Book picks similar to
Managed Code Rootkits: Hooking Into Runtime Environments by Erez Metula
security
books-wantex
collection
geek
Arduino Cookbook: Recipes to Begin, Expand, and Enhance Your Projects
Michael Margolis - 2010
You'll find more than 200 tips and techniques for building a variety of objects and prototypes such as IoT solutions, environmental monitors, location and position-aware systems, and products that can respond to touch, sound, heat, and light.Updated for the Arduino 1.8 release, the recipes in this third edition include practical examples and guidance to help you begin, expand, and enhance your projects right away--whether you're an engineer, designer, artist, student, or hobbyist.Get up to speed on the Arduino board and essential software concepts quicklyLearn basic techniques for reading digital and analog signalsUse Arduino with a variety of popular input devices and sensorsDrive visual displays, generate sound, and control several types of motorsConnect Arduino to wired and wireless networksLearn techniques for handling time delays and time measurementApply advanced coding and memory-handling techniques
The Power of your Subconscious Mind and Other Works
Joseph Murphy - 2013
A compilation of works by Joseph Murphy including The Power of Your Subconscious Mind, Magic of Faith, and Believe In Yourself
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Mark Dowd - 2006
Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.
Beautiful Code: Leading Programmers Explain How They Think
Andy OramLincoln Stein - 2007
You will be able to look over the shoulder of major coding and design experts to see problems through their eyes.This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. Beautiful Code is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.
Their Darkest Hour
Christopher G. Nuttall - 2014
Swiftly, the aliens take control of Britain’s cities and force the remainder of the British military to go on the run. With the government destroyed, the population must choose between fighting and collaborating with the alien overlords. This is truly Britain’s darkest hour. Caught up in these events are a handful of ordinary people, struggling to survive. The Prime Minister, forced into hiding, and an unscrupulous politician looking to find fame and power by serving the aliens. Soldiers fighting an insurgency and senior officers trying desperately to find the key to driving the aliens away from Earth; police officers faced with a choice between collaboration or watching the aliens brutalise the civilian population. And ordinary citizens, trying to survive a world turned upside down. But resistance seems futile and the aliens appear unstoppable – and the entire population is caught in the middle. As the alien grip tightens, the last best hope for freedom lies with those who will never surrender...and are prepared to pay any price for the liberation of Earth.
Mastering Blockchain: Distributed Ledgers, Decentralization and Smart Contracts Explained
Imran Bashir - 2017
Get to grips with the underlying technical principles and implementations of blockchainBuild powerful applications using Ethereum to secure transactions and create smart contractsExplore cryptography, mine cryptocurrencies, and solve scalability issues with this comprehensive guide
OAuth 2 in Action
Justin Richer - 2017
You'll learn how to confidently and securely build and deploy OAuth on both the client and server sides. Foreword by Ian Glazer.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.About the TechnologyThink of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.About the BookOAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides.What's InsideCovers OAuth 2 protocol and designAuthorization with OAuth 2OpenID Connect and User-Managed AccessImplementation risksJOSE, introspection, revocation, and registrationProtecting and accessing REST APIsAbout the ReaderReaders need basic programming skills and knowledge of HTTP and JSON.About the AuthorJustin Richer is a systems architect and software engineer. Antonio Sanso is a security software engineer and a security researcher. Both authors contribute to open standards and open source.Table of ContentsPart 1 - First stepsWhat is OAuth 2.0 and why should you care?The OAuth dance Part 2 - Building an OAuth 2 environmentBuilding a simple OAuth clientBuilding a simple OAuth protected resourceBuilding a simple OAuth authorization serverOAuth 2.0 in the real world Part 3 - OAuth 2 implementation and vulnerabilitiesCommon client vulnerabilitiesCommon protected resources vulnerabilitiesCommon authorization server vulnerabilitiesCommon OAuth token vulnerabilities Part 4 - Taking OAuth furtherOAuth tokensDynamic client registrationUser authentication with OAuth 2.0Protocols and profiles using OAuth 2.0Beyond bearer tokensSummary and conclusions
Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying
Lance Henderson - 2015
So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive... and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona - how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor: - Browse the Internet Anonymously - Darkcoins, Darknet Marketplaces & Opsec Requirements - Tor Hidden Servers - How to Not Get Caught - Counter-Forensics the FBI Doesn't Want You to Know About - Windows vs. Linux - Which Offers Stronger Network Security? - Cryptocurrency (Real Bitcoin Anonymity) - Supercookies & Encryption - Preventing Marketers and Debt Collectors From Finding You - How to Protect Your Assets - i.e., How to Be Invisible and even Hide from the Internet itself! - Darknet Personas Scroll back up and click "Look Inside" and Secure Your Future Today!
The Hacker Playbook 2: Practical Guide To Penetration Testing
Peter Kim - 2015
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
The Bennett Family Series: Books 1-3
Layla Hagen - 2019
From unexpected office entanglements to finding love again after a harrowing loss, the one thing that doesn’t change is how hard each is willing to fight once he finds the woman he wants to make his forever. This special boxed collection includes three full novels—Your Irresistible Love, Your Captivating Love, and Your Forever Love—each with a delicious alpha hero oozing hotness from its pages. This boxed set from USA Today bestselling author Layla Hagen will make you swoon, sigh, and fan yourself as you fall helplessly in love and get totally addicted to the Bennetts. Grab your copy and start your binge read today!
