Book picks similar to
Building Virtual Machine Labs: A Hands-On Guide by Tony Robinson
computer_science-hacking
cyber
rack_025
technology
Computer Networking: A Top-Down Approach
James F. Kurose - 2000
Building on the successful top-down approach of previous editions, this fourth edition continues with an early emphasis on application-layer paradigms and application programming interfaces, encouraging a hands-on experience with protocols and networking concepts.
Blue Team Field Manual (BTFM)
Alan J. White - 2017
Blue Team Field Manual (BTFM) is a Cyber Security Incident Response Guide that aligns with the NIST Cybersecurity Framework consisting of the five core functions of Identify, Protect, Detect, Respond, and Recover by providing the tactical steps to follow and commands to use when preparing for, working through and recovering from a Cyber Security Incident.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Colonel Sanders and the American Dream
Josh Ozersky - 2012
But only one of them was ever a real person—Colonel Sanders of Kentucky Fried Chicken/KFC. From a 1930s roadside café in Corbin, Kentucky, Harland Sanders launched a fried chicken business that now circles the globe, serving “finger lickin’ good” chicken to more than twelve million people every day. But to get there, he had to give up control of his company and even his own image, becoming a mere symbol to people today who don’t know that Colonel Sanders was a very real human being. This book tells his story—the story of a dirt-poor striver with unlimited ambition who personified the American Dream.Acclaimed cultural historian Josh Ozersky defines the American Dream as being able to transcend your roots and create yourself as you see fit. Harland Sanders did exactly that. Forced at age ten to go to work to help support his widowed mother and sisters, he failed at job after job until he went into business for himself as a gas station/café/motel owner and finally achieved a comfortable, middle-class life. But then the interstate bypassed his business and, at sixty-five, Sanders went broke again. Packing his car with a pressure cooker and his secret blend of eleven herbs and spices, he began peddling the recipe for “Colonel Sanders’ Kentucky Fried Chicken” to small-town diners in exchange for a nickel for each chicken they sold. Ozersky traces the rise of Kentucky Fried Chicken from this unlikely beginning, telling the dramatic story of Sanders’ self-transformation into “The Colonel,” his truculent relationship with KFC management as their often-disregarded goodwill ambassador, and his equally turbulent afterlife as the world’s most recognizable commercial icon.
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
Understanding Air France 447
Bill Palmer - 2013
Written by A330 Captain, Bill Palmer, this book opens to understanding the actions of the crew, how they failed to understand and control the problem, and how the airplane works and the part it played. All in easy to understand terms.Addressed are the many contributing aspects of weather, human factors, and airplane system operation and design that the crew could not recover from. How each contributed is covered in detail along with what has been done, and needs to be done in the future to prevent this from happening again.Also see the book's companion website: UnderstandingAF447.com for supplemental materials referred to in the book or to contact the author.
C Programming: Language: A Step by Step Beginner's Guide to Learn C Programming in 7 Days
Darrel L. Graham - 2016
It is a great book, not just for beginning programmers, but also for computer users who would want to have an idea what is happening behind the scenes as they work with various computer programs. In this book, you are going to learn what the C programming language entails, how to write conditions, expressions, statements and even commands, for the language to perform its functions efficiently. You will learn too how to organize relevant expressions so that after compilation and execution, the computer returns useful results and not error messages. Additionally, this book details the data types that you need for the C language and how to present it as well. Simply put, this is a book for programmers, learners taking other computer courses, and other computer users who would like to be versed with the workings of the most popular computer language, C. In this book You'll learn: What Is The C Language? Setting Up Your Local Environment The C Structure and Data Type C Constants and Literals C Storage Classes Making Decisions In C The Role Of Loops In C Programming Functions in C Programming Structures and Union in C Bit Fields and Typedef Within C. C Header Files and Type Casting Benefits Of Using The C Language ...and much more!! Download your copy today! click the BUY button and download it right now!
