Book picks similar to
Computer Viruses: From Theory to Applications by Iric Filiol
hacking
programming
specialist-books
v
Kali Linux Revealed: Mastering the Penetration Testing Distribution
Raphaël Hertzog - 2017
They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.
Hacker's Delight
Henry S. Warren Jr. - 2002
Aiming to tell the dark secrets of computer arithmetic, this title is suitable for library developers, compiler writers, and lovers of elegant hacks.
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Kevin D. Mitnick - 2011
While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is the most comprehensive to date.)
Outbreak
Karri Kadin - 2021
She was wrong.A single bite changed her life forever.She’d spent years pushing people away, but to survive as the world spiraled into an apocalypse would be impossible alone. So, when her estranged brother offered to help get her to safety she accepted.Now she just had to make it to the pickup location. The clock was ticking. The sick are hunting. And the infection was spreading.Can she survive long enough to reach the safety of the bunker?The outbreak is just the beginning…You’ll love this remarkable twist on the zombie/dystopian adventure. This novella is a prequel to the novel After the Outbreak.
Microprocessors and Microcontrollers
N. Senthil Kumar - 2011
It also touches upon the fundamentals of 32 bit, and 64 bit advanced processors. The book throughout provides the most popular programming tool - the assembly language codes to enhance the knowledge of programming the processors.Clear and concise in its treatment of topics, the contents of the book is supported by learning tools such as review questions, application examples (case studies) and design-based exercises.
The Lion's Surprise Baby: A Paranormal Pregnancy Romance
Jade White - 2018
Please only read if these themes interest you. Only suitable for adults. It had been a long time since Tara Phillips had slept with a man but a passionate night full of adventurous sex was just what she needed. And it was just what she got when she met the smooth and handsome property developer Brenton Morgan whilst on vacation in California. It was supposed to be a holiday fling which was why Brenton never revealed his secret shape-shifting lion side to her. However, what was meant to be just one night would become much, much more 9 months later and life as they knew it would never be the same again... Warning: This is a sex fueled paranormal romance featuring a curvy heroine and a hunky werelion. Please only read if these themes interest you. Only suitable for adults.
Drinking to Distraction
Jenna Hollenstein - 2013
But for years Jenna Hollenstein worried that she was using alcohol for the wrong reasons. Though it didn't cause her to spiral out of control, drinking seemed to be detracting from her life in subtler ways: missed opportunities, unaddressed fears, challenges not taken, relationships not cherished, and creativity unexplored. Rather than a series of dramatic events often associated with alcoholism, her decision to stop drinking was based on years of introspection, pros and cons lists, and conversations with friends, family, and a wise therapist. Though she never "hit bottom," Hollenstein eventually realized that drinking was not enhancing her life: it was distracting her from it.
Pretty Things Don't Break: A Memoir
Lauren Jayne - 2016
Her father was charming, but a monster. Lauren Jayne’s riveting memoir transports you into her roller-coaster life from page one. Travel with Lauren from her parents’ topless jazz club in Australia to her wild-child years growing up in the heart of Seattle’s grunge scene in the 1990s.
She was a girl on a mission: ditching the chaos-filled life she was born into to find love
In Seattle, Lauren finds the family she has always longed for in her tight group of friends. Here she experiences her first love, first loss, and finally, through a deeply rooted internal strength, a boundless determination to have the life she has always longed for and deep faith. She finds that what she has been looking for was closer than she ever knew. Dealing with life head-on, she fights her way through abandonment and self-loathing, a debilitating eating disorder and suicide. You cannot escape this addictive memoir without being personally affected - you will feel as if you are right by her side the whole way through, rooting for her.
Sydney, Rome, and Israel: a lifelong journey of pain, loss and learning
This captivating memoir will transport you into Lauren Jayne’s bizarre and larger-than-life world. You will journey around the world ping-ponging from Vegas where you will fall in love with her zany Mafia-drenched grandparents, Israel where she will discover a deeper faith, Rome where her love of culture is ignited, and back to Seattle where a suicide crumbles her world, only to finally bring it back together.
You cannot read this evocative and beautifully written true story without gaining a new perspective on life.
