The Shellcoder's Handbook: Discovering and Exploiting Security Holes


Jack Koziol - 2004
    This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or applicationNew material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and VistaAlso features the first-ever published information on exploiting Cisco's IOS, with content that has never before been exploredThe companion Web site features downloadable code files

Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems


Chris Sanders - 2007
    But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.

Firing A Rocket : Stories of the Development of the Rocket Engines for the Saturn Launch Vehicles and the Lunar Module as Viewed from the Trenches (Kindle Single)


James R. French - 2017
    But Neil Armstrong and Sally Ride would have never made history, and humankind would not have touched the stars, if not for the men and women on the ground who lit the fuse that launched the first rockets.Enthralled as a boy by the exploits of Flash Gordon and the novels of Robert Heinlein and Arthur C. Clarke—who put the science in science fiction—James French became one of the original unsung engineers of America’s groundbreaking space program. His fascinating memoir offers an up-close-and-technical look at building, testing, and perfecting the pioneering Saturn rockets and original lunar landing module, and he shares true tales, both humorous and harrowing, of life—and near death—on the front lines of scientific exploration.If you’ve ever said, “It’s not rocket science,” you’re right. It’s rocket engineering—and here’s your chance to marvel at how it changed the world and made it possible to explore all that lies beyond Earth. James R French graduated from MIT in 1958 with a degree of BSME Specializing in Propulsion. His first job was with Rocketdyne Division of North American Aviation where he worked on developmental testing of H-1 engines and combustion devices hardware for F-1 and J-2 engines used in Saturn 5. Mr. French has also worked at TRW Systems, where he was Lead Development Test Engineer on the Lunar Module Descent Engine, and Jet Propulsion Laboratory where he was Advanced Planetary studies Manager as well as Chief Engineer for the SP-100 Space Nuclear Power System and worked on Mariners 5, 6, 7, 8, and 9; Viking 1 & 2 and Voyager 1 & 2. . In 1986, he helped found American Rocket Co., a commercial launch company.Since 1987, Mr. French has been consultant to a variety of aerospace companies, SDIO, NASA, and USAF. He has participated in various startup companies in the private space flight arena and currently consults extensively to Blue Origin. Mr. French is co-author with Dr. Michael Griffin of the best-selling text Space Vehicle Design, published by AIAA. The second edition of the book has received the Summerfield Book Award for 2008. Mr. French is a Fellow of both AIAA and the British Interplanetary Society and a 50+ year member of AIAA. He has held several Technical Committee and other posts in AIAA. Cover design by Evan Twohy

Linux Basics for Hackers: Getting Started with Networking, Scripting, and Security in Kali


OccupyTheWeb - 2018
    Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers.If you're getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent first step. Using Kali Linux, an advanced penetration testing distribution of Linux, you'll learn the basics of using the Linux operating system and acquire the tools and techniques you'll need to take control of a Linux environment.First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus in on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: - Cover your tracks by changing your network information and manipulating the rsyslog logging utility - Write a tool to scan for network connections, and connect and listen to wireless networks - Keep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted email - Write a bash script to scan open ports for potential targets - Use and abuse services like MySQL, Apache web server, and OpenSSH - Build your own hacking tools, such as a remote video spy camera and a password crackerHacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?

463 Hard to Believe Facts


Nayden Kostov - 2021
    My objective has been to provide you with a lifetime supply of icebreakers and points of discussion. Amaze your friends and family by telling them that all the planets in our Solar System could fit in the distance between Earth and the Moon or that flamingos can drink boiling water.Following the success of my site RaiseYourBrain, I decided to collect the best trivia gems and present you with a fact compendium suitable for a wide audience. This is the product of years of sifting through history and references books on a myriad of subjects as well as searching the Internet and paying attention to the news.These facts are a result of years of sifting through history and reference books, as well as searching the Internet and researching the news. Each fact is suitable for nearly any age – the “spiciest” entries are separated by their own chapter but still use clean language!Become a trivia whiz with even more facts in the Hard to Believe Facts series!

Not Your Average Runner: Why You’re Not Too Fat to Run and the Skinny on How to Start Today


Jill Angie - 2017
    With humor, compassion, and lots of love, Jill Angie delivers the goods: overcoming the challenges of running with an overweight body and giving individuals’ self-esteem an enormous boost in the process. This isn't a guide to running for weight loss, or a simple running plan. It shows readers how a woman carrying a few (or many) extra pounds can successfully become a runner in the body she has right now. Jill Angie is a certified running coach and personal trainer who wants to live in a world where everyone is free to feel fit and fabulous at any size. She started the Not Your Average Runner movement in 2013 to show that runners come in all shapes, sizes and speeds, and, since then, has assembled a global community of revolutionaries that are taking the running world by storm. If you would like to be part of the revolution, flip to the inside and find out more!

The Instant Genius


Tanya Slover - 1998
    This compendium is bursting with little-known gems such as: the Bible is the most stolen book in America; humans and giraffes have the same number of vertebrae in their necks (seven); and the first thermometer was filled with brandy, not mercury (and was quite accurate). Presented with humor and precision, The Instant Genius is an engrossing battery of over 200 facts sure to settle at least one thorny question in everyone's mind.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

The Dark Net: Inside the Digital Underworld


Jamie Bartlett - 2014
    A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.

