Android Hacker's Handbook


Joshua J. Drake - 2013
    Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

Learning the UNIX Operating System


Jerry Peek - 1989
    Why wade through a 600-page book when you can begin working productively in a matter of minutes? It's an ideal primer for Mac and PC users of the Internet who need to know a little bit about UNIX on the systems they visit.This book is the most effective introduction to UNIX in print. The fourth edition covers the highlights of the Linux operating system. It's a handy book for someone just starting with UNIX or Linux, as well as someone who encounters a UNIX system on the Internet. And it now includes a quick-reference card.Topics covered include: Linux operating system highlightsLogging in and logging outWindow systems (especially X/Motif)Managing UNIX files and directoriesSending and receiving mailRedirecting input/outputPipes and filtersBackground processingBasic network commandsv

Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous


Gabriella Coleman - 2014
    She ended up becoming so closely connected to Anonymous that the tricky story of her inside–outside status as Anon confidante, interpreter, and erstwhile mouthpiece forms one of the themes of this witty and entirely engrossing book.The narrative brims with details unearthed from within a notoriously mysterious subculture, whose semi-legendary tricksters—such as Topiary, tflow, Anachaos, and Sabu—emerge as complex, diverse, politically and culturally sophisticated people. Propelled by years of chats and encounters with a multitude of hackers, including imprisoned activist Jeremy Hammond and the double agent who helped put him away, Hector Monsegur, Hacker, Hoaxer, Whistleblower, Spy is filled with insights into the meaning of digital activism and little understood facets of culture in the Internet age, including the history of “trolling,” the ethics and metaphysics of hacking, and the origins and manifold meanings of “the lulz.”

How to Speak Tech: The Non-Techie’s Guide to Key Technology Concepts


Vinay Trivedi - 2013
    Now it's time to find out how these things work. Vinay Trivedi peels back the mystery of the Internet, explains it all in the simplest terms, and gives you the knowledge you need to speak confidently when the subject turns to technology.This revised second edition of How to Speak Tech consists of two parts: the first spells out the essential terms and technologies of Internet startups to get you up to speed on the jargon you need to know; the second is a primer on the latest tech trends, including the blockchain, augmented and virtual reality, Internet of Things, and artificial intelligence.Neither the Internet nor the top tech trends are beyond anyone, given the right teaching. This book breaks down the major concepts and technologies of a modern app into bite-sized chapters, helping you understand topics that usually are not explained clearly and showing you that it's not rocket science.So go ahead, grab this book and start to speak tech.What You'll LearnUnderstand the basics of new and established technologies such as blockchain, artificial intelligence (AI), augmented and virtual reality (AR and VR), Internet of Things (IoT), software development, programming languages, databases, and moreListen intelligently and speak confidently when technologies are brought up in your businessBe confident in your grasp of terms and technologies when setting up your own organization's application Who This Book Is ForStudents who want to understand different technologies relevant to their future careers at startups and established organizations, as well as business and other non-technical professionals who encounter and require an understanding of key technical terms and trends to succeed in their rolesReviews "Finally, a book non-techies can use to understand the web technologies that are changing our lives." Paul Bottino, Executive Director, Technology and Entrepreneurship Center, Harvard University "A great book everyone can use to understand how tech startups work." Rene Reinsberg, Founder, Celo; Former VP of Emerging Products, GoDaddy "Through the simplicity of his presentation, Vinay shows that the basics of technology can be straightforwardly understood by anyone who puts in the time and effort to learn." Joseph Lassiter, Professor of Management Science, Harvard Business School and Harvard Innovation Lab

Getting Started with OAuth 2.0


Ryan Boyd - 2011
    This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system

