Book picks similar to
Managed Code Rootkits: Hooking Into Runtime Environments by Erez Metula
security
books-wantex
collection
geek
Sweet & Deadly Endings (Sweets Shop Cozy Mysteries Book 4)
Maisy Morgan - 2019
Her grandson Tripp is doing great in school. Her relationship with Officer Preston is blooming. And now, her daughter Lilly is visiting for a few months, while her boyfriend Matthew is filming for a starring role in a movie located close to her sweets shop! Unfortunately, soon after they arrive, an assistant turns up dead on the movie set. And it looks like Matthew is the main murder suspect. Not to mention, Tripp’s friend Hannah gets some really bad news that has them all worried. Maybe things aren’t going so good after all. Will Hannah end up being okay? And, will Mary and Officer Preston be able to clear Matthew of the murder charges? Or is Matthew truly guilty of the crime… AUTHOR’S NOTE: Thank you for your interest in my Sweets Shop Cozy Mysteries Series! If you like reading about murder mysteries, women who own sweets shops, family life and a little clean romance on the side, you’ll likely enjoy this series. So download and immerse yourself in this fun four-book series located in the small town of Brooks, Georgia…
Data Warehousing
Reema Thareja - 2009
It provides a thorough understanding of the fundamentals of Data Warehousing and aims to impart a sound knowledge to users for creating and managing a Data Warehouse.The book introduces the various features and architecture of a Data Warehouse followed by a detailed study of the Business Requirements and Dimensional Modelling. It goes on to discuss the components of a Data Warehouse and thereby leads up to the core area of the subject by providing a thorough understanding of the building and maintenance of a Data Warehouse. This is then followed up by an overview of planning and project management, testing and growth and then finishing with Data Warehouse solutions and the latest trends in this field. The book is finally rounded off with a broad overview of its related field of study, Data Mining. The text is ably supported by plenty of examples to illustrate concepts and contains several review questions and other end-chapter exercises to test the understanding of students. The book also carries a running case study that aims to bring out the practical aspects of the subject. This will be useful for students to master the basics and apply them to real-life scenario.
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys
Michael W. Lucas - 2012
But most people only use the bare minimum SSH offers. Used properly, SSH simplifies your job and improves security.This book saves you from sifting a decade of obsolete online tutorials and quickly gets you running:SSH with the OpenSSH server and the PuTTY and OpenSSH clients. You will:Eliminate passwords.Manage access to your SSH server by users, groups, addresses, and moreSecurely move files around your networkForward graphic displays from one host to anotherForward TCP/IP connections Centrally manage host keys and client configurationsUse SSH as a secure transport for other applicationsSecure applications run over SSHBuild Virtual Private Networks with OpenSSHAnd more! This book quickly and painlessly simplifies life for anyone using SSH.Review"Michael W. Lucas is one of my favorite technical authors, and every book he writes is a must-read for IT professionals." - Richard Bejtlich, CSO, MANDIANT, and TaoSecurity blogger"...SSH Mastery is a title that Unix users and system administrators like myself will want to keep within reach..." - Peter Hansteen"This stripping-down of the usual tech-book explanations gives it the immediacy of extended documentation on the Internet. ...an in-depth presentation from someone who used OpenSSH to do a number of things, and paid attention while doing it." - Justin Sherrill, DragonFly BSD Digest
The DCI Jack Logan Collection Books 1-3: A Scottish Crime Fiction Series
J.D. Kirk - 2020
The Alex Troutt Thrillers #4-6
John W. Mefford - 2017
For Alex Troutt, a trip back home for a much-needed summer vacation proves only one thing: greed rules. But how it takes root could destroy her world. Fueled by the lust of power and money, the shadow of death envelopes her seaside hometown, including those closest to Alex. But as disconnected investigations converge into one focal point, Alex will stop at nothing to blow the entire crime ring straight to hell—even if she has to make the ultimate sacrifice…her life. AT Dusk (Book 5) Eyes are the window to the soul…unless there isn't a soul to be found. A little boy makes his first kill—and he likes it. He is cunning, charming, and without remorse. He is a sociopath. As boy turns to man, what lies inside takes root. He will make a mark on Boston unlike any other, and FBI Special Agent Alex Troutt must figure out how to stop him. But when she and her close-knit team move in closer, the stakes become much higher as the case takes on a more personal tone. It’s a frantic race to stop a manipulative killer before his web of deceit and destruction escalates into a blood bath of haunting proportions. AT Last (Book 6) Thirty years after losing a parent to a hit-and-run drunk driver, FBI agent Alex Troutt finally confronts the killer--the same man who just murdered the Boston police chief. And what Alex pulls from him shatters her core. Armed with little more than hope and a shred of decades-old evidence, Alex chases a memory from her past, hoping that she'll find the mother she never really had. With her old buddy Archie on board --as much as ever can be -- the hunt takes her deep into the foothills of West Virginia. A fanatical religious cult has created its own society. Clinging to a whisper of hope, Alex must out-think and out-duel everyone in her path to right a thirty-year wrong. Will Alex’s quest to find the truth destroy her life all over again?
