Book picks similar to
Network Security Technologies and Solutions (CCIE Professional Development Series) (CCIE Professional Development (Unnumbered)) by Yusuf Bhaiji
reference
information-security
computers
general
DNS and BIND
Cricket Liu - 1996
This book brings you up-to-date with the latest changes in this crucial service.The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.Topics include:What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz - 2014
But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."
The Way to Go: A Thorough Introduction to the Go Programming Language
Ivo Balbaert - 2012
"
All Your Base Are Belong to Us: How Fifty Years of Videogames Conquered Pop Culture
Harold Goldberg - 2011
But as the gaming industry grows in numerous directions and everyone talks about the advance of the moment, few explore and seek to understand the forces behind this profound evolution. How did we get from Space Invaders to Grand Theft Auto? How exactly did gaming become a $50 billion industry and a dominant pop culture form? What are the stories, the people, the innovations, and the fascinations behind this incredible growth?Through extensive interviews with gaming's greatest innovators, both its icons and those unfairly forgotten by history, All Your Base Are Belong To Us sets out to answer these questions, exposing the creativity, odd theories--and passion--behind the twenty-first century's fastest-growing medium.Go inside the creation of: Grand Theft Auto * World of Warcraft * Bioshock * Kings Quest * Bejeweled * Madden Football * Super Mario Brothers * Myst * Pong * Donkey Kong * Crash Bandicoot * The 7th Guest * Tetris * Shadow Complex * Everquest * The Sims * And many more!
Study Package for NTSE Class X
McGraw-Hill Education - 2014
This latest edition has included an english language test to stage 2 of the examination - as opposed to the previous edition that only covered scholastic aptitude and mental ability in part one and part two.study package for ntse class x is meant to provide a comprehensive coverage of all the topics that are prescribed in the most recent format of the prestigious ntse exam. Based around the syllabi of classes 9 and 10, it has been carefully framed to optimize the studying patterns of aspiring students who wish to write the exam.the book covers the necessary topics in each stage of the exam and is divided into sections that individually address all of these. It thus helps stimulate a real-world test environment. Some of the topics covered include the verbal test, non-verbal test and the assignments given in sections a, b and c in stage one (mental ability). Also included in stage 2 (scholastic aptitude) are subjects like physics, chemistry, biology, history, geography, economics, mathematics, political science, and, recently included after last year's examination - the english language test portion as well.the book was published in the year 2014 by tata mcgrawhill publication and is available in paperback.
Once a Bitcoin Miner: Scandal and Turmoil in the Cryptocurrency Wild West
Ethan Lou - 2021
From investing in Bitcoin in university to his time writing for Reuters, and then mining the digital asset ― Lou meets a co-founder of Ethereum and Gerald Cotten of QuadrigaCX (before he was reported dead), and hangs out in North Korea with Virgil Griffith, the man later arrested for allegedly teaching blockchain to the totalitarian state.Coming of age in the 2008 financial crisis, Lou's generation has a natural affinity with this rebel internet money, this so-called millennial gold, created in the wake of that economic storm. At once an immersive narrative of adventure and fortune, Once a Bitcoin Miner is also a work of journalistic rigor. Lou examines this domain through the lens of the human condition, delving deep into the lives of the fast-talkers, the exiles, the ambitious, and the daring, forging their paths in a new world harsh and unpredictable.
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson - 2010
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
Introducing Windows 10 for IT Professionals
Ed Bott - 2015
This guide introduces new features and capabilities, providing a practical, high-level overview for IT professionals ready to begin deployment planning now. This book is a preview, a work in progress about a work in progress. It offers a snapshot of the Windows 10 Technical Preview as of April 2015, on the eve of the BUILD Developers’ Conference in San Francisco.
