Book picks similar to
Kali Linux Social Engineering by Rahul Singh Patel
programming
hacking
free
read-business-technical-career
The Hacker Playbook: Practical Guide To Penetration Testing
Peter Kim - 2014
The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field. Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software. From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience. Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.
The Linux Command Line Beginner's Guide
Jonathan Moeller - 2012
ABOUT THE AUTHORStanding over six feet tall, Jonathan Moeller has the piercing blue eyes of a Conan of Cimmeria, the bronze-colored hair a Visigothic warrior-king, and the stern visage of a captain of men, none of which are useful in his career as a computer repairman, alas.He has written the "Demonsouled" trilogy of sword-and-sorcery novels, and continues to write the "Ghosts" sequence about assassin and spy Caina Amalas, the "Computer Beginner's Guide" series of computer books, and numerous other works.
Learn Ruby the Hard Way
Zed A. Shaw - 2011
It assumes absolutely no prior programming knowledge and will guide you carefully and slowly through the learning process.Learn Ruby The Hard Way is a translation of the original "Learn Python The Hard Way" to teaching Ruby, with the translation done by Rob Sobers. "Learn Python The Hard Way" has taught hundreds of thousands worldwide how to code in Python, and this book uses the same proven method for Ruby. When you are done with this book you will have the skill to move on to other books about Ruby and be ready to understand them.
True Crime Stories Volume 4: 12 Terrifying True Crime Murder Cases (List of Twelve)
Ryan Becker - 2018
In Volume 4 of True Crime, prepare for crimes like never before, as we examine what makes people snap and commit gruesome, calculated and disturbing crimes that will have you wondering about human nature.Inside these pages, you will encounter some of America's worst excesses in human behavior with notorious criminals like: - Priscilla Ford- Adam Lanza- Michael Kenneth McLendon- Dana Ewell- Christopher Harper-Mercer- And more
Stealing the Network: How to Own the Box
Ryan Russell - 2003
So, what IS it? It is an edgy, provocative, attack-oriented series of chapters written in a first hand, conversational style. World-renowned network security personalities present a series of 25 to 30 page chapters written from the point of an attacker who is gaining access to a particular system. This book portrays the -street fighting- tactics used to attack networks and systems. Not just another -hacker- book, it plays on -edgy- market success of Steal this Computer Book with first hand, eyewitness accountsA highly provocative expose of advanced security exploitsWritten by some of the most high profile -White Hats-, -Black Hats- and -Gray Hats-Gives readers a -first ever- look inside some of the most notorious network intrusions
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Stealing the Network: How to Own an Identity
Raven Alder - 2005
Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air... Stealing the Network: How to Own an Identity is the 3rd book in the Stealing series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this STN collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.Cast upon a backdrop of Evasion, surviving characters from How to Own a Continent find themselves on the run, fleeing from both authority and adversary, now using their technical prowess in a way they never expected--to survive.
Mastering Digital Cameras: An Illustrated Guidebook (Digital Photography 1)
Al Judge - 2013
"I like how the author builds quite high expectations in the introduction of the book, and manages to fulfill them fully throughout the book.""I am amazed at his ability to focus on teaching people, like me, who have done basically nothing with cameras other than point and shoot. There is a wealth of useful and understandable information in this book,...""I've been photographing for years since first SLR in 1960s and yet I found much of interest and some I was unfamiliar with. I especially appreciated the clear, concise presentation."" Even us 'know-it-alls' are surprised by the information that cleared-up some uncertain items that had existed too long.""As a former photography student who learned almost nothing over a two year period, I can now say that I fully understand the terminology and possess the technical skill to take better photographs and possibly revisit my dream of becoming a sports photographer." Whether You are New to Photography,making the transition from Film to Digital Photography, or just want to improve your skills, this book will save you TIME and MONEY!
No more intimidation! If you understand how Digital Cameras work, every photo becomes a learning experience.
Many people are walking around with expensive cameras that they barely know how to use and others are missing great photo opportunities because they have been misinformed by well-meaning friends. This book is based on the premise that a solid understanding of photographic equipment results in a faster learning curve and better photos. The technology is actually quite simple when it is broken down and clearly explained.Without an understanding of cameras, you are at the mercy of others in all your buying decisions. You will only scratch the surface of your camera's capabilities until you take on its manual settings. You need to read this book because:
It will take the confusion out of Photographic terminology by clearly defining every important term used.
Your learning will be enhanced by 120 charts and photos that will simplify discussions and help you to remember what you learned.
You will learn why buying a camera based on Megapixels alone is a bad idea.
You will learn how sensor size and lens selection affect image quality more than any other factors.
Strange photographic terms will loose their mystique once you learn how they were carried over from film photography.
˃˃˃ You will also learn: How digital images are created and stored.Which file format to use when editing photos.Which file format to use when sharing photos.How to select a lens for your DSLR camera.How to properly adjust exposure.Why a zoom lens can be a very good investment.Why you should care about focal length, aperture, shutter speed, and ISO as well as what these terms mean. ˃˃˃ About the author: Al Judge is a professional photographer living in Sedona, Arizona. His works are displayed in several locations around town. He is a best selling author with more than a dozen photography books.
