Book picks similar to
Expert Oracle Application Express Security by Scott Spendolini
general
oracle
programming
security
IPv6 Essentials
Silvia Hagen - 2002
It guides you through everything you need to know to get started, including how to configure IPv6 on hosts and routers and which applications currently support IPv6. The new IPv6 protocols offers extended address space, scalability, improved support for security, real-time traffic support, and auto-configuration so that even a novice user can connect a machine to the Internet. Aimed at system and network administrators, engineers, network designers, and IT managers, this book will help you understand, plan for, design, and integrate IPv6 into your current IPv4 infrastructure.Beginning with a short history of IPv6, author Silvia Hagen provides an overview of new functionality and discusses why we need IPv6. Hagen also shares exhaustive discussions of the new IPv6 header format and Extension Headers, IPv6 address and ICMPv6 message format, Security, QoS, Mobility and, last but not least, offers a Quick Start Guide for different operating systems. IPv6 Essentials, Second Edition also covers:In-depth technical guide to IPv6 Mechanisms and Case Studies that show how to integrate IPv6 into your network without interruption of IPv4 services Routing protocols and upper layer protocols Security in IPv6: concepts and requirements. Includes the IPSEC framework and security elements available for authentication and encryption Quality of Service: covers the elements available for QoS in IPv6 and how they can be implemented Detailed discussion of DHCPv6 and Mobile IPv6 Discussion of migration cost and business case Getting started on different operating systems: Sun Solaris, Linux, BSD, Windows XP, and Cisco routersWhether you're ready to start implementing IPv6 today or are planning your strategy for the future, IPv6 Essentials, Second Edition will provide the solid foundation you need to get started."Silvia's look at IPv6 is always refreshing as she translates complex technology features into business drivers and genuine end-user benefits to enable building new business concepts based on end to end models." Latif Ladid, President IPv6 Forum, Chair EU IPv6 Task Force
MySQL Crash Course
Ben Forta - 2005
And this book will teach you all you need to know to be immediately productive with MySQL. By working through 30 highly focused hands-on lessons, your MySQL Crash Course will be both easier and more effective than you'd have thought possible. Learn how to: Retrieve and sort data Filter data using comparisons, regular expressions, full text search, and much more Join relational data Create and alter tables Insert, update, and delete data Leverage the power of stored procedures and triggers Use views and Cursors Manage transactional processing Create user accounts and manage security via access control Ben Forta is Macromedia's Senior Technical Evangelist, and has almost 20 years of experience in the computer industry in product development, support, training, and product marketing. Ben is the author of the best-selling Sams Teach Yourself SQL in 10 Minutes (now in its third edition, and translated into over a dozen languages), ColdFusion Web Application Construction Kit, and Advanced ColdFusion Development (both published by Que Publishing), Sams Teach Yourself Regular Expressions in 10 Minutes, as well as books on SQL, Flash, JSP, HomeSite, WAP, Windows 2000, and other subjects.
DNS and BIND
Cricket Liu - 1996
This book brings you up-to-date with the latest changes in this crucial service.The fifth edition covers BIND 9.3.2, the most recent release of the BIND 9 series, as well as BIND 8.4.7. BIND 9.3.2 contains further improvements in security and IPv6 support, and important new features such as internationalized domain names, ENUM (electronic numbering), and SPF (the Sender Policy Framework).Whether you're an administrator involved with DNS on a daily basis or a user who wants to be more informed about the Internet and how it works, you'll find that this book is essential reading.Topics include:What DNS does, how it works, and when you need to use it How to find your own place in the Internet's namespace Setting up name servers Using MX records to route mail Configuring hosts to use DNS name servers Subdividing domains (parenting) Securing your name server: restricting who can query your server, preventing unauthorized zone transfers, avoiding bogus servers, etc. The DNS Security Extensions (DNSSEC) and Transaction Signatures (TSIG) Mapping one name to several servers for load sharing Dynamic updates, asynchronous notification of change to a zone, and incremental zone transfers Troubleshooting: using nslookup and dig, reading debugging output, common problems DNS programming using the resolver library and Perl's Net::DNS module
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
Python in a Nutshell
Alex Martelli - 2003
Demonstrates the programming language's strength as a Web development tool, covering syntax, data types, built-ins, the Python standard module library, and real world examples
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Love Comes with a Price: Tales of a Dopeboy's Girl
Bianca - 2016
She has a bad attitude and she does what she wants and when she wants and does not care who she hurts in the process. She has everything that she could possibly want in life, but she feels like she is missing one thing, the love of her biological father, Tristan “Triple T” Thompson. Briana turns to different men looking for that love and affection that she has never gotten from Trip. Will that missing love and affection cause Briana to turn to a man who does not have her best interest at heart?Shanice Miller and Briana are sisters and they are nothing alike. Shanice has always been in her sister’s shadow and she hates it. Shanice starts to hang out with a different crowd and starts doing things that she knows no one would be proud of. She meets someone who she believes has her best interest at heart and will help her get her life back on track. Will he help her get her life back on track or will he lead her down a path of more destruction.Jaslyn Roberson is the quiet and rational thinker of the group. Jaslyn find herself in an abusive relationship and along with home issues she sometimes doesn’t know which way is up. After an tragic event she seeks solace into the arms of another man. Jaslyn can sense that this new guy is keeping a secret from her, but can’t quite put her finger on it.
