Bulletproof SSL and TLS: The Complete Guide to Deploying Secure Servers and Web Applications


Ivan Ristic - 2014
    Quite the contrary; mistakes are easy to make and can often fully compromise security. Bulletproof SSL and TLS is the first SSL book written with users in mind. It is the book you will want to read if you need to assess risks related to website encryption, manage keys and certificates, configure secure servers, and deploy secure web applications. Bulletproof SSL and TLS is based on several years of work researching SSL and how SSL is used in real life, implementing and supporting a comprehensive assessment tool running on the SSL Labs website (https://www.ssllabs.com), and assessing most of the public SSL servers on the Internet. The assessment tool helped many site owners identify and solve issues with their SSL deployments. The intent of this book is to provide a definitive reference for SSL deployment that is full of practical and relevant information.

The Quick Python Book


Naomi R. Ceder - 2000
    This updated edition includes all the changes in Python 3, itself a significant shift from earlier versions of Python.The book begins with basic but useful programs that teach the core features of syntax, control flow, and data structures. It then moves to larger applications involving code management, object-oriented programming, web development, and converting code from earlier versions of Python.True to his audience of experienced developers, the author covers common programming language features concisely, while giving more detail to those features unique to Python.Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler


Chris Eagle - 2008
    With IDA Pro, you live in a source code-optional world. IDA can automatically analyze the millions of opcodes that make up an executable and present you with a disassembly. But at that point, your work is just beginning. With The IDA Pro Book, you'll learn how to turn that mountain of mnemonics into something you can actually use.Hailed by the creator of IDA Pro as the "long-awaited" and "information-packed" guide to IDA, The IDA Pro Book covers everything from the very first steps to advanced automation techniques. While other disassemblers slow your analysis with inflexibility, IDA invites you to customize its output for improved readability and usefulness. You'll save time and effort as you learn to:Identify known library routines, so you can focus your analysis on other areas of the code Extend IDA to support new processors and filetypes, making disassembly possible for new or obscure architectures Explore popular plug-ins that make writing IDA scripts easier, allow collaborative reverse engineering, and much more Utilize IDA's built-in debugger to tackle obfuscated code that would defeat a stand-alone disassembler You'll still need serious assembly skills to tackle the toughest executables, but IDA makes things a lot easier. Whether you're analyzing the software on a black box or conducting hard-core vulnerability research, a mastery of IDA Pro is crucial to your success. Take your skills to the next level with The IDA Pro Book.

Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World


Marcus J. Carey - 2019
    Tribe of Hackers wants to change that. We asked for industry, career, and personal advice from 70 cybersecurity luminaries who are ready to break down barriers and shatter ceilings. It's about time.This book can be a catalyst for change for anyone, from beginners trying to enter the industry, to practitioners looking to start their own firms. What tips do the founders of Dragos, Inc. and Duo Security have on starting a company? Do you need a college degree or certification to be a cybersecurity professional? What is the biggest bang-for-the-buck action your organization can take to improve its cybersecurity posture? What "life hacks" to real hackers use to make their own lives easier? What resources can women in cybersecurity utilize to maximize their potential?All proceeds from the book will go towards: Bunker Labs, Sickle Cell Disease Association of America, Rainforest Partnership, and Start-Up! Kid's Club.We can't wait to show you the most epic cybersecurity thought leadership collaborative effort, ever.(Source: Amazon.com)

Masters of Deception: The Gang That Ruled Cyberspace


Michelle Slatalla - 1995
    "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour

Practical Cryptography


Niels Ferguson - 2003
    The gold standard for attaining security is cryptography because it provides the most reliable tools for storing or transmitting digital information. Written by Niels Ferguson, lead cryptographer for Counterpane, Bruce Schneier's security company, and Bruce Schneier himself, this is the much anticipated follow-up book to Schneier's seminal encyclopedic reference, Applied Cryptography, Second Edition (0-471-11709-9), which has sold more than 150,000 copies. Niels Ferguson (Amsterdam, Netherlands) is a cryptographic engineer and consultant at Counterpane Internet Security. He has extensive experience in the creation and design of security algorithms, protocols, and multinational security infrastructures. Previously, Ferguson was a cryptographer for DigiCash and CWI. At CWI he developed the first generation of off-line payment protocols. He has published numerous scientific papers. Bruce Schneier (Minneapolis, MN) is Founder and Chief Technical Officer at Counterpane Internet Security, a managed-security monitoring company. He is also the author of Secrets and Lies: Digital Security in a Networked World (0-471-25311-1).

Penetration Testing: A Hands-On Introduction to Hacking


Georgia Weidman - 2014
    This beginner-friendly book opens with some basics of programming and helps you navigate Kali Linux, an operating system that comes preloaded with useful computer security tools like Wireshark and Metasploit. You'll learn about gathering information on a target, social engineering, capturing network traffic, analyzing vulnerabilities, developing exploits, and more. Hands-on examples discuss even advanced topics like mobile device security and bypassing anti-virus software.