Streaming Systems
Tyler Akidau - 2018
As more and more businesses seek to tame the massive unbounded data sets that pervade our world, streaming systems have finally reached a level of maturity sufficient for mainstream adoption. With this practical guide, data engineers, data scientists, and developers will learn how to work with streaming data in a conceptual and platform-agnostic way.Expanded from Tyler Akidau's popular blog posts Streaming 101 and Streaming 102, this book takes you from an introductory level to a nuanced understanding of the what, where, when, and how of processing real-time data streams. You'll also dive deep into watermarks and exactly-once processing with co-authors Slava Chernyak and Reuven Lax.You'll explore:How streaming and batch data processing patterns compareThe core principles and concepts behind robust out-of-order data processingHow watermarks track progress and completeness in infinite datasetsHow exactly-once data processing techniques ensure correctnessHow the concepts of streams and tables form the foundations of both batch and streaming data processingThe practical motivations behind a powerful persistent state mechanism, driven by a real-world exampleHow time-varying relations provide a link between stream processing and the world of SQL and relational algebra
Tech Like a PIRATE: Using Classroom Technology to Create an Experience and Make Learning Memorable
Matt Miller - 2020
American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road
Nick Bilton - 2017
In 2011, a twenty-six-year-old libertarian programmer named Ross Ulbricht launched the ultimate free market: the Silk Road, a clandestine Web site hosted on the Dark Web where anyone could trade anything—drugs, hacking software, forged passports, counterfeit cash, poisons—free of the government’s watchful eye. It wasn’t long before the media got wind of the new Web site where anyone—not just teenagers and weed dealers but terrorists and black hat hackers—could buy and sell contraband detection-free. Spurred by a public outcry, the federal government launched an epic two-year manhunt for the site’s elusive proprietor, with no leads, no witnesses, and no clear jurisdiction. All the investigators knew was that whoever was running the site called himself the Dread Pirate Roberts. The Silk Road quickly ballooned into $1.2 billion enterprise, and Ross embraced his new role as kingpin. He enlisted a loyal crew of allies in high and low places, all as addicted to the danger and thrill of running an illegal marketplace as their customers were to the heroin they sold. Through his network he got wind of the target on his back and took drastic steps to protect himself—including ordering a hit on a former employee. As Ross made plans to disappear forever, the Feds raced against the clock to catch a man they weren’t sure even existed, searching for a needle in the haystack of the global Internet.Drawing on exclusive access to key players and two billion digital words and images Ross left behind, Vanity Fair correspondent and New York Times bestselling author Nick Bilton offers a tale filled with twists and turns, lucky breaks and unbelievable close calls. It’s a story of the boy next door’s ambition gone criminal, spurred on by the clash between the new world of libertarian-leaning, anonymous, decentralized Web advocates and the old world of government control, order, and the rule of law. Filled with unforgettable characters and capped by an astonishing climax, American Kingpin might be dismissed as too outrageous for fiction. But it’s all too real.
