Book picks similar to
Internet Firewalls and Network Security by New Riders
technology-books
zz-office
box-2
computer-science
The Other Side of Hell 2
Les Macdonald - 2018
Part One holds 12 stories of Family Annihilators - men who murder their entire family. It is more common than you might think. Part Two is called A Six Pack of Murder which is a random collection of six more true crime stories of murder.
Cookham To Cannes: The South of France - Lobsters & Lunatics
Brent Tyler
Deciding that taking a leap into the unknown was better than making no decision at all, they borrowed a little money from some good friends, packed up their belongings and headed to a mobile home site just outside Cannes. Whilst there, they would look for work with the hope of settling in the region. What no one bothered to tell France’s newest arrivals was that the people they were about to be interviewed by and eventually work for were all blisteringly, yet deliciously mad. Whilst minding his own business in the garden belonging to one of these certifiable lunatics, Brent gets adopted by a dog with his own obsession, maintaining the author's theory that sanity is an extremely rare commodity in the south of France.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
Schiit Happened: The Story of the World's Most Improbable Start-Up
Jason Stoddard - 2014
From afar, it looks like they did it with ease...but the truth is much more complicated."--InnerFidelityFor everyone who didn't win the venture capital lottery,or everyone who wasn't born with a trust fund,for everyone who doesn't have rich relatives...This is the story of how real start-ups work. This is how to turn a dream into a multimillion dollar business—without selling out, without spending a mint on marketing, and without losing your sense of humor.Meet Schiit Audio, a company born in a garage that went on to change the face of high-end personal audio—challenging the idea that everything must be made in China, rejecting old ideas about advertising and social awareness, and forging our own unforgettable brand. This is our (improbable) story.Here’s to your own stories—and your success!
Programming in Go: Creating Applications for the 21st Century
Mark Summerfield - 2012
With this guide, pioneering Go programmer Mark Summerfield shows how to write code that takes full advantage of Go's breakthrough features and idioms. Both a tutorial and a language reference, "Programming in Go" brings together all the knowledge you need to evaluate Go, think in Go, and write high-performance software with Go. Summerfield presents multiple idiom comparisons showing exactly how Go improves upon older languages, calling special attention to Go's key innovations. Along the way, he explains everything from the absolute basics through Go's lock-free channel-based concurrency and its flexible and unusual duck-typing type-safe approach to object-orientation. Throughout, Summerfield's approach is thoroughly practical. Each chapter offers multiple live code examples designed to encourage experimentation and help you quickly develop mastery. Wherever possible, complete programs and packages are presented to provide realistic use cases, as well as exercises. Coverage includes:-- Quickly getting and installing Go, and building and running Go programs -- Exploring Go's syntax, features, and extensive standard library -- Programming Boolean values, expressions, and numeric types -- Creating, comparing, indexing, slicing, and formatting strings -- Understanding Go's highly efficient built-in collection types: slices and maps -- Using Go as a procedural programming language -- Discovering Go's unusual and flexible approach to object orientation -- Mastering Go's unique, simple, and natural approach to fine-grained concurrency -- Reading and writing binary, text, JSON, and XML files -- Importing and using standard library packages, custom packages, and third-party packages -- Creating, documenting, unit testing, and benchmarking custom packages
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang - 2014
Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
Network Warrior
Gary A. Donahue - 2007
What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Chris Sanders - 2007
But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.
User Stories Applied: For Agile Software Development
Mike Cohn - 2004
In User Stories Applied, Mike Cohn provides you with a front-to-back blueprint for writing these user stories and weaving them into your development lifecycle.You'll learn what makes a great user story, and what makes a bad one. You'll discover practical ways to gather user stories, even when you can't speak with your users. Then, once you've compiled your user stories, Cohn shows how to organize them, prioritize them, and use them for planning, management, and testing.User role modeling: understanding what users have in common, and where they differ Gathering stories: user interviewing, questionnaires, observation, and workshops Working with managers, trainers, salespeople and other proxies Writing user stories for acceptance testing Using stories to prioritize, set schedules, and estimate release costs Includes end-of-chapter practice questions and exercises User Stories Applied will be invaluable to every software developer, tester, analyst, and manager working with any agile method: XP, Scrum... or even your own home-grown approach.