How to Break Software: A Practical Guide to Testing


James A. Whittaker - 2002
    Instead of relying on a rigid plan, it should be intelligence, insight, experience and a "nose for where the bugs are hiding" that guide testers. This book helps testers develop this insight. The techniques presented here allow testers to go off-script. Full description

CSS and Documents


Eric A. Meyer - 2012
    

Expert Oracle Database Architecture: Oracle Database 9i, 10g, and 11g Programming Techniques and Solutions


Thomas Kyte - 2005
    Tom has a simple philosophy: you can treat Oracle as a black box and just stick data into it or you can understand how it works and exploit it as a powerful computing environment. If you choose the latter, then you’ll find that there are few information management problems that you cannot solve quickly and elegantly. This fully revised second edition covers the latest developments in Oracle Database 11g. Each feature is taught in a proof-by-example manner, not only discussing what it is, but also how it works, how to implement software using it, and the common pitfalls associated with it. Don’t treat Oracle Database as a black-box. Get this book. Get under the hood. Turbo-charge your career. Fully-revised to cover Oracle Database 11g Proof-by-example approach: Let the evidence be your guide Dives deeply into Oracle Databases’s most powerful features What you’ll learn Develop an evidence-based approach to problem solving Manage transactions in highly concurrent environments Speed access to data through table and index design Manage files and memory structures for performance and reliability Scale up through partitioning and parallel processing Load and unload data to interface with external systems Think for yourself; don’t take Tom’s word for it! Who this book is for This book is aimed at Oracle Database administrators, at PL/SQL and Java developers writing code to be deployed inside the database, and at developers of external applications who use Oracle Database as a data store. It is the go to book for those wishing to create efficient and scalable applications.

Netwars: The Code


M. Sean Coleman - 2014
    A high-tech serial thriller from the dark side of the net. Episode 1.Welcome to the Deep Web. Those parts of the internet no search engine explores. The place where you can buy anything. Drugs, children, weapons. Anyone can do it. And get away free. Anthony Prince, head of PrinceSec, a firm which provides high-tech security for the government and major corporations, dies in a plane crash when crossing the English Channel. Responsible for Prince's death is a hacker named Strider. His real name is Scott Mitchell and in his day job at the National Cyber Crime Unit he uses legitimate means to get the bad guys. As Strider, his means are less legal. On the same night, PrinceSec is the target of a cyber-attack. When the NCCU is called to assess the damage, a link is found between Prince and a criminal hacker group called Black Flag. The race is on for Mitchell to protect his identity as Strider and to stop Black Flag before it's too late.

MCSE Self-Paced Training Kit (Exams 70-290, 70-291, 70-293, 70-294): Microsoft Windows Server 2003 Core Requirements


Dan HolmeMelissa Craft - 2003
    Maybe you re going for MCSA first, then MCSE. Maybe you need to upgrade your current credentials. Now, direct from Microsoft, this set brings together all the study resources you ll need. You get the brand-new Second Edition of all four books: for Exam 70-290 (Managing and Maintaining a Windows Server Environment), 70-291 and 70-293 (Network Infrastructure), and 70-294 (Active Directory). What s new here? Deeper coverage, more case studies, more troubleshooting, plus significant new coverage: Emergency Management Services, DNS, WSUS, Post-Setup Security Updates, traffic monitoring, Network Access Quarantine Control, and much more. There are more than 1,200 highly customizable CD-based practice questions. And, for those who don t have easy acess to Windows Server 2003, there s a 180-day eval version. This package isn t cheap, but there s help there, too: 15% discount coupons good toward all four exams. Bill Camarda, from the August 2006 href="http://www.barnesandnoble.com/newslet... Only