Head Rush Ajax


Brett McLaughlin - 2006
    Asynchronous programming lets you turn your own web sites into smooth, slick, responsive applications that make your users feel like they're back on the information superhighway, not stuck on a dial-up backroad.But who wants to take on next-generation web programming with the last generation's instruction book? You need a learning experience that's as compelling and cutting-edge as the sites you want to design. That's where we come in. With Head Rush Ajax, in no time you'll be writing JavaScript code that fires off asynchronous requests to web servers...and having fun doing it. By the time you've taken your dynamic HTML, XML, JSON, and DOM skills up a few notches, you'll have solved tons of puzzles, figured out how well snowboards sell in Vail, and even watched a boxing match. Sound interesting? Then what are you waiting for? Pick up Head Rush Ajax and learn Ajax and asynchronous programming the right way--the way that sticks.If you've ever read a Head First book, you know what to expect: a visually rich format designed for the way your brain works. Head Rush ramps up the intensity with an even faster look and feel. Have your first working app before you finish Chapter 1, meet up with the nefarious PROJECT: CHAOS stealth team, and even settle the question of the Top 5 Blues CDs of all time. Leave boring, clunky web sites behind with 8-tracks and hot pants--and get going with next-generation web programming."If you thought Ajax was rocket science, this book is for you. Head Rush Ajax puts dynamic, compelling experiences within reach for every web developer." -- Jesse James Garrett, Adaptive Path"A 'technology-meets-reality' book for web pioneers on the cutting edge." -- Valentin Crettaz, CTO, Condris Technologies

The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography


Simon Singh - 1999
    From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy.Throughout the text are clear technical and mathematical explanations, and portraits of the remarkable personalities who wrote and broke the world’s most difficult codes. Accessible, compelling, and remarkably far-reaching, this book will forever alter your view of history and what drives it. It will also make you wonder how private that e-mail you just sent really is.

The Smart Girl's Guide to Privacy: Practical Tips for Staying Safe Online


Violet Blue - 2014
    For every trustworthy website, there are countless jerks, bullies, and scam artists who would harvest your personal information for their own purposes. But you can fight back, right now.In The Smart Girl’s Guide to Privacy, award-winning author and investigative journalist Violet Blue shows you how women are targeted online and how to keep yourself safe. Blue’s practical, user-friendly advice will show you how to:•Delete personal content from websites•Use website and browser privacy controls effectively•Recover from and prevent identity theft•Figure out where the law protects you—and where it doesn’t•Set up safe online profiles•Remove yourself from people finder websitesEven if your privacy has already been compromised, don’t panic. It’s not too late to take control. Let The Smart Girl’s Guide to Privacy help you cut through the confusion and start protecting your online life.

Speccy Nation


Dan Whitehead - 2012
    The British games industry would go on to create such hits as Tomb Raider and Grand Theft Auto, our innovation and imagination the envy of the world, our programmers the most sought after talent in the fastest growing entertainment medium in history.And it all started here.Welcome to the Speccy Nation.Join veteran games journalist and author Dan Whitehead on a journey through fifty games that helped to define the golden age of British gaming. From the timeless classics to unlikely cult favourites, and even the games so eccentric they could only have come from Britain in the 1980s.Part nostalgic look at the past, and part critical eye on the present and future, Speccy Nation is essential reading for all retro gaming enthusiasts.Includes a foreword by Your Sinclair's Phil "Snouty" South.

Fundamentals of Computers


V. Rajaraman - 2011
    

Zero Day


Mark E. Russinovich - 2011
    An oil tanker runs aground in Japan when its navigational system suddenly stops dead. Hospitals everywhere have to abandon their computer databases when patients die after being administered incorrect dosages of their medicine. In the Midwest, a nuclear power plant nearly becomes the next Chernobyl when its cooling systems malfunction.At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the U.S. computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe.Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today -- it's a cataclysmic disaster just waiting to happen.

