Hacking Exposed: Network Security Secrets & Solutions


Joel Scambray - 2003
    Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits New wireless and RFID security tools, including multilayered encryption and gateways All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking Fully updated chapters on hacking the Internet user, web hacking, and securing code

CEH Certified Ethical Hacker Study Guide


Kimberly Graves - 2010
    That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews

Ebook: Design Thinking (Innovation Trends Series)


BBVA Innovation Center - 2015
    In this issue you will find out all there is to be known about Design Thinking, the different and creative approach to businesses everyday challenges.

A Million Little Bricks: The Unofficial Illustrated History of the LEGO Phenomenon


Sarah Herman - 2012
    . . there aren't many titles that haven’t been bestowed on LEGO toys, and it’s not hard to see why. From its inception in the early 1930s right up until today, the LEGO Group’s history is as colorful as the toys it makes. Few other playthings share the LEGO brand’s creative spirit, educative benefits, resilience, quality, and universal appeal. The LEGO name is now synonymous with playtime, but it wasn’t always so. This history charts the birth of the LEGO Group in the workshop of a Danish carpenter and its steady growth as a small, family-run toy manufacturer to its current position as a market-leading, award-winning brand. The company’s ever-increasing catalogof products—including the earliest wooden toys, plastic bricks, play themes, and other building systems such as DUPLO, Technic, and MINDSTORMS—are chronicled in detail, alongside the manufacturing process, LEGOLAND parks, licensed toys, and computer games. Learn all about how LEGO pulled itself out of an economic crisis and embraced technology to make building blocks relevant to twenty-first-century children and discover the vibrant fan community of kids and adults whose conventions, websites, and artwork keep the LEGO spirit alive. As nostalgic as it is contemporary, A Million Little Bricks will have you reminiscing about old Classic Space sets, rummaging through the attic for forgotten Minifigure friends, and playing with whatever LEGO bricks you can get your hands on (even if it means sharing with your kids).

Rootkits: Subverting the Windows Kernel


Greg Hoglund - 2005
    It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks

Making It in the Art World: New Approaches to Galleries, Shows, and Raising Money


Brainard Carey - 2011
    Whether you re a beginner, a student, or a career artist looking to be in the best museum shows, this book provides ways of advancing your plans on any level. Making It in the Art World is an invaluable resource for artists at every stage, offering readers a plethora of strategies and helpful tips to plan and execute a successful artistic career. Topics include how to evaluate your own work, how to submit art, how to present work to the public, how to avoid distractions in the studio, and much more.

Digital Adaptation


Paul Boag - 2014
    That's why we created Digital Adaptation, a new practical book on how to help senior management understand the Web and adapt the business, culture, teams and workflows accordingly. No fluff, no theory — just techniques and strategies that worked in practice, and showed results. The book will help traditional businesses and organizations to overcome their legacy, and help you plant the seeds of change with very little power. If you do want to finally see changes happening, this is the book to grab. Written by Paul Boag. Designed by Veerle Pieters. 176 pages. YOU'LL LEARN TO: • Tackle bureaucracy and overcome legacy culture, • Develop a flexible and effective digital strategy, • Use responsibility matrix to minimize delays and costs, • Adopt a digital culture and become digital by default, • Apply techniques from mid-sized and large organizations, • Avoid toxic working practices and improve internal processes, • Organize teams and boost their efficiency, • Embrace social media and use them effectively, • Understand the value of a digital team and invest in them, • Break down the walls and nourish collaboration, ownership and innovation.

Rapid Instructional Design: Learning ID Fast and Right


George M. Piskurich - 2000
    It offers a no-nonsense walk through all the steps in the instructional design process and each step is explained in language that is conversational and easy to understand. This new edition addresses such topics as learning analysis, return on investment, and designing asynchronous and synchronous e-learning, as well as a wealth of illustrative examples of storyboards and professional commentary and case studies from professionals in the field.

ToGAF 9 Foundation Study Guide: Preparation for the TOGAF 9 Part 1 Examination


Rachel Harrison - 2009
    It gives an overview of every learning objective for the TOGAF 9 Foundation Syllabus and in-depth coverage on preparing and taking the TOGAF 9 Part 1 Examination. It is specifically designed to help individuals prepare for certification.This Study Guide is excellent material for:a) Individuals who require a basic understanding of TOGAF 9b) Professionals who are working in roles associated with an architecture project such as those responsible for planning, execution, development, delivery, and operationc) Architects who are looking for a first introduction to TOGAF 9d) Architects who want to achieve Level 2 certification in a stepwise manner and have not previously qualified as TOGAF 8 CertifiedA prior knowledge of enterprise architecture is advantageous but not required. While reading this Study Guide, the reader should also refer to the TOGAF Version 9.1 documentation available online at www.opengroup.org and also available as hard copy from www.vanharen.net and online booksellers

Guide to Computer Forensics and Investigations (Book & CD)


Bill Nelson - 2003
    This resource guides readers through conducting a high-tech investigation, from acquiring digital evidence to reporting its findings. Updated coverage includes new software and technologies as well as up-to-date reference sections, and content includes how to set up a forensics lab, how to acquire the proper and necessary tools, and how to conduct the investigation and subsequent digital analysis. It is appropriate for students new to the field, or as a refresher and technology update for professionals in law enforcement, investigations, or computer security. The book features free downloads of the latest forensic software, so readers can become familiar with the tools of the trade.

