Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications


Ivan Ristic - 2014
    Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance


Julia Angwin - 2014
    We are being watched.We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.

(ISC)² CISSP Certified Information Systems Security Professional Official Study Guide


Mike Chapple - 2018
    This bestselling Sybex study guide covers 100% of all exam objectives. You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. Reinforce what you've learned with key topic exam essentials and chapter review questions. Along with the book, you also get access to Sybex's superior online interactive learning environment that includes: Four unique 250 question practice exams to help you identify where you need to study more. Get more than 90 percent of the answers correct, and you're ready to take the certification exam. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam Coverage of all of the exam topics in the book means you'll be ready for: Security and Risk Management Asset Security Security Engineering Communication and Network Security Identity and Access Management Security Assessment and Testing Security Operations Software Development Security

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

Dissecting The Hack: The F0rb1dd3n Network


Jayson E. Street - 2009
    One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book! Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack

A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security


Tobias Klein - 2011
    In this one-of-a-kind account, you'll see how the developers responsible for these flaws patched the bugs—or failed to respond at all. As you follow Klein on his journey, you'll gain deep technical knowledge and insight into how hackers approach difficult problems and experience the true joys (and frustrations) of bug hunting.Along the way you'll learn how to:Use field-tested techniques to find bugs, like identifying and tracing user input data and reverse engineering Exploit vulnerabilities like NULL pointer dereferences, buffer overflows, and type conversion flaws Develop proof of concept code that verifies the security flaw Report bugs to vendors or third party brokersA Bug Hunter's Diary is packed with real-world examples of vulnerable code and the custom programs used to find and test bugs. Whether you're hunting bugs for fun, for profit, or to make the world a safer place, you'll learn valuable new skills by looking over the shoulder of a professional bug hunter in action.

Masters of Deception: The Gang That Ruled Cyberspace


Michelle Slatalla - 1995
    "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

APIs: A Strategy Guide


Daniel Jacobson - 2011
    Salesforce.com (more than 50%) and Twitter (more than 75% fall into this category. Ebay gets more than 8 billion API calls a month. Facebook and Google, have dozens of APIs that enable both free services and e-commerce, get more than 5 billion API calls each day. Other companies like NetFlix have expanded their service of streaming movies over the the web to dozens of devices using API. At peak times, more than 20 percent of all traffic is accounted for by Netflix through its APIs. Companies like Sears and E-Trade are opening up their catalogs and other services to allow developers and entrepreneurs to create new marketing experiences. Making an API work to create a new channel is not just a matter of technology. An API must be considered in terms of business strategy, marketing, and operations as well as the technical aspects of programming. This book, written by Greg Brail, CTO of Apigee, and Brian Mulloy, VP of Products, captures the knowledge of all these areas gained by Apigee, the leading company in supporting the rollout of high traffic APIs.

No, No, No, No, No, Yes. Insights From a Creative Journey: Motivation & Self-Improvement (Creative & Innovation series Book 1)


Gideon Amichay - 2014
     But rather an essential tool for direction, motivation and innovation. No, No, No, No, No, Yes is the perfect inspirational Christmas gift for that someone in your life embarking on a great new challenge. Whether they just graduated from college, are changing careers, have set out to achieve something in the arts or the business realm, or just aspire to do something seemingly impossible, No, No, No, No, No, Yes will help them see that the “no’s” they will confront are simply directions on the map to “yes”. No. It is a word that every CEO, entrepreneur and creative professional has confronted. It is a word that both novices and seasoned professionals dread. It is a word that can easily seem like death to a dream. And yet it is also a word that can point in the right direction. It is a word that motivates us to do something differently, try something else, get better, innovate, keep going. No is a word that looms over every business person's, innovator's, and artist's life. And yet the word is universally met with trepidation and fear because the value of being told No is so little understood. ˃˃˃ No is a facilitator In No, No, No, No, No, Yes. Insights From A Creative Journey, award winning creator of visionary ad campaigns (Cannes Lions, Clios); ad exec (the Shalmor Avnon Amichay/Y&R agency); cartoonist (The New Yorker); speaker (TEDx); and teacher (School of Visual Arts) Gideon Amichay demonstrates that No is not a barrier to success it s a facilitator. No is not the end, but rather an essential tool for direction, motivation and innovation. Based on Amichay s best-selling book in Israel (published by Gordon Books in 2011) and 2013 TEDx talk of the same name, No, No, No, No, No, Yes takes the reader on an illustrated journey of the author's own lifetime confrontation, negotiation and relationship with No . Walking the reader through critical No s in his own 25 year career pitching cartoons to the New Yorker, risky ad campaign concepts as head of one of Israel s biggest ad agencies, impossible outdoor ad installations -- Amichay reveals the wisdom that No rarely ends with an exclamation point. ˃˃˃ No ends with a comma Rather, Amichay demonstrates that No usually ends with a comma: No comma, we don't have the time. No comma, we don't have the budget. No comma, can we see another option? By discovering which No comma he was confronting, Amichay shows how No s in fact led him to eventual Yes s -- including the waiting, the rejections, and the revisions and demonstrates that No, forces us to reexamine, to explore, to rethink, to change directions, to get better. ˃˃˃ No can be the best answer to get In No, No, No, No, No, Yes Amichay shares the essential revelation that sometimes No can be the best answer to get. Through illuminating anecdotes from his own illustrious career running the gamut between business and the arts, Gideon Amichay demonstrates unequivocally that No's, whether from colleagues, from clients, from life, or from within have great power, and are simply directions on the map to Yes. Authoritative, funny, whimsical, wise, and pragmatic, No, No, No, No, No, Yes. Insights From A Creative Journey. is the essential companion for every executive, innovator and artist to navigate the unavoidable odyssey of No in order to find the eventual Yes. Scroll up and grab a copy today.