Don’t waste any more time! Scroll up and grab a copy today for little more than the cost of a cup of coffee!
Command Line Kung Fu: Bash Scripting Tricks, Linux Shell Programming Tips, and Bash One-liners
Jason Cannon - 2014
Beneath a Surface
Brad Sams - 2018
The company was forced to write-down $900 million in inventory and Surface’s future was in jeopardy.Beneath A Surface tells the inside story of how Microsoft turned its hardware dreams into a reality with new details about the challenges Panos and his team had to overcome as well as the internal politics that nearly killed the brand.For fans of Microsoft and those who are interested in the business of building brands, Beneath A Surface is a must read that tells the inside story of how Microsoft turned a failure into a fortune.
Essential Oils: Recipe Quick Reference: Essential Oils Recipes for All Occasions
Philip Ozz - 2015
These recipes range from those that you yourself can use as well as those that can benefit your beloved pets and home. If you are someone with minimal or no essential oils experience, this book will be good for you. This can help you get started really quick. If you're someone who has a little more experience with essential oils before, this book is also for you. This book offers tons of essential oils recipes resources laid out in a quick, concise, and easy to read format. In this book, you will learn the following awesome information: The basic information about the different essential oils that you can use! Brief information regarding the effectivity of the essential oils! The 100% best way to ensure that you are mixing the right essential oils together to achieve maximum effect! A step-by-step tutorial on how you can mix the essential oils to achieve the right blend or right essential oil product! The definitive guide that contains tons of awesome essential oils recipes! Our professional tips about these essential oil recipes! We’d love to share these to you! Several recipes for essential oil blends and products which are good for you, your kids, your pets, and even your home! and much much more…. So, what are you waiting for? Get started today and experience the various benefits that essential oils can do to you!!! ***SPECIAL OFFER!!!*** LIMITED TIME OFFER 40% OFF (Regular Price $4.99) This #1 Best Selling Critically Acclaimed Book is now available Globally on Amazon - Download it Now!
Nmap Cookbook: The Fat-free Guide to Network Scanning
Nicholas Marsh - 2010
Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.Topics covered include:* Installation on Windows, Mac OS X, Unix/Linux platforms* Basic and advanced scanning techniques* Network inventory and security auditing* Firewall evasion techniques* Zenmap - A graphical front-end for Nmap* NSE - The Nmap Scripting Engine* Ndiff - A Nmap scan comparison utilitySimplified coverage of Nmap 5.00 features.
Practical Cryptography
Niels Ferguson - 2003
The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).
Laravel: Code Bright
Dayle Rees - 2013
At $29 and cheaper than a good pizza, you will get the book in its current partial form, along with all future chapters, updates, and fixes for free. As of the day I wrote this description, Code Bright had 130 pages and was just getting started. To give you some perspective on how detailed it is, Code Happy was 127 pages in its complete state. Want to know more? Carry on reading.Welcome back to Laravel. Last year I wrote a book about the Laravel PHP framework. It started as a collection of tutorials on my blog, and eventually became a full book. I definitely didn’t expect it to be as popular as it was. Code Happy has sold almost 3000 copies, and is considered to be one of the most valuable resourcesfor learning the Laravel framework.Code Bright is the spiritual successor to Code Happy. The framework has grown a lot in the past year, and has changed enough to merit a new title. With Code Bright I hope to improve on Code Happy with every way, my goal is, to once again, build the most comprehensive learning experience for the framework. Oh, and to still be funny. That’s very important to me.Laravel Code Bright will contain a complete learning experience for all of the framework’s features. The style of writing will make it approachable for beginners, and a wonderful reference resource for experienced developers alike.You see, people have told me that they enjoyed reading Code Happy, not only for its educational content, but for its humour, and for my down to earth writing style. This is very important to me. I like to write my books as if we were having a conversation in a bar.When I wrote Code Happy last year, I was simply a framework enthusiast. One of the first to share information about the framework. However, since then I have become a committed member of the core development team. Working directly with the framework author to make Laravel a wonderful experience for the developers of the world.One other important feature of both books, is that they are published while in progress. This means that the book is available in an incomplete state, but will grow over time into a complete title. All future updates will be provided for free.What this means is that I don’t have to worry about deadlines, or a fixed point of completion. It leads to less stress and better writing. If I think of a better way to explain something, I can go back and change it. In a sense, the book will never be completed. I can constantly add more information to it, until it becomes the perfect resource.Given that this time I am using the majority of my spare time to write the title (yes, I have a full time job too!), I have raised the price a little to justify my invested time. I was told by many of my past readers that they found the previous title very cheap for the resource that it grew into, so if you are worried about the new price, then let me remind you what you will get for your 29 bucks.The successor to Code Happy, seen by many as the #1 learning resource for the Laravel PHP framework.An unending source of information, chapters will be constantly added as needed until the book becomes a giant vault of framework knowledge.Comedy, and a little cheesy, but very friendly writing.
The Hacker Crackdown: Law and Disorder on the Electronic Frontier
Bruce Sterling - 1992
A journalist investigates the past, present, and future of computer crimes, as he attends a hacker convention, documents the extent of the computer crimes, and presents intriguing facts about hackers and their misdoings.