Four Seasons of Love: Sweet, Clean Small-Town Romances
Alexa Verde - 2021
Akka in Action
Raymond Roestenburg - 2012
Akka uses Actors-independently executing processes that communicate via message passing—as the foundation for fault-tolerant applications where individual actors can fail without crashing everything. Perfect for high-volume applications that need to scale rapidly, Akka is an efficient foundation for event-driven systems that want to scale elastically up and out on demand, both on multi-core processors and across server nodes.Akka in Action is a comprehensive tutorial on building message-oriented systems using Akka. The book takes a hands-on approach, where each new concept is followed by an example that shows you how it works, how to implement the code, and how to (unit) test it. You'll learn to test and deploy an actor system and scale it up and out, showing off Akka's fault tolerance. As you move along, you'll explore a message-oriented event-driven application in Akka. You'll also tackle key issues like how to model immutable messages and domain models, and apply patterns like Event Sourcing, and CQRS. The book concludes with practical advice on how to tune and customize a system built with Akka.
SAFe 4.5 Distilled: Applying the Scaled Agile Framework for Lean Enterprises
Richard Knaster - 2018
SAFe addresses this primary goal, and offers these further benefits: reduced time-to-market, improved quality, stronger alignment across geographically distributed multi-disciplinary teams, and collaboration across teams to deliver meaningful value to customers with reduced cycle time." --Sundaresan Jagadeesan, SW CoE Program Director, Philips To succeed in today's adapt-or-die marketplace, businesses must be able to rapidly change the way they create and deliver value to their customers. Hundreds of the world's most successful companies-including Intel, Capital One, AstraZeneca, Cisco, and Philips-have turned to the Scaled Agile Framework(R) (SAFe(R)) to achieve agility at scale and maintain a competitive edge. SAFe(R) 4.5 Distilled: Applying the Scaled Agile Framework(R) for Lean Enterprises explains how adopting SAFe can quickly improve time to market and increase productivity, quality, and employee engagement. In this book, you will Understand the business case for SAFe: its benefits, the problems it solves, and how to apply it Get an overview of SAFe across all parts of the business: team, program, value stream, and portfolio Learn why SAFe works: the power of SAFe's Lean-Agile mindset, values, and principles Discover how systems thinking, Agile development, and Lean product development form the underlying basis for SAFe Learn how to become a Lean-Agile leader and effectively drive an enterprise-wide transformation Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.
Ajaya: Duryodhana's Mahabharata - Collector's Edition
Anand Neelakantan - 2018
Every Indian has grown up conditioned to the view that the Pandavas were virtuous and wronged; and the Kauravas were manipulative and evil. On a visit to Malanada Temple, Kerala, national bestselling author of ASURA, Anand Neelakantan, discovered the temple deity to be none other than Duryodhanan, the ostensible 'villain' of the Mahabharata. This astonishing discovery prompted him to delve deep into the narrative of the defeated Crown Prince of Hastinapura, and the Kaurava clan. Ajaya challenges established views and compels us to think again. The book is all about the power of perception. It retells with compelling credibility, the epic events from Duryodhan's (given name: Suryodhana), point of view. While Jaya is the story of the Pandavas, told from the perspective of the victors of Kurukshetra; Ajaya is the narrative of the 'unconquerable' Kauravas, who were decimated to the last man. At the heart of India's most powerful empire, a revolution is brewing. Bhishma, the noble patriarch of Hastinapura, is struggling to maintain the unity of his empire. On the throne sits Dhritarashtra, the blind King, and his foreign-born Queen – Gandhari. In the shadow of the throne stands Kunti, the Dowager-Queen, burning with ambition to see her firstborn become the ruler, acknowledged by all. Amidst the chaos, Prince Suyodhana, heir of Hastinapura, stands tall, determined to claim his birthright and act according to his conscience. He is the maker of his own destiny – or so he believes. While in the corridors of the Hastinapura palace, a foreign Prince plots to destroy India. About the Author : Anand Neelakantan says: Ajaya is an attempt to revisit our mythologies with a modern view and see what the same events look like when observed from the side of the defeated. Were these people branded villains because they were far ahead of their times? There are many books about the Pandavas, about Karna, Draupadi, Kuniti and the other dramatis personae of the Mahabharata. But who speaks for Duryodhana? Growing up in a Kerala village with more temples than necessary, it was small wonder that mythology fascinated Anand early on. Ironically, he was drawn to the anti-heroes. But life called and he went on to become an engineer; joined the Indian Oil Corporation; moved to Bangalore; married Aparna; and welcomed a daughter and a son. But the voices of yore refused to be silenced in his head and he felt impelled to narrate the stories of the vanquished and the dammed; to give life to those silent heroes we have long overlooked in our uncritical acceptance of the conventional renderings of our epics. Ajaya follows the outstanding success of his #1 bestseller, Asura: Tale Of The Vanquished.
How to Prepare for Logical Reasoning for CAT
Arun Sharma - 2012
Thereare now only two sections in CAT Paper. In this scenario, LR forms a critical part of the Verbal Ability and Logical Reasoning section. A good score in this segment would take you closer towards your goal of succeeding . It is therefore essential to develop your problem solving skills in LR to a levelwhere you can quickly and comfortably attemptthe LR questions. Besides LR also forms an important component of other prestigious non-CATMBA Entrance Examinations.