Shadow Force: Complete 5-Part Series


Camilla Blake - 2021
    No cliffhangers. Epic action, drama, suspense, clean romance, and happy ever afters. Highly rated authors.PART ONE: Shadow PromiseCade Montgomery will always carry the guilt for the men who died on his watch, and he will stop at nothing to find the people responsible. When Piper Collins, his former foster sister and the woman who stole his heart more than ten years ago, resurfaces, things get complicated.Piper Collins left the FBI after her fiancé died three years ago, to find his killer. That search leads her to Atlanta and back to Cade, the man who broke her heart when he left and never returned. When Cade meets with two men who are working for a known drug lord at the bar where she’s working undercover, Piper is disappointed to find he turned to a life of crime instead of being the man of conviction she used to know. But things aren’t adding up, and Piper hopes that, with his help, her fiancé’s killer will be brought to justice.PART TWO: Shadow SecretCruz Ortiz is no longer the man he used to be. After being taken hostage and almost beaten to death by a Venezuelan drug lord, Cruz joins Shadow Force with a new face, a new identity, and a death certificate for his old self. When Shadow Force is tasked with sending someone in undercover, Cruz is the obvious choice.Lydia Ayala is content with her life as a nurse practitioner in the slums of Miami. Sure, her patients tend to be gang members and drug dealers, but she’s confident she’s making a difference in the world. When she’s kidnapped and forced into a marriage, she plans to find a way out of the death sentence. But Cruz Ortiz keeps a watchful eye on her, and her chances to make a break are growing smaller, while the wedding is drawing closer.PART THREE: Shadow FlightRyder Blake is grateful Shadow Force scooped him up before he died a slow death at his desk at the CIA headquarters. After running for his life during a long-term undercover op, Ryder is convinced he’s put his clandestine days behind him. But when a large shipment of drugs and guns goes missing and the Russian Mafia boss who tried to have him killed is implicated, Ryder agrees to take on his old persona and enter a string of underground fights. Only, Jolie Phillips, the office manager for Shadow Force and a woman determined to be an operative, is assigned to the case with him, and Ryder is not a happy camper.A new organization comes to light as Ryder and Jolie travel around the southeast. As they get closer to the answers, the danger escalates, and Ryder and Jolie are running for their lives.PART FOUR: Shadow RescueFormer army and explosives expert Oscar Cortada is rumored to have one or two screws loose due to his infatuation with making things go Boom! But when he and the team stumble upon a container of women, Oscar is tormented by his memories. Oscar volunteers for the job to help Shadow Force uncover the missing people.Ivy Bell never stopped loving her husband while she pursued a career in acting and modeling. Still, after eleven years apart, it seemed they would never find their way back to each other. But when a new role opens up in Atlanta and Ivy arrives on set, she realizes things aren’t what they seem.PART FIVE: Shadow RedemptionLevi Slater has fought crime since his time with the DEA, but never before has he encountered a more evil and sinister group than the Los Caballeros del Camino, The Knights of the Way.Dr. Drew Bellamy has one objective: keep her son safe. But when she’s taken from outside her home and given an ultimatum, she finds herself scrambling and forcing her way out of captivity. When she runs smack into Levi Slater in the woods outside the compound where she was held, she faces a decision—trust him with her and her son’s life or go it alone.

A MacKenzie Security Omnibus 1: Seduction and Sapphires, Shadows and Silk, Secrets and Satin, Sins and Scarlet Lace


Liliana Hart - 2019
     Bayleigh Scott has no idea who her new neighbor is, only that her body is drawn to him in ways she can’t explain, and the danger that surrounds him isn’t the deterrent she knows it should be. More than fireworks explode between Cade and Bayleigh when she discovers the real reason he relentlessly pursued her, but by then it’s too late, because she’s already been drawn into a deadly game of desire, deception and revenge. SHADOWS AND SILK Agent Brant Scott knows when a battle is lost. He’s been an integral part of hunting down members of the del Fuego cartel for years, but it’s not the violent criminals that have the ability to bring him to his knees. That honor belongs to one woman. And after spending a night in Darcy MacKenzie’s bed, he knows he has to disappear from her life or risk her finding out the one secret that can make her despise him forever. Darcy MacKenzie is hell on wheels. At least that’s what her brothers tell her. And when she has the chance to work with the elite team assigned to destroy the most dangerous drug cartel in the world, she jumps at the chance to lend her expertise by deciphering the Mayan hieroglyphs the cartel is using to send messages. The only problem is her partner is none other that Brant Scott—the only man she’s ever loved and the one who left her without a backward glance. With secrets of her own—and a body built for sin—Darcy is more than an equal match for the stubborn Brant. But loving each other could be more of a risk than either is willing to take. SECRETS AND SATIN No one knows heartbreak like Jade Jax. After losing her husband to a tragic death, she doesn’t believe love can happen twice. But after years of living a half-life without her husband, her body starts to waken again, and needs she’d forgotten come to the surface. Max Devlin never thought Jade would want him outside of his dreams, but fate plays a helping hand when they’re thrust into a high stakes mission, protecting each other’s backs like old times. Max decides he’s finally ready to end his bachelor ways, but he learns quickly that happily-ever-after isn't always possible. Because Jade has no desire to ever love again. Not when she knows how painful it can be. SINS AND SCARLET LACE Declan MacKenzie has loved the same woman for as long as he can remember, but after a mission early on in his career turns deadly, he realizes he can never have a wife or family and keep them safe. So he watches her marry another man. Sophia Huxley is involved in a nightmare. Her late husband has been labeled a traitor and he's made her the fall guy. There's no one she can call to prove her innocence. Except the man who broke her heart.

Game Development Essentials: An Introduction


Jeannie Novak - 2004
    This book not only examines content creation and the concepts behind development, but it also give readers a background on the evolution of game development and how it has become what it is today. GAME DEVELOPMENT ESSENTIALS also includes chapters on project management, development team roles and responsibilities, development cycle, marketing, maintenance, and the future of game development. With the same engaging writing style and examples that made the first two editions so popular, this new edition features all the latest games and game technology. Coverage of new game-related technology, development techniques, and the latest research in the field make this an invaluable resource for anyone entering the exciting, competitive, ever-changing world of game development.