Head First EJB


Kathy Sierra - 2003
    As the industry standard for platform-independent reusable business components, EJB has just become Sun Microsystem's latest developer certification. Whether you want to be certifiable or just want to learn the technology inside and out, Head First EJB will get you there in the least painful way. And with the greatest understanding.You'll learn not just what the technology is, but more importantly, why it is, and what it is and isn't good for. You'll learn tricks and tips for EJB development, along with tricks and tips for passing this latest, very challenging Sun Certified Business Component Developer (SCBCD) exam. You'll learn how to think like a server. You'll learn how to think like a bean. And because this is a Head First book, you'll learn how to think about thinking.Co-author Kathy Sierra was one of Sun's first employees to teach brave, early adopter customers how to use EJB. She has the scars. But besides dragging you deep into EJB technology, Kathy and Bert will see you through your certification exam, if you decide to go for it. And nobody knows the certification like they do - they're co-developers of Sun's actual exam!As the second book in the Head First series, Head First EJB follows up the number one best-selling Java book in the US, Head First Java. Find out why reviewers are calling it a revolution in learning tough technical topics, and why Sun Chairman and CEO Scott McNealy says, "Java technology is everywhere...if you develop software and haven't learned Java, it's definitely time to dive in "Head First."And with Head First book, you don't even have to feel guilty about having fun while you're learning; it's all part of the learning theory. If the latest research in cognitive science, education, and neurobiology suggested that boring, dry, and excruciatingly painful was the best way to learn, we'd have done it. Thankfully, it's been shown that your brain has a sense of style, a sense of humour, and a darn good sense of what it likes and dislikes.In Head First EJB, you'll learn all about:Component-based and role-based development The architecture of EJB, distributed programming with RMI Developing and Deploying an EJB application The Client View of a Session and Entity bean The Session Bean Lifecycle and Component Contract The Entity bean Lifecycle and Component Contract Container-managed Persistence (CMP) Container-managed Relationships (CMR) EJB-QL Transactions Security EJB Exceptions The Deployment Descriptor The Enterprise Bean Environment in JNDI Programming Restrictions and PortabilityThe book includes over 200 mock exam questions that match the tone, style, difficulty, and topics on the real SCBCD exam. See why Kathy and Bert are responsible for thousands of successful exam-passers--"The Sun certification exam was certainly no walk in the park, but Kathy's material allowed me to not only pass the exam, but Ace it!" --Mary Whetsel, Sr. Technology Specialist, Application Strategy and Integration, The St. Paul Companies"Kathy Sierra and Bert Bates are two of the few people in the world who can make complicated things seem damn simple, and as if that isn't enough, they can make boring things seem interesting." --Paul Wheaton, The Trail Boss, javaranch.com"Who better to write a Java study guide than Kathy Sierra, reigning queen of Java instruction? Kathy Sierra has done it again. Here is a study guide that almost guarantees you a certification!" --James Cubetta, Systems Engineer, SGI

Guerrilla Home Recording: How to Get Great Sound from Any Studio {No Matter How Weird or Cheap Your Gear Is}


Karl Coryat - 2004
    The revised edition is updated with a greater focus on digital recording techniques, the most powerful tools available to the home recordist. There are chapters devoted to instrument recording, humanizing drum patterns, mixing with plug-ins and virtual consoles, and a new section on using digital audio skills. And since, many true "Guerrillas" still record to analog tape, we have retained the best of that world. This edition features many more graphics than in the original edition, further enforcing Guerrilla Home Recording's reputation as the most readable, user-frienly recording title on the market.

Mastering Vmware Vsphere 5


Scott Lowe - 2011
    You'll learn how to install, configure, operate, manage, and secure the latest release.Covers all the new features and capabilities of the much-anticipated new release of VMware vSphere Discusses the planning, installation, operation, and management for the latest release Reviews migration to the latest vSphere software Offers hands-on instruction and clear explanations with real-world examples Mastering VMware vSphere is the strategic guide you need to maximize the opportunities of virtualization.

VMware vSphere 5 Clustering Technical Deepdive


Frank Denneman - 2011
    It covers the basic steps needed to create a vSphere HA and vSphere DRS cluster and to implement vSphere Storage DRS. Even more important, it explains the concepts and mechanisms behind HA, DRS and Storage DRS which will enable you to make well educated decisions. This book will take you in to the trenches of HA, DRS and Storage DRS and will give you the tools to understand and implement e.g. HA admission control policies, DRS resource pools, Datastore Clusters and resource allocation settings. On top of that each section contains basic design principles that can be used for designing, implementing or improving VMware infrastructures and fundamental supporting features like (Storage) vMotion, Storage I/O Control and much more are described in detail for the very first time. This book is also the ultimate guide to be prepared for any HA, DRS or Storage DRS related question or case study that might be presented during VMware VCDX, VCP and or VCAP exams.Coverage includes: HA node types HA isolation detection and response HA admission control VM Monitoring HA and DRS integration DRS imbalance algorithm Resource Pools Impact of reservations and limits CPU Resource Scheduling Memory Scheduler DPM Datastore Clusters Storage DRS algorithm Influencing SDRS recommendationsBe prepared to dive deep!