Book picks similar to
Kali Linux Social Engineering by Rahul Singh Patel
hacking
programming
algum-dia-talvez
computerscience
Node.js in Action
Mike Cantelon - 2011
You'll start by learning how to set up your Node development environment, including loading the community-created extensions. Next, you'll run several simple demonstration programs where you'll learn the basics of a few common types of Node applications. Then you'll dive into asynchronous programming, a model Node leverages to lessen application bottlenecks.About this BookJavaScript on the server? You bet. Node.js is a JavaScript server capable of supporting scalable, high-performance web applications. Using asynchronous I/O, the server can do more than one thing at a time, a key requirement for real-time apps like chat, games, and live statistics. And since it's JavaScript, you use the same language end to end.Node.js in Action shows you how to build production-quality applications. Clear introductions of key concepts and example-by-example coverage take you from setup to deployment. You'll dive into asynchronous programming, data storage, and output templating, and interact with the filesystem to create non-HTTP applications like TCP/IP servers and command-line tools. Perfect for a web developer transitioning from Rails, Django, or PHP. Requires basic knowledge of JavaScript. No prior experience with Node.js needed.Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.What's InsideSet up Node and extensions Grok asynchronous programming and the event loop Examples including microblogging, IM, games, and moreAbout the AuthorsAs skilled practitioners, expert teachers and trainers, and contributors to the core framework, authors Mike Cantelon, Marc Harter, T.J. Holowaychuk, and Nathan Rajlich represent the best of the Node.js development community.Table of ContentsPART 1 NODE FUNDAMENTALS Welcome to Node.js Building a multiroom chat application Node programming fundamentals PART 2 WEB APPLICATION DEVELOPMENT WITH NODE Building Node web applications Storing Node application data Connect Connect's built-in middleware Express Advanced Express Testing Node applications Web application templating PART 3 GOING FURTHER WITH NODE Deploying Node applications and maintaining uptime Beyond web servers The Node ecosystem
The Magic Square - Tricking Your Way to Mental Superpowers (Faking Smart Book 3)
Lewis Smile - 2012
Perform this genius seemingly-mathematical feat on any napkin, any receipt, or even on your friend's arm.You can learn the famous Magic Square, and you can learn it in under 10 minutes.You will have a magician's Grand Finale, in your hands at any moment. This gets audible gasps, and you can wow people with this for the rest of your life...**************************THE PERFORMANCE:**************************Your friend will name a random number. You then speedily write 16 different numbers into a 4x4 grid. With a smug flourish, you then reveal that all combinations and directions within the grid add up to their chosen number. It is simply mind-blowing.Effortlessly perform a trick that it seems only a computer could perform, and learn how in 10 minutes from right now.
The Art and Science of Java
Eric S. Roberts - 2007
By following the recommendations of the Association of Computing Machinery's Java Task Force, this first edition text adopts a modern objects-first approach that introduces readers to useful hierarchies from the very beginning.KEY TOPICS: Introduction; Programming by Example; Expressions; Statement Forms; Methods; Objects and Classes; Objects and Memory; Strings and Characters; Object-Oriented Graphics; Event-Driven Programs; Arrays and ArrayLists; Searching and Sorting; Collection Classes; Looking Ahead.MARKET: A modern objects-first approach to the Java programming language that introduces readers to useful class hierarchies from the very beginning.
Eleventh Hour CISSP®: Study Guide
Eric Conrad - 2016
This book is streamlined to include only core certification information, and is presented for ease of last-minute studying. Main objectives of the exam are covered concisely with key concepts highlighted. The CISSP certification is the most prestigious, globally-recognized, vendor neutral exam for information security professionals. Over 100,000 professionals are certified worldwide, with many more joining their ranks. This new third edition is aligned to cover all of the material in the most current version of the exam’s Common Body of Knowledge. All domains are covered as completely and concisely as possible, giving users the best possible chance of acing the exam.
Completely updated for the most current version of the exam’s Common Body of Knowledge
Provides the only guide you need for last-minute studying
Answers the toughest questions and highlights core topics
Streamlined for maximum efficiency of study, making it ideal for professionals updating their certification or for those taking the test for the first time
Writing A Novel with Ulysses III
David Hewson - 2014
Best-selling novelist David Hewson, author of the ever-popular Writing A Novel with Scrivener, offers a professional insight into how to use this unique app for writing fiction. This ebook covers all the aspects of Ulysses a writer needs to master in order to produce a finished book, from initial planning through to completed ebook, Word file or PDFs for publication, reading and revision. You will learn how to use Ulysses to structure a book into parts and scenes, ways to manage research and ideas and how to develop a novel from a bare outline through to first draft and revisions. Hewson also describes how Ulysses stores work uniquely in its own library, enabling you to work on the same draft manuscript across different machines while on the move. For budding screenwriters there is a section on how to use Ulysses to produce scripts to professional formats that can be edited later in movie apps such as Final Draft. And this release will also include a free upgrade to an updated edition covering the next release of Ulysses and the forthcoming iPad app. David Hewson (www.davidhewson.com) is the author of more than 25 novels published around the world. He adapted the award-winning TV series The Killing into acclaimed novel and recently launched a new crime series set in Amsterdam with The House of Dolls which has been optioned for Dutch TV.