SQL Antipatterns
Bill Karwin - 2010
Now he's sharing his collection of antipatterns--the most common errors he's identified in those thousands of requests for help. Most developers aren't SQL experts, and most of the SQL that gets used is inefficient, hard to maintain, and sometimes just plain wrong. This book shows you all the common mistakes, and then leads you through the best fixes. What's more, it shows you what's behind these fixes, so you'll learn a lot about relational databases along the way. Each chapter in this book helps you identify, explain, and correct a unique and dangerous antipattern. The four parts of the book group the antipatterns in terms of logical database design, physical database design, queries, and application development. The chances are good that your application's database layer already contains problems such as Index Shotgun, Keyless Entry, Fear of the Unknown, and Spaghetti Query. This book will help you and your team find them. Even better, it will also show you how to fix them, and how to avoid these and other problems in the future. SQL Antipatterns gives you a rare glimpse into an SQL expert's playbook. Now you can stamp out these common database errors once and for all. Whatever platform or programming language you use, whether you're a junior programmer or a Ph.D., SQL Antipatterns will show you how to design and build databases, how to write better database queries, and how to integrate SQL programming with your application like an expert. You'll also learn the best and most current technology for full-text search, how to design code that is resistant to SQL injection attacks, and other techniques for success.
The Jewish Joke: A Short History - With Punchlines
Devorah Baum - 2017
This smart and funny book includes tales from many of these much-loved comics, and will appeal to their broad audience, while revealing the history, context and wider culture of Jewish joking.The Jewish joke is as old as Abraham, and like the Jews themselves it has wandered over the world, learned countless new languages, worked with a range of different materials, been performed in front of some pretty hostile crowds, and yet still retained its own distinctive identity. So what is it that animates the Jewish joke? Why are Jews so often thought of as ‘funny’? And how old can a joke get?The Jewish Joke is a brilliant—and laugh-out-loud funny—riff on about what marks Jewish jokes apart from other jokes, why they are important to Jewish identity and how they work. Ranging from self-deprecation to anti-Semitism, politics to sex, Devorah Baum looks at the history of Jewish joking and asks whether the Jewish joke has a future. With jokes from Lena Dunham to Woody Allen, as well as Freud and Marx (Groucho, mostly), Baum balances serious research with light-hearted humor and provides fascinating insight into this well-known and much loved cultural phenomenon.
Flight
Neil Graham Hansen - 2019
In 1964, I embarked on a journey that was to be my life's adventure. I hired on as a pilot for Air America and its clandestine operations in Southeast Asia. Flying for the CIA's secret airline was a dream come true. Air America's operations were unknown. Its schedules were irregular. Its pilots were shadow people. It was the world of spooks, covert air ops and adventure. I had already been a pilot for more than half of my life when I left my home in Detroit for the wild escapades that awaited me in Southeast Asia. Air America had been the pinnacle of my life and, had the trajectory remained steady, my world and my career should have gone onward and upward from that point. The intent of telling my story is to take the reader on an historical journey of a little-known place in time through my own personal account. Within the context of history, my narrative is not to be considered anything but my own experience. The ranks of Air America were comprised of a host of patriotic professionals who deserve a place of honor in the annals of history. However, many colorful characters wore the Air America wings, and inside the course of my narrative, the reader will be subjected to people and situations that cannot be filed neatly under anything resembling normal sanity. Most names, except those of a known or high-ranking or public nature, and those I wish to recognize for heroic performances, have been changed to protect the innocent and guilty alike.
