Book picks similar to
Introduction to Theoretical Computer Science by Boaz Barak
computer-science
cyber
textbooks
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Network Security: Private Communication in a Public World
Charlie Kaufman - 1995
In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
The Windows Command Line Beginner's Guide (Computer Beginner's Guides)
Jonathan Moeller - 2011
The Windows Command Line Beginner's Guide gives users new to the Windows command line an overview of the Command Prompt, from simple tasks to network configuration.In the Guide, you'll learn how to:-Manage the Command Prompt.-Copy & paste from the Windows Command Prompt.-Create batch files.-Remotely manage Windows machines from the command line.-Manage disks, partitions, and volumes.-Set an IP address and configure other network settings.-Set and manage NTFS and file sharing permissions.-Customize and modify the Command Prompt.-Create and manage file shares.-Copy, move, and delete files and directories from the command line.-Manage PDF files and office documents from the command line.-And many other topics.
The Haskell School of Expression: Learning Functional Programming Through Multimedia
Paul Hudak - 2000
It has become popular in recent years because of its simplicity, conciseness, and clarity. This book teaches functional programming as a way of thinking and problem solving, using Haskell, the most popular purely functional language. Rather than using the conventional (boring) mathematical examples commonly found in other programming language textbooks, the author uses examples drawn from multimedia applications, including graphics, animation, and computer music, thus rewarding the reader with working programs for inherently more interesting applications. Aimed at both beginning and advanced programmers, this tutorial begins with a gentle introduction to functional programming and moves rapidly on to more advanced topics. Details about progamming in Haskell are presented in boxes throughout the text so they can be easily found and referred to.
Understanding Social Networks: Theories, Concepts, and Findings
Charles Kadushin - 2011
Understanding Social Networks fills that gap by explaining the big ideas that underlie the social network phenomenon. Written for those interested in this fast moving area but who are not mathematically inclined, it covers fundamental concepts, then discusses networks and their core themes in increasing order of complexity. Kadushin demystifies the concepts, theories, and findings developed by network experts. He selects material that serves as basic building blocks and examples of best practices that will allow the reader to understand and evaluate new developments as they emerge. Understanding Social Networks will be useful to social scientists who encounter social network research in their reading, students new to the network field, as well as managers, marketers, and others who constantly encounter social networks in their work.
Using Information Technology
Brian K. Williams - 1990
This text is user-focused and has been highly updated including topics, pictures and examples. The Williams text contains less theory and more application to engage students who might be more familiar with technology. Continually published and updated for over 15 years, Using Information Technology was the first text to foresee and define the impact of digital convergence--the fusion of computers and communications. It was also the first text to acknowledge the new priorities imposed by the Internet and World Wide Web and bring discussion of them from late in the course to the beginning. Today, it is directed toward the "Always On" generation that is at ease with digital technology--comfortable with iPhones, MySpace, Facebook, Twitter, Wikipedia, and the blogosphere--but not always savvy about its processes, possibilities, and liabilities. This 8th edition continues to address the two most significant challenges that instructors face in teaching this course: -Trying to make the course interesting and challenging, and -Trying to teach to students with a variety of computer backgrounds. In addition, this text correlates with Simnet Online for full integration of resources within the Computing Concepts course.
The Tcp/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Charles Kozierok - 2005
It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.
Business Law
Lee Mei Pheng - 2009
The authors' comprehensive experience in legal practice, banking and teaching have enabled them to provide a condensed and easy to understand coverage of business law principles and areas of interest related thereto.
Learn Brazilian Portuguese - Word Power 101
Innovative Language - 2011
This e-book is a completely new way to learn Brazilian Portuguese vocabulary fast - and for free! Start speaking Brazilian Portuguese in minutes with the powerful learning methods you will master in this book.The vocabulary words you’ll find in Learn BrazilianPortuguese - Word Power 101 were hand selected by our Brazilian Portuguese language teachers as the top 101 most frequently used words in the Brazilian Portuguese language. With each entry, you’ll see the word and a vibrant image to help remember the meaning. You’ll hear the word (separate free download) to master the pronunciation. Then you’ll see how the word is actually used in everyday speech with sample sentences and phrases. Learning Brazilian Portuguese vocabulary has never been easier!In this book, you’ll get: - 101 of the most frequently used Brazilian Portuguese vocabulary words - Audio with authentic native Brazilian Portuguese pronunciation *Supplementary mp3 audio files are a separate download - Vibrant photos and images to help memorization - Useful and practical sample sentences and phrases Purchase Learn BrazilianPortuguese - Word Power 101 today to start mastering Brazilian Portuguese vocabulary in the fastest, easiest and most fun way possible!
