Gray Hat Python: Python Programming for Hackers and Reverse Engineers


Justin Seitz - 2008
    But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools - and how to build your own when the pre-built ones won't cut it.You'll learn how to:Automate tedious reversing and security tasks Design and program your own debugger Learn how to fuzz Windows drivers and create powerful fuzzers from scratch Have fun with code and library injection, soft and hard hooking techniques, and other software trickery Sniff secure traffic out of an encrypted web browser session Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and more The world's best hackers are using Python to do their handiwork. Shouldn't you?

What was I Thinking


Paul Henry - 2011
    It will keep you entertained for hours. It's the very unusual story of Paul Henry - from his eventful childhood to his adventurous career in journalism to his recent outrageous comments on television which divided the country.A natural-born story teller, Paul spins many great yarns in this book. It's fascinating insight into his complex character. He's surprising -- he doesn't adhere to any prescribed set of beliefs. He's bold -- he set himself up as an international news correspondent working out of his Masterton lounge. And he's versatile -- turning his hand to running a cafe, running for Parliament and running from terrorists.

The Washington Post for Kindle (Ad-Free)


The Washington Post Company - 2018
    

Best RV Tips from RVTipOfTheDay.com


Steven Fletcher - 2013
    No matter if you use your RV just a few weekends and holidays a year or make it your full time home, you will find tips that will make your RV travels easier, safer and more enjoyable. You'll find tips that will save you time and money. You will find tips on getting your mail while traveling, internet access, boondocking, and work camping. You'll learn how to save money on camping fees just by choosing where to stay and staying longer. You will get tips on how you can customize your RV to make your home.Chapter TitlesRV Care & Maintenance TipsRV Boondocking – Dry-Camping – Overnighting TipsRV Camping TipsRV Park Reservation & Check-In ChecklistsRV Travel & Destination TipsRV Driving TipsRV Lifestyle TipsWork Camping TipsRV Accessories TipsRV Battery TipsRV Holding Tanks & Toilet TipsRV Fresh Water System TipsRV Electrical System TipsRV Refrigerator TipsMiscellaneous RV TipsTips for RVing With Dogs This book includes over 400 tips. You pay pennies for tips that can save you hundreds of dollars.About the Editors: As most folks do, we started out tent camping. In the late 1970s we ventured across the country from northern California to western Pennsylvania and back through Washington and Oregon in Steven’s boxy old 1965 Chevy van.   Those were the days, my friends. That trip had a lasting effect and over time we realized we were destined to be full time RVers. In 1995 we sold our house and a Recreational Vehicle became our home. An RV has been our home every since.

The Personal Internet Address & Password Logbook


Heather Zschock - 2010
    Plenty of room to fill in website addresses, usernames, passwords, and add notes. Spiral binding allows pages to lie flat. Elastic band closure. Includes pages in the back to record additional useful information, such as your home network configuration, software license numbers, and other notes. Removable band and discreet cover design. Measures 4-1/4" wide x 5-3/4" high.

Thinking in CSS


Aravind Shenoy - 2014
    Instead of wandering through loads of theory, we will understand CSS more practically so that we can design a webpage using CSS. We have used Notepad for the examples in this book. Alternatively, you can also use Notepad++ or any advanced editor. All that you need to do is copy the code and paste it into Notepad. Upon execution, you will get the output as depicted in the screenshots. Screenshots are provided for each sample code. Coding gets better with practice. The examples in this book are compatible with almost every browser. Instead of using the verbatim code, you can modify the code and see the change in the output, thereby understanding the subtle nuances of CSS. By the end of the book, with practice, you can achieve better things and get more acquainted with CSS.

The C# Player's Guide


R.B. Whitaker - 2012
    

The Microsoft Data Warehouse Toolkit: With SQL Server 2008 R2 and the Microsoft Business Intelligence Toolset


Joy Mundy - 2006
    In this new edition, the authors explain how SQL Server 2008 R2 provides a collection of powerful new tools that extend the power of its BI toolset to Excel and SharePoint users and they show how to use SQL Server to build a successful data warehouse that supports the business intelligence requirements that are common to most organizations. Covering the complete suite of data warehousing and BI tools that are part of SQL Server 2008 R2, as well as Microsoft Office, the authors walk you through a full project lifecycle, including design, development, deployment and maintenance.Features more than 50 percent new and revised material that covers the rich new feature set of the SQL Server 2008 R2 release, as well as the Office 2010 release Includes brand new content that focuses on PowerPivot for Excel and SharePoint, Master Data Services, and discusses updated capabilities of SQL Server Analysis, Integration, and Reporting Services Shares detailed case examples that clearly illustrate how to best apply the techniques described in the book The accompanying Web site contains all code samples as well as the sample database used throughout the case studies The Microsoft Data Warehouse Toolkit, Second Edition provides you with the knowledge of how and when to use BI tools such as Analysis Services and Integration Services to accomplish your most essential data warehousing tasks.

