Data Structures Using C++


D.S. Malik - 2003
    D.S. Malik is ideal for a one-semester course focused on data structures. Clearly written with the student in mind, this text focuses on Data Structures and includes advanced topics in C++ such as Linked Lists and the Standard Template Library (STL). This student-friendly text features abundant Programming Examples and extensive use of visual diagrams to reinforce difficult topics. Students will find Dr. Malik's use of complete programming code and clear display of syntax, explanation, and example easy to read and conducive to learning.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

The Hobbyist's Guide to the RTL-SDR: Really Cheap Software Defined Radio


Carl Laufer - 2014
    The RTL-SDR is a super cheap software defined radio based on DVB-T TV dongles that can be found for under $20. This book is about tips and tutorials that show you how to get the most out of your RTL-SDR dongle. Some projects described in this book are also compatible with other wideband SDRs like the HackRF, Airspy and SDR Play. What's in the book Learn how to set up your RTL-SDR with various free software defined radio programs such as SDR#, HDSDR, SDR-Radio and more. Learn all the little tricks and oddities that the dongle has. A whole chapter dedicated to improving the RTL-SDR's performance. Dozens of tutorials for fun RTL-SDR based projects such as ADS-B aircraft radar, AIS boat radar, ACARS decoding, receiving NOAA and Meteor-M2 weather satellite images, listening to and following trunked radios, decoding digital voice P25/DMR signals, decoding weather balloon telemetry, receiving DAB radio, analysing GSM and listening to TETRA signals, decoding pagers, receiving various HF signals such as ham radio modes, weatherfax and DRM radio, decoding digital D-STAR voice, an introduction to GNU Radio, decoding RDS, decoding APRS, measuring filters and SWR with low cost equipment, and many many more projects! Guide to antennas, cables and adapters. This book is updated every 3-4 months to ensure information is fresh and up to date. Updates are available for free for all customers. Note: To update the book you must manually contact Kindle support and request the update. Last updated to edition 4.1 on 15 June 2015.

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws


Dafydd Stuttard - 2007
    The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.

Intel Microprocessors 8086/8088, 80186/80188, 80286, 80386, 80486, Pentium, Prentium Proprocessor, Pentium II, III, 4


Barry B. Brey - 1991
    This text provides a comprehensive view of programming and interfacing of the Intel family of Microprocessors from the 8088 through the latest Pentium 4 microprocessor. Organized in an orderly and manageable format, it offers over 200 programming examples using the Microsoft Macro Assembler program, and provides a thorough description of each Intel family members, memory systems, and various I/O systems.

Android Hacker's Handbook


Joshua J. Drake - 2013
    Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

Cricut Expression: A Comprehensive Guide to Creating with Your Machine


Cathie Rigby - 2012
    For advanced crafters, this book instructs on features such as modes and functions, and teaches how to create with color, texture, and dimension. A cutting guide teaches the perfect settings to cut every type of material. A separate chapter introduces the new features of Cricut Expression™ 2 and explains how it differs from the original Expression machine. More than 50 creative projects inspire ideas for home décor, gifts, parties, cards, and scrapbook layouts.

Global Business Today


Charles W.L. Hill - 1998
    The success of the first five editions of Global Business Today has been based in part upon the incorporation of leading edge research into the text, the use of the up-to-date examples and statistics to illustrate global trends and enterprise strategy, and the discussion of current events within the context of the appropriate theory. Our research has shown that students and instructors alike enjoy the interesting, informative, and accessible writing style of GBT - so much so that the writing has become Charles Hill's trademark. In addition to boxed material which provides deep illustrations in every chapter, Hill carefully weaves interesting anecdotes into the narrative of the text to engage the reader.

Starting Out with C++: Early Objects (Formerly Alternate Edition)


Tony Gaddis - 2005
    Objects are introduced early, right after control structures and before arrays and pointers. The STL string class is used throughout. As with all Gaddis books, there is a strong emphasis on problem solving and program design, a careful step-by-step introduction of each new topic, clear and easy to read code listings, concise and practical real world examples, and an abundance of exercises in each chapter.

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


Gordon Fyodor Lyon - 2009
    From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.

Admission Assessment Exam Review


HESI - 2012
    Plus, it helps you identify areas of weakness so you can focus your study time. Sample problems and step-by-step examples with explanations in the math and physics sections show you how to work through each problem so you understand the steps it takes to complete the equation. Practice tests with answer keys for each topic - located in the appendices for quick access - help you assess your understanding of each topic and familiarize you with the types of questions you're likely to encounter on the actual exam. HESI Hints boxes offer valuable test-taking tips, as well as rationales, suggestions, examples, and reminders for specific topics.End-of-chapter review questions help you gauge your understanding of chapter content.A full-color layout and more illustrations in the life science chapters visually reinforce key concepts for better understanding.Expanded and updated content in each chapter ensures you're studying the most current content.Basic algebra review in the math section offers additional review and practice.Color-coded chapters help you quickly find specific topic sections.Helpful organizational features in each chapter include an introduction, key terms, chapter outline, and a bulleted chapter summary to help you focus your study.A glossary at the end of the text offers quick access to key terms and their definitions.

Culture Sketches: Case Studies in Anthropology


Holly Peters-Golden - 1993
    The groups selected are peoples whose traditional cultures are uniquely their own. Each has distinctive patterns and practices; each has faced the challenge of an encroaching world, with differing results. Moreover, they often provide the prime illustrations of important concepts in introductory anthropology course including Azande witchcraft, Ju/'hoansi egalitarianism, Trobriand kula exchange, and Minangkabau matriliny. As such, this volume can stand alone as an introduction to central ethnographic concepts through these 15 societies, or serve as a valuable companion to anthropology texts. Many of the peoples presented are involved in the diaspora; some struggle to preserve old ways in new places. All sketches follow a logical, consistent organization that makes it easy for students to understand major themes such as history, subsistence, sociopolitical organization, belief systems, marriage, kinship, and contemporary issues.

The Calculus 7


Louis Leithold - 1995
    The author has sought to utlilize the technology now available for the teaching and learning of calculus. The hand-held graphics calculator is one such form of technology that has been integrated into the book. Topics in algebra, trigonometry, and analytical geometry appear in the Appendix.

CISSP All-in-One Exam Guide


Shon Harris - 2001
    Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.