The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy
Patrick Engebretson - 2011
No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test
Glacier Mountaineering: An Illustrated Guide to Glacier Travel and Crevasse Rescue
Andy Tyson - 2005
This is the only book to clearly illustrate and systematically guide readers through glacier anatomy, equipment, route finding, and rescue techniques and, just like our other books that are illustrated by Mike Clelland, it is guaranteed to entertain the whole way through.
Steve and the Swamp Witch of Endor: The Ultimate Minecraft Comic Book Volume 2 (An Unofficial Minecraft Comic Book)
Herobrine Comics - 2015
Jump into this epic adventure against zombies, skeletons, creepers, and a surprise enemy at the end. Will Steve and Piggy have the courage to defeat the Swamp Witch of Endor? Buy your copy today and find out! Buy your copy now!
The Fifth Western Novel MEGAPACK ®: 4 Novels of the Old West
Walter A. Tompkins - 2015
Tompkins ... Fleeing a posse, Cleve Logan boards a riverboat loaded with outlaws. Hands are dealt in a desperate game -- and Death will take the last trick!THE RENEGADE HILLS, by Allan K. Echols ... Saddle up -- and ride hell-bent-for-leather down the trail to a hidden valley -- but keep your guns loose in your holsters, 'cause you're riding to an outlaw showdown in the Renegade Hills!LAST-CHANCE RANGE, by Dean Owen ... Byrd Elkhart called the Territory his private range. He strung his barbed wire across forty miles of it, and the other ranchers just stood by with their tails between their legs. But then a different breed of man showed up in the person of Clay Janner, of Texas -- and he was going to drive his scrawny herd over the range even if he had to turn the whole Territory into a six-gun shambles!POWDER SMOKE, by Jackson Gregory ... "Double pay," Bart Warbuck told his gunmen, "and give hundred more to the one who gets Jeff Cody!" -- It was as simple as that if you were Warbuck, had 30 killers on your payroll, and made the law whatever you wanted it to be. But it was hard to take if you were young Cody, and if the only gun you could rely on was the one in your belt. And if you alone could stop Bart Warbuck!If you enjoy this volume of classic Westerns, don't forget to search your favorite ebook store for "Wildside Press Megapack" to see the 220+ other entries in this series, including not just historical fiction, but mysteries, adventure, science fiction, fantasy, horror -- and much, much more!
Three Women & A Murder
Chitrangada Mukherjee - 2020
Leaving behind three distressed women. The shocked mother, Sagota. The hapless wife, Kalpana. And the paranoid paramour, Shayantika.Sukanto wasn’t brutally murdered. On the contrary, he was found dead in his study, sleeping peacefully. His autopsy report too indicated organ failure. And, Sukanto left an intriguing letter under his favourite crystal jug, which reads like a suicide note.Baffled and clueless the about-to-retire Superintendent of Police, Mr Roy after spending months on the investigation reluctantly closes the case in absence of evidence. Even though his colleague Inspector Malakar is unconvinced.This is when the three women narrate their stories of loving, hating and wanting Sukanto.Only one of them is a killer.But the question is who and why?
