Book picks similar to
Ethical Hacking and Countermeasures: Attack Phases by EC-Council
network-security-cyber
partially-read
pen-sec
studies
Systems Analysis and Design
Alan Dennis - 2002
Building on their experience as professional systems analysts and award-winning teachers, authors Dennis, Wixom, and Roth capture the experience of developing and analyzing systems in a way that students can understand and apply.With
Systems Analysis and Design, 4th edition
, students will leave the course with experience that is a rich foundation for further work as a systems analyst.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
Introduction to Mineralogy
William D. Nesse - 1999
It presents the important traditional content of mineralogy including crystallography, chemical bonding, controls on mineral structure, mineral stability, and crystal growth to provide a foundation that enables students to understand the nature and occurrence of minerals. Physical, optical, and X-ray powder diffraction techniques of mineral study are described in detail, and common chemical analytical methods are outlined as well. Detailed descriptions of over 100 common minerals are provided, and the geologic context within which these minerals occur is emphasized. Appendices provide tables and diagrams to help students with mineral identification, using both physical and optical properties. Numerous line drawings, photographs, and photomicrographs help make complex concepts understandable. Introduction to Mineralogy not only provides specific knowledge about minerals but also helps students develop the intellectual tools essential for a solid, scientific education. This comprehensive text is useful for undergraduate students in a wide range of mineralogy courses.
Artificial Intelligence: A Modern Approach
Stuart Russell - 1994
The long-anticipated revision of this best-selling text offers the most comprehensive, up-to-date introduction to the theory and practice of artificial intelligence. *NEW-Nontechnical learning material-Accompanies each part of the book. *NEW-The Internet as a sample application for intelligent systems-Added in several places including logical agents, planning, and natural language. *NEW-Increased coverage of material - Includes expanded coverage of: default reasoning and truth maintenance systems, including multi-agent/distributed AI and game theory; probabilistic approaches to learning including EM; more detailed descriptions of probabilistic inference algorithms. *NEW-Updated and expanded exercises-75% of the exercises are revised, with 100 new exercises. *NEW-On-line Java software. *Makes it easy for students to do projects on the web using intelligent agents. *A unified, agent-based approach to AI-Organizes the material around the task of building intelligent agents. *Comprehensive, up-to-date coverage-Includes a unified view of the field organized around the rational decision making pa
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Subjects Matter: Exceeding Standards Through Powerful Content-Area Reading
Harvey Daniels - 2014
This book is about making those encounters as compelling as we can make them." -Harvey "Smokey" Daniels and Steven ZemelmanWe are specialists to the bone-in science, math, social studies, art, music, business, and foreign language. But now, the Common Core and state standards require us to help our students better understand the distinctive texts in our subject areas. "Nobody's making us into reading teachers," write Smokey Daniels and Steve Zemelman, "but we must become teachers of disciplinary thinking through our students' reading."If this shift sounds like a tough one, Subjects Matter, Second Edition is your solution. Smokey and Steve, two of America's most popular educators, share exactly what you need to help students read your nonfiction content closely and strategically: 27 proven teaching strategies that help meet-and exceed-the standards how-to suggestions for engaging kids with content through wide, real-world reading a lively look at using "boring" textbooks motivating instruction that's powered by student collaboration specifics for helping struggling readers succeed.Subjects Matter, Second Edition enables deep, thoughtful learning for your students, while keeping the irreverent, inspiring heart that's made the first edition indispensable. You'll discover fresh and re-energized lessons, completely updated research, and vibrant vignettes from new colleagues and old friends who have as much passion for their subjects as you do."We'll be using methods particular to our fields as well as engaging reading materials that help students understand and remember our content better," write Smokey and Steve. "We can realize that vision of the light going on in kids' heads and maybe fill them with enthusiasm about the amazing subject matter that we have to offer. Sound good? Let's get to work." Read a sample chapter from Subjects Matter, Second Edition.
Hacking the Xbox: An Introduction to Reverse Engineering
Andrew Huang - 2003
The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.
Mechanical Engineering Reference Manual for the PE Exam
Michael R. Lindeburg - 1994
Dozens of key charts, tables, and graphs, including updated steam tables and two new charts of LMTD heat exchanger correction factors, make it possible to work most exam problems using the Reference Manual alone. A complete, easy-to-use index saves you valuable time during the exam as it helps you quickly locate important information needed to solve problems._____________________________Since 1975 more than 2 million people preparing for their engineering, surveying, architecture, LEED®, interior design, and landscape architecture exams have entrusted their exam prep to PPI. For more information, visit us at www.ppi2pass.com.
