents: INTRODUCTION ► BOOKS AND COMICS ► COMMUNICATION ► COOKING APPS ► EDUCATION ► ENTERTAINMENT ► FINANCE ► GAMES ► HEALTH AND FITNESS ► KIDS ► LIFESTYLE ► MUSIC ► NAVIGATION ► NEWS & MAGAZINES ► NOVELTY ► PHOTOGRAPHY ► PODCASTS ► PRODUCTIVITY ► REAL ESTATE ► REFERENCE ► SHOPPING ► SOCIAL NETWORKING ► SPORTS ► TRAVEL ► UTILITIES ► WEATHER ► WEB BROWSERS BOOK LOVERS, REJOICE! INDEX

Penetration Testing: A Hands-On Introduction to Hacking


Georgia Weidman - 2014
    This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.

Pocket Guide to APA Style


Robert Perrin - 2006
    In addition to step-by-step coverage of documentation, the book includes an overview of the research-writing process entitled "Writing Scholarly Papers" and three useful appendices. Thorough and practical, this convenient reference guide is also less expensive and easier for undergraduates to use than the APA Manual. The Second Edition features expanded coverage of electronic sources to keep students up-to-date on using and evaluating Internet references in their research. In addition, this new edition provides more guidance on avoiding plagiarism. The two sample APA-style papers--one argumentative and one experimental--are carefully annotated to give students extra support as they master the elements of manuscript preparation and documentation principles.

Network Warrior


Gary A. Donahue - 2007
    What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

Programming the Semantic Web


Toby Segaran - 2009
    You'll learn how to incorporate existing data sources into semantically aware applications and publish rich semantic data. Each chapter walks you through a single piece of semantic technology and explains how you can use it to solve real problems. Whether you're writing a simple mashup or maintaining a high-performance enterprise solution,Programming the Semantic Web provides a standard, flexible approach for integrating and future-proofing systems and data. This book will help you:Learn how the Semantic Web allows new and unexpected uses of data to emergeUnderstand how semantic technologies promote data portability with a simple, abstract model for knowledge representationBecome familiar with semantic standards, such as the Resource Description Framework (RDF) and the Web Ontology Language (OWL)Make use of semantic programming techniques to both enrich and simplify current web applications

Race Against The Machine


Erik Brynjolfsson - 2011
    Drawing on research by their team at the Center for Digital Business, they show that there's been no stagnation in technology -- in fact, the digital revolution is accelerating. Recent advances are the stuff of science fiction: computers now drive cars in traffic, translate between human languages effectively, and beat the best human Jeopardy! players.As these examples show, digital technologies are rapidly encroaching on skills that used to belong to humans alone. This phenomenon is both broad and deep, and has profound economic implications. Many of these implications are positive; digital innovation increases productivity, reduces prices (sometimes to zero), and grows the overall economic pie.But digital innovation has also changed how the economic pie is distributed, and here the news is not good for the median worker. As technology races ahead, it can leave many people behind. Workers whose skills have been mastered by computers have less to offer the job market, and see their wages and prospects shrink. Entrepreneurial business models, new organizational structures and different institutions are needed to ensure that the average worker is not left behind by cutting-edge machines.In Race Against the Machine Brynjolfsson and McAfee bring together a range of statistics, examples, and arguments to show that technological progress is accelerating, and that this trend has deep consequences for skills, wages, and jobs. The book makes the case that employment prospects are grim for many today not because there's been technology has stagnated, but instead because we humans and our organizations aren't keeping up.

Offline: Free Your Mind from Smartphone and Social Media Stress


Imran Rashid - 2018
    In Offline, they deliver an eye-opening research-based journey into the world of tech giants, smartphones, social engineering, and subconscious manipulation. This provocative work shows you how digital devices change individuals and communities for better and worse.A must-read if you or your kids use smartphones or tablets and spend time browsing social networks, playing online games or even just browsing sites with news and entertainment.   Learn how to recognize ‘mind hacks’ and avoid the potentially disastrous side-effects of digital pollution. Unplug from the matrix. Learn digital habits that work for you.

@War: The Rise of the Military-Internet Complex


Shane Harris - 2014
    In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.

Einstein's Refrigerator and Other Stories from the Flip Side of History


Steve Silverman - 2001
    In fact, they worked so well that the science teacher then began posting his discoveries to his own Web site, which he dubbed Useless Information. Well-researched and clearly sourced, Silverman's unusual tidbits have gained a wide following.In Einstein's Refrigerator, Silverman collects more than 30 of the most fascinating stories he has gathered--tales of forgotten genius, great blunders, and incredible feats of survival, as well as answers to puzzling questions.Einstein's Refrigerator is a remarkable book with spellbinding stories. Whatever happened to the refrigerator Einstein helped invent? While it never became a commercial success, its underlying concepts became the basis for cooling nuclear breeder reactors.

Java Network Programming


Elliotte Rusty Harold - 1997
    It is a clear, complete introduction to developing network programs (both applets and applications) using Java, covering everything from networking fundamentals to remote method invocation (RMI). Java Network Programming, 3rd Edition includes chapters on TCP and UDP sockets, multicasting protocol and content handlers, servlets, multithreaded network programming, I/O, HTML parsing and display, the Java Mail API, and the Java Secure Sockets Extension. There's also significant information on the New I/O API that was developed in large part because of the needs of network programmers. This invaluable book is a complete, single source guide to writing sophisticated network applications. Packed with useful examples, it is the essential resource for any serious Java developer.

IPv6 Essentials


Silvia Hagen - 2002
    It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure.Beginning with a short history of IPv6, author Silvia Hagen provides an overview of new functionality and discusses why we need IPv6. Hagen also shares exhaustive discussions of the new IPv6 header format and Extension Headers, IPv6 address and ICMPv6 message format, Security, QoS, Mobility and, last but not least, offers a Quick Start Guide for different operating systems. IPv6 Essentials, Second Edition also covers:In-depth technical guide to IPv6 Mechanisms and Case Studies that show how to integrate IPv6 into your network without interruption of IPv4 services Routing protocols and upper layer protocols Security in IPv6: concepts and requirements. Includes the IPSEC framework and security elements available for authentication and encryption Quality of Service: covers the elements available for QoS in IPv6 and how they can be implemented Detailed discussion of DHCPv6 and Mobile IPv6 Discussion of migration cost and business case Getting started on different operating systems: Sun Solaris, Linux, BSD, Windows XP, and Cisco routersWhether you're ready to start implementing IPv6 today or are planning your strategy for the future, IPv6 Essentials, Second Edition will provide the solid foundation you need to get started."Silvia's look at IPv6 is always refreshing as she translates complex technology features into business drivers and genuine end-user benefits to enable building new business concepts based on end to end models." Latif Ladid, President IPv6 Forum, Chair EU IPv6 Task Force

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Michael Sikorski - 2011
    When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

The 100 Simple Secrets of Happy People: What Scientists Have Learned and How You Can Use It


David Niven - 2000
    BASED ON SCIENTIFIC RESEARCH AND PSYCHOLOGICAL STUDIES OF REAL PEOPLE, THESE 100 PRACTICES, ATTITUDES AND HABITS HAVE BEEN PROVEN TO TRANSFORM A UNHAPPY EXISTENCE INTO A FULL AND HAPPY LIFE.Experts have spent their careers investigating what mak