Flight
Neil Graham Hansen - 2019
In 1964, I embarked on a journey that was to be my life's adventure. I hired on as a pilot for Air America and its clandestine operations in Southeast Asia. Flying for the CIA's secret airline was a dream come true. Air America's operations were unknown. Its schedules were irregular. Its pilots were shadow people. It was the world of spooks, covert air ops and adventure. I had already been a pilot for more than half of my life when I left my home in Detroit for the wild escapades that awaited me in Southeast Asia. Air America had been the pinnacle of my life and, had the trajectory remained steady, my world and my career should have gone onward and upward from that point. The intent of telling my story is to take the reader on an historical journey of a little-known place in time through my own personal account. Within the context of history, my narrative is not to be considered anything but my own experience. The ranks of Air America were comprised of a host of patriotic professionals who deserve a place of honor in the annals of history. However, many colorful characters wore the Air America wings, and inside the course of my narrative, the reader will be subjected to people and situations that cannot be filed neatly under anything resembling normal sanity. Most names, except those of a known or high-ranking or public nature, and those I wish to recognize for heroic performances, have been changed to protect the innocent and guilty alike.
The Silk Brief
John M. Burton - 2012
The book transported my imagination where I was right inside a courtroom drama…. Fantastic, thoroughly recommend this book!” “Both educational and entertaining …I thought the author did an excellent job of introducing Americans to the British legal system (which bemuses many of us as much as cricket). I always love good summations, and these were of high calibre… The author demonstrated a mastery of providing meaningful snippets of personal life essentially in textual asides.”“Author John Burton, Q.C. knows of whereof he writes, and his book, as well as being a well plotted, well written and highly enjoyable murder trial novel, is an education in the English criminal justice system, warts and all… There is also a fascinating subplot about the business of English criminal lawyers and the intrigues of the “Chambers” in which Brant practices.”“…..the skills of both the Prosecution, Joanna Glass QC and the Defence are on display. The reader is made to feel part of the Defence team.”David Brant QC is a newly appointed Queen’s Counsel, a “Silk”, a Criminal Barrister struggling against ever-dwindling legal aid funds and a lack of work. His Chambers is also suffering internal and external pressures and his Senior Clerk seems to only serve a select few. Life at the Bar is more challenging than ever before. His personal life is not much better. Having faced an acrimonious divorce after an inadvisable liaison with a female Solicitor, his life has become a mixture of enforced rest and ever increasing consumption of Claret and Rioja Reserva. However, after a night out with his Senior Clerk, he is instructed to defend in a Murder trial, leading one of the instructing solicitor’s firm’s In-House Barristers.The client is a Mr Damien Clarke, a cocaine addict charged with killing a known associate, Usman Hussain, after a night of smoking crack together in Hussain’s flat. The evidence against Damien appears almost overwhelming and as the case progresses towards trial it is strengthened by further forensic scientific evidence.David Brant QC must use all his forensic skill to combat the array of damning evidence against Damien and to pit his wits against a highly competent Prosecutor and a Judge who has a personal dislike for him. The Silk Brief takes us from before David Brant QC is instructed, through his early preparation of the case and conferences with the client in the High Security Belmarsh prison, through to the trial and verdict. It provides the day by day record of a murder trial including the examination and cross-examination of lay and expert witnesses, Counsel’s speeches, the Judges summing up and finally the jury’s deliberations and verdict. Although a work of fiction, the author draws extensively on his knowledge of the Criminal Bar of England and Wales, having practiced as a Criminal Barrister for over thirty years, latterly as Queen’s Counsel, conducting many trials, including murder trials in the Central Criminal Court, known colloquially and fondly as “The Old Bailey”.
30 Arduino Projects for the Evil Genius
Simon Monk - 2010
You'll master Arduino through a series of projects while learning the required simplified C programming.
Computer Networks: A Systems Approach
Larry L. Peterson - 1996
This expanded and completely updated edition covers the why of network design, focusing not just the specifications comprising today's systems but how key technologies and protocols actually work in the real world to solve specific problems. It is the only introductory computer networking book written by authors who have had first-hand experience with many of the protocols discussed in the text, who have actually designed some of them as well, and who are still actively designing the computer networks today.The book makes less use of computer code to explain protocols than earlier editions. Moreover, this new edition shifts the focus somewhat higher in the protocol stack where there is generally more innovative and exciting work going on at the application and session layers than at the link and physical layers. Other new features are: increased accessibility by clearly separating the advanced material from more fundamental via special headings and boxed features; the material is structured in such a way as to make it easier to teach top-down. Furthermore, the book outstrips the competitors in offering a more robust ancillary package for student and instructor support. The text is complemented with figures as well as links to networking resources on the Web and links to author-created materials on author-maintained Web site.Computer Networks, Fourth Edition, will be an invaluable resource for networking professionals and upper level undergraduate and graduate students in CS, EE, and CSE programs.