Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Sun Certified Programmer & Developer for Java 2 Study Guide (Exam 310-035 & 310-027)


Kathy Sierra - 2002
    More than 250 challenging practice questions have been completely revised to closely model the format, tone, topics, and difficulty of the real exam. An integrated study system based on proven pedagogy, exam coverage includes step-by-step exercises, special Exam Watch notes, On-the-Job elements, and Self Tests with in-depth answer explanations to help reinforce and teach practical skills.Praise for the author:"Finally A Java certification book that explains everything clearly. All you need to pass the exam is in this book."--Solveig Haugland, Technical Trainer and Former Sun Course Developer"Who better to write a Java study guide than Kathy Sierra, the reigning queen of Java instruction? Kathy Sierra has done it again--here is a study guide that almost guarantees you a certification "--James Cubeta, Systems Engineer, SGI"The thing I appreciate most about Kathy is her quest to make us all remember that we are teaching people and not just lecturing about Java. Her passion and desire for the highest quality education that meets the needs of the individual student is positively unparalleled at SunEd. Undoubtedly there are hundreds of students who have benefited from taking Kathy's classes."--Victor Peters, founder Next Step Education & Software Sun Certified Java Instructor"I want to thank Kathy for the EXCELLENT Study Guide. The book is well written, every concept is clearly explained using a real life example, and the book states what you specifically need to know for the exam. The way it's written, you feel that you're in a classroom and someone is actually teaching you the difficult concepts, but not in a dry, formal manner. The questions at the end of the chapters are also REALLY good, and I am sure they will help candidates pass the test. Watch out for this Wickedly Smart book."-Alfred Raouf, Web Solution Developer, Kemety.Net"The Sun Certification exam was certainly no walk in the park but Kathy's material allowed me to not only pass the exam, but Ace it "--Mary Whetsel, Sr. Technology Specialist, Application Strategy and Integration, The St. Paul Companies

MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements


Dan HolmeMelissa Craft - 2003
    Maybe you re going for MCSA first, then MCSE. Maybe you need to upgrade your current credentials. Now, direct from Microsoft, this set brings together all the study resources you ll need. You get the brand-new Second Edition of all four books: for Exam 70-290 (Managing and Maintaining a Windows Server Environment), 70-291 and 70-293 (Network Infrastructure), and 70-294 (Active Directory). What s new here? Deeper coverage, more case studies, more troubleshooting, plus significant new coverage: Emergency Management Services, DNS, WSUS, Post-Setup Security Updates, traffic monitoring, Network Access Quarantine Control, and much more. There are more than 1,200 highly customizable CD-based practice questions. And, for those who don t have easy acess to Windows Server 2003, there s a 180-day eval version. This package isn t cheap, but there s help there, too: 15% discount coupons good toward all four exams. Bill Camarda, from the August 2006 href="http://www.barnesandnoble.com/newslet... Only

Daily Routine Mastery: How to Create the Ultimate Daily Routine for More Energy, Productivity, and Success - Have Your Best Day Every Day


Dominic Mann - 2017
     From energizing morning routines, to insanely efficient work routines, to empowering evening rituals, the ultra-successful structure their days to utilize every last waking minute to its fullest potential. And in this book, you will learn how to do the same. How will you learn to create the ultimate daily routine? Inside the book: The secret to creating the ultimate morning routine so you can have your best day every day (Hint: It has 3 parts) How to get more done with an ultra-efficient work routine (plus the ultimate work routine for squeezing every last drop of potential out of your work hours) How to renew your energy throughout the day with an “energy ritual” for all-day energy and productivity (plus how to schedule tasks according to your energy levels) Why having cold showers every morning can leave you feeling more energized, happy, and productive The secret to waking up feeling energized (Hint: It has nothing to do with how long you sleep for) How to finish your day with a powerful evening routine so you can kick ass the next day (plus an example of a great evening ritual you can copy) And much more… To create a powerful daily routine and perform at the peak of your abilities day in and day out, scroll up to the top of this page and click BUY NOW.