Introduction to Modern Cryptography: Principles and Protocols
Jonathan Katz - 2007
Introduction to Modern Cryptography provides a rigorous yet accessible treatment of modern cryptography, with a focus on formal definitions, precise assumptions, and rigorous proofs.The authors introduce the core principles of modern cryptography, including the modern, computational approach to security that overcomes the limitations of perfect secrecy. An extensive treatment of private-key encryption and message authentication follows. The authors also illustrate design principles for block ciphers, such as the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES), and present provably secure constructions of block ciphers from lower-level primitives. The second half of the book focuses on public-key cryptography, beginning with a self-contained introduction to the number theory needed to understand the RSA, Diffie-Hellman, El Gamal, and other cryptosystems. After exploring public-key encryption and digital signatures, the book concludes with a discussion of the random oracle model and its applications.Serving as a textbook, a reference, or for self-study, Introduction to Modern Cryptography presents the necessary tools to fully understand this fascinating subject.
U.S. History, Volume II: 1865-Present
Boundless - 2013
History textbook is a college-level, introductory textbook that covers the exciting subject of U.S. History. Volume II covers 1865 through the present day. Boundless works with subject matter experts to select the best open educational resources available on the web, review the content for quality, and create introductory, college-level textbooks designed to meet the study needs of university students.This textbook covers:Reconstruction: 1865-1877 -- The End of the War, The Aftermath of the War, The Battle over Reconstruction, Reconstruction in the South, The Reconstructed South, The Grant PresidencyThe Gilded Age: 1870-1900 -- The Gilded Age, The Second Industrial Revolution, The Rise of the City, The Rise of Big Business, The Rise of Immigration, Work in Industrial America, The Transformation of the West, Conquest in the West, The Transformation of the South, Politics in the Gilded Age, Urban Reform, Corruption and Reform, The Agrarian and Populist Movements, The Silver SolutionRace, Empire, and Culture in the Gilded Age: 1870-1900 -- Culture in the Gilded Age, Popular Culture, Cheap Amusements, Education, The Rise of Realism, Labor and Domestic Tensions, The Labor Wars, War, Empire, and an Emerging American World PowerThe Progressive Era: 1890-1917 -- The Progressive Era, Labor, Local, and Political Reform, The Politics of Progressivism, Grassroots Progressivism, Progressivism: Theory and Practice, Changing Ideas of Freedom, Roosevelt's Progressivism, Roosevelt's Second Term, From Roosevelt to Taft, Woodrow Wilson and Progressivism, The Limits of ProgressivismWorld War I: 1914-1919 -- The Wilson Administration, American Neutrality, America's Entry into the War, America and WWI, The War at Home, The "American", The Fight for Peace, Diplomacy & Negotiations at the War's End, The Transition to Peace: 1919-21From the New Era to the Great Depression: 1920-1933 -- The New Era, The Roaring Twenties, The Culture of Change, Resistance to Change, Wall Street Crash of 1929, The Great DepressionThe New Deal: 1933-1940 -- Franklin D. Roosevelt and the First New Deal, The New Deal, Critical Interpretations of the New Deal, The Social Cost of the Depression, Toward a Welfare State, Roosevelt's Second Term, Culture in the Thirties, The Second New Deal, The Legacy of the New DealFrom Isolation to World War II: 1930-1943 -- Non-Interventionism, The Beginning of the War, Conflict in Europe, Conflict in the Pacific, America's Early Involvement, Mobilization in the U.S., Social Effects of the War, The War in Germany, The War in the Pacific, The End of WWIIThe Cold War: 1947-1991 -- Origins of the Cold War, The Cold War, Truman and the Fair Deal, The Cold War and KoreaThe Politics and Culture of Abundance: 1943-1960 -- The Politics of Abundance, The Culture of Abundance, The Eisenhower Administration, The Policy of Containment, The Emergence of the Civil Rights MovementThe Sixties: 1960-1969 -- The Election of 1960, The Expansion of the Civil Rights Movement, Counterculture, The John F. Kennedy Administration, The Lyndon B. Johnson AdministrationThe Conservative Turn of America: 1968-1989 -- The Nixon Administration, Watergate, The Ford Administration, The Carter Administration, The Reagan AdministrationThe Challenges of Globalization and the Coming Century: After 1989 -- The George H.W. Bush Administration, America's Emerging Culture, The Clinton Administration, Globalization and the U.S.
Discrete Mathematical Structures
Bernard Kolman - 1995
It covers areas such as fundamentals, logic, counting, relations and digraphs, trees, topics in graph theory, languages and finite-state machines, and groups and coding.
Systems Analysis and Design
Gary B. Shelly - 1991
Students will find concepts easy-to-understand through the clear writing style and full-color figures that illustrate current technology and trends. Examples and cases are drawn from actual systems projects that enable students to learn in the context of solving problems, much like the ones they will encounter on the job. This approach, combined with motivating tools such as the SCR Associates interactive Web-Based Case Study, Systems Analyst's Toolkit, the Student Study Tool on CD-ROM, and more, makes Systems Analysis and Design, Seventh Edition a wise and exciting choice for your introductory systems analysis and design class.