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code


Michael Hale Ligh - 2010
    Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills. Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

A Companion To Easter Island (Guide To Rapa Nui)


James Grant-Peterkin - 2010
    This guidebook includes the island's history, culture and all of its significant archaeological sites. It also contains all of the practical information needed for your visit, including island activities and up-to-date restaurant and shopping recommendations. It will also tell you the best times to visit the sites in order to get the optimal light for photography and to avoid the crowds, as well as many other 'local' tips that no other guidebook will tell you. Contains over 100 color photos of Easter Island, as well as color maps of both the island and the one town, Hanga Roa. New, Updated edition (2014).

The Addiction Treatment Planner


Robert R. Perkinson - 2001
    The bestselling treatment planning system for mental health professionalsThe Addiction Treatment Planner, Fifth Edition provides all the elements necessary to quickly and easily develop formal treatment plans that satisfy the demands of HMOs, managed care companies, third-party payors, and state and federal agencies.New edition features empirically supported, evidence-based treatment interventions Organized around 43 behaviorally based presenting problems, including substance use, eating disorders, schizoid traits, and others Over 1,000 prewritten treatment goals, objectives, and interventions--plus space to record your own treatment plan options Easy-to-use reference format helps locate treatment plan components by behavioral problem Includes a sample treatment plan that conforms to the requirements of most third-party payors and accrediting agencies including CARF, The Joint Commission (TJC), COA, and the NCQA

Security Metrics: Replacing Fear, Uncertainty, and Doubt


Andrew Jaquith - 2007
    Using sample charts, graphics, case studies, and war stories, Yankee Group Security Expert Andrew Jaquith demonstrates exactly how to establish effective metrics based on your organization's unique requirements. You'll discover how to quantify hard-to-measure security activities, compile and analyze all relevant data, identify strengths and weaknesses, set cost-effective priorities for improvement, and craft compelling messages for senior management. Security Metrics successfully bridges management's quantitative viewpoint with the nuts-and-bolts approach typically taken by security professionals. It brings together expert solutions drawn from Jaquith's extensive consulting work in the software, aerospace, and financial services industries, including new metrics presented nowhere else. You'll learn how to: - Replace nonstop crisis response with a systematic approach to security improvement - Understand the differences between "good" and "bad" metrics - Measure coverage and control, vulnerability management, password quality, patch latency, benchmark scoring, and business-adjusted risk - Quantify the effectiveness of security acquisition, implementation, and other program activities - Organize, aggregate, and analyze your data to bring out key insights - Use visualization to understand and communicate security issues more clearly - Capture valuable data from firewalls and antivirus logs, third-party auditor reports, and other resources - Implement balanced scorecards that present compact, holistic views of organizational security effectiveness Whether you're an engineer or consultant responsible for security and reporting to management-or an executive who needs better information for decision-making-Security Metrics is the resource you have been searching for. Andrew Jaquith, program manager for Yankee Group's Security Solutions and Services Decision Service, advises enterprise clients on prioritizing and managing security resources. He also helps security vendors develop product, service, and go-to-market strategies for reaching enterprise customers. He co-founded @stake, Inc., a security consulting pioneer acquired by Symantec Corporation in 2004. His application security and metrics research has been featured in CIO, CSO, InformationWeek, IEEE Security and Privacy, and The Economist. Foreword Preface Acknowledgments About the Author Chapter 1 Introduction: Escaping the Hamster Wheel of Pain Chapter 2 Defining Security Metrics Chapter 3 Diagnosing Problems and Measuring Technical Security Chapter 4 Measuring Program Effectiveness Chapter 5 Analysis Techniques Chapter 6 Visualization Chapter 7 Automating Metrics Calculations Chapter 8 Designing Security Scorecards Index

Teach Yourself C++


Herbert Schildt - 1992
    It also gives readers the opportunity to test their understanding with multiple exercises. Readers can test their knowledge of individual concepts, and then test their comprehension of the topic in a larger setting.

Practical C++ Programming


Steve Oualline - 1995
    But this high-level language is relatively difficult to master, even if you already know the C programming language.The 2nd edition of Practical C++ Programming is a complete introduction to the C++ language for programmers who are learning C++. Reflecting the latest changes to the C++ standard, this 2nd edition takes a useful down-to-earth approach, placing a strong emphasis on how to design clean, elegant code.In short, to-the-point chapters, all aspects of programming are covered including style, software engineering, programming design, object-oriented design, and debugging. It also covers common mistakes and how to find (and avoid) them. End of chapter exercises help you ensure you've mastered the material.Practical C++ Programming thoroughly covers: C++ Syntax Coding standards and style Creation and use of object classes Templates Debugging and optimization Use of the C++ preprocessor File input/output Steve Oualline's clear, easy-going writing style and hands-on approach to learning make Practical C++ Programming a nearly painless way to master this complex but powerful programming language.

Murach's HTML5 and CSS3: Training and Reference


Zak Ruvalcaba - 2011
    This title also teaches you how to use the HTML5 and CSS3 features alongside the earlier standards.