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
Marcus J. Carey - 2019
Tribe of Hackers wants to change that. We asked for industry, career, and personal advice from 70 cybersecurity luminaries who are ready to break down barriers and shatter ceilings. It's about time.This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms. What tips do the founders of Dragos, Inc. and Duo Security have on starting a company? Do you need a college degree or certification to be a cybersecurity professional? What is the biggest bang-for-the-buck action your organization can take to improve its cybersecurity posture? What "life hacks" to real hackers use to make their own lives easier? What resources can women in cybersecurity utilize to maximize their potential?All proceeds from the book will go towards: Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid's Club.We can't wait to show you the most epic cybersecurity thought leadership collaborative effort, ever.(Source: Amazon.com)
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Penetration Testing: A Hands-On Introduction to Hacking
Georgia Weidman - 2014
This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.
This Machine Kills Secrets: How WikiLeakers, Cypherpunks, and Hacktivists Aim to Free the World's Information
Andy Greenberg - 2012
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.
Gray Hat Python: Python Programming for Hackers and Reverse Engineers
Justin Seitz - 2008
But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Mark Dowd - 2006
Drawing on their extraordinary experience, they introduce a start-to-finish methodology for "ripping apart" applications to reveal even the most subtle and well-hidden security flaws.
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Drowned by Corn (Kindle Single)
Erika Hayasaki - 2014
But something went terribly wrong. By day's end, some would be alive. Others would not. A close-knit community would be devastated, forced to endure. This gripping true story centers on what happened to one courageous and flawed young man who survived, and how his life quickly spiraled out of control in the next two years. It is a story about love, unbreakable friendship, and "king" corn. “There are some forty-five thousand items in the average American supermarket and more than a quarter of them now contain corn,” writes Michael Pollan in The Omnivore’s Dilemma. But as international dependence on the highly subsidized crop for cattle feed, corn syrup and ethanol has surged—so have deaths by corn. Based on three years of reporting and interviews with the people involved and thousands of pages of court documents, transcripts, police reports, journalist Erika Hayasaki brings to life (in narrative nonfiction-style) this world of people who risk and sometimes lose their lives for this powerful commodity. Hayasaki, a former national correspondent for the Los Angeles Times, is the author of The Death Class: A True Story About Life (Simon & Schuster 2014), as well as the Kindle Single, Dead or Alive (2012). She is an assistant professor in the Literary Journalism Program at the University of California, Irvine, and a regular contributor to Newsweek and The Atlantic. *Cover design by Kristen RadtkePraise for DROWNED BY CORN:THE CHICAGO TRIBUNE: "The descriptions of the accident are chilling: a blow-by-blow account of the grain pulling the young men under and the dramatic rescue of Will, who survived after being buried past his chest. The piece follows Will as his grief sends him into a downward spiral. "Drowned by Corn" is a gripping narrative of tenderness and horror, friendship and loss." — Megan KirbySAN FRANCISCO CHRONICLE: "Erika Hayasaki’s suspenseful account of the deaths of Paco and Wyatt and the harrowing rescue of Will is the stuff of nightmares. But what elevates this fine work of investigative journalism is her portrayal of Will in the aftermath: his survival guilt, his struggle with alcohol and drugs, his strained relationships and his eventual discovery of a way to endure his and his town’s unspeakable losses." — Porter Shreve
Metaprogramming Elixir
Chris McCord - 2015
Maybe you’ve played with the basics or written a few macros. Now you want to take it to the next level. This book is a guided series of metaprogramming tutorials that take you step by step to metaprogramming mastery. You’ll extend Elixir with powerful features and write faster, more maintainable programs in ways unmatched by other languages.You’ll start with the basics of Elixir’s metaprogramming system and find out how macros interact with Elixir’s abstract format. Then you’ll extend Elixir with your own first-class features, write a testing framework, and discover how Elixir treats source code as building blocks, rather than rote lines of instructions. You’ll continue your journey by using advanced code generation to create essential libraries in strikingly few lines of code. Finally, you’ll create domain-specific languages and learn when and where to apply your skills effectively.When you’re done, you will have mastered metaprogramming, gained insights into Elixir’s internals, and have the confidence to leverage macros to their full potential in your own projects.
The LogStash Book
James Turnbull - 2013
We're going to do that by introducing you to Example.com, where you're going to start a new job as one of its SysAdmins. The first project you'll be in charge of is developing its new log management solution. We'll teach you how to:* Install and deploy LogStash.* Ship events from a LogStash Shipper to a central LogStash server.* Filter incoming events using a variety of techniques.* Output those events to a selection of useful destinations.* Use LogStash's Web interface and alternative interfaces like Kibana.* Scale out your LogStash implementation as your environment grows.* Quickly and easily extend LogStash to deliver additional functionality you might need.By the end of the book you should have a functional and effective log management solution that you can deploy into your own environment.