The Legacy Builder: Five Non-Negotiable Leadership Secrets


Rod Olson - 2013
    The five non-negotiables. And you can’t give away what you don’t possess yourself.” When Lance Marshall’s life comes crashing down, his wife arranges for him to meet with his high school mentor, Coach Moore. Coach sends Lance “back to the locker room” to talk with five sports legends who are now successful leaders. Each player will show Lance a principle for excellence in both leadership and the home. But the advice comes with a caveat: Lance must apply the principle he learns within twenty-four hours or the meetings end. This modern parable is for business leaders, coaches, and parents who know the challenge of motivating people while balancing the demands of life with integrity—and leaving a legacy that will last forever.

Cypherpunks: Freedom and the Future of the Internet


Julian Assange - 2012
    Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.

Understanding Cryptography: A Textbook For Students And Practitioners


Christof Paar - 2009
    Today's designers need a comprehensive understanding of applied cryptography.After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.The authors have considerable experience teaching applied cryptography to engineering and computer science students and to professionals, and they make extensive use of examples, problems, and chapter reviews, while the book's website offers slides, projects and links to further resources. This is a suitable textbook for graduate and advanced undergraduate courses and also for self-study by engineers.

Be Amazing or Go Home: Seven Customer Service Habits That Create Confidence with Everyone


Shep Hyken - 2017
    In fact, amazement is a habit that anyone can master--and Shep Hyken knows the tricks to making it your own.In Be Amazing or Go Home, Shep shares the secrets behind making his motto "Always Be Amazing!" an everyday lifestyle and shows how you too can become exceptional in business and in life. Drawing on the routines of incredible people, Shep demonstrates simple practices that can elevate your game, including: Showing up ready to amazing Being proactive Craving feedback Taking responsibility Embracing authenticity Focusing on excellence Turning misery into magic Once you master these habits, you'll be able to create trust, build stronger relationships, make sales, advance your career, and more. Now is the time to step out of the ordinary and step into amazing.

Hacking For Dummies


Kevin Beaver - 2004
    In order to counter these cyber bad guys, you must become a hacker yourself--an ethical hacker. Hacking for Dummies shows you just how vulnerable your systems are to attackers. It shows you how to find your weak spots and perform penetration and other security tests. With the information found in this handy, straightforward book, you will be able to develop a plan to keep your information safe and sound. You'll discover how to:Work ethically, respect privacy, and save your system from crashing Develop a hacking plan Treat social engineers and preserve their honesty Counter war dialing and scan infrastructures Understand the vulnerabilities of Windows, Linux, and Novell NetWare Prevent breaches in messaging systems, web applications, and databases Report your results and managing security changes Avoid deadly mistakes Get management involved with defending your systems As we enter into the digital era, protecting your systems and your company has never been more important. Don't let skepticism delay your decisions and put your security at risk. With Hacking For Dummies, you can strengthen your defenses and prevent attacks from every angle!

How to Kill a Unicorn: How the World's Hottest Innovation Factory Builds Bold Ideas That Make It to Market


Mark Payne - 2014
      Today, innovation is seen by business leaders and the media alike as the key to growth, a burning issue in every company, from startups to the Fortune 500. And in that space, Fahrenheit 212 is viewed as a high-performance innovation SWAT team, able to solve the most complex, mission-critical challenges. Under Mark Payne, the firm's president and head of Idea Development, Fahrenheit 212, since its inception a decade ago, has worked with such giants of industry as Coca-Cola, Samsung, Hershey's, Campbell's Soup, LG, Starbucks, Mattel, Office Depot, Citibank, P&G, American Express, Nutrisystem, GE, and Goldman Sachs, to name but a few. It has been praised as a hotspot for innovation in publications like Fortune, Esquire, Businessweek, and FastCompany.  What Drives Fahrenheit 212's success is its unique methodology, combining what it calls Magic--the creative side of innovation--with Money, the business side. They explore every potential idea with the end goal in mind--bringing an innovative product to market in a way that will transform a company's business and growth. In How to Kill a Unicorn, Mark Payne pulls back the curtain on how the company is able to bring more innovative products and ideas successfully to market than any other firm and offers blow by blow inside accounts of how they grapple with and solved their biggest challenges.