Book picks similar to
Database Security by Silvana Castaño
security
it-books
gygkuhk
databases-architechture
The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
Chris Eagle - 2008
With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.
Introduction to Algorithms
Thomas H. Cormen - 1989
Each chapter is relatively self-contained and can be used as a unit of study. The algorithms are described in English and in a pseudocode designed to be readable by anyone who has done a little programming. The explanations have been kept elementary without sacrificing depth of coverage or mathematical rigor.
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman - 2014
This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.
Thank You for Being Such a Pain: Spiritual Guidance for Dealing with Difficult People
Mark Rosen - 1998
By embracing four fundamental premises and putting into practice the author's many helpful and practical suggestions, you'll acquire the skills and insights necessary for turning around even the most troublesome relationship. What you need to keep in mind is that: (1) nothing in your life happens randomly and your difficulties have a deeper purpose; (2) frustration and even emotional pain are as necessary for your personal and spiritual growth as love and joy; (3) transforming enmity and completing unfinished business may be the most important skills you can learn in life; and (4) when you make an effort to work on your inner self, your outer relationships will be transformed. This groundbreaking book draws upon state-of-the-art psychological principles and timeless spiritual practices from all traditions. Filled with enlightening exercises and entertaining stories, Thank You for Being Such a Pain will forever change the way you see the difficult people in your life . . . as well as the way you see yourself.
Long for This World: The Strange Science of Immortality
Jonathan Weiner - 2010
A fast-paced, sure-to-astonish scientific adventure from “one of our finest science journalists” (Jonah Lehrer), Weiner’s Long for This World addresses the ageless question, “Is there a secret to eternal youth?” And has it, at long last, been found?
Flashman At The Charge ;Flashman In The Great Game
George MacDonald Fraser - 1983
Head First Data Analysis: A Learner's Guide to Big Numbers, Statistics, and Good Decisions
Michael G. Milton - 2009
If your job requires you to manage and analyze all kinds of data, turn to Head First Data Analysis, where you'll quickly learn how to collect and organize data, sort the distractions from the truth, find meaningful patterns, draw conclusions, predict the future, and present your findings to others. Whether you're a product developer researching the market viability of a new product or service, a marketing manager gauging or predicting the effectiveness of a campaign, a salesperson who needs data to support product presentations, or a lone entrepreneur responsible for all of these data-intensive functions and more, the unique approach in Head First Data Analysis is by far the most efficient way to learn what you need to know to convert raw data into a vital business tool. You'll learn how to:Determine which data sources to use for collecting information Assess data quality and distinguish signal from noise Build basic data models to illuminate patterns, and assimilate new information into the models Cope with ambiguous information Design experiments to test hypotheses and draw conclusions Use segmentation to organize your data within discrete market groups Visualize data distributions to reveal new relationships and persuade others Predict the future with sampling and probability models Clean your data to make it useful Communicate the results of your analysis to your audience Using the latest research in cognitive science and learning theory to craft a multi-sensory learning experience, Head First Data Analysis uses a visually rich format designed for the way your brain works, not a text-heavy approach that puts you to sleep.
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
Michael Sikorski - 2011
When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.
Nanny Shifter Service: Box Set 1
Sky Winters - 2018
There Is a New Nanny Service In Town, And It Serves Very Sexy and Discreet Clients! Book 1: Daddy Dragon Will Anna’s new Dragon boss protect her when it counts? Book 2: Daddy Bear Careful, if you take a job for this Daddy Bear, you might get torn into pieces! Book 3: Daddy Wolf’s Nanny This wolf has a ferocious temper, and he wants to hire a nanny! Book 4: Dragon’s Virgin Nanny Dixie is no stranger to dangerous men… but can she handle a dangerous dragon shifter? 18+ Only.
Don't Break (The Reluctant Heart Book 1)
Jeannette Winters - 2020
The Reluctant Heart Series Book 1: Don’t Break Book 2: Don’t Hesitate Book 3: Just Trust Book 4: Just Feel Book 5: Don’t Quit Book 6: Just Believe
Kindle Fire Tips & Tricks
Tim Sievers - 2011
You'll get up to speed quickly with this straight forward guide, full of practical step-by-step visual instructions. Full color screen shots help you learn visually and quickly become productive. <br><br>From the best selling author of the Top 100 Tips for iPad.
Essential System Administration
Æleen Frisch - 1991
Whether you are a beginner or an experienced administrator, you'll quickly be able to apply its principles and advice to your everyday problems.The book approaches Unix system administration from the perspective of your job -- the routine tasks and troubleshooting that make up your day. Whether you're dealing with frustrated users, convincing an uncomprehending management that you need new hardware, rebuilding the kernel, or simply adding new users, you'll find help in this book. You'll also learn about back up and restore and how to set up printers, secure your system, and perform many other system administration tasks. But the book is not for full-time system administrators alone. Linux users and others who administer their own systems will benefit from its practical, hands-on approach.This second edition has been updated for all major Unix platforms, including SunOS 4.1, Solaris 2.4, AIX 4.1, Linux 1.1, Digital Unix, OSF/1, SCO Unix Version 3, HP/UX Versions 9 and 10, and IRIX Version 6. The entire book has been thoroughly reviewed and tested on all of the platforms covered. In addition, networking, electronic mail, security, and kernel configuration topics have been expanded substantially.Topics covered include:Starting up and shutting down your system Adding new users Managing processes System security Organizing and planning file systems Planning and performing backups Setting up pointers TCP/IP networking Setting up email Adding terminals and disk drives Setting up and using the accounting system
Unnovations
Charlie Brooker - 2002
Modelled on those catalogues that spill unwanted from your weekend newspapers, this is a celebration of triumphantly useless and inappropriate consumer choices. Illustrated throughout in the shape and style of catalogues that offer you the chance to buy machines that stamp your initials onto golf balls or allow you to warm you slippers electronically before putting them on. An array of toys, gadgets, and handy-helps, it's a modern vision of a consumer paradise gone very weird indeed.
Ry's Git Tutorial
Ryan Hodson - 2014
Its popularity among open-source developers makes Git a necessary tool for professional programmers, but it can also do wonders for your personal coding workflow. You’ll be able to experiment with new ideas, radically refactor existing code, and efficiently share changes with other developers—all without the slightest worry towards breaking your project.This comprehensive guide will walk you through the entire Git library, writing code and executing commands every step of the way. You'll create commits, revert snapshots, navigate branches, communicate with remote repositories, and experience core Git concepts first-hand.Designed for newcomers to distributed development, Ry's Git Tutorial presents this complex subject in simple terms that anyone can understand. Beginner and veteran programmers alike will find this book to be a fun, fast, and friendly introduction to Git-based revision control.
Bad Data Handbook: Cleaning Up The Data So You Can Get Back To Work
Q. Ethan McCallum - 2012
In this handbook, data expert Q. Ethan McCallum has gathered 19 colleagues from every corner of the data arena to reveal how they’ve recovered from nasty data problems.From cranky storage to poor representation to misguided policy, there are many paths to bad data. Bottom line? Bad data is data that gets in the way. This book explains effective ways to get around it.Among the many topics covered, you’ll discover how to:Test drive your data to see if it’s ready for analysisWork spreadsheet data into a usable formHandle encoding problems that lurk in text dataDevelop a successful web-scraping effortUse NLP tools to reveal the real sentiment of online reviewsAddress cloud computing issues that can impact your analysis effortAvoid policies that create data analysis roadblocksTake a systematic approach to data quality analysis