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
Encrypted
Carolyn McCray - 2012
Praise for Encrypted... "Imagine a roller coaster ride filled with historical twists and turns, fabulous action, and a great love story. You'll soar to the skies then grip your seat on the way down. Encrypted will leave you breathless in the end." Amber Scott Author Fierce Dawn "If you like Lara Croft you'll love the heroine, Ronnie. From one explosion to the next my heart raced with each turn of the page. And the plague making a come back? Written with such realism, after reading Encrypted, you may never want to leave your house again." Elena Gray Author Full Body Contact Overview: A code written in unbreakable Angelic script. The resurgence of the Black Death. Can an FBI Agent and the Robin Hood Hacker save the world from another Dark Ages? More praise for Encrypted... "Dan Brown blinked and Carolyn McCray took over. Encrypted is the best thing that I've read in the thriller genre, hands down. It's got history, mysticism, shadowy organizations manipulating world events. Oh, and did I mention the most incredible opposites attract relationship EVER? This novel knocked my socks off." Ben Hopkin Book Reviewer "Halting the spread of a weaponized redo of the Black Plague? Intending to plunge the world into a medieval hellish vision of the Hidden Hand? It's never good when the dead could turn out to be the lucky ones. That's a lot of responsibility resting on the shoulders of a brilliant cyber hacker and a sexy FBI agent. Makes you wonder who's calling the shots? God, the angels or a 13th century cult that would make Lucifer blush." Taylor Lee Author Grandmaster's Legacy "Action packed from the first sentence, 'Encrypted' kept me turning pages. From hackers, special agents, to the plague, you won't be able to put this one down until the end!" Kelli McCracken Author What the Heart Wants If you enjoy the intrigue of The Bourne Identity, the historical texture of Dan Brown, and the roller coaster action of Indian Jones, you are going to LOVE "Encrypted!" **If you were looking for Carolyn's extremely controversial historical thriller, simply search under 30 Pieces of Silver (#1 Kindle Bestseller in Men's Adventure and War categories, but be warned, it is WAY more controversial than Encrypted.) **If you were looking for near future action/adventure roller coaster, try Carolyn's MoonRush. It's 2049 and the rush is on! To the moon! **If you were looking for Carolyn's taut romantic suspense with an MMA kick, search for Full Body Contact under her pen name Cristyn West **If you were looking for Carolyn's #1 historical thriller set in ancient Rome, simply search under "Fated McCray." Beware though, there is a thread of paranormal romance that sneaks up on you like an asp in the night... **If you were looking for Carolyn's thriller short stories, An Engagement to Remember and Dark Lullaby check out Bullet, Brass, and Babes, the ultimate thriller anthology!
Explain the Cloud Like I'm 10
Todd Hoff - 2018
And I mean all the time. Every day there’s a new cloud-based dating app; a new cloud-based gizmo for your house; a new cloud-based game; or a thousand other new things—all in the cloud.The cloud is everywhere! Everything is in the cloud! What does it mean! Let’s slow down. Take a deep breath. That’s good. Take another. Excellent. This book teaches you all about the cloud. I’ll let you in on a little secret: the cloud is not that hard to understand. It’s not. It’s just that nobody has taken the time to explain to you what the cloud is. They haven’t, have they?Deep down I think this is because they don’t understand the cloud either, but I do. I’ve been a programmer and writer for over 30 years. I’ve been in cloud computing since the very start, and I’m here to help you on your journey to understand the cloud. Consider me your tour guide. I’ll be with you every step of the way, but not in a creepy way.I take my time with this book. I go slow and easy, so you can build up an intuition about what the cloud really is, one idea at a time. When you finish reading, you’ll understand the cloud. When you hear someone say some new cool thing is in the cloud, you’ll understand exactly what they mean. That’s a promise. How do I deliver on that promise? I use lots and lots of pictures. I use lots and lots of examples. We’ll reveal the secret inner-workings of AWS, Netflix, Facebook Messenger, Amazon Kindle, Apple iCloud, Google Maps, Nest and cloud DVRs. You’ll learn by seeing and understanding; no matter if you're a complete beginner, someone who knows a little and wants to learn more, or a programmer looking to change their career to the cloud.The cloud is the future. You don't want to miss out on the future, do you? Read this book and we'll discover it together.I’m excited. This will be fun. Let’s get started!
Virtual Reality: The Revolutionary Technology of Computer-Generated Artificial Worlds-And How It Promises to Transform Society
Howard Rheingold - 1991
It sounds like science fiction, but it's science fact. Surgeons now rehearse operations on computer-generated "virtual" patients, and architects "walk through" virtual buildings while the actual structures are still in blueprints. In Virtual Reality, Howard Rheingold takes us to the front lines of this revolutionary new technology that creates computer-generated worlds complete with the sensations of touch and motion, and explores its impact on everything from entertainment to particle physics.