Buddha on the Bus


Nate Damm - 2014
    When various complications arise during the journey, Nate finds himself focusing closely on the characters around him for a bit of entertainment, but ends up getting more than he bargained for. The focal point of the story is Nate's seat-mate, a young man named Bud, whose extremely odd behavior catches the attention of everyone on the bus.

Configuring Windows 7: Self-Paced Training Kit (MCTS Exam 70-680)


Ian L. McLean - 2009
    This Self-Paced Training Kit is designed to help maximize your performance on 70-680, the required exam for the Microsoft Certified Technology Specialist (MCTS): Windows 7, Configuration certification.This 2-in-1 kit includes the official Microsoft study guide, plus practice tests on CD to help you assess your skills. It comes packed with the tools and features exam candidates want most—including in-depth, self-paced training based on final exam content; rigorous, objective-by-objective review; exam tips from expert, exam-certified authors; and customizable testing options. It also provides real-world scenarios, case study examples, and troubleshooting labs to give you the skills and expertise you can use on the job.Work at your own pace through the lessons and lab exercises. This official study guide covers installing, upgrading, and migrating to Windows 7; configuring network connectivity, applications, and devices; implementing backup and recovery; configuring User Account Control (UAC), mobility options, and new features such as DirectAccess and BranchCache; and managing system updates.Then assess yourself using the 200 practice questions on CD, featuring multiple customizable testing options to meet your specific needs. Choose timed or untimed testing mode, generate random tests, or focus on discrete objectives. You get detailed explanations for right and wrong answers—including pointers back to the book for further study. You also get an exam discount voucher—making this kit an exceptional value and a great career investment.

Distributed Operating Systems: Concepts and Design


Pradeep K. Sinha - 1996
    Each chapter addresses de-facto standards, popular technologies, and design principles applicable to a wide variety of systems. Complete with chapter summaries, end-of-chapter exercises and bibliographies, Distributed Operating Systems concludes with a set of case studies that provide real-world insights into four distributed operating systems.

Software Craftsmanship: The New Imperative


Pete McBreen - 2001
    Software Craftsmanship transcends software engineering, demonstrating that quality software can't simply be manufactured: it must be built by craftspeople with pride in their work, and a personal commitment to excellence. In Software Craftsmanship, Pete McBreen focuses on the craft of software development, explaining why current software engineering techniques often fail, and offering programmers a new path to excellence. Just as the modern carpenter benefits from better tools, materials, and understanding, the modern programmer can benefit from better computers, reusable components, and more robust languages -- but only if he or she is prepared to treat the software profession as a true craft. McBreen explains what software craftsmanship means, how its affects users, and how it changes the developer's relationship with customers. He introduces the concepts of software apprentices and journeymen, shows what can (and can't) be learned from the software engineering movement, and presents specific steps you can take now to move towards craftsmanship in your work -- and your organization.

Practical UNIX & Internet Security


Simson Garfinkel - 1991
    Crammed with information about host security, it saved many a UNIX system administrator and user from disaster.This second edition is a complete rewrite of the original book. It's packed with twice the pages and offers even more practical information for UNIX users and administrators. It covers features of many types of UNIX systems, including SunOS, Solaris, BSDI, AIX, HP-UX, Digital UNIX, Linux, and others. The first edition was practical, entertaining, and full of useful scripts, tips, and warnings. This edition is all those things -- and more.If you are a UNIX system administrator or user in this security-conscious age, you need this book. It's a practical guide that spells out, in readable and entertaining language, the threats, the system vulnerabilities, and the countermeasures you can adopt to protect your UNIX system, network, and Internet connection. It's complete -- covering both host and network security -- and doesn't require that you be a programmer or a UNIX guru to use it.Practical UNIX & Internet Security describes the issues, approaches, and methods for implementing security measures. It covers UNIX basics, the details of security, the ways that intruders can get into your system, and the ways you can detect them, clean up after them, and even prosecute them if they do get in. Filled with practical scripts, tricks, and warnings, Practical UNIX & Internet Security tells you everything you need to know to make your UNIX system as secure as it possible can be.Contents include:Part I: Computer Security Basics. Introduction and security policies. Part II: User Responsibilities. Users and their passwords, groups, the superuser, the UNIX filesystem, and cryptography. Part III: System Administrator Responsibilities. Backups, defending accounts, integrity checking, log files, programmed threats, physical security, and personnel security. Part IV: Network and Internet Security: telephone security, UUCP, TCP/IP networks, TCP/IP services, WWW, RPC, NIS, NIS+, Kerberos, and NFS. Part V: Advanced Topics: firewalls, wrappers, proxies, and secure programming. Part VI: Handling Security Incidents: discovering a breakin, U.S. law, and trust. VII: Appendixes. UNIX system security checklist, important files, UNIX processes, paper and electronic sources, security organizations, and table of IP services.