The Hoffmann Plague
Tony Littlejohns - 2018
With all established infrastructure and support systems gone, they must learn new skills quickly: skills which have become unfamiliar to most people living in modern times. By turns moving, shocking and humorous, it is a tale of ordinary people trying to build new lives in extraordinary circumstances and the practical issues they have to address. In a lawless country where societal norms have been destroyed, they encounter other survivors - some friendly; some hostile. But do they have what it takes to survive in this harsh new world? “Really enjoyed it. Flowed really well. Loved the detail you put into things and made me feel like I could actually survive!” Stuart R. “Your style is quite chatty and easy to read and your descriptions are evocative: it's very easy to visualise things! You also reminded me a bit of elements of Day of The Triffids, I think in style. TBH I really liked your general style - it's engaging without being hard work.” Dee T. “ Wow! It's over. Loved it and loved the ending… What was great is we were both always looking forward to the next chapter. Brilliant. We both loved it.” Sue Z. “Great stuff… thoroughly enjoyed it… The story is way too good not to be shared with millions of people.” Ant Z. “I can't believe it's over! I just finished it: it was really good! And that last sentence makes me hopeful for a sequel!!” Steph L. “The pace of the novel is about right, with the reader able to follow the characters through their journeys, both individually and combined. It feels moralistic without being prescriptive, leaving the reader to make up their own mind about where they would stand in such a circumstance.” Michael S.
The Silk Brief
John M. Burton - 2012
The book transported my imagination where I was right inside a courtroom drama…. Fantastic, thoroughly recommend this book!” “Both educational and entertaining …I thought the author did an excellent job of introducing Americans to the British legal system (which bemuses many of us as much as cricket). I always love good summations, and these were of high calibre… The author demonstrated a mastery of providing meaningful snippets of personal life essentially in textual asides.”“Author John Burton, Q.C. knows of whereof he writes, and his book, as well as being a well plotted, well written and highly enjoyable murder trial novel, is an education in the English criminal justice system, warts and all… There is also a fascinating subplot about the business of English criminal lawyers and the intrigues of the “Chambers” in which Brant practices.”“…..the skills of both the Prosecution, Joanna Glass QC and the Defence are on display. The reader is made to feel part of the Defence team.”David Brant QC is a newly appointed Queen’s Counsel, a “Silk”, a Criminal Barrister struggling against ever-dwindling legal aid funds and a lack of work. His Chambers is also suffering internal and external pressures and his Senior Clerk seems to only serve a select few. Life at the Bar is more challenging than ever before. His personal life is not much better. Having faced an acrimonious divorce after an inadvisable liaison with a female Solicitor, his life has become a mixture of enforced rest and ever increasing consumption of Claret and Rioja Reserva. However, after a night out with his Senior Clerk, he is instructed to defend in a Murder trial, leading one of the instructing solicitor’s firm’s In-House Barristers.The client is a Mr Damien Clarke, a cocaine addict charged with killing a known associate, Usman Hussain, after a night of smoking crack together in Hussain’s flat. The evidence against Damien appears almost overwhelming and as the case progresses towards trial it is strengthened by further forensic scientific evidence.David Brant QC must use all his forensic skill to combat the array of damning evidence against Damien and to pit his wits against a highly competent Prosecutor and a Judge who has a personal dislike for him. The Silk Brief takes us from before David Brant QC is instructed, through his early preparation of the case and conferences with the client in the High Security Belmarsh prison, through to the trial and verdict. It provides the day by day record of a murder trial including the examination and cross-examination of lay and expert witnesses, Counsel’s speeches, the Judges summing up and finally the jury’s deliberations and verdict. Although a work of fiction, the author draws extensively on his knowledge of the Criminal Bar of England and Wales, having practiced as a Criminal Barrister for over thirty years, latterly as Queen’s Counsel, conducting many trials, including murder trials in the Central Criminal Court, known colloquially and fondly as “The Old Bailey”.