Book picks similar to
Managed Code Rootkits: Hooking Into Runtime Environments by Erez Metula
security
geek
information-security
infosec-books
Manifesto: A Revolutionary Approach to General Aviation Maintenance
Mike Busch - 2014
Written in typical no-nonsense style, it lays out the basis of Mike's “minimalist” maintenance philosophy for owner-flown general aviation aircraft. An owner who follows the book's guidance can save a small fortune on maintenance costs and end up with a safer, more reliable aircraft.Owners are advised to perform the absolute least amount of maintenance required to make their aircraft safe, reliable and legal… and nothing more. The book explains in detail why engine and propeller TBOs and most other manufacturer-prescribed maintenance intervals should be disregarded. And “Manifesto” explains exactly how to do it.About the Author:Mike Busch is arguably the best-known A&P/IA in general aviation. In 2008, he was honored by the FAA as “National Aviation Maintenance Technician of the Year.” Mike has been a prolific aviation writer for more than four decades. His “Savvy Aviator” columns have appeared in numerous publications including EAA Sport Aviation, AOPA’s Opinion Leader’s Blog, AVweb, and magazines for the three largest GA type clubs (ABS, CPA, and COPA). He is renowned for his free monthly maintenance webinars and his standing-room-only forums at EAA AirVenture Oshkosh. Mike has been a pilot and aircraft owner for 45 years with 7,500+ hours logged, and he is a CFIA/I/ME. He’s founder and CEO of Savvy Aircraft Maintenance Management, Inc., the world’s largest firm providing maintenance-management services for owner-flown aircraft.
A Sting in the Tale: A Collection of Short Stories
Matt Shaw - 2015
Stories included: A Mother's Love Plane Crazy The Last Will & Testament of Norman Fielding Lost Love Road Rage
Perl in a Nutshell
Nathan Patwardhan - 1998
This book covers all the core features of the language. It ranges widely through the Perl programmer's universe, gathering together in convenient form a wealth of information about Perl itself and its application to CGI scripts, network programming, database interaction, and graphical user interfaces. It also gives detailed coverage about using Perl within a Win32 environment.This book assembles more information about the language in one place than any other reference work. Here are just some of the topics covered in the book:Basic language reference Introduction to using Perl modules Perl and CGI: CGI basics, CGI.pm, mod_perl DBI, the database-independent API for Perl Sockets programming in Perl LWP, the library for World Wide Web programming in Perl The Net::* modules As part of the successful "in a Nutshell" series of books from O'Reilly & Associates, Perl in a Nutshell is for readers who want a single reference for all their needs.
Red Team Field Manual
Ben Clark - 2014
The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.
The First Face of Janus: Secret Society of Nostradamus
Phil Valentine - 2017
A sci-fi writer finds a set of quatrains that foretell a horrible catastrophe, a mass murder that will change the course of history. He races against time to decipher the quatrains and stop the slaughter. The next prophecy has begun, and there’s only one man who can stop The First Face of Janus.
A MURDER IN MUSSOORIE AND OTHER TALES
Ruskin Bond - 2019
The sleepy little hill-town of Mussoorie—British in its garb and Indian in its soul—is jolted out of its reverie by a mysterious murder. A woman is found dead in her bed, her body laid out perfectly, and the door locked from inside. Sundry suspects and sensational speculations about black magic and crystal-gazing abound, but no one has been able to identify the murderer. Outgrowing the small town, the story travels to all the way to faraway London, and catches the fancy of the master of mysteries, Arthur Conan Doyle…Interwoven with clever wit and lively humour, A Murder in Mussoorie and Other Tales will transport you to a world of wonder and adrenaline-pumping adventure.
The Color Purple: A Memory Book of the Broadway Musical
Lise Funderberg - 2006
A musical that evokes a unique emotional response, it tracks the story of its heroine, Celie, from sexual abuse by her stepfather to physical abuse by her husband to "a roof-raising story of triumph." This gorgeously producedcompanion volume revisits what is so powerful about the show. The Color Purple: A Memory Book has the look and feel of a beautiful antique scrapbook, a keepsake for those who have experienced the musical and want to be able to experience its soaring emotions at any time, or who want to share Celie's journey with their loved ones. But it will also be a memory book of the road The Color Purple took — from Alice Walker's memories right through to the sketches for the costumes and sets, from the cast's own struggles to the entire libretto, all of which have given Celie's against-the-odds triumph new life. Revealing, poignant, and stunning, The Color Purple: A Memory Book is a must-have book for anyone moved by Celie's story.