The Marigold Story: Indira Gandhi & Others


Kumkum Chadha - 2019
    Prime Minister Indira Gandhi hated the marigold flower, although in death it was strewn all over her body; her son Sanjay Gandhi was dictatorial, but also uncommonly empathetic; Smita Patil, who was synonymous with strong, women-centric films, was deeply insecure in her personal life; Ekta Kapoor, the television czarina believes that her unabashed faith in God helped her scale heights and earn her first big bucks; and Abhinav Bindra, who won India the first Olympic gold medal in an individual event confessed how he was a laidback child with no goals in sight. Embellished with interesting nuggets, this book is a collection of fascinating profiles including, L.K. Advani, Smriti Irani, Lalu Prasad Yadav, Rajiv Gandhi, Amitabh Bachchan and Arun Jaitley. Uncommon access, being privy to confidences and, above all, a willingness to tell the story, bring alive the people behind the headlines. The Marigold Story: Indira Gandhi & Others is not a gushing account of newsmakers; if anything it captures their weaknesses; goes beyond their achievements and examines what makes these individuals distinctive and unforgettable at the same time.

HTML5 for Masterminds: How to take advantage of HTML5 to create amazing websites and revolutionary applications


Juan Diego Gauchat
    

Artificial Life: A Report from the Frontier Where Computers Meet Biology


Steven Levy - 1992
    Some of these species can move and eat, see, reproduce, and die. Some behave like birds or ants. One such life form may turn out to be our best weapon in the war against AIDS.What these species have in common is that they exist inside computers, their DNA is digital, and they have come into being not through God's agency but through the efforts of a generation of scientists who seek to create life in silico.But even as it introduces us to these brilliant heretics and unravels the intricacies of their work. Artificial Life examines its subject's dizzying philosophical implications: Is a self-replicating computer program any less alive than a flu virus? Are carbon-and-water-based entities merely part of the continuum of living things? And is it possible that one day "a-life" will look back at human beings and dismiss us as an evolutionary way station -- or, worse still, a dead end?

The Windows Command Line Beginner's Guide (Computer Beginner's Guides)


Jonathan Moeller - 2011
    The Windows Command Line Beginner's Guide gives users new to the Windows command line an overview of the Command Prompt, from simple tasks to network configuration.In the Guide, you'll learn how to:-Manage the Command Prompt.-Copy & paste from the Windows Command Prompt.-Create batch files.-Remotely manage Windows machines from the command line.-Manage disks, partitions, and volumes.-Set an IP address and configure other network settings.-Set and manage NTFS and file sharing permissions.-Customize and modify the Command Prompt.-Create and manage file shares.-Copy, move, and delete files and directories from the command line.-Manage PDF files and office documents from the command line.-And many other topics.

Reversing: Secrets of Reverse Engineering


Eldad Eilam - 2005
    The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language

100 Years of Leeds United: 1919-2019


Daniel Chapman - 2018
    Since its foundation in 1919, Leeds United Football Club has seen more ups and downs than most, rising to global fame through an inimitable and uncompromising style in the 70s, clinching the last Division One title of the pre-Sky Sports era in 1992, before becoming the epitome of financial mismanagement at the start of the 21st century. Despite this demise, United remains one of the best supported – and most divisive – clubs in football, with supporters’ clubs dotted across the globe. In 100 Years of Leeds United, Chapman delves deep into the archives to discover the lesser-known episodes, providing fresh context to the folkloric tales that have shaped the club we know today, painting the definitive picture of the West Yorkshire giants.