Book picks similar to
Steganography in Digital Media by Jessica Fridrich
cryptography
joe
cryptology
technical
Computer Security: Principles and Practice
William Stallings - 2007
This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.
The Best of 2600: A Hacker Odyssey
Emmanuel Goldstein - 2008
Find the best of the magazine's writing in Best of 2600: A Hacker Odyssey, a collection of the strongest, most interesting, and often most controversial articles covering 24 years of changes in technology, all from a hacker's perspective. Included are stories about the creation of the infamous tone dialer "red box" that allowed hackers to make free phone calls from payphones, the founding of the Electronic Frontier Foundation, and the insecurity of modern locks.
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
Crypto: How the Code Rebels Beat the Government—Saving Privacy in the Digital Age
Steven Levy - 2001
From Stephen Levy—the author who made "hackers" a household word—comes this account of a revolution that is already affecting every citizen in the twenty-first century. Crypto tells the inside story of how a group of "crypto rebels"—nerds and visionaries turned freedom fighters—teamed up with corporate interests to beat Big Brother and ensure our privacy on the Internet. Levy's history of one of the most controversial and important topics of the digital age reads like the best futuristic fiction.
The ARRL Extra Class License Manual for Ham Radio
H. Ward Silver - 2002
Whenyou upgrade to Extra Class, you gain access to the entire Amateur Radio frequency spectrum. Ues this book to ace the top-level ham radio licensing exam. Our expert instruction will lead you through all of the knowledge you need to pass the exam: rules, specific operating skills and more advanced electronics theory.
Windows Presentation Foundation Unleashed
Adam Nathan - 2006
Windows Presentation Foundation (WPF) is a key component of the .NET Framework 3.0, giving you the power to create richer and more compelling applications than you dreamed possible. Whether you want to develop traditional user interfaces or integrate 3D graphics, audio/video, animation, dynamic skinning, rich document support, speech recognition, or more, WPF enables you to do so in a seamless, resolution-independent manner. Windows Presentation Foundation Unleashed is the authoritative book that covers it all, in a practical and approachable fashion, authored by .NET guru and Microsoft developer Adam Nathan. - Covers everything you need to know about Extensible Application Markup Language (XAML) - Examines the WPF feature areas in incredible depth: controls, layout, resources, data binding, styling, graphics, animation, and more - Features a chapter on 3D graphics by Daniel Lehenbauer, lead developer responsible for WPF 3D - Delves into non-mainstream topics: speech, audio/video, documents, bitmap effects, and more - Shows how to create popular UI elements, such as features introduced in the 2007 Microsoft Office System: Galleries, ScreenTips, custom control layouts, and more - Demonstrates how to create sophisticated UI mechanisms, such as Visual Studio-like collapsible/dockable panes - Explains how to develop and deploy all types of applications, including navigation-based applications, applications hosted in a Web browser, and applications with great-looking non-rectangular windows - Explains how to create first-class custom controls for WPF - Demonstrates how to create hybrid WPF software that leverages Windows Forms, ActiveX, or other non-WPF technologies - Explains how to exploit new Windows Vista features in WPF applications
HTML Fixes for Kindle: Advanced Self Publishing for Kindle Books, or Tips on Tweaking Your App's HTML So Your Ebooks Look Their Best
Aaron Shepard - 2013
Have you ever opened a Kindle book to find that the font started out way too small or way too large? Have you tried to change to a different font while reading and discovered you couldn't? Have you jumped to a new chapter in a Kindle book and seen that the chapter heading lost its formatting? Has a Kindle completely ignored formatting you knew was in the book? According to Amazon, the simplest way to publish your Kindle book is to upload an HTML file you've saved from Microsoft Word or another app. By itself, that method can bring you maybe 80% of the way to a well-formatted, trouble-free ebook. But what about the other 20%? In this follow-up to his bestselling -From Word to Kindle, - Aaron Shepard takes your saved HTML as a starting point and tells how to quickly tweak and tune it to avoid common problems. Assuming no knowledge of HTML, he introduces the basics of the language, then reveals how to use find-and-replace and macros to touch up an entire book in seconds! If you're serious about Kindle publishing and you're technically inclined -- but not a full-fledged geek -- Aaron provides the tips you need to bring your Kindle book to the next level, making it something truly to be proud of. ///////////////////////////////////////////////// Aaron Shepard is a foremost proponent of the new business of profitable self publishing, which he has practiced and helped develop since 1998. He is the author of -Aiming at Amazon, - -POD for Profit, - -Perfect Pages, - and Amazon's #1 and #2 bestselling paid books on Kindle formatting, -From Word to Kindle- and -Pictures on Kindle.