Book picks similar to
Applied Incident Response by Steve Anson
comp-sec
cybersecurity
cybersecurity-books
security
Psycho.com: serial killers on the internet
Eileen Ormsby - 2020
The internet has put them in our pocketsPsycho.com is a chilling look at what happens when murderous minds meet modern technology by the bestselling author of The Darkest WebThis book expands on three cases originally released in edited form for the Casefile True Crime podcast:Pedro Rodrigues Filho, aka Pedrinho Matador, aka Killer PeteyDnepropetrovsk Maniacs, aka the Hammer ManiacsMark Twitchell, aka Dexter Serial Killer
Computer Security: Principles and Practice
William Stallings - 2007
This is the only book available that provides integrated, comprehensive, up-to-date coverage of the broad range of topics in this subject. Comprehensive treatment of user authentication and access control. Unified approach to intrusion detection and firewalls, giving readers a solid understanding of the threats and countermeasures. More detailed coverage of software security than other books. Exploration of management issues. Systematic, comprehensive discussion of malicious software and denial of service attacks. Coverage of Linux and Windows Vista. Up-to-date coverage of database security. Thorough overview of cryptography, authentication, and digital signatures. Coverage of Internet security. For system engineers, programmers, system managers, network managers, product marketing personnel, system support specialists; a solid, up-to-date reference or tutorial for self-study.
Writing Secure Code
Michael Howard - 2001
You need to assume it will run in the most hostile environments imaginable -- and design, code, and test accordingly. Writing Secure Code, Second Edition shows you how. This edition draws on the lessons learned and taught throughout Microsoft during the firm s massive 2002 Windows Security Push. It s a huge upgrade to the respected First Edition, with new coverage across the board. Michael Howard and David LeBlanc first help you define what security means to your customers -- and implement a three-pronged strategy for securing design, defaults, and deployment. There s especially useful coverage of threat modeling -- decomposing your application, identifying threats, ranking them, and mitigating them. Then, it s on to in-depth coverage of today s key security issues from the developer s standpoint. Everyone knows buffer overruns are bad: Here s a full chapter on avoiding them. You ll learn how to establish appropriate access controls and default to running with least privilege. There s detailed coverage of overcoming attacks on cryptography (for example, avoiding poor random numbers and bit-flipping attacks). You ll learn countermeasures for virtually every form of user input attack, from malicious database updates to cross-site scripting. We ve just scratched the surface: There are authoritative techniques for securing sockets and RPC, protecting against DOS attacks, building safer .NET applications, reviewing and testing code, adding privacy features, and even writing high-quality security documentation. Following these techniques won t just improve security -- it ll dramatically improve robustness and reliability, too. Bill CamardaBill Camarda is a consultant, writer, and web/multimedia content developer. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.
Lead... for God's Sake!: A Parable for Finding the Heart of Leadership
Todd G. Gongwer - 2010
If you have ever asked yourself why you do what you do, or wondered what your purpose is in leadership or in life, this book is for you. As the lives of a coach, a CEO, and a janitor intersect in this captivating parable you will journey deep into the heart of leadership where the answers to many of life's most important questions can be found.Whether you're leading in business, sports, or in your own family, this inspiring story will show you how to take the first - and most important - step in becoming the leader you were meant to be. Lead for God's Sake truly is much more than a simple statement. It's a calling!"Seldom have I found this kind of practical wisdom presented in such a delightful, engaging and compelling narrative. As a business leader, I found its "takeaways" right on targettouching life where the rubber meets the road. I wasn't able to put it down. It's that good!"John D. Beckett,
Skills for New Managers
Morey Stettner - 2000
This title includes practical techniques and examples.
Beautiful Security: Leading Security Experts Explain How They Think (Theory In Practice, #28)
Andy Oram - 2009
Criminals succeed by exercising enormous creativity, and those defending against them must do the same.Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their prey How social networking, cloud computing, and other popular trends help or hurt our online security How metrics, requirements gathering, design, and law can take security to a higher level The real, little-publicized history of PGP This book includes contributions from:Peiter "Mudge" Zatko Jim Stickley Elizabeth Nichols Chenxi Wang Ed Bellis Ben Edelman Phil Zimmermann and Jon Callas Kathy Wang Mark Curphey John McManus James Routh Randy V. Sabett Anton Chuvakin Grant Geyer and Brian Dunphy Peter Wayner Michael Wood and Fernando Francisco All royalties will be donated to the Internet Engineering Task Force (IETF).
The American Revolution
John Fiske - 1891
You may find it for free on the web. Purchase of the Kindle edition includes wireless delivery.
Modern Technical Writing: An Introduction to Software Documentation
Andrew Etter - 2016
Written by the lead technical writer at one of Silicon Valley's most exciting companies, Modern Technical Writing is a set of guiding principles and thoughtful recommendations for new and experienced technical writers alike. Not a reference manual, and not comprehensive, it instead serves as an introduction to a sensible writing and publishing process, one that has eluded the profession for too long.
The Book of PoC||GTFO
Manul Laphroaig - 2017
Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.
Mastering APA Style: Student's Workbook and Training Guide
American Psychological Association - 2009
This user-friendly training guide includes groups of instructional exercises and practice tests on various aspects and features of the sixth edition of the Publication Manual, including electronic references and citations, grammar, headings, seriation, statistical and mathematical copy, italics, capitalization, numbers style, and table formatting.
The Great American Divorce: Why Our Country Is Coming Apart—And Why It Might Be for the Best
David Austin French - 2020
Straw Bale Gardening
Joel Karsten - 2013
He has perfected the perfect way for anyone to have a garden without weeding, bending over, or using chemicals. If you follow his step by step methods and suggestions you will be assured to grow a beautiful and productive garden this year, even if you have never gardened before. The best part is that if the soil in your backyard is less than productive it doesn't matter at all. If you have sunlight and water, you will have a great garden this year. From the Arctic Circle in Northern Alaska to the heat of the desert in Saudi Arabia, people are using this method, and having great success. The booklet is full color with 78 pages, and has a perfect bind booklet binding.
Must Have AR-15 Upgrades
Vitaly Pedchenko - 2013
Ebook about the best and the most popular AR-15 upgrades.
Silent Violence
D.M. Samson - 2008
He had secured a job replacing the outgoing foreman of a secluded farm near Riyadh. Almost two years later she would return. Alone. Broken. In Silent Violence she tells us of her journey: a long downward spiral. From the first inklings of things not being right, a pet killer in the expatriate compound, clandestine excursions by the farm crew, through to the rising hysteria within the expatriate community, then the killings at the farm, the ensuing imprisonment, moral deterioration, government procrastination and eventual deliverance.
Practical Lock Picking: A Physical Penetration Tester's Training Guide
Deviant Ollam - 2010
Unlike other texts on the subject (which tend to be either massive volumes detailing every conceivable style of lock or brief "spy manuals" that only skim the surface) this book is for INFOSEC professionals that need essential, core knowledge of lockpicking and seek the ability to open most locks with relative ease. Deviant's material is presented with rich, detailed diagrams and is offered in easy-to-follow lessons which allow even beginners to acquire the knowledge very quickly. Everything from straightforward lockpicking to quick-entry techniques like shimming, bumping, and bypassing is explained and shown.Whether you're being hired to penetrate security or simply trying to harden your own defenses, this book is essential.
Detailed photos make learning as easy as picking a lock
DVD is filled with indispensible lock picking videos and color photos
Extensive appendix details tools and toolkits currently available for all your lock picking needs