UNIX System Administration Handbook


Evi Nemeth - 1989
    The third edition has been expanded to include "direct from the frontlines" coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administration - from basic topics to UNIX esoterica - and provides explicit cover of four popular UNIX systems:- Red Hat Linux- Solaris- HP-UX- FreeBSDThis book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems - warts and all.

The Pentester BluePrint: Starting a Career as an Ethical Hacker


Phillip L. Wylie - 2020
    Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications.You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement.Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing.Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you:The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

Running Scared: The Life and Treacherous Times of Las Vegas Casino King Steve Wynn


John L. Smith - 1995
    He's a mogul whose empire at one point included the Mirage, the Golden Nugget, and Treasure Island. But how did he gain and wield his tremendous power in Nevada? And why did a confidential Scotland Yard report prevent him from opening a casino in London? When this biography, written by a local reporter, was first released in 1995, Steve Wynn brought suit against its original publisher and forced him into bankruptcy. Now available in paperback, the inside story of the biggest phenomenon to roil Las Vegas since Hoover Dam gives readers an intimate glimpse at the real business that's conducted beyond the gaming tables.

Fire in the Valley: The Making of the Personal Computer


Paul Freiberger - 1984
    It reveals the visions they shared, the sacrifices they made, and the rewards they reaped.

Dissecting The Hack: The F0rb1dd3n Network


Jayson E. Street - 2009
    One half massive case study, one half technical manual, Dissecting the Hack has it all - learn all about hacking tools and techniques and how to defend your network against threats. Yes, the security threats are real - read more about the tactics that you see executed throughout the story in the second half of the book where you will learn to recon, scan, explore, exploit and expunge with the tools and techniques shown in the story. Every hack is real and can be used by you once you have the knowledge within this book! Utilizes actual hacking and security tools in its story- helps to familiarize a newbie with the many devices and their codeIntroduces basic hacking techniques in real life context for ease of learningPresented in the words of the hacker/security pro, effortlessly envelops the beginner in the language of the hack

Console Wars: Sega, Nintendo, and the Battle that Defined a Generation


Blake J. Harris - 2014
    Sega, on the other hand, was just a faltering arcade company with big aspirations and even bigger personalities. But that would all change with the arrival of Tom Kalinske, a man who knew nothing about videogames and everything about fighting uphill battles. His unconventional tactics, combined with the blood, sweat and bold ideas of his renegade employees, transformed Sega and eventually led to a ruthless David-and-Goliath showdown with rival Nintendo.The battle was vicious, relentless, and highly profitable, eventually sparking a global corporate war that would be fought on several fronts: from living rooms and schoolyards to boardrooms and Congress. It was a once-in-a-lifetime, no-holds-barred conflict that pitted brother against brother, kid against adult, Sonic against Mario, and the US against Japan.Based on over two hundred interviews with former Sega and Nintendo employees, Console Wars is the underdog tale of how Kalinske miraculously turned an industry punchline into a market leader. It's the story of how a humble family man, with an extraordinary imagination and a gift for turning problems into competitive advantages, inspired a team of underdogs to slay a giant and, as a result, birth a $60 billion dollar industry.

Nmap Network Scanning: The Official Nmap Project Guide to Network Discovery and Security Scanning


Gordon Fyodor Lyon - 2009
    From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book suits all levels of security and networking professionals. A 42-page reference guide documents every Nmap feature and option, while the rest of the book demonstrates how to apply those features to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Hints and instructions are provided for common uses such as taking network inventory, penetration testing, detecting rogue wireless access points, and quashing network worm outbreaks. Nmap runs on Windows, Linux, and Mac OS X.Nmap's original author, Gordon "Fyodor" Lyon, wrote this book to share everything he has learned about network scanning during more than 11 years of Nmap development. Visit http: //nmap.org/book for more information and sample chapters.

Heavenly Intrigue: Johannes Kepler, Tycho Brahe, and the Murder Behind One of History's Greatest Scientific Discoveries


