The Rescue


Steven Konkoly - 2019
    Hired by an influential US senator to liberate his daughter from a human-trafficking ring, Decker never anticipated sabotage or that the assault could go so disastrously wrong. The hostage is dead. His team is wiped out, and so are their families, including Decker’s own wife and son—eliminated one by one by the Russian mafia. And he’s survived to take the fall.When he’s inexplicably freed soon into a ten-year sentence in federal prison, Decker suspects another setup. And private investigator Harlow Mackenzie knows he’s right. She has evidence that a power greater than the Russian mob was behind the raid that ruined Decker’s life.The next move in a nationwide cat-and-mouse game of high-level sedition is up to them. Fueled by revenge and an obsession to clear his name, Decker has only one mission: to destroy a growing conspiracy before it’s too late.

Hacking: Ultimate Hacking for Beginners, How to Hack (Hacking, How to Hack, Hacking for Dummies, Computer Hacking)


Andrew McKinnon - 2015
    It provides a complete overview of hacking, cracking, and their effect on the world. You'll learn about the prerequisites for hacking, the various types of hackers, and the many kinds of hacking attacks: Active Attacks Masquerade Attacks Replay Attacks Modification of Messages Denial of Service or DoS Spoofing Techniques Mobile Hacking Hacking Tools Penetration Testing Passive Attacks If you are looking to venture into the world of hacking, this book will teach you all the information you need to know. When you download Hacking: Ultimate Hacking For Beginners - How to Hack, you'll discover how to acquire Many Powerful Hacking Tools. You'll also learn about Malware: A Hacker’s Henchman and Common Attacks And Viruses. You'll even learn about identity theft, how to protect yourself, and how hackers profit from this information! Read this book for FREE on Kindle Unlimited - Download NOW! Download Hacking: Ultimate Hacking For Beginners - How to Hack right away - This Amazing 4th Edition puts a wealth of knowledge at your disposal. You'll learn how to hack an email password, spoofing techniques, mobile hacking, and tips for ethical hacking. You'll even learn how to fight viruses and choose the right antivirus software for your system! Just scroll to the top of the page and select the Buy Button. Download Your Copy TODAY!

Cypherpunks: Freedom and the Future of the Internet


Julian Assange - 2012
    Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Stealing the Network: How to Own a Shadow


Johnny Long - 2007
    Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks


Michal Zalewski - 2005
    Silence on the Wire uncovers these silent attacks so that system administrators can defend against them, as well as better understand and monitor their systems.Silence on the Wire dissects several unique and fascinating security and privacy problems associated with the technologies and protocols used in everyday computing, and shows how to use this knowledge to learn more about others or to better defend systems. By taking an indepth look at modern computing, from hardware on up, the book helps the system administrator to better understand security issues, and to approach networking from a new, more creative perspective. The sys admin can apply this knowledge to network monitoring, policy enforcement, evidence analysis, IDS, honeypots, firewalls, and forensics.

Hacking: The Art of Exploitation


Jon Erickson - 2003
    This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

Beautiful Code: Leading Programmers Explain How They Think


Andy OramLincoln Stein - 2007
    You will be able to look over the shoulder of major coding and design experts to see problems through their eyes.This is not simply another design patterns book, or another software engineering treatise on the right and wrong way to do things. The authors think aloud as they work through their project's architecture, the tradeoffs made in its construction, and when it was important to break rules. Beautiful Code is an opportunity for master coders to tell their story. All author royalties will be donated to Amnesty International.

Bicycle: The History


David V. Herlihy - 2004
    But was the “mechanical horse” truly destined to usher in a new era of road travel or would it remain merely a plaything for dandies and schoolboys? In Bicycle: The History (named by Outside magazine as the #1 book on bicycles), David Herlihy recounts the saga of this far-reaching invention and the passions it aroused. The pioneer racer James Moore insisted the bicycle would become “as common as umbrellas.” Mark Twain was more skeptical, enjoining his readers to “get a bicycle. You will not regret it—if you live.” Because we live in an age of cross-country bicycle racing and high-tech mountain bikes, we may overlook the decades of development and ingenuity that transformed the basic concept of human-powered transportation into a marvel of engineering. This lively and engrossing history retraces the extraordinary story of the bicycle—a history of disputed patents, brilliant inventions, and missed opportunities. Herlihy shows us why the bicycle captured the public’s imagination and the myriad ways in which it reshaped our world.