AA100 The Arts Past and Present - Cultural Encounters (Book 3)
Richard Danson Brown - 2008
Computer Networking: A Top-Down Approach
James F. Kurose - 2000
Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Chris Sanders - 2007
But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.
Comptia Security+: Get Certified Get Ahead: Sy0-301 Study Guide
Darril Gibson - 2011
The SY0-301 version covers every aspect of the SY0-301 exam, and includes the same elements readers raved about in the previous version. Each of the eleven chapters presents topics in an easy to understand manner and includes real-world examples of security principles in action. The author uses many of the same analogies and explanations he's honed in the classroom that have helped hundreds of students master the Security+ content. You'll understand the important and relevant security topics for the Security+ exam, without being overloaded with unnecessary details. Additionally, each chapter includes a comprehensive review section to help you focus on what's important. Over 450 realistic practice test questions with in-depth explanations will help you test your comprehension and readiness for the exam. The book includes a 100 question pre-test, a 100 question post-test, and practice test questions at the end of every chapter. Each practice test question includes a detailed explanation to help you understand the content and the reasoning behind the question. You'll be ready to take and pass the exam the first time you take it. If you plan to pursue any of the advanced security certifications, this guide will also help you lay a solid foundation of security knowledge. Learn this material, and you'll be a step ahead for other exams. This SY0-301 study guide is for any IT or security professional interested in advancing in their field, and a must read for anyone striving to master the basics of IT systems security. The author supplements the book with blog posts here: http: //blogs.getcertifiedgetahead.com/. This page provides a full listing of mobile device apps from the author: http: //learnzapp.com/partners/darrilgibson/
Handbook of Psychological Assessment
Gary Groth-Marnat - 1984
. . an excellent text for graduate courses on psychological assessment. It . . . familiarizes the student with the entire enterprise of clinical assessment and provides enough of a how-to guide for the student to carry out an assessment practicum." --Contemporary Psychology "For both practitioners and students of psychological assessment, the expanded and updated Handbook provides guidance to the selection, administration, evaluation, and interpretation of the most commonly used psychological tests." --Reference and Research Book News The updated and expanded fourth edition of the highly acclaimed classic text on psychological assessment The Handbook of Psychological Assessment, Fourth Edition presents a step-by-step guide on how to conduct a comprehensive psychological evaluation. It provides a complete review of the most commonly used assessment instruments and the most efficient methods for selecting and administering tests, evaluating data, and integrating results into a coherent, problem-solving report. Updated reviews and interpretive guidelines are included for the most frequently used assessment techniques, including structured and unstructured interviews, Wechlser intelligence scales (WAIS-III/WISC-III), Minnesota Multiphasic Personality Inventory (MMPI-2/MMPI-A), Millon Multiaxial Clinical Inventory-III, California Psychological Inventory, Rorschach, Thematic Apperception Test, and frequently used instruments for neuropsychological screening (e.g., Bender Gestalt and Rey Auditory Verbal Learning Test). Each test is reviewed according to its history and development, psychometrics, administration, and interpretation of results. In addition, this revised and expanded Fourth Edition includes: * Completely updated research on all assessment techniques * A chapter on the Wechsler Memory Scales (WMS-III) * A new chapter on brief instruments for treatment planning, patient monitoring, and outcome assessment (Beck Depression Inventory-II, State Trait Anxiety Inventory, and Symptom Checklist-90-R) Organized according to the sequence psychologists follow when conducting an assessment, the Handbook of Psychological Assessment, Fourth Edition is a practical, valuable reference for clinical psychologists, therapists, school psychologists, and counselors.
The Practical Skeptic: Core Concepts in Sociology
Lisa J. McIntyre - 1998
This title enables students to grasp key sociological concepts and learn the useful lesson that there is much that goes on in the social world that escapes the sociologically untrained eye.
Inorganic Chemistry
D.F. Shriver - 1990
The bestselling textbook inorganic chemistry text on the market covers both theoretical and descriptive aspects of the subject, and emphasizes experimental methods, industrial applications, and modern topics.