Brand Strategy 101: Your Logo Is Irrelevant - The 3 Step Process to Build a Kick-Ass Brand
Michael R. Drew - 2013
No really, it is. Let me explain.It turns out that drooling dogs and ringing bells are far more important than a logo (thank you Pavlov).Sure, successful businesses have logos--easily recognizable logos. Playboy, McDonald's, Coke. But there's far more to their success than bunny ears, golden arches or a certain shade of red. Stripped of all the marketing lingo, branding is pretty simple: Your brand is all the associations that come to mind when your potential customers see or hear your name.Whether your focus is on personal branding or on branding your company culture--you've got to have more than a fancy logo and edgy color scheme to create brand stickability (you know, a brand your customers can't get out of their heads).Well, there’s a process to capturing attention and getting your foot in the door of your customers’ minds. Here's a taste of some of the personal branding advice you'll find in this book:You must become the first solution your customer thinks of when they have a problem you can solve. How?The first step is to figure out what your audience cares about. What keeps them up at night? What problems can you help them solve? From there, you need to apply these three steps:1) Frequency2) Repetition3) AnchoringIn this e-book, we’ll show you how to figure out what your customers really want. Then we will show you how to apply these three steps to help you become the trusted resource that comes to mind first when your customer’s itch needs to be scratched.Is real and authentic branding going to happen overnight? Probably not. But ask yourself this: Do you want short-term results that lose effectiveness? Or are you willing to invest a bit more time and effort to create long-term results that get better and better?If you're looking for a branding book that promises a quick fix, this isn't the book for you. But if you want to create a brand that sticks like superglue--read this book!Go ahead and let the wimps and whiners have the get-rich quick schemes that fizzle and fall flat like a wet firework. You want to ignite a branding bonfire.
Niubi!: The Real Chinese You Were Never Taught in School
Eveline Chao - 2009
So whether you?re planning a trip to Beijing, flirting with an online acquaintance from Shanghai, or just want to start a fight in Chinatown--Niubi! will ensure that nothing you say is lost in translation.
The Astral Projection Guidebook: Mastering the Art of Astral Travel
Erin Pavlina - 2013
Learn to Master Astral TravelWould you like to walk through walls, fly around the world, reconnect with deceased loved ones, and explore time and space? Have you had a terrifying out of body encounter that left you fearful of ever exploring astral projection? Would you like to know how to travel the astral realms safely and protect yourself from unwanted projections?Whether you are a novice or an experienced astral traveler, the Astral Projection Guidebook will teach you how to master astral projection safely and effectively.In this guide, you’ll learn how to:•Prepare yourself for a positive astral journey•Achieve separation from your body•Explore the astral realms – alone or with friends•Enjoy mind-blowing astral sex•Protect yourself from dark entities•Train to become an astral warriorGet ready to have fun exploring the astral realms!
Erlang and OTP in Action
Martin Logan - 2010
Multi-core processors and the increasing demand for maximum performance and scalability in mission-critical applications have renewed interest in functional languages like Erlang that are designed to handle concurrent programming. Erlang, and the OTP platform, make it possible to deliver more robust applications that satisfy rigorous uptime and performance requirements.Erlang and OTP in Action teaches you to apply Erlang's message passing model for concurrent programming--a completely different way of tackling the problem of parallel programming from the more common multi-threaded approach. This book walks you through the practical considerations and steps of building systems in Erlang and integrating them with real-world C/C++, Java, and .NET applications. Unlike other books on the market, Erlang and OTP in Action offers a comprehensive view of how concurrency relates to SOA and web technologies.This hands-on guide is perfect for readers just learning Erlang or for those who want to apply their theoretical knowledge of this powerful language. You'll delve into the Erlang language and OTP runtime by building several progressively more interesting real-world distributed applications. Once you are competent in the fundamentals of Erlang, the book takes you on a deep dive into the process of designing complex software systems in Erlang. Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.
The Wealth of Networks: How Social Production Transforms Markets and Freedom
Yochai Benkler - 2006
The phenomenon he describes as social production is reshaping markets, while at the same time offering new opportunities to enhance individual freedom, cultural diversity, political discourse, and justice. But these results are by no means inevitable: a systematic campaign to protect the entrenched industrial information economy of the last century threatens the promise of today’s emerging networked information environment.In this comprehensive social theory of the Internet and the networked information economy, Benkler describes how patterns of information, knowledge, and cultural production are changing—and shows that the way information and knowledge are made available can either limit or enlarge the ways people can create and express themselves. He describes the range of legal and policy choices that confront us and maintains that there is much to be gained—or lost—by the decisions we make today.
Strategic Management: Text and Cases
Gregory G. Dess - 1995
The text is rounded off by rich, relevant, and teachable cases. This text's accessible writing style and wealth of new and updated illustrations, which clarify the most difficult topics, make this text the best resource for your students. The new case selections emphasize variety, currency, and familiar company names. The cases are up-to-date in terms of both financial data and strategic issues. This group of cases gives both instructors and students unparalleled quality and variety. Based on consistent reviewer feedback, these selections combine comprehensive and shorter length cases about well known companies.