SQL Performance Explained


Markus Winand - 2011
    The focus is on SQL-it covers all major SQL databases without getting lost in the details of any one specific product. Starting with the basics of indexing and the WHERE clause, SQL Performance Explained guides developers through all parts of an SQL statement and explains the pitfalls of object-relational mapping (ORM) tools like Hibernate. Topics covered include: Using multi-column indexes; Correctly applying SQL functions; Efficient use of LIKE queries; Optimizing join operations; Clustering data to improve performance; Pipelined execution of ORDER BY and GROUP BY; Getting the best performance for pagination queries; Understanding the scalability of databases. Its systematic structure makes SQL Performance Explained both a textbook and a reference manual that should be on every developer's bookshelf.

Writing High-Performance .NET Code


Ben Watson - 2014
    Learn critical lessons from a person who helped design and build one of the largest high-performance .NET systems in the world.This book does not just teach you how the CLR works—it teaches you exactly what you need to do now to obtain the best performance today. It will expertly guide you through the nuts and bolts of extreme performance optimization in .NET, complete with in-depth examinations of CLR functionality, free tool recommendations and tutorials, useful anecdotes, and step-by-step guides to measure and improve performance.Among the topics you will learn are how to:-Choose what to measure and why-Use many amazing tools, freely available, to solve problems quickly-Understand the .NET garbage collector and its effect on your application-Use effective coding patterns that lead to optimal garbage collection performance-Diagnose common GC-related issues-Reduce costs of JITting-Use multiple threads sanely and effectively, avoiding synchronization problems-Know which .NET features and APIs to use and which to avoid-Use code generation to avoid performance problems-Measure everything and expose hidden performance issues-Instrument your program with performance counters and ETW events-Use the latest and greatest .NET features-Ensure your code can run on mobile devices without problems-Build a performance-minded team…and much more.

Java Performance


Charlie Hunt - 2010
    

Tata


Morgen Witzel - 2010
    1 Lakh/ below US$ 2500 car), is set to change our perception of India': on the threshold of becoming a truly global brand.*s oldest and most respected corporate brand. With a major international presence, in a variety of areas including steel, tea, chemicals, communications and software, Tata now stands 65th in the world brand valuation league. But what is the Tata brand all about? What are its values? How do people perceive it, in India and around the world? In this absorbing and informed book Morgen Witzel digs into the heart of the Tata enterprise, describes its origins, how Tata's reputation and image evolved, and how the group has worked to transform that image into a powerful and valuable brand. Tata: The Evolution of a Corporate Brand goes to the core of the Tata ethos to explore the unique relationship between the Tata group and the Indian people, a relationship that goes beyond the achievements of a successful business to its social contributions for its employees and the society at large. Finally it asks how that reputation will be perceived and understood as Tata moves into global markets. Whether you re an entrepreneur, a manager, a marketer, or an interested Tata loyalist this book will help you understand the durability of the brand and inspire you with the values it holds onto in the global economy.

Active Directory


Alistair G. Lowe-Norris - 2003
    Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.You'll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you've learned--ideal whether you're a network administrator for a small business or a multinational enterprise.Upgrade Active Directory to Windows Server 2012Learn the fundamentals, including how AD stores objectsUse the AD Administrative Center and other management toolsLearn to administer AD with Windows PowerShellSearch and gather AD data, using the LDAP query syntaxUnderstand how Group Policy functionsDesign a new Active Directory forestExamine the Kerberos security protocolGet a detailed look at the AD replication process

Design Patterns: Elements of Reusable Object-Oriented Software


Erich Gamma - 1994
    Previously undocumented, these 23 patterns allow designers to create more flexible, elegant, and ultimately reusable designs without having to rediscover the design solutions themselves.The authors begin by describing what patterns are and how they can help you design object-oriented software. They then go on to systematically name, explain, evaluate, and catalog recurring designs in object-oriented systems. With Design Patterns as your guide, you will learn how these important patterns fit into the software development process, and how you can leverage them to solve your own design problems most efficiently. Each pattern describes the circumstances in which it is applicable, when it can be applied in view of other design constraints, and the consequences and trade-offs of using the pattern within a larger design. All patterns are compiled from real systems and are based on real-world examples. Each pattern also includes code that demonstrates how it may be implemented in object-oriented programming languages like C++ or Smalltalk.