Book picks similar to
UNIX System Security: A Guide for Users and System Administrators by David A. Curry
andy
computers
do-not-ebook
hacking
Horrors Next Door 2: Short Scary Stories to play with your mind
Tom Coleman - 2019
Some of the stories are inspired by true events. Find out which ones inside this scary collection. "The Girl I Married" Jonathan noticed that after marrying Jeanette, she starts acting strange. As if she is not the same girl he dated. Why is she so different and what secrets is she hiding? "I`m Sorry Daddy" After an accident at work, Mr. Williams starts developing unusual symptoms. He is turning into a monster and there is nothing to stop this. "The House Next Door part 2" Jessica decides to find out what happened to her friend Sarah. What new discoveries will she make and will the same fate befall her?
Ganked In Space
NM Tatum - 2018
When lifelong friends Reggie, Joel and Cody, fail to win the Virtual Reality Elite championship, they’re forced to find real work. The guys sign a pest control contract, ridding space stations of infestations.
ShimVens have been spreading rapidly across the galaxy.
The bugs eat through wiring, destroying space stations and ships.Reggie took the job because the pay was good and the work sounded easy. Cody and Joel are skeptical, but Reggie convinces them it’s easy work. Just spray the bugs and done, right?
Not exactly.
They soon learn these pests are deadly. They’ll have to rely on their gaming skills if they are to survive.
And they’re going to need better weapons. Oh, and a mercenary who knows how to kick ass.
These three immature guys go off to save the universe…all by accident.
Men in Black meets Ghost Busters. Intergalactic Pest Control will have readers hooked from the beginning.
--- Caution for strong language and graphic scenes involving lots of bug guts.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
The Complete Guide to High-End Audio
Robert Harley - 1995
With this book, discover how to get the best sound for your money, how to identify the weak links in your system and upgrade where it will do the most good, how to set up and tweak your system for maximum performance, and how to become a more perceptive and appreciative listener. Just a few of the secrets you will learn cover high-end sound on a budget, how to do it cheap and still do it right; five system set-up mistakes and how to avoid them; how to make your speakers sound up to 50% better, at no cost; how to choose and set up a computer-based music system; how to find the one speaker in 50 worth owning; and why all 100-watt amplifiers don't sound the same. Since the first edition's publication in 1994, The Complete Guide to High-End Audio has been considered the essential reference on high-quality music reproduction, with more than 150,000 copies sold in five languages.
Gangsters' Wives (Underworld UK)
Tammy Cohen - 2010
But what lies behind every bad man? Gangsters' Wives tells the side of the story you didn't know - what it's like to live with Britain's most lawless men, from the women who married them. Devoted mum-of-three Judy Marks was imprisoned alongside her husband, notorious drug smuggler Howard Marks; while Flanagan, the first ever Page Three girl, found herself splashed across the papers as the fiancée of legendary East End villain Reggie Kray. Jenny Pinto, wife of gangster Dave Courtney, has given the police keys to their house to stop them breaking down the front door. In ten funny, moving, searingly honest first-person accounts, Gangsters' Wives tells you all you ever wanted to know about the lives and loves of the women who are, quite literally, married to the mob.
Hot, Quick & Dirty: 12 Steamy Short Stories (Quickies Series)
Eddie Cleveland - 2017
Every few weeks, they shared their deepest romantic dreams and naughtiest fantasies to him, and he gave them a free story, written just for them. Now you can get a peek under the covers and see what happens when a romance author writes your deepest desires. If you would like to have your fantasies written in future stories, join our group here -> https://www.facebook.com/groups/13169...
The Sum Of All Sins
Mark Sennen - 2018
A terrible secret. A shocking murder.Catherine and her husband move from London to a remote farm in Devon, hoping to forget their troubles and make a fresh start, but escaping the past isn't always so easy. When Catherine discovers her husband has been keeping a secret from her, and a friend turns up desperate for help, she is soon regretting ever leaving the bright lights of the city behind.
Mafiaboy: How I Cracked The Internet And Why Its Still Broken
Michael Calce - 2008
After 2 months and hundreds of hours of wiretapping, the FBI and RCMP staged a late-night raid to apprehend the most wanted man in cyberspace—a 15-year-old kid, Mafiaboy. 8 years later, Mafiaboy, a.k.a.Michael Calce, has ignored requests from every major media outlet in North America and has not told a word of his story—until now. Using his experience as a cautionary tale, Calce takes the reader through the history of hacking and how it has helped make the internet the new frontier for crime in the 21st century.
Backtrack 5 Wireless Penetration Testing Beginner's Guide
Vivek Ramachandran - 2011
Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.
The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick - 2001
Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Awakening Your Psychic Powers: Open Your Inner Mind And Control Your Psychic Intuition Today
Henry Reed - 1988
Now you can harness the power of your inborn psychic awareness.In his lifetime, American visionary Edgar Cayce introduced thousands to the wonders of psychic awareness. Now his carefully preserved writings are illuminated by well-known psychologist Henry Reed, Ph.D. In the words and spirit of Edgar Cayce, this guide will give you the knowledge you need to build a foundation for ESP and unlock the secrets of heightened awareness, including:-Psychic sensitivity-a natural part of perception-Exercises to develop your psychic intuition-Experimenting with clairvoyance, telepathic suggestion, and open channeling-Meditation and recognizing the patterns that can change your life
The Closing Bid
Elle Wright - 2019
When she requests his presence at her neighborhood bachelor auction, he agrees—under one condition. His participation must be kept under wraps. He may be one of the best “closers” in the league, but the last thing he needs is a media circus. Unfortunately, the persistent woman who wins his company is a reporter. She stands for everything he tries to avoid, but their instant connection and her undeniable beauty are slowly breaking through his exterior whether he likes it or not. One night, one goal. That’s all sports journalist Ashton Joy (A.J.) Cook needs to land the exclusive interview of her dreams. She’s worked overtime to earn respect and interviewing the mysterious baseball player is an opportunity too delicious to pass up. Using her sly reporter skills, A.J. arranges the auction’s winning bid for Christian. Yet, the man behind the legend is infuriating in more ways than one. Their explosive chemistry is giving her whiplash and soon, A.J. must decide between doing what’s best for her career or following what she feels in her heart.
Streamed to Kill (The Dead Speak Book 3)
Emmy Ellis - 2019
That is, until his psychic aide, Oliver, hears the voice of someone he knows… Who are the women dumped in the stream? Can a female sergeant pull off acting as bait for the killer? David is that killer. After growing up in a dysfunctional household, he has very important reasons for abducting then killing women. With his doll, Sally, by his side, he’s convinced he’ll find the answers he seeks…
Hacking: The Art of Exploitation
Jon Erickson - 2003
This book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.
Cyberpunk Handbook:: The Real Cyberpunk Fakebook
St. Jude - 1995
Jude and R.U. Sirius--consummate insiders and co-founders of the revolutionary Mondo 2000 magazine, and co-authors of Mondo 2000: A User's Guide to the New Edge--both definitive source guides for members of the electronic underground. Includes Cyberpunk cryptic crossword puzzles and a hipness checklist, plus a true/false "final exam."