Penetration Testing: A Hands-On Introduction to Hacking


Georgia Weidman - 2014
    This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.

Writing A Novel with Ulysses III


David Hewson - 2014
    Best-selling novelist David Hewson, author of the ever-popular Writing A Novel with Scrivener, offers a professional insight into how to use this unique app for writing fiction. This ebook covers all the aspects of Ulysses a writer needs to master in order to produce a finished book, from initial planning through to completed ebook, Word file or PDFs for publication, reading and revision. You will learn how to use Ulysses to structure a book into parts and scenes, ways to manage research and ideas and how to develop a novel from a bare outline through to first draft and revisions. Hewson also describes how Ulysses stores work uniquely in its own library, enabling you to work on the same draft manuscript across different machines while on the move. For budding screenwriters there is a section on how to use Ulysses to produce scripts to professional formats that can be edited later in movie apps such as Final Draft. And this release will also include a free upgrade to an updated edition covering the next release of Ulysses and the forthcoming iPad app. David Hewson (www.davidhewson.com) is the author of more than 25 novels published around the world. He adapted the award-winning TV series The Killing into acclaimed novel and recently launched a new crime series set in Amsterdam with The House of Dolls which has been optioned for Dutch TV.

CSS and Documents


Eric A. Meyer - 2012
    

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

Security Pillar: AWS Well-Architected Framework (AWS Whitepaper)


AWS Whitepapers - 2016
    It provides guidance to help customers apply best practices in the design, delivery, and maintenance of secure AWS environments. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.

Cloud Computing for Dummies


Judith Hurwitz - 2009
    If you've been put in charge of implementing cloud computing, this straightforward, plain-English guide clears up the confusion and helps you get your plan in place.You'll learn how cloud computing enables you to run a more green IT infrastructure, and access technology-enabled services from the Internet ("in the cloud") without having to understand, manage, or invest in the technology infrastructure that supports them. You'll also find out what you need to consider when implementing a plan, how to handle security issues, and more.Cloud computing is a way for businesses to take advantage of storage and virtual services through the Internet, saving money on infrastructure and support This book provides a clear definition of cloud computing from the utility computing standpoint and also addresses security concerns Offers practical guidance on delivering and managing cloud computing services effectively and efficiently Presents a proactive and pragmatic approach to implementing cloud computing in any organization Helps IT managers and staff understand the benefits and challenges of cloud computing, how to select a service, and what's involved in getting it up and running Highly experienced author team consults and gives presentations on emerging technologies Cloud Computing For Dummies gets straight to the point, providing the practical information you need to know.

Kindle Fire Tips, Tricks and Traps: A How-To Tutorial for the Kindle Fire HD


Edward C. Jones - 2012
    THIS BOOK has been written to cover BOTH the current ("2nd generation") Kindle Fire HD, AND the earlier ("1st Generation") Kindle Fire HD.<br><br></h2><br><br><h2>"Fantastic..." "Great Help..." "Easy for a non-geek to understand." -Actual reviewer comments for Kindle Fire HD Tips, Tricks, and Traps: A How-To Tutorial for the Kindle Fire HD</h2><br><i><br>"Fantastic! I searched and searched for a source to help me better understand my new Kindle. I was about to give up and then I found this book. I have discovered so many tips and tricks! I am enjoying my Kindle so much more!"<br><br>"Easy for a non-geek to understand. Thanks for writing a book that I can understand. Very basic guide to the kindle fire that is easy to follow and makes it easy to implement any suggestions offered. The directions given matched what is actually on my kindle fire. I have read a couple of books that were supposedly updated for late 2012 or for January 2013 that gave instructions for actions on my kindle fire that didn't match what I see on my device bough in December 2012. This is hugely frustrating to a tech novice. This book told me exactly where to go and what to do."<br><br>"Great help. This was a big help with my first venture in tablet land. A lot of good ideas. A must read for any kindle user."<br></i><br><br>So, you've got a Kindle Fire as a gift, or perhaps you bit the purchase bullet on your own because you wanted this impressive tablet. Do you want to get the most out of your new Kindle Fire HD? If you are looking for a top-notch tutorial at a reasonable cost, you've come to the right place! Here is the book that will teach you 100% of what you need to know. <b>Kindle Fire HD Tips, Tricks, and Traps: A How-To Tutorial for the Kindle Fire HD</b> is your detailed guide to getting the maximum benefit from your Kindle Fire HD.<br>In this comprehensive guide, you'll learn tips (ways to effectively use your Kindle Fire), tricks (ways to improve the operation of your Kindle Fire), and traps (things to avoid to prevent problems while using your Kindle Fire). You will learn-<br><br>• How to get around within the user interface, the home screen, and the carousel more efficiently<br><br>• How to make your Kindle Fire your own, customizing its display and operation for fastest and easiest use<br><br>• How to find THOUSANDS of FREE books, as well as movies and songs, for your Kindle Fire<br><br>• How to setup the security options to protect your account information<br><br>• How you can move your iTunes or other music library to your Kindle Fire<br><br>• How you can download YouTube videos to your Kindle Fire<br><br>* How to use the built-in camera and the new camera app provided by Amazon in a late 2012 software update<br><br>• Suggested apps that no Kindle Fire owner should be without<br><br>You will learn all of the above and more, with Kindle Fire Tips, Tricks, and Traps: A How-To Tutorial for the Kindle Fire HD as a part of your library.

Foundations of Software Testing ISTQB Certification


Rex Black - 2006
    Completely updated to comprehensively reflect the most recent changes to the ISTQB Foundation Syllabus, the book adopts a practical, hands-on approach, covering the fundamental topics that every system and software tester should know. The authors are themselves developers of the ISTQB syllabus and are highly respected international authorities, teachers and authors within the field of software testing.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Learning Node


Shelley Powers - 2012
    This guide offers a friendly way to master Node fundamentals with clear and concise information you can use right away.Built on Google’s V8 JavaScript engine, Node offers high performance and easy scalability for server-side applications. Learning Node walks you through the differences and parallels between client-side and server-side programming, with practical examples of programming and deployment.* Quickly learn how to install and deploy Node* Understand how to use Node and related components to build sites and applications efficiently* Manage Node modules with npm* Create pages easily with template systems* Apply client-side skills, tools, and techniques on the server* Maintain a connection between browser and server with web sockets

The Little Go Book


Karl Seguin - 2014
    It's aimed at developers who might not be quite comfortable with the idea of pointers and static typing.http://openmymind.net/The-Little-Go-B...

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code


Michael Hale Ligh - 2010
    Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Python Essential Reference (Developer's Library)


David Beazley - 1999
    This text concisely describes the Python language and its programming environment for those readers already familiar with languages such as C and C++.

Introduction to Data Communications and Networking


Wayne Tomasi - 2004
    KEY TOPICS: Topics explored include wireless and wireline telecommunications systems, basic data communications networks and systems, local area networks, internetworks, and the Internet including TCP/IP protocol suite. MARKET: For professionals with a career or interest in electronic communications, data communications, and/or networking, as well as ECT, EET, and CET technologists.

Pro Django


Marty Alchin - 2008
    Learn how to leverage the Django web framework to its full potential in this advanced tutorial and reference. Endorsed by Django, Pro Django more or less picks up where The Definitive Guide to Django left off and examines in greater detail the unusual and complex problems that Python web application developers can face and how to solve them.Provides in-depth information about advanced tools and techniques available in every Django installation Runs the gamut from the theory of Django's internal operations to actual code that solves real-world problems for high-volume environments Goes above and beyond other books, leaving the basics behind Shows how Django can do things even its core developers never dreamed possible