Joshua Gilder - 2004
    That collaboration would mark the dawn of modern science . . . and end in murder.Johannes Kepler changed forever our understanding of the universe with his three laws of planetary motion. He demolished the ancient model of planets moving in circular orbits and laid the foundation for the universal law of gravitation, setting physics on the course of revelation it follows to this day. Kepler was one of the greatest astronomers of all time. Yet if it hadn't been for the now lesser-known Tycho Brahe, the man for whom Kepler apprenticed, Kepler would be a mere footnote in today's science books. Brahe was the Imperial Mathematician at the court of the Holy Roman Emperor in Prague and the most famous astronomer of his era. He was one of the first great systematic empirical scientists and one of the earliest founders of the modern scientific method. His forty years of planetary observations—an unparalleled treasure of empirical data—contained the key to Kepler's historic breakthrough. But those observations would become available to Kepler only after Brahe's death. This groundbreaking history portrays the turbulent collaboration between these two astronomers at the turn of the seventeenth century and their shattering discoveries that would mark the transition from medieval to modern science. But that is only half the story. Based on recent forensic evidence (analyzed here for the first time) and original research into medieval and Renaissance alchemy—all buttressed by in-depth interviews with leading historians, scientists, and medical specialists—the authors have put together shocking and compelling evidence that Tycho Brahe did not die of natural causes, as has been believed for four hundred years. He was systematically poisoned—most likely by his assistant, Johannes Kepler. An epic tale of murder and scientific discovery, Heavenly Intrigue reveals the dark side of one of history’s most brilliant minds and tells the story of court politics, personal intrigue, and superstition that surrounded the protean invention of two great astronomers and their quest to find truth and beauty in the heavens above.

Piano: The Making of a Steinway Concert Grand


James Barron - 2006
    Alone among the big piano companies, Steinway still crafts all of its pianos largely by hand, imbuing each one with the promise and burden of its brand. In this captivating narrative, James Barron of "The New York Times" tells the story of one Steinway piano, from raw lumber to finished instrument. Barron follows that brand-new piano--known by its number, K0862--on its eleven-month journey through the Steinway factory, where time-honored manufacturing methods vie with modern-day industrial efficiency. He looks over the shoulders of men and women--some second- and third-generation employees, some recently arrived immigrants--who transform wood and steel into a concert grand. Together, they carry on the traditions begun more than 150 years ago by the immigrants who founded Steinway & Sons--a family that soared to prominence in the music world and, for a while, in New York City's political and economic life. Barron also explores the art and science of developing a piano's timbre and character before its first performance, when the essential question will be answered: Does K0862 live up to the Steinway legend? From start to finish, "Piano "will charm and enlighten music lovers.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

The Nudist on the Late Shift: And Other True Tales of Silicon Valley


Po Bronson - 1999
    In his national bestseller The Nudist on the Late Shift he tells the true story of the mostly under-thirty entrepreneurs and tech wizards, immigrants and investors, dreamers and visionaries, who see the Valley as their Mecca. Taking us inside the world of these newcomers, brainiacs, salespeople, headhunters, utopians, plutocrats, and innovators as they transform our culture, The Nudist on the Late Shift is a defining portrait of a new generation in the whirl of an information revolution and an international gold rush.Po Bronson is the author of two novels and one book of nonfiction. Bombardiers, a dark satire of high finance, was an international bestseller that was translated into twelve languages. The First $20 Million Is Always the Hardest, soon to be a feature film from 20th Century Fox, is a comedy of Silicon Valley.  His third bestseller, The Nudist on the Late Shift and Other True Tales of Silicon Valley, demonstrates that Bronson's wit and imagination apply as well to nonfiction as to fiction.

Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

Special Agent: My Life On the Front Lines as a Woman in the FBI


Candice Delong - 2001
    She has been on the front lines of some of the FBIs most gripping and memorable cases, including being chosen as one of the three agents to carry out the manhunt for the Unabomber in Lincoln, Montana. She has tailed terrorists, gone undercover as a gangsters moll, and posed as the madam for a call-girl ring. Now for the first time she reveals the dangers and rewards of being a woman on the front lines of the worlds most powerful law enforcement agency. She traces the unusual career path that led her to crime fighting, and recounts the incredible obstacles she faced as a woman and as a fledgling agent. She takes readers step by step through the profiling process and shows how she helped solve a number of incredible cases. The story of her role as a lead investigator on the notorious Tylenol Murderer case is particularly compelling. Finally, she gives the true, insiders story behind the investigation that led to the arrest of the Unabomberincluding information that the media cant or wont reveal. A remarkable portrait of courage and grace under fire, Special Agent offers a missing chapter to the annals of law enforcement and a dramatic and often funny portrait of an extraordinary woman who has dedicated her heart and soul to the crusade against crime.Candice DeLongs Top Cases: 1. TYMURS-(Bureau acronym for Tylenol Murders)8 victims, 1982. 2. F.A.L.N. Terrorist Organization, 198184. 3. Melissa Ackerman kidnap/rape/murder, 1986Serial child killer Brian Dugan (Illinois). Brian Dugan was the most prolific serial killer Illinois had ever encountered. 4. The Burlington Rapist (Illinois serial rapist), 1984. 5. The Lecherous Landlord was the first and most significant Discrimination in Housing case in the history of the Chicago FBI. 6. Undercover work on UNABOM, including an afternoon with Ted Kaczynski on his arrest day, April 3, 1996.