Raising Confident Kids: 10 Ways to Foster Self-esteem and Avoid Typical Parenting Mistakes (Kids Don't Come With a Manual series)


Nadim Saad - 2016
    Unfortunately, in trying to help develop these traits, parents can increase their children’s anxiety and make them afraid of making mistakes without realising it. Raising Confident Kids will equip you to avoid common pitfalls and create positive parenting habits. Bestselling parenting coach Nadim Saad draws on the latest research in child psychology, neuroscience and the Growth Mindset to offer parents 10 practical ways to nurture their children's self-esteem and ensure that they grow to become happy and confident adults. Discover the 5 typical mistakes that can affect children's self-esteem and how to avoid them Quickly learn and apply step-by-step solutions to grow your children's confidence and self-esteem Help your children develop a Growth Mindset so that they embrace new challenges and are unafraid of making mistakes Gain practical understanding of how to apply these tips and techniques to family life thanks to real-life examples

The 4-Hour Chef: The Simple Path to Cooking Like a Pro, Learning Anything, and Living the Good Life


Timothy Ferriss - 2012
    It’s a choose-your-own-adventure guide to the world of rapid learning.#1 New York Times bestselling author (and lifelong non-cook) Tim Ferriss takes you from Manhattan to Okinawa, and from Silicon Valley to Calcutta, unearthing the secrets of the world’s fastest learners and greatest chefs. Ferriss uses cooking to explain “meta-learning,” a step-by-step process that can be used to master anything, whether searing steak or shooting 3-pointers in basketball. That is the real “recipe” of The 4-Hour Chef.You'll train inside the kitchen for everything outside the kitchen. Featuring tips and tricks from chess prodigies, world-renowned chefs, pro athletes, master sommeliers, super models, and everyone in between, this “cookbook for people who don’t buy cookbooks” is a guide to mastering cooking and life.The 4-Hour Chef is a five-stop journey through the art and science of learning:1. META-LEARNING. Before you learn to cook, you must learn to learn. META charts the path to doubling your learning potential.2. THE DOMESTIC. DOM is where you learn the building blocks of cooking. These are the ABCs (techniques) that can take you from Dr, Seuss to Shakespeare.3. THE WILD. Becoming a master student requires self-sufficiency in all things. WILD teaches you to hunt, forage, and survive.4. THE SCIENTIST. SCI is the mad scientist and modernist painter wrapped into one. This is where you rediscover whimsy and wonder.5. THE PROFESSIONAL. Swaraj, a term usually associated with Mahatma Gandhi, can be translated as “self-rule.” In PRO, we’ll look at how the best in the world become the best in the world, and how you can chart your own path far beyond this book.

Vision for Life: Ten Steps to Natural Eyesight Improvement


Meir Schneider - 2012
    Born almost blind, Schneider taught himself to see and developed an innovative program of healing and recovery that has helped thousands of people regain and improve their health.Vision for Life is packed with exercises for a natural eye health routine, which you can immediately incorporate into your life, and includes a set of eye chart posters to use together with the book. This program is not only strengthening but also restorative and deeply relaxing. You will learn how to reverse developing issues before they cause damage and how to remedy existing problems including near- and far-sightedness and lazy eye as well as cataracts, glaucoma, optic neuritis, detached retinas and tears, macular degeneration, and retinitis pigmentosa. Vision for Life is not only for people who see poorly and would like to improve their vision, but also for those with 20/20 vision who wish to maintain their perfect eyesight as they grow older.Clients of the Meir Schneider Self-Healing Method experience their own capacity to bring about recovery, reversing the progress of a wide range of degenerative conditions such as arthritis and muscular dystrophy as well as eye disease. Based in part on the established Bates Method of eyesight improvement and in part on his own professional and personal discoveries, Meir Schneider's pioneering approach has helped thousands of people successfully treat a host of eye problems, including nearsightedness, farsightedness, astigmatism, lazy eye, double vision, glaucoma, cataracts, macular degeneration, retinal detachment, retinitis pigmentosa, and nystagmus.Born blind to deaf parents, Schneider underwent a series of painful operations as a young child and was left with ninety-nine percent scar tissue on his eyes, resulting in his being declared incurably blind. At the age of seventeen, he discovered how to improve his vision from one percent to fifty-five percent of normal vision with the eye exercises presented in this book. Today Schneider drives a car, reads, and proves time and again that vision can and does improve with exercise. His contributions to the field of self-healing are recognized by alternative health practitioners and medical doctors alike.

How to Make Your Electric Guitar Play Great: The Electric Guitar Owner's Manual


Dan Erlewine - 2001
    From shopping for a first electric guitar to setting customized action, this do-it-yourself player's primer for owning and maintaining an electric guitar explains the ins and outs of: choosing the right guitar; cleaning, tools and basic maintenance; personalizing and improving on a "factory setup"; trouble-shooting; basic guitar electronics; setups of the pros; and much more. Written by Dan Erlewine, author of the bestselling Guitar Player Repair Guide and the popular "Repairs" column in Guitar Player magazine, this book also includes a plastic sheet with specialized guitar tools you can snap-out!

How to Become Rich: 12 Lessons I Learnt from Vedic and Puranic Stories


Devdutt Pattanaik - 2019
    

Perception and Imaging: Photography - A Way of Seeing


Richard D. Zakia - 1997
    Relevant psychological principles will help you predict your viewer's emotional reaction to your photographic images, giving you more power, control, and tools for communicating your desired message. Knowing how our minds work helps photographers, graphic designers, videographers, animators, and visual communicators both create and critique sophisticated works of visual art. Benefit from this insight in your work. Topics covered in this book: gestalt grouping, memory and association, space, time, color, contours, illusion and ambiguity, morphics, personality, subliminals, critiquing photographs, and rhetoric.