Essential PHP Security


Chris Shiflett - 2005
    It also works beautifully with other open source tools, such as the MySQL database and the Apache web server. However, as more web sites are developed in PHP, they become targets for malicious attackers, and developers need to prepare for the attacks.Security is an issue that demands attention, given the growing frequency of attacks on web sites. Essential PHP Security explains the most common types of attacks and how to write code that isn't susceptible to them. By examining specific attacks and the techniques used to protect against them, you will have a deeper understanding and appreciation of the safeguards you are about to learn in this book.In the much-needed (and highly-requested) Essential PHP Security, each chapter covers an aspect of a web application (such as form processing, database programming, session management, and authentication). Chapters describe potential attacks with examples and then explain techniques to help you prevent those attacks.Topics covered include:Preventing cross-site scripting (XSS) vulnerabilitiesProtecting against SQL injection attacksComplicating session hijacking attemptsYou are in good hands with author Chris Shiflett, an internationally-recognized expert in the field of PHP security. Shiflett is also the founder and President of Brain Bulb, a PHP consultancy that offers a variety of services to clients around the world.

Train Your Brain: How to Build a Million Dollar Business in Record Time


Dana Wilde - 2013
    There always seemed to be a new system to learn, a new surefire method or cutting-edge technique for entrepreneurs to master.In an effort to teach her team members a better and easier way, Dana Wilde created Train Your Brain, a tested and proven system combining elements of both mindset and action ... or as Dana likes to call it, Intentional Action.What Dana discovered by using Train Your Brain is that mindset can be "taught" and that learning simple mindset strategies not only allows you to understand how the brain works but also shows you how easy it is to change your thinking and, as a result, change your outcomes.In Train Your Brain, Dana breaks down the Cycle of Perpetual Sameness--the number one reason why most people only experience incremental change in their lives. More importantly, she also provides the much-needed blueprint to help you get off this counterproductive cycle quickly.Train Your Brain, with its twenty easy-to-implement "Mindware Experiments," gives you all the necessary tools needed to get off ... and stay off ... the Cycle of Perpetual Sameness, so you can transform your life and grow your business in record time!

Dark Mirror: Edward Snowden and the American Surveillance State


Barton Gellman - 2020
    Barton Gellman’s informant called himself ‘Verax’ - the truth-teller. It was only later that Verax unmasked himself as Edward Snowden. But Gellman’s primary role in bringing Snowden’s revelations to light, for which he shared the Pulitzer Prize, is only the beginning of this gripping real-life spy story. Snowden unlocked the door: here Gellman describes what he found on the other side over the course of a years-long journey of investigation. It is also the story of his own escalating battle against unknown digital adversaries after he discovered his own name on a file in the leaked document trove and realised that he himself was under attack.Through a gripping narrative of paranoia, clandestine operations and jaw-dropping revelations, Dark Mirror delineates in full for the first time the hidden superstructure that connects government espionage with Silicon Valley. Who is spying on us and why? Here are the answers.©2020 Barton Gellman (P)2020 Penguin Audio

Click: What Millions of People are Doing Online and Why It Matters


Bill Tancer - 2008
    As online directories replace the yellow pages, search engines replace traditional research, and news sites replace newsprint, we are in an age in which we've come to rely tremendously on the Internet--leaving behind a trail of information about ourselves as a culture and the direction in which we are headed. With surprising and practical insight, Tancer demonstrates how the Internet is changing the way we absorb information and how understanding that change can be used to our advantage in business and in life.Click analyzes the new generation of consumerism in a way no other book has before, showing how we use the Internet, and how those trends provide a wealth of market research nearly as vast as the Internet itself. Understanding how we change is integral to our success. After all, we are what we click.

Site Reliability Engineering: How Google Runs Production Systems


Betsy Beyer - 2016
    So, why does conventional wisdom insist that software engineers focus primarily on the design and development of large-scale computing systems?In this collection of essays and articles, key members of Google's Site Reliability Team explain how and why their commitment to the entire lifecycle has enabled the company to successfully build, deploy, monitor, and maintain some of the largest software systems in the world. You'll learn the principles and practices that enable Google engineers to make systems more scalable, reliable, and efficient--lessons directly applicable to your organization.This book is divided into four sections: Introduction--Learn what site reliability engineering is and why it differs from conventional IT industry practicesPrinciples--Examine the patterns, behaviors, and areas of concern that influence the work of a site reliability engineer (SRE)Practices--Understand the theory and practice of an SRE's day-to-day work: building and operating large distributed computing systemsManagement--Explore Google's best practices for training, communication, and meetings that your organization can use