Book picks similar to
2600 Magazine: The Hacker Quarterly - Winter 2015-2016 by 2600 Magazine
information-security
periodicals
politics
computer-science
The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
Bill Blunden - 2009
Adopting an approach that favors full disclosure, The Rootkit Arsenal presents the most accessible, timely, and complete coverage of rootkit technology. This book covers more topics, in greater depth, than any other currently available. In doing so the author forges through the murky back alleys of the Internet, shedding light on material that has traditionally been poorly documented, partially documented, or intentionally undocumented.The spectrum of topics covered includes how to:* Hook kernel structures on multi-processor systems* Use a kernel debugger to reverse system internals* Inject call gates to create a back door into Ring-0* Use detour patches to sidestep group policy* Modify privilege levels on Vista by altering kernel objects* Utilize bootkit technology* Defeat live incident response and post-mortem forensics* Implement code armoring to protect your deliverables* Establish covert channels using the WSK and NDIS 6.0
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
Eric S. Raymond - 1999
According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy. Already, billions of dollars have been made and lost based on the ideas in this book. Its conclusions will be studied, debated, and implemented for years to come. According to Bob Young, "This is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of Linux-based operating systems, and to the success of open source users and the companies that supply them."The interest in open source software development has grown enormously in the past year. This revised and expanded paperback edition includes new material on open source developments in 1999 and 2000. Raymond's clear and effective writing style accurately describing the benefits of open source software has been key to its success. With major vendors creating acceptance for open source within companies, independent vendors will become the open source story in 2001.
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Mark Dowd - 2006
Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman - 2014
This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.
The Hacker and the State: Cyber Attacks and the New Normal of Geopolitics
Ben Buchanan - 2020
Escape from Dubai
Herve Jaubert - 2009
From a life of luxury in the opulent city of Dubai to promised ruination, Jaubert tells a tale of espionage and escape that rivals any best selling novel on the market. Immersed in a luxury submarine business, Jaubert was hired as CEO by Dubai World to develop and design miniature subs for the wealthy. Once problems developed within the business, Herve Jaubert became the scapegoat of government officials and found himself ensnared in a web of police threats, extortion, human rights abuses and coercion. With no chance to make it through their biased legal system, Jaubert planned the escape of his life.
Predators and Prey
Abhinav Agarwal - 2020
An Indian scientist on the run. The spy apparatus of three nations after him and the coveted secrets he intends to take to the highest authorities. A girl who has become an unwitting pawn in this deadly game. A mastermind who will stop at nothing. They are up against a man with a troubled past who stands between life and death, victory and defeat. A conspiracy so devious it could forever change the nation. A race against impossible odds and time. Who will get their hands on the secret first? About the Author Abhinav is a columnist, photographer, software professional, Hindi music addict, reader and reviewer, and curator of the Indic Book Club. Abhinav’s writings have been published in DNA, Pioneer, Swarajya, LinkedIn, OpIndia, Medium, and elsewhere. He has worked at technology companies in India, the United States, and Canada. He holds a bachelor’s degree in Computer Engineering from Mumbai University and is a post-graduate from the Indian Institute of Management, Bangalore. He lives in Bangalore with his wife and two daughters.
Deep Blue
Alan Judd - 2017
During a time of political disruption and rising anti-nuclear sentiment, MI5 discovers that an extremist fringe group, Action Against Austerity, appears to have links to an established political party while planning sabotage using something or someone called Deep Blue. Banned from investigating British political parties, the head of MI5 seeks advice from Charles Thoroughgood, his opposite number in MI6. Agreeing to help unofficially with the case, Charles must delve deep into his own past, to an unresolved Cold War case linked to his private life. Using the past as key to the present, he soon finds himself in a race against time to prevent a plot which is politically nuclear … Authoritative and packed with in-depth knowledge, Deep Blue is a gripping new spy thriller from a master of the genre.‘Judd infuses his writing with insider knowledge’ New Statesman
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Stealing the Network: How to Own the Box
Ryan Russell - 2003
So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the -street fighting- tactics used to attack networks and systems. Not just another -hacker- book, it plays on -edgy- market success of Steal this Computer Book with first hand, eyewitness accountsA highly provocative expose of advanced security exploitsWritten by some of the most high profile -White Hats-, -Black Hats- and -Gray Hats-Gives readers a -first ever- look inside some of the most notorious network intrusions
Stakeknife: Britain's Secret Agents in Ireland
Greg Harkin - 2004
The stories of two undercover agents -- Brian Nelson, who worked for the Force Research Unit (FRU), aiding loyalist terrorists and murderers in their bloody work; and the man known as Stakeknife, deputy head of the IRA's infamous ‘Nutting Squad', the internal security force which tortured and killed suspected informers.