- ///////////////////////////////////////////////// CONTENTS Getting Started 1 WORKING WITH HTML HTML and Kindle HTML Export HTML Editing HTML Processing HTML Basics HTML Checking HTML Cleanup HTML Testing 2 HTML FIXES Fixes for Fonts Fixes for Paragraphs Fixes for Headings Fixes for Line Breaking Fixes for Pictures Fixes for Navigation ///////////////////////////////////////////////// SAMPLE Here are some of the things you can accomplish through changes in HTML. * Adjust bookmarks so headings retain proper formatting when jumped to. * Remove settings that stop the user from choosing their own. * Keep fonts from appearing much too small or much too large when the book is opened. * Make sure indents and other spacing stays relative to larger and smaller font sizes. * Avoid line breaks that leave short words dangling at the ends of lines or paragraphs. * Make up for features lost in translation from your word processor, like nonbreaking hyphens. * Stop -ghost hyphens- from appearing in the middle of words. * Keep pages of text from disappearing for some users. * Prevent the Kindle from applying its own defaults in place of your settings.
CCNA Portable Command Guide
Scott D. Empson - 2005
The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.
Security Metrics: Replacing Fear, Uncertainty, and Doubt
Andrew Jaquith - 2007
Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index
The Implementation (TCP/IP Illustrated, Volume 2)
Gary R. Wright - 1995
"TCP/IP Illustrated, Volume 2" contains a thorough explanation of how TCP/IP protocols are implemented. There isn't a more practical or up-to-date bookothis volume is the only one to cover the de facto standard implementation from the 4.4BSD-Lite release, the foundation for TCP/IP implementations run daily on hundreds of thousands of systems worldwide. Combining 500 illustrations with 15,000 lines of real, working code, "TCP/IP Illustrated, Volume 2" uses a teach-by-example approach to help you master TCP/IP implementation. You will learn about such topics as the relationship between the sockets API and the protocol suite, and the differences between a host implementation and a router. In addition, the book covers the newest features of the 4.4BSD-Lite release, including multicasting, long fat pipe support, window scale, timestamp options, and protection against wrapped sequence numbers, and many other topics. Comprehensive in scope, based on a working standard, and thoroughly illustrated, this book is an indispensable resource for anyone working with TCP/IP.
Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications
Ivan Ristic - 2014
Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.
Twenty Small Sailboats to Take You Anywhere
John Vigor - 1999
But what was once fantasy is now reality. With a growing glut of good used boats on the market, its possible to sail around the world in a boat that costs less than a car. In this fascinating book, well-known boating author John Vigor turns the spotlight on 20 seaworthy sailboats that are at home on the ocean. These are old fiberglass boats, mostly of traditional design and strong construction. All are small their sizes range from 20 feet to 32 feet overall but all have crossed oceans. Many have circumnavigated the world. And all are inexpensive. There are many hundreds of small cruising boats sailing the seven seas at this moment. They explore everywhere, from the ice-bound shores of Antarctica to the high latitudes of the Northern Hemisphere. Most, however, ply the tradewind routes where flying fish play. The water is warm, and coconut trees line calm lagoons bounded by beaches of pure white sand. But choosing the right boat to cross an ocean or go around the world can be a confusing and exasperating experience, particularly if your budget is tight. Its well-nigh impossible to find objective comparisons. Vigor sets out to remedy that in this book. He compares the designs and handling characteristics of 20 different boats whose prices on the secondhand market start at about $3,000. Interviews with experienced owners (featuring valuable tips about handling each boat in heavy weather) are interspersed with line drawings of hulls, sailplans, and accommodations. Vigor has unearthed the known weaknesses of each boat and explains how to deal with them. He rates their comparative seaworthiness, their speed, and the number of people they can carry in comfort. If you have ever dreamed the dream, this is the book that will turn it into reality.