The Clarke Brothers #1-3
Lilian Monroe - 2018
That’s all it’s supposed to be.One wild, unforgettable night.And then we'd go our separate ways.... I was wrong.
Get the complete Clarke Brothers series, featuring brooding mountain heroes with hearts of gold, and the heroines that make them hot. Absolutely Kindle-melting!
Deadly Webs Omnibus
James Hunt - 2017
Abduction cases are taken very seriously by all of the parties involved. None more so than by Chase Grant, a detective in Seattle’s eighteenth precinct. The clock starts the moment he gets the call from a parent, and the first twelve hours are crucial. Every move counts, and every choice matters. If he missteps, then a child might not come home. But today was different. He got a call about a missing child. And then another, and another, and another…
Hacking the Xbox: An Introduction to Reverse Engineering
Andrew Huang - 2003
The book progresses into a discussion of the Xbox security mechanisms and other advanced hacking topics, with an emphasis on educating the readers on the important subjects of computer security and reverse engineering. Hacking the Xbox includes numerous practical guides, such as where to get hacking gear, soldering techniques, debugging tips and an Xbox hardware reference guide.Hacking the Xbox also confronts the social and political issues facing today's hacker by looking forward and discussing the impact of today's legal challenges on legitimate reverse engineering activities. The book includes a chapter written by the Electronic Frontier Foundation (EFF) about the rights and responsibilities of hackers, and concludes by discussing the latest trends and vulnerabilities in secure PC platforms.
Engineering Software as a Service: An Agile Approach Using Cloud Computing + $10 AWS Credit
Armando Fox - 2013
This book is neither a step-by-step tutorial nor a reference book. Instead, our goal is to bring a diverse set of software engineering topics together into a single narrative, help readers understand the most important ideas through concrete examples and a learn-by-doing approach, and teach readers enough about each topic to get them started in the field. Courseware for doing the work in the book is available as a virtual machine image that can be downloaded or deployed in the cloud. A free MOOC (massively open online course) at saas-class.org follows the book's content and adds programming assignments and quizzes. See http://saasbook.info for details.
Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine
Clinton Gormley - 2014
This practical guide not only shows you how to search, analyze, and explore data with Elasticsearch, but also helps you deal with the complexities of human language, geolocation, and relationships.If you're a newcomer to both search and distributed systems, you'll quickly learn how to integrate Elasticsearch into your application. More experienced users will pick up lots of advanced techniques. Throughout the book, you'll follow a problem-based approach to learn why, when, and how to use Elasticsearch features.Understand how Elasticsearch interprets data in your documentsIndex and query your data to take advantage of search concepts such as relevance and word proximityHandle human language through the effective use of analyzers and queriesSummarize and group data to show overall trends, with aggregations and analyticsUse geo-points and geo-shapes--Elasticsearch's approaches to geolocationModel your data to take advantage of Elasticsearch's horizontal scalabilityLearn how to configure and monitor your cluster in production
Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses
Edward Skoudis - 2005
I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits
Ejb 3 in Action
Debu Panda - 2007
This book builds on the contributions and strengths of seminal technologies like Spring, Hibernate, and TopLink.EJB 3 is the most important innovation introduced in Java EE 5.0. EJB 3 simplifies enterprise development, abandoning the complex EJB 2.x model in favor of a lightweight POJO framework. The new API represents a fresh perspective on EJB without sacrificing the mission of enabling business application developers to create robust, scalable, standards-based solutions.EJB 3 in Action is a fast-paced tutorial, geared toward helping you learn EJB 3 and the Java Persistence API quickly and easily. For newcomers to EJB, this book provides a solid foundation in EJB. For the developer moving to EJB 3 from EJB 2, this book addresses the changes both in the EJB API and in the way the developer should approach EJB and persistence.