Book picks similar to
Router Security Strategies: Securing IP Network Traffic Planes by Gregg Schudel
cisco
comp-infosec
lang-en
publisher-cisco
Incognito Toolkit - Tools, Apps, and Creative Methods for Remaining Anonymous, Private, and Secure While Communicating, Publishing, Buying, and Researching Online
Rob Robideau - 2013
With laws getting stricter by the day and making it more and more difficult to properly protect your personal information, you need the most up-to-date information and tools available and that's what you will find in Incognito Toolkit! Don't let snoopers, investigators, and scammers look over your shoulder or track you while you work and play on the internet! Learn about the tools that will help you use the internet anonymously, privately, and securely to protect assets, avoid social stigmas, and make you safer. This book is full of information that large corporations, scammers, and nosy governments don't want you to find! You won't find a collection of techniques and creative methods like this anywhere else! Covered in Incognito Toolkit: - Making truly anonymous online purchases - Shortcomings of Bitcoin - Encrypting communications - Encryption for online file storage solutions - Locking down and monitoring your hardware - Browser Fingerprinting - Using TOR and VPNs - Creative Text and File Steganography Techniques - Critical Techniques for Publishing Anonymously - Cleaning photo and video metadata - Dealing with tracking cookies Updated December 4th, 2013 with new information about credit card skimmers, TOR hardware devices, and more!
Scroll up and click the "Look Inside" feature on the top left hand side of the page!
The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset
Joy Mundy - 2006
In this new edition, the authors explain how SQL Server 2008 R2 provides a collection of powerful new tools that extend the power of its BI toolset to Excel and SharePoint users and they show how to use SQL Server to build a successful data warehouse that supports the business intelligence requirements that are common to most organizations. Covering the complete suite of data warehousing and BI tools that are part of SQL Server 2008 R2, as well as Microsoft Office, the authors walk you through a full project lifecycle, including design, development, deployment and maintenance.Features more than 50 percent new and revised material that covers the rich new feature set of the SQL Server 2008 R2 release, as well as the Office 2010 release Includes brand new content that focuses on PowerPivot for Excel and SharePoint, Master Data Services, and discusses updated capabilities of SQL Server Analysis, Integration, and Reporting Services Shares detailed case examples that clearly illustrate how to best apply the techniques described in the book The accompanying Web site contains all code samples as well as the sample database used throughout the case studies The Microsoft Data Warehouse Toolkit, Second Edition provides you with the knowledge of how and when to use BI tools such as Analysis Services and Integration Services to accomplish your most essential data warehousing tasks.
Cocoa Design Patterns
Erik M. Buck - 2009
Although Cocoa is indeed huge, once you understand the object-oriented patterns it uses, you'll find it remarkably elegant, consistent, and simple. Cocoa Design Patterns begins with the mother of all patterns: the Model-View-Controller (MVC) pattern, which is central to all Mac and iPhone development. Encouraged, and in some cases enforced by Apple's tools, it's important to have a firm grasp of MVC right from the start. The book's midsection is a catalog of the essential design patterns you'll encounter in Cocoa, including Fundamental patterns, such as enumerators, accessors, and two-stage creation Patterns that empower, such as singleton, delegates, and the responder chain Patterns that hide complexity, including bundles, class clusters, proxies and forwarding, and controllers And that's not all of them! Cocoa Design Patterns painstakingly isolates 28 design patterns, accompanied with real-world examples and sample code you can apply to your applications today. The book wraps up with coverage of Core Data models, AppKit views, and a chapter on Bindings and Controllers. Cocoa Design Patterns clearly defines the problems each pattern solves with a foundation in Objective-C and the Cocoa frameworks and can be used by any Mac or iPhone developer.
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks
Michal Zalewski - 2005
Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.
Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)
James Smith - 2016
Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!
Kotlin for Android Developers: Learn Kotlin the easy way while developing an Android App
Antonio Leiva - 2016
UML 2 and the Unified Process: Practical Object-Oriented Analysis and Design
Jim Arlow - 2001
Even for people not working with the Unified Process, the book is still of great use. UML 2 and the Unified Process, Second Edition is a must-read for every UML 2 beginner and a helpful guide and reference for the experienced practitioner."--Roland Leibundgut, Technical Director, Zuehlke Engineering Ltd."This book is a good starting point for organizations and individuals who are adopting UP and need to understand how to provide visualization of the different aspects needed to satisfy it. "--Eric Naiburg, Market Manager, Desktop Products, IBM Rational SoftwareThis thoroughly revised edition provides an indispensable and practical guide to the complex process of object-oriented analysis and design using UML 2. It describes how the process of OO analysis and design fits into the software development lifecycle as defined by the Unified Process (UP). UML 2 and the Unified Process contains a wealth of practical, powerful, and useful techniques that you can apply immediately. As you progress through the text, you will learn OO analysis and design techniques, UML syntax and semantics, and the relevant aspects of the UP. The book provides you with an accurate and succinct summary of both UML and UP from the point of view of the OO analyst and designer.This book providesChapter roadmaps, detailed diagrams, and margin notes allowing you to focus on your needs Outline summaries for each chapter, making it ideal for revision, and a comprehensive index that can be used as a reference New to this edition:Completely revised and updated for UML 2 syntax Easy to understand explanations of the new UML 2 semantics More real-world examples A new section on the Object Constraint Language (OCL) Introductory material on the OMG's Model Driven Architecture (MDA) The accompanying website providesA complete example of a simple e-commerce system Open source tools for requirements engineering and use case modeling Industrial-strength UML course materials based on the book
Ruby for Rails: Ruby Techniques for Rails Developers
David A. Black - 2006
That means you can't tap into the full power of Rails unless you master the Ruby language. ""Ruby for Rails,"" written by Ruby expert David Black (with a forward by David Heinemeier Hansson), helps Rails developers achieve Ruby mastery. Each chapter deepens your Ruby knowledge and shows you how it connects to Rails. You'll gain confidence working with objects and classes and learn how to leverage Ruby's elegant, expressive syntax for Rails application power. And you'll become a better Rails developer through a deep understanding of the design of Rails itself and how to take advantage of it.Newcomers to Ruby will find a Rails-oriented Ruby introduction that's easy to read and that includes dynamic programming techniques, an exploration of Ruby objects, classes, and data structures, and many neat examples of Ruby and Rails code in action. ""Ruby for Rails"": the Ruby guide for Rails developers!What's Inside Classes, modules, and objects Collection handling and filtering String and regular expression manipulation Exploration of the Rails source code Ruby dynamics Many more programming concepts and techniques!