Scroll up to grab your copy of Pretty Things Don't Break: A Memoir now
Types and Programming Languages
Benjamin C. Pierce - 2002
The study of type systems--and of programming languages from a type-theoretic perspective--has important applications in software engineering, language design, high-performance compilers, and security.This text provides a comprehensive introduction both to type systems in computer science and to the basic theory of programming languages. The approach is pragmatic and operational; each new concept is motivated by programming examples and the more theoretical sections are driven by the needs of implementations. Each chapter is accompanied by numerous exercises and solutions, as well as a running implementation, available via the Web. Dependencies between chapters are explicitly identified, allowing readers to choose a variety of paths through the material.The core topics include the untyped lambda-calculus, simple type systems, type reconstruction, universal and existential polymorphism, subtyping, bounded quantification, recursive types, kinds, and type operators. Extended case studies develop a variety of approaches to modeling the features of object-oriented languages.
Resurrection
Scott Nicholson - 2018
A researcher studying the virus suffers a fever and launches into a bloody killing spree that ends with two police officers dead. A second researcher, Dr. Meg Perriman, has just flown home for the Easter holiday with her family in North Carolina, unknowingly carrying the virus. Within days, the infection spreads across the planet, sparking martial law, chaos, and widespread slaughter as many of the infected turn into flesh-eating zombies. Meg and a few others appear to be immune, however, and the survivors gather in a megachurch called Promiseland that the U.S. government has established as an emergency shelter. The Rev. Cameron Ingram, a charismatic televangelist the president has appointed as the “zombie czar,” believes the catastrophe is a sign of the Biblical apocalypse. When a rash of natural disasters accompany the outbreak and civilization breaks down, people turn to Ingram for salvation in the face of fear and despair. But Meg and her group of friends soon discover Ingram is not what he appears, and they are caught between the devil and the living dead.
The Pentester BluePrint: Starting a Career as an Ethical Hacker
Phillip L. Wylie - 2020
Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties
802.11 Wireless Networks: The Definitive Guide
Matthew S. Gast - 2002
Foremost on that list is mobility, since going wireless frees you from the tether of an Ethernet cable at a desk. But that's just the tip of the cable-free iceberg. Wireless networks are also more flexible, faster and easier for you to use, and more affordable to deploy and maintain.The de facto standard for wireless networking is the 802.11 protocol, which includes Wi-Fi (the wireless standard known as 802.11b) and its faster cousin, 802.11g. With easy-to-install 802.11 network hardware available everywhere you turn, the choice seems simple, and many people dive into wireless computing with less thought and planning than they'd give to a wired network. But it's wise to be familiar with both the capabilities and risks associated with the 802.11 protocols. And 802.11 Wireless Networks: The Definitive Guide, 2nd Edition is the perfect place to start.This updated edition covers everything you'll ever need to know about wireless technology. Designed with the system administrator or serious home user in mind, it's a no-nonsense guide for setting up 802.11 on Windows and Linux. Among the wide range of topics covered are discussions on:deployment considerationsnetwork monitoring and performance tuningwireless security issueshow to use and select access pointsnetwork monitoring essentialswireless card configurationsecurity issues unique to wireless networksWith wireless technology, the advantages to its users are indeed plentiful. Companies no longer have to deal with the hassle and expense of wiring buildings, and households with several computers can avoid fights over who's online. And now, with 802.11 Wireless Networks: The Definitive Guide, 2nd Edition, you can integrate wireless technology into your current infrastructure with the utmost confidence.
Diabetes: Reverse Your Diabetes With a Clear and Concise Step by Step Guide: (Diabetes, Diabetes Diet, Diabetes free, Diabetes Cure, Reversing Diabetes)
David Corr - 2016
You know about friends and family who are struggling with diabetes and trying to live a normal life. Well, if you or any of your family members are struggling with diabetes, then you understand these symptoms very well. You would have also heard that diabetes is irreversible. Now, here is the deal – Diabetes can be reversed and this book will teach you how. This book will guide you how to avoid the negative consequences of diabetes and live a happy energetic life Here is a preview of what you will learn. What is diabetes Types of diabetes you might have and the symptoms Factors causing diabetes Tips to manage your diabetes The diabetic nutritional strategy Foods to consume for diabetes Foods to avoid Exercises for controlling diabetes Stress relief for diabetes Supplements to help your diabetes Tags:Diabetes, Diabetes Cure, Reverse Diabetes, Type 2, Diabetes Solution, Diabetes Destroyer, Diabetes Cookbook, Diabetes Diet, Diabetes without Drugs, Diabetes Awareness, Diabetes Book, Diabetes for Dummies, Diabetes Breakthrough, Diabetes Care, Diabetes Diet Plan, Diabetes Treatment
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.