Book picks similar to
Practical Lock Picking: A Physical Penetration Tester's Training Guide by Deviant Ollam
non-fiction
security
reference
infosec
Exploding the Phone: The Untold Story of the Teenagers and Outlaws Who Hacked Ma Bell
Phil Lapsley - 2013
Starting with Alexander Graham Bell's revolutionary "harmonic telegraph," by the middle of the twentieth century the phone system had grown into something extraordinary, a web of cutting-edge switching machines and human operators that linked together millions of people like never before. But the network had a billion-dollar flaw, and once people discovered it, things would never be the same.Exploding the Phone tells this story in full for the first time. It traces the birth of long-distance communication and the telephone, the rise of AT&T's monopoly, the creation of the sophisticated machines that made it all work, and the discovery of Ma Bell's Achilles' heel. Phil Lapsley expertly weaves together the clandestine underground of "phone phreaks" who turned the network into their electronic playground, the mobsters who exploited its flaws to avoid the feds, the explosion of telephone hacking in the counterculture, and the war between the phreaks, the phone company, and the FBI.The product of extensive original research, Exploding the Phone is a ground-breaking, captivating book.
Zero Day: The Threat In Cyberspace
Robert O'Harrow Jr. - 2013
For more than a year, Washington Post reporter Robert O'Harrow has explored the threats proliferating in our digital universe. This eBook is a compilation of that reporting. With chapters built around real people, including hackers, security researchers and corporate executives, this book will help regular people, lawmakers and businesses better understand the mind-bending challenge of keeping the internet safe from hackers and security breaches -- and all out war.
Secrets of Mental Math: The Mathemagician's Guide to Lightning Calculation and Amazing Math Tricks
Arthur T. Benjamin - 1993
Get ready to amaze your friends—and yourself—with incredible calculations you never thought you could master, as renowned “mathemagician” Arthur Benjamin shares his techniques for lightning-quick calculations and amazing number tricks. This book will teach you to do math in your head faster than you ever thought possible, dramatically improve your memory for numbers, and—maybe for the first time—make mathematics fun.Yes, even you can learn to do seemingly complex equations in your head; all you need to learn are a few tricks. You’ll be able to quickly multiply and divide triple digits, compute with fractions, and determine squares, cubes, and roots without blinking an eye. No matter what your age or current math ability, Secrets of Mental Math will allow you to perform fantastic feats of the mind effortlessly. This is the math they never taught you in school.Also available as an eBook
Kali Linux Revealed: Mastering the Penetration Testing Distribution
Raphaël Hertzog - 2017
They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.
Building Microservices: Designing Fine-Grained Systems
Sam Newman - 2014
But developing these systems brings its own set of headaches. With lots of examples and practical advice, this book takes a holistic view of the topics that system architects and administrators must consider when building, managing, and evolving microservice architectures.Microservice technologies are moving quickly. Author Sam Newman provides you with a firm grounding in the concepts while diving into current solutions for modeling, integrating, testing, deploying, and monitoring your own autonomous services. You'll follow a fictional company throughout the book to learn how building a microservice architecture affects a single domain.Discover how microservices allow you to align your system design with your organization's goalsLearn options for integrating a service with the rest of your systemTake an incremental approach when splitting monolithic codebasesDeploy individual microservices through continuous integrationExamine the complexities of testing and monitoring distributed servicesManage security with user-to-service and service-to-service modelsUnderstand the challenges of scaling microservice architectures
Boy Scout Handbook
Boy Scouts of America - 1911
Scouts past and present will be fascinated to see how scouting has changed, as well as what has stayed the same over the years.
How to Invent Everything: A Survival Guide for the Stranded Time Traveler
Ryan North - 2018
. . and then broke? How would you survive? Could you improve on humanity's original timeline? And how hard would it be to domesticate a giant wombat? With this book as your guide, you'll survive--and thrive--in any period in Earth's history. Bestselling author and time-travel enthusiast Ryan North shows you how to invent all the modern conveniences we take for granted--from first principles. This illustrated manual contains all the science, engineering, art, philosophy, facts, and figures required for even the most clueless time traveler to build a civilization from the ground up. Deeply researched, irreverent, and significantly more fun than being eaten by a saber-toothed tiger, How to Invent Everything will make you smarter, more competent, and completely prepared to become the most important and influential person ever.
CEH Certified Ethical Hacker All-in-One Exam Guide
Matt Walker - 2011
Pub the Date: September. 2011 of Pages: 416 in Publisher: McGraw-Hill the Get complete coverages of all the objectives included on the EC-Council's Certified the Ethical Hacker exam inside the this comprehensive resource. Written by an the IT security expert. The this the authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter. exam tips. practice exam questions. and in-depth explanations. Designed to help you pass the exam with ease. this definitive volume also serves as an essential on-the-job reference.COVERS ALL EXAM TOPICS. INCLUDING: Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses. trojans. and other ...
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.
CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007)
Mike Meyers - 1999
The book offers clear instruction and real-world examples from training expert and bestselling author Mike Meyers along with hundreds of accurate practice questions.Fulfilling the promise of the All-in-One series, this complete reference serves both as a study tool and a valuable on-the-job reference that will serve readers beyond the exam. CompTIA Network+ Certification All-in-One Exam Guide, Seventh Edition (Exam N10-007) also includes access to free video training and interactive hands-on labs and simulations that prepare you for difficult performance-based questions. A valuable pre-assessment test enables readers to gauge their familiarity with the test’s objectives and tailor an effective course for study.-Contains complete coverage of every objective for the CompTIA Network+ Certification exam-Written by CompTIA training and certification guru Mike Meyers- Electronic content includes the Total Tester exam simulator with over 100 practice questions, over an hour of training videos, and a collection of Mike Meyers’ favorite shareware and freeware networking utilities
Head First Software Development
Dan Pilone - 2007
Instead of surrendering to these common problems, let Head First Software Development guide you through the best practices of software development. Before you know it, those failed projects will be a thing of the past. With its unique visually rich format, this book pulls together the hard lessons learned by expert software developers over the years. You'll gain essential information about each step of the software development lifecycle -- requirements, design, coding, testing, implementing, and maintenance -- and understand why and how different development processes work. This book is for you if you are:Tired of your customers assuming you're psychic. You'll learn not only how to get good requirements, but how to make sure you're always building the software that customers want (even when they're not sure themselves) Wondering when the other 15 programmers you need to get your project done on time are going to show up. You'll learn how some very simple scheduling and prioritizing will revolutionize your success rate in developing software. Confused about being rational, agile, or a tester. You'll learn not only about the various development methodologies out there, but how to choose a solution that's right for your project. Confused because the way you ran your last project worked so well, but failed miserably this time around. You'll learn how to tackle each project individually, combine lessons you've learned on previous projects with cutting-edge development techniques, and end up with great software on every project.Head First Software Development is here to help you learn in a way that your brain likes... and you'll have a blast along the way. Why pick up hundreds of boring books on the philosophy of this approach or the formal techniques required for that one? Stick with Head First Software Development, and your projects will succeed like never before. Go on, get started... you'll learn and have fun. We promise.
Breaking and Entering: The Extraordinary Story of a Hacker Called "Alien"
Jeremy N. Smith - 2019
When she arrived at MIT in the 1990s, Alien was quickly drawn to the school’s tradition of high‑risk physical trespassing: the original “hacking.” Within a year, one of her hallmates was dead and two others were arraigned. Alien’s adventures were only just beginning. After a stint at the storied, secretive Los Alamos National Laboratory, Alien was recruited by a top cybersecurity firm where she deployed her cache of virtual weapons—and the trespassing and social engineering talents she had developed while “hacking” at MIT. The company tested its clients’ security by every means possible—not just coding, but donning disguises and sneaking past guards and secretaries into the C‑suite. Alien now runs a boutique hacking outfit that caters to some of the world’s biggest and most vulnerable institutions—banks, retailers, government agencies. Her work combines devilish charm, old‑school deception, and next generation spycraft. In Breaking and Entering, cybersecurity finally gets the rich, character‑driven, fast-paced treatment it deserves.
100 Deadly Skills: The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
Clint Emerson - 2015
From acts of terror to mass shootings, and from the unseen (and sometimes virtual) matrix of everyday crime, danger is no longer confined to dark alleys or unstable regions. Potentially life-threatening circumstances can arise anywhere, anytime, and Clint Emerson—former Navy SEAL—wants you to be prepared. 100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers—modified from the world of black ops—to help you take action in numerous “worst case” scenarios from escaping a locked trunk, to making an improvised Taser, to tricking facial recognition software. With easy-to-understand instructions and illustrations, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces. This complete course in survival teaches you how to prevent tracking, evade a kidnapping, elude an active shooter, rappel down the side of a building, immobilize a bad guy, protect yourself against cyber-criminals, and much more—all using low-tech to “no-tech” methods. Clear, detailed, and presented in an easy-to-understand and execute format, 100 Deadly Skills is an invaluable resource. Because let’s face it, when danger is imminent, you don’t have time for complicated instructions.
Hybrid Woodworking
Marc Spagnuolo - 2013
Working this way can produce beautiful results, but is it the best method for woodworking in the 21st century?In Hybrid Woodworking, author and Internet woodworking star Marc Spagnuolo offers a more efficient approach that combines the strength of power-tool and hand-tool techniques. The end result: You save time and effort while producing furniture that still has that stunning handmade look.The Hybrid SystemHybrid Woodworking will show you which machines and power tools are best for the grunt work of furniture making. It will explain which hand tools are essential for fine-tuning. And best of all, it will demonstrate techniques for working flawlessly and efficiently with every machine and tool in your shop.Making beautiful furniture can be immensely gratifying. By adopting the hybrid woodworking system you can get to that satisfying end result with less effort while enjoying every step along the way.
Spy the Lie: Three Former CIA Officers Reveal Their Secrets to Uncloaking Deception
Philip Houston - 2012
Be it hiring a new employee, investing in a financial interest, speaking with your child about drugs, confronting your significant other about suspected infidelity, or even dating someone new, having the ability to unmask a lie can have far-reaching and even life-altering consequences.As former CIA officers, Philip Houston, Michael Floyd, and Susan Carnicero are among the world’s best at recognizing deceptive behavior. Spy the Lie chronicles the captivating story of how they used a methodology Houston developed to detect deception in the counterterrorism and criminal investigation realms, and shows how these techniques can be applied in our daily lives.Through fascinating anecdotes from their intelligence careers, the authors teach listeners how to recognize deceptive behaviors, both verbal and nonverbal, that we all tend to display when we respond to questions untruthfully. For the first time, they share with the general public their methodology and their secrets to the art of asking questions that elicit the truth.Spy the Lie is a game-changer. You may never experience another book that has a more dramatic impact on your career, your relationships, or your future.©2012 Philip Houston, Susan Carnicero, Don Tennant, Michael Floyd (P)2012 Macmillan