None of the Above
Rick Edwards - 2015
What with broken promises, complicated jargon and a lack of simple and clear information, is it any wonder that voter turnout is plummeting? It's not that you don't care about the way the country is run - it's that you don't think you can change it. Well, you can. And this book aims to show you how, by setting out basic politics and answering questions we've all asked, like: Why do politicians lie? What do UKIP stand for? And what's going to happen to the NHS? You have a decision to make in the countdown to the May 2015 General Election. You have something politicians want. Your vote. An ambassador for #SwingtheVote and the presenter of Free Speech, Rick Edwards has written a pithy and succinct book explaining the power of your vote. A refreshing counterpoint to Russell Brand's sentiments on voting in his latest book, Revolution, it will make you think about politics in a completely new way.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Fox Nation vs. Reality: The Fox News Cult of Ignorance
Mark Howard - 2012
Its Internet community web site, Fox Nation, serves as the online gathering place for Fox viewers to absorb and spread the aggregated disinformation and conspiracy theories hatched by Fox News.Two years ago the first volume of Fox Nation vs. Reality was published revealing an Internet operation that was dedicated to fiercely partisan, right-wing distortions of the truth. Its mission was, and remains, to construct a safe haven for the broader Fox News community to reinforce their preferred fantasies and unfounded preconceptions. Since then Fox Nation has evolved into an even more sheltered environment that has taken on many characteristics of culthood. It is a pattern they adopted from their parent, Fox News, where the slogan “fair and balanced” was an implicit condemnation of all other news sources as being neither. Recognizing that the prime directive of a cult is to convince your followers that your version of reality is the only true version and that all others are agents of deception, Fox segregated their disciples to prevent them from being contaminated by impure thoughts, otherwise known as facts.In Fox Nation vs. Reality you will find a compilation of articles originally published on the media analysis web site News Corpse. They provide an eye-opening look into the lengths that committed propagandists will go in order to fabricate an alternative political reality. And remember that Fox Nation is not some remote outpost on the Internet Superhighway. It is an integral part of Fox News whose executives are wholly responsible for the stain it produces on journalism.
Brad Thor Collectors' Edition #3: The Last Patriot / The Apostle / Foreign Influence
Brad Thor - 2012
Follow counterterrorism operative and ex-SEAL Scot Harvath’s action-packed exploits, and discover why Brad Thor has been called “America’s favorite author” (KKTX).THE LAST PATRIOTJune 632 A.D.: The prophet Mohammed shares a final and startling revelation. Within days, he is assassinated. September 1789: Thomas Jefferson uncovers a conspiracy that could change the face of Islam. Present day: Men still kill to keep the secret hidden. When a car bomb explodes outside a Parisian café, counterterrorism operative Scot Harvath is thrust back into the life he has tried desperately to leave behind. In a race to uncover an ancient secret with the power to stop militant Islam, Harvath will risk everything to reclaim Mohammed’s final revelation and defeat one of the deadliest evils the world has ever known.THE APOSTLEEvery politician has a secret. And when the daughter of a politically connected family is kidnapped abroad, America’s new president will agree to anything—even a deadly and ill-advised rescue plan—in order to keep his secret hidden. But when covert counterterrorism operative Scot Harvath is assigned to infiltrate one of the world’s most notorious prisons and free the man the kidnappers demand as ransom, he quickly learns that there is much more to the operation than anyone dares to admit. As the subterfuge is laid bare, Harvath must examine his own career of ruthlessly hunting down and killing terrorists and decide if he has what it takes to help one of the world’s worst go free.FOREIGN INFLUENCEBuried deep within the black ops budget of the Department of Defense, a newly created spy agency reports only to a secret panel of military insiders. Its job: target America’s enemies—both foreign and domestic— under charter of three simple words—Find, Fix, and Finish. When a bombing in Rome kills a group of American college students, the evidence points to a dangerous colleague from Harvath’s past. Leveraging this relationship to lure the suspect out of hiding, Harvath must destroy him. But what if it is the wrong man? In Chicago a young woman is struck by a taxi in a hit-and-run, and the family’s attorney uncovers a shocking connection to the Rome bombing. Harvath must link together the desperate violence, and race to prevent one of the most audacious and unthinkable acts of war in the history of mankind.