The Little Redis Book
Karl Seguin
While it's safe to say that relational databases aren't going anywhere, we can also say that the ecosystem around data is never going to be the same.Of all the new tools and solutions, for me, Redis has been the most exciting. Why? First because it's unbelievably easy to learn. Hours is the right unit to use when talking about length of time it takes to get comfortable with Redis. Secondly, it solves a specific set of problems while at the same time being quite generic. What exactly does that mean? Redis doesn't try to be all things to all data. As you get to know Redis, it'll become increasingly evident what does and what does not belong in it. And when it does, as a developer, it's a great experience.While you can build a complete system using Redis only, I think most people will find that it supplements their more generic data solution - whether that be a traditional relational database, a document-oriented system, or something else. It's the kind of solution you use to implement specific features. In that way, it's similar to an indexing engine. You wouldn't build your entire application on Lucene. But when you need good search, it's a much better experience - for both you and your users. Of course, the similarities between Redis and indexing engines end there.The goal of this book is to build the foundation you'll need to master Redis. We'll focus on learning Redis' five data structures and look at various data modeling approaches. We'll also touch on some key administrative details and debugging techniques.LicenseThe Little Redis Book is licensed under the Attribution-NonCommercial 3.0 Unported license. You should not have paid for this book.You are free to copy, distribute, modify or display the book. However, I ask that you always attribute the book to me, Karl Seguin, and do not use it for commercial purposes.You can see the full text of the license at:http://creativecommons.org/licenses/b...About The AuthorKarl Seguin is a developer with experience across various fields and technologies. He's an active contributor to Open-Source Software projects, a technical writer and an occasional speaker. He's written various articles, as well as a few tools, about Redis. Redis powers the ranking and statistics of his free service for casual game developers: mogade.com.Karl wrote The Little MongoDB Book, the free and popular book about MongoDB.His blog can be found at http://openmymind.net and he tweets via @karlseguinWith Thanks ToA special thanks to Perry Neal for lending me his eyes, mind and passion. You provided me with invaluable help. Thank you.Latest VersionThe latest source of this book is available at: http://github.com/karlseguin/the-litt...
ToGAF 9 Foundation Study Guide: Preparation for the TOGAF 9 Part 1 Examination
Rachel Harrison - 2009
It gives an overview of every learning objective for the TOGAF 9 Foundation Syllabus and in-depth coverage on preparing and taking the TOGAF 9 Part 1 Examination. It is specifically designed to help individuals prepare for certification.This Study Guide is excellent material for:a) Individuals who require a basic understanding of TOGAF 9b) Professionals who are working in roles associated with an architecture project such as those responsible for planning, execution, development, delivery, and operationc) Architects who are looking for a first introduction to TOGAF 9d) Architects who want to achieve Level 2 certification in a stepwise manner and have not previously qualified as TOGAF 8 CertifiedA prior knowledge of enterprise architecture is advantageous but not required. While reading this Study Guide, the reader should also refer to the TOGAF Version 9.1 documentation available online at www.opengroup.org and also available as hard copy from www.vanharen.net and online booksellers
Getting Started with OAuth 2.0
Ryan Boyd - 2011
This concise introduction shows you how OAuth provides a single authorization technology across numerous APIs on the Web, so you can securely access users’ data—such as user profiles, photos, videos, and contact lists—to improve their experience of your application.Through code examples, step-by-step instructions, and use-case examples, you’ll learn how to apply OAuth 2.0 to your server-side web application, client-side app, or mobile app. Find out what it takes to access social graphs, store data in a user’s online filesystem, and perform many other tasks.Understand OAuth 2.0’s role in authentication and authorizationLearn how OAuth’s Authorization Code flow helps you integrate data from different business applicationsDiscover why native mobile apps use OAuth differently than mobile web appsUse OpenID Connect and eliminate the need to build your own authentication system