Book picks similar to
Computer Viruses: From Theory to Applications by Iric Filiol
v
virus
hacking
programming
Mom Boss
Hilary Grossman - 2021
The Lululemon-clad moms are perfectly toned, expertly highlighted, and magnificently manicured. The women spend their days practicing Pilates, shopping for shoes, and doing everything in their power to ensure their children never experience a difficult day.PTA president, Jackie Martin, is the envy off the mothers. She has a loyal and handsome husband, she host's elaborate parties, and her eldest daughter, Hayley, is the most popular child in the fifth grade. Her life appears flawless, but is life ever what it seems to be?After receiving a painful blow, when Hayley was in kindergarten, Jackie clawed her way into PTA power. She lived her life by the adage, "Proper planning prevents poor performance." Her attention to detail (okay fine – her control freak nature) served her well until she experiences the ultimate betrayal.Angry and hurt, old emotional wounds are ripped open as Jackie realizes she doesn't know who she can trust. Jackie must reevaluate her life, her friendships, and the choices she has made. Will she finally let her guard down and show the world the real Jackie Martin?A hilarious and heartwarming novel that’s perfect for fans of Class Mom! Mom Boss is the standalone prequel to Go On, Girl and Mom Genes.
The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
Eric S. Raymond - 1999
According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy. Already, billions of dollars have been made and lost based on the ideas in this book. Its conclusions will be studied, debated, and implemented for years to come. According to Bob Young, "This is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of Linux-based operating systems, and to the success of open source users and the companies that supply them."The interest in open source software development has grown enormously in the past year. This revised and expanded paperback edition includes new material on open source developments in 1999 and 2000. Raymond's clear and effective writing style accurately describing the benefits of open source software has been key to its success. With major vendors creating acceptance for open source within companies, independent vendors will become the open source story in 2001.
Ana: A Memoir of Anorexia Nervosa
Syanne Centeno - 2018
If I was starving, then that meant that I did not have to face reality. I did not have to think. When you’re starving, you cannot think. Every day feels like an out-of-body experience, and everything sounds like you are swimming underwater. When you have Anorexia Nervosa, you aren’t living… you are merely existing. You become a walking corpse of the person you once were. Your life becomes about finding ways to satisfy your disorder and nothing else really matters. You know that there is a chance that you won’t wake up the next morning, but keeping the Anorexia alive is more important than keeping yourself alive. You convince yourself that as long as you are hungry that somehow everything is okay. This was my life for 10 ½ years. My name is Syanne Centeno and I found Anorexia as an eight-year-old little girl. You could say that I accidentally stumbled upon this illness, or maybe IT actually found ME. I didn’t know what Anorexia was, and had never heard of it. I actually didn’t hear the term “Anorexia Nervosa” until I was 14, but had unknowingly been engaging in eating disorder behavior for years prior. Anorexia is such a complex, perplexing disorder. Trying to explain why I developed this as a child is nearly impossible. The only thing I can do is write down my experience and take you on a journey in my shoes in hopes that this will help someone somewhere understand the realities of living with an eating disorder." This is the account of Syanne's journey with severe Anorexia Nervosa (which she named "Ana"), a deadly psychiatric illness that haunts thousands of young girls and women each year. Throughout her honest, gut-wrenching tale she relives the horror of battling "Ana" for over a decade starting at the age of just eight-years-old, and how it nearly took her life. Along with Anorexia Nervosa, Syanne speaks of the other mental illness's she struggled with such as Depression, Borderline Personality Disorder, and self- mutilation. Without holding back, Syanne highlights the realities of living with an eating disorder, and what it took for her to overcome it.
A Walk with Mud: a story of two friends hiking from Canada to Mexico on the Pacific Crest Trail
Anna Herby - 2016
Certain that this passion can transcend the complications of their relationship, they set off on a journey to walk from Canada to Mexico, 2,660 miles on the Pacific Crest Trail. Together, they brave snow-covered slopes in the Cascades of Washington, walk through lava fields in Oregon, navigate a smoky haze of wildfire in Northern California, climb eleven thousand foot mountain passes in the High Sierra and revel in the desolate beauty of the Mojave desert in fall. But just two weeks into the adventure they break up. With four months of hiking still ahead, they find that navigating the new terms of their relationship is just as hard as navigating the wilderness. As a veteran U.S. Army Ranger, Mud struggles with chronic pain, post-traumatic stress disorder and resistance to intimacy. Bug longs for the connection she once had with her best friend. There’s no doubt that each will complete the trek, but will they finish together? A Walk with Mud is an honest, compassionate look into the physical and emotional ups and downs of an epic journey. With graceful narration, this memoir puts you right in the center of the most beautiful places on the West Coast. Moments of love, heartbreak, humor and sincerity keep the story fresh and engaging up to the very last page.
Rise: A Memoir
Rise Myers - 2016
It was as if her mother knew that Risé was not meant to be written into the family’s tragedies. In fact, from a young age Risé found a way to rise above the chaos, abuse, and molestation of her childhood, eventually escaping the weight of her family, and learning to love and believe in herself. This story is a testament to her deep determination and innate courage.
Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door
Brian Krebs - 2014
Tracing the rise, fall, and alarming resurrection of the digital mafia behind the two largest spam pharmacies and countless viruses, phishing, and spyware attacks he delivers the first definitive narrative of the global spam problem and its threat to consumers everywhere.Blending cutting-edge research, investigative reporting, and firsthand interviews, this terrifying true story reveals how we unwittingly invite these digital thieves into our lives every day. From unassuming computer programmers right next door to digital mobsters like "Cosma" who unleashed a massive malware attack that has stolen thousands of Americans' logins and passwords, Krebs uncovers the shocking lengths to which these people will go to profit from our data and our wallets.Not only are hundreds of thousands of Americans exposing themselves to fraud and dangerously toxic products from rogue online pharmacies, but even those who never open junk messages are at risk. As Krebs notes, spammers can—and do—hack into accounts through these emails, harvest personal information like usernames and passwords, and sell them on the digital black market. The fallout from this global epidemic doesn't just cost consumers and companies billions, it costs lives too.Fast-paced and utterly gripping, Spam Nation ultimately proposes concrete solutions for protecting ourselves online and stemming this tidal wave of cybercrime, before it's too late."Krebs's talent for exposing the weaknesses in online security has earned him respect in the IT business and loathing among cybercriminals. His track record of scoops has helped him become the rare blogger who supports himself on the strength of his reputation for hard-nosed reporting."
Bloomberg Businessweek
On Screen 3 - Teacher's Book (interleaved)
Jenny Dooley
The series combines active English learning with a variety of lively topics presented in themed modules. Key Features An integrated approach to the development of all four language skills Notions and functions Vocabulary presentation and practice Variety of reading, listening and speaking tasks Grammar presentation in context Activities encouraging critical thinking as well as web research Writing sections containing models and development of writing skills & Writing bank Realistic pairwork and groupwork activities Pronunciation and Intonation sections Study Skills to help students become autonomous learners Practical English sections preparing students to use the language in real-life situations Culture sections & CLIL sections for each module Language Review Grammar Reference section Interactive Whiteboard (IWB) Software
Serious Cryptography: A Practical Introduction to Modern Encryption
Jean-Philippe Aumasson - 2017
You’ll learn about authenticated encryption, secure randomness, hash functions, block ciphers, and public-key techniques such as RSA and elliptic curve cryptography.You’ll also learn: - Key concepts in cryptography, such as computational security, attacker models, and forward secrecy - The strengths and limitations of the TLS protocol behind HTTPS secure websites - Quantum computation and post-quantum cryptography - About various vulnerabilities by examining numerous code examples and use cases - How to choose the best algorithm or protocol and ask vendors the right questionsEach chapter includes a discussion of common implementation mistakes using real-world examples and details what could go wrong and how to avoid these pitfalls. Whether you’re a seasoned practitioner or a beginner looking to dive into the field, Serious Cryptography will provide a complete survey of modern encryption and its applications.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman - 2014
This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.
Dark Territory: The Secret History of Cyber War
Fred Kaplan - 2016
The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.
Social Engineering: The Science of Human Hacking
Christopher Hadnagy - 2018
The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited.Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks.Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
Linkers and Loaders
John R. Levine - 1999
But do you know how to use them to their greatest possible advantage? Only now, with the publication of Linkers & Loaders, is there an authoritative book devoted entirely to these deep-seated compile-time and run-time processes. The book begins with a detailed and comparative account of linking and loading that illustrates the differences among various compilers and operating systems. On top of this foundation, the author presents clear practical advice to help you create faster, cleaner code. You'll learn to avoid the pitfalls associated with Windows DLLs, take advantage of the space-saving, performance-improving techniques supported by many modern linkers, make the best use of the UNIX ELF library scheme, and much more. If you're serious about programming, you'll devour this unique guide to one of the field's least understood topics. Linkers & Loaders is also an ideal supplementary text for compiler and operating systems courses.
Buddhism for Beginners: All you need to start your journey
Richard Johnson - 2017
Written in a style that is simple and engaging, it explores the history of Buddhism, its philosophies, and its relevance in today’s society. The book provides numerous meditative exercises that will allow you to experience the wondrous teachings of this ancient wisdom. Inside you will read about... ✓ A Brief History of Buddhism ✓ The Spread of Buddhism ✓ The Servant or the Master: Which One are You? ✓ Self-Identification with the Mind and Body ✓ Meditation ✓ The Presence of Mindfulness ✓ The Principle of Karma ✓ Dualistic versus Non-Dualistic Perspectives ✓ The Principle of Non-Substantiality ✓ One’s Life and the Environment ✓ Sentient and Non-Sentient Beings ✓ Attachment ✓ The Ten Worlds The author explains how Buddhism is more than a religion; it’s an internal science. Rather than relying on dogma or sacred texts, Buddhism teaches us to look inward and challenge our most deep-seated beliefs for the purpose liberating ourselves from our minds.