Planet Earth Strangest Places: Fun Facts and Pictures for Kids
Speedy Publishing - 2015
This will let children know that there is a world out there they do not even know about. This will also make children wonder what goes on in these strange places. Some children will even develop the goal to visit some of these places when they get older. Most children do not know that there are strange places all over the earth.
PHP Cookbook
David Sklar - 2002
With our Cookbook's unique format, you can learn how to build dynamic web applications that work on any web browser. This revised new edition makes it easy to find specific solutions for programming challenges.PHP Cookbook has a wealth of solutions for problems that you'll face regularly. With topics that range from beginner questions to advanced web programming techniques, this guide contains practical examples -- or "recipes" -- for anyone who uses this scripting language to generate dynamic web content. Updated for PHP 5, this book provides solutions that explain how to use the new language features in detail, including the vastly improved object-oriented capabilities and the new PDO data access extension. New sections on classes and objects are included, along with new material on processing XML, building web services with PHP, and working with SOAP/REST architectures. With each recipe, the authors include a discussion that explains the logic and concepts underlying the solution.
Web Operations: Keeping the Data on Time
John Allspaw - 2010
It's the expertise you need when your start-up gets an unexpected spike in web traffic, or when a new feature causes your mature application to fail. In this collection of essays and interviews, web veterans such as Theo Schlossnagle, Baron Schwartz, and Alistair Croll offer insights into this evolving field. You'll learn stories from the trenches--from builders of some of the biggest sites on the Web--on what's necessary to help a site thrive.Learn the skills needed in web operations, and why they're gained through experience rather than schoolingUnderstand why it's important to gather metrics from both your application and infrastructureConsider common approaches to database architectures and the pitfalls that come with increasing scaleLearn how to handle the human side of outages and degradationsFind out how one company avoided disaster after a huge traffic delugeDiscover what went wrong after a problem occurs, and how to prevent it from happening againContributors include:John AllspawHeather ChampMichael ChristianRichard CookAlistair CrollPatrick DeboisEric FlorenzanoPaul HammondJustin HuffAdam JacobJacob LoomisMatt MassieBrian MoonAnoop NagwaniSean PowerEric RiesTheo SchlossnagleBaron SchwartzAndrew Shafer
The Implementation (TCP/IP Illustrated, Volume 2)
Gary R. Wright - 1995
"TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.
Living Clojure
Carin Meier - 2015
Author Carin Meier not only provides a practical overview of this JVM language and its functional programming concepts, but also includes a complete hands-on training course to help you learn Clojure in a structured way.The first half of the book takes you through Closure’s unique design and lets you try your hand at two Clojure projects, including a web app. The holistic course in second half provides you with critical tools and resources, including ways to plug into the Clojure community.
Understand the basic structure of a Clojure expression
Learn how to shape and control code in a functional way
Discover how Clojure handles real-world state and concurrency
Take advantage of Java classes and learn how Clojure handles polymorphism
Manage and use libraries in a Clojure project
Use the core.async library for asynchronous and concurrent communication
Explore the power of macros in Clojure programming
Learn how to think in Clojure by following the book’s seven-week training course
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Justin Seitz - 2008
But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?
The Conscious Mind
Zoltan Torey - 2014
Drawing on insights from evolutionary biology, neuroscience, and linguistics, Torey reconstructs the sequence of events by which "Homo erectus" became "Homo sapiens." He describes the augmented functioning that underpins the emergent mind -- a new ("off-line") internal response system with which the brain accesses itself and then forms a selection mechanism for mentally generated behavior options. This functional breakthrough, Torey argues, explains how the animal brain's "awareness" became self-accessible and reflective -- that is, how the human brain acquired a conscious mind. Consciousness, unlike animal awareness, is not a unitary phenomenon but a composite process. Torey's account shows how protolanguage evolved into language, how a brain subsystem for the emergent mind was built, and why these developments are opaque to introspection. We experience the brain's functional autonomy, he argues, as free will. Torey proposes that once life began, consciousness had to emerge -- because consciousness is the informational source of the brain's behavioral response. Consciousness, he argues, is not a newly acquired "quality," "cosmic principle," "circuitry arrangement," or "epiphenomenon," as others have argued, but an indispensable working component of the living system's manner of functioning.