Book picks similar to
Computer Viruses: From Theory to Applications by Iric Filiol
hacking
programming
specialist-books
v
Worm: The First Digital World War
Mark Bowden - 2011
Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kevin Poulsen - 2011
Max 'Vision' Butler was a white-hat hacker and a celebrity throughout the programming world, even serving as a consultant to the FBI. But there was another side to Max. As the black-hat 'Iceman', he'd seen the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, and in their dysfunction was the ultimate challenge: he would stage a coup and steal their ill-gotten gains from right under their noses.Through the story of Max Butler's remarkable rise, KINGPIN lays bare the workings of a silent crime wave affecting millions worldwide. It exposes vast online-fraud supermarkets stocked with credit card numbers, counterfeit cheques, hacked bank accounts and fake passports. Thanks to Kevin Poulsen's remarkable access to both cops and criminals, we step inside the quiet,desperate battle that law enforcement fights against these scammers. And learn that the boy next door may not be all he seems.
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
The Tangled Web: A Guide to Securing Modern Web Applications
Michal Zalewski - 2011
Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs Build mashups and embed gadgets without getting stung by the tricky frame navigation policy Embed or host user-supplied content without running into the trap of content sniffing For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.
Ransom Seaborn
Bill Deasy - 2006
Deasy quietly explores the ties that bind, and the evolution of a heart that everyone will recognize, and root for" -- Jane McCafferty, author of "One Heart" --- Ransom Seaborn is an astonishing literary debut in the spirit of Gatsby and Holden Caulfield.
Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
Andy Oram - 2009
Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).
How Linux Works: What Every Superuser Should Know
Brian Ward - 2004
Some books try to give you copy-and-paste instructions for how to deal with every single system issue that may arise, but How Linux Works actually shows you how the Linux system functions so that you can come up with your own solutions. After a guided tour of filesystems, the boot sequence, system management basics, and networking, author Brian Ward delves into open-ended topics such as development tools, custom kernels, and buying hardware, all from an administrator's point of view. With a mixture of background theory and real-world examples, this book shows both "how" to administer Linux, and "why" each particular technique works, so that you will know how to make Linux work for you.
Motherhood Martyrdom & Costco Runs
Whitney Dineen - 2017
• Exhausting—when you realize you’ll most likely never sleep again--like EVER. • Explosive—OMG these kids spew from both ends! And that’s just the beginning. Whitney shares the ridiculous highs and excruciating lows of her catapult into motherhood. Enjoy the ride as this new mom vows to give up profanity while falling in love with… you guessed it, Costco. Be careful, because if you’re anything like Whitney, you may just pee a little. Motherhood Martyrdom & Costco Runs takes the reader on a roller coaster of emotions as Whitney plummets into postpartum depression, desperately tries to get her kids to stop yodeling in public restrooms, and comes to terms with the fact she’ll never quite be queen of her own kingdom. Get ready to laugh, cry, cheer, and pat yourself on the back for the sake of mommies everywhere. And while you’re at it, stop by Costco for a case of toilet paper and a Very Berry Sundae. You won’t regret it!
Introducing Psychology of Relationships: A Practical Guide (Introducing...)
John Karter - 2012
This Practical Guide will help you achieve new and healthier ways of relating by explaining some of the major underlying psychological ‘drivers’ that permeate relationships and identify and work on these unconscious motivating factors to eliminate ‘knee-jerk’ reactions. Filled with straightforward, practical advice, case studies and examples, Introducing Psychology of Relationships will help you understand your relationship and make it more loving and mutually supportive, as well as be better equipped for entering into a new relationship.
An Introduction to the Way of the Buddha: Buddhism for Beginners
Shalu Sharma - 2016
Here’s what you will learn in this book; you will learn about the Buddha, history of Buddha and Buddhism, teachings of Buddha, about Buddhist philosophy, the 3 universal truths, noble truths, sufferings, eight fold path, divisions of Buddhism, the 5 precepts, how to practice Buddhism and more.Download your book today and learn Buddhism plain and simple.
Go in Action
William Kennedy - 2014
The book begins by introducing the unique features and concepts of Go. Then, you'll get hands-on experience writing real-world applications including websites and network servers, as well as techniques to manipulate and convert data at speeds that will make your friends jealous.
The Linux Command Line
William E. Shotts Jr. - 2012
Available here:readmeaway.com/download?i=1593279523The Linux Command Line, 2nd Edition: A Complete Introduction PDF by William ShottsRead The Linux Command Line, 2nd Edition: A Complete Introduction PDF from No Starch Press,William ShottsDownload William Shotts’s PDF E-book The Linux Command Line, 2nd Edition: A Complete Introduction
Teesra Janam / تیسرا جنم
Khalid Jamil Akhtar - 2005
Khalid Jamil published his autobiography in Urdu under the title "Teesra Janam".In first part of the book "Pehla Janam", he talks of his childhood memories including his stay at Petaro. He talks of his successes and achievements at Petaro, which would be of great interest for all Petarians to read. In the second part "Doosra Janam", he talks about his unfortunate accident, and how this changed his entire life. He talks of the transformation and how his mind, soul, thoughts and consciousness reacted to this change in his life. It was a rebirth for him when he rediscovered himself. In the last part of the book "Teesra Janam", he discusses the stories of his patients and friends, and provides a new insight into one's own self. He goes on to discuss issues of society and social issues and their solutions. All of this can be possible only through a change in our thought process and a sense of discovery of the self.
Just for Fun: The Story of an Accidental Revolutionary
Linus Torvalds - 2001
Then he wrote a groundbreaking operating system and distributed it via the Internet -- for free. Today Torvalds is an international folk hero. And his creation LINUX is used by over 12 million people as well as by companies such as IBM.Now, in a narrative that zips along with the speed of e-mail, Torvalds gives a history of his renegade software while candidly revealing the quirky mind of a genius. The result is an engrossing portrayal of a man with a revolutionary vision, who challenges our values and may change our world.
Working at the Ubuntu Command-Line Prompt
Keir Thomas - 2011
His books have been read by over 1,000,000 people and are #1 best-sellers. His book Beginning Ubuntu Linux recently entered its sixth edition, and picked-up a Linux Journal award along the way. Thomas is also the author of Ubuntu Kung Fu. * * * * * * * * * * * * * * * * * Get to grips with the Ubuntu command-line with this #1 best-selling and concise guide. "Best buck I've spent yet" — Amazon review.* Readable, accessible and easy to understand;* Learn essential Ubuntu vocational skills, or read just for fun;* Covers Ubuntu commands, syntax, the filesystem, plus advanced techniques;* For ANY version of Linux based on Debian, such as Linux Mint--not just Ubuntu!;* Includes BONUS introduction to Ubuntu chapter, plus a glossary appendix and a guide to reading Linux/Unix documentation.