C++ Coding Standards: 101 Rules, Guidelines, and Best Practices
Herb Sutter - 2004
This happens automatically when following agood, simple set of guidelines.*They improve development speed, because the programmer doesn't need toalways make decisions starting from first principles.*They enhance teamwork by eliminating needless debates on inconsequentialissues and by making it easy for teammates to read and maintain each other'scode.The coding standards introduced by this book are a collection of guidelines forwriting high-quality C++ code.***They are the distilled conclusions of a rich collective experience of the C++community. Until now, this body of knowledge has been available only asfolklore or spread in bits and pieces throughout books.
Computer Organization & Design: The Hardware/Software Interface
David A. Patterson - 1993
More importantly, this book provides a framework for thinking about computer organization and design that will enable the reader to continue the lifetime of learning necessary for staying at the forefront of this competitive discipline. --John Crawford Intel Fellow Director of Microprocessor Architecture, Intel The performance of software systems is dramatically affected by how well software designers understand the basic hardware technologies at work in a system. Similarly, hardware designers must understand the far reaching effects their design decisions have on software applications. For readers in either category, this classic introduction to the field provides a deep look into the computer. It demonstrates the relationship between the software and hardware and focuses on the foundational concepts that are the basis for current computer design. Using a distinctive learning by evolution approach the authors present each idea from its first principles, guiding readers through a series of worked examples that incrementally add more complex instructions until they ha
Grave Girl: The Complete Trilogy
Amy Cross - 2019
In the center of the village, the local cemetery might at first seem rather ordinary. Old gravestones lean in every direction, watched over by statues of angels. There are rumors, however, that the cemetery in Rippon hides one very dark secret. Could it be that this is where the Devil himself is buried? After running away from home in search of a fresh start, Samantha Marker can't afford to be picky about finding a new job. When she's hired to look after Rippon's cemetery, she thinks she can simply hide away from society and get on with her life. She soon discovers, however, that Rippon has begun to attract some very unwelcome attention. Dark forces are determined to recover the Devil's body, and they'll stop at nothing in their quest. Even if that means bringing about the end of the world. Thrown into a battle she doesn't even understand, Sam finds herself up against demons, ghosts and other nightmares. As if those dangers aren't bad enough, there's also the distinct possibility that all these battles might accidentally cause the Devil to rise from his grave. Even as she tries to save the world, however, Sam also has to deal with the consequences of a terrible mistake that she made long ago. How can she save humanity when she's already abandoned the one person who needs her even more? Grave Girl: The Complete Trilogy is an omnibus edition containing the three books in the Grave Girl trilogy: Grave Girl (2013), Raven Revivals (2014) and The Gravest Girl of All (2018).
Maug
David Wood - 2019
Maddock, Bones, and the crew of the Sea Foam set out for a legendary island in the Pacific, the final resting place of a wealth of treasure vessels. Standing in their way are mercenaries, cage fighters, drug gangs, mystics, and powers beyond their understanding. But no danger is more grave than what lies in wait. Praise for David Wood and the Dane Maddock Adventures “Dane and Bones.... Together they're unstoppable. Rip roaring action from start to finish. Wit and humor throughout. Just one question - how soon until the next one? Because I can't wait.” Graham Brown, author of Shadows of the Midnight Sun “A twisty tale of adventure and intrigue that never lets up and never lets go!” Robert Masello, author of Bestiary and Blood and Ice “What an adventure! A great read that provides lots of action, and thoughtful insight as well, into strange realms that are sometimes best left unexplored.” Paul Kemprecos, author of the NUMA Files “A page-turning yarn blending high action, Biblical speculation, ancient secrets, and nasty creatures. Indiana Jones better watch his back!” Jeremy Robinson, author of SecondWorld “With the thoroughly enjoyable way Mr. Wood has mixed speculative history with our modern day pursuit of truth, he has created a story that thrills and makes one think beyond the boundaries of mere fiction and enter the world of 'why not'?” David Lynn Golemon, Author of Ancients “Let there be no confusion: David Wood is the next Clive Cussler. Once you start reading, you won't be able to stop until the last mystery plays out in the final line.” Edward G. Talbot, author of 2012: The Fifth World “I like my thrillers with lots of explosions, global locations and a mystery where I learn something new. Wood delivers! Recommended as a fast paced, kick ass read.” J.F. Penn, author of Desecration “Dourado is a brisk read, reminiscent of early Cussler adventures, and perfect for an afternoon at the beach or a cross-country flight. You'll definitely want more of Maddock.” Sean Ellis- Author of Into the Black
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language