Book picks similar to
UNIX System Security: A Guide for Users and System Administrators by David A. Curry
shelved
zz-guest-room
andy
computers
Hidden In Plain Sight 10: How To Program A Quantum Computer
Andrew H. Thomas - 2018
This book contains an introduction to quantum mechanics, with complete instructions and videos showing you how to program a real quantum computer, provided by IBM.
How to Break Software: A Practical Guide to Testing
James A. Whittaker - 2002
Instead of relying on a rigid plan, it should be intelligence, insight, experience and a "nose for where the bugs are hiding" that guide testers. This book helps testers develop this insight. The techniques presented here allow testers to go off-script. Full description
Operating System Concepts Essentials
Abraham Silberschatz - 2010
This book covers the core concepts of operating systems without any unnecessary jargon or text. The authors put you on your way to mastering the fundamental concepts of operating systems while you also prepare for today's emerging developments.Covers the core concepts of operating systems Bypasses unnecessary and wordy text or jargon Encourages you to take your operating system knowledge to the next level Prepares you for today's emerging developments in the field of operating systems Operating Systems Concepts Essentials is a soup-to-nuts guide for all things involving operating systems!
The Legend of Mary Death
Loren K. Jones - 2019
Marydyth Shalina Forlan Zel’Karyn was gifted with remarkable speed and reflexes, which she turned into sword skill few could match. Wielding the dragon blood sword, Sang Del Dracl, Marydyth made a name for herself with the Army of Coravia. But it was a name she wasn’t happy with; Mary Death. Marydyth is forced to flee to Evandia and embraces her fate. Now a lady of Evandia, Mary Death retires to a life of leisure in the palace of King Oradan. But retirement is not her fate. Made a Royal Guard in honor of her service to the kingdom, Marydyth continues her legend as a sword instructor. But she is still one of the most deadly swordswomen to have ever lived, and that skill is needed to protect her new king and kingdom. And protect them she will, even unto her own death.
Linux Kernel Development
Robert Love - 2003
The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book:An all-new chapter on kernel data structuresDetails on interrupt handlers and bottom halvesExtended coverage of virtual memory and memory allocationTips on debugging the Linux kernelIn-depth coverage of kernel synchronization and lockingUseful insight into submitting kernel patches and working with the Linux kernel community
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
The Girl in the Box: A Psychological Suspense Novel (A Let Me Go Series Book 1)
Lisa Akers - 2017
After a tumultuous childhood in a broken home, keeping secrets became a way of life for twin sisters: Gabby and Olivia, and their little sister, Emma. They've all got skeletons in their closets; memories locked away never to see the light of day. But after they take divergent paths in life, disaster strikes, and their pasts collide head-on with a mysterious present in this surreal and gripping family drama. The worst has happened, and if they want to find the key to survival and reconciliation, they must learn to let their skeletons out; shake the dust off of them, and maybe even let them dance across the floor. At turns heartbreaking, dark and beautiful, The Girl in the Box explores not only the consequences of secrets--even secrets kept out of fear--but also the courage it takes to speak the truth, to let go, and to survive. Trigger Warning: The content of this novel contains graphic scenes: violence to women, victimization, abduction, and abusePreviously titled: Let Me GoFiction: Psychological Suspense, Family Drama, Stand-Alone (no cliffhangers)
The Lodger
Joanne Ryan - 2022
What could be better, she reasons, than having a lodger who she already knows instead of a total stranger. As they rekindle their friendship, Gina recalls the long ago summer when they spent every day together. Gina believed then that they’d be best friends forever.But Lissa thought differently.With the benefit of hindsight, Gina now realises that Lissa unfriended her in the most brutal way possible. With a growing awareness that Lissa might not be the perfect person she always believed her to be, she’s beginning to wonder if she can even trust her. Because what Lissa wants, Lissa gets. Has she made a mistake by asking Lissa to move in? She thinks that maybe she has, but Lissa makes no secret of the fact that she has no intention of going anywhere....
Silent Winter
Maggie James - 2019
He awakes to find himself in total darkness, naked and chained to the floor. Fed just enough to keep him alive, Drew is unable to identify his captor, or the reason for his incarceration. As reality fades, hallucinations take over. Can Drew escape his prison before madness claims him?Meanwhile Drew's wife, Holly, despairing of ever seeing him again, turns to his brother for comfort. As the worst winter in decades sweeps the UK, she learns of Drew's tragic past. Could his disappearance be connected with that of a prostitute years before?A story of how the mind responds to solitary confinement, 'Silent Winter' examines one man's desperate attempt to survive the unthinkable.
A Day to Survive Boxset
William Stone - 2021
Thirty-six hours have passed since the EMP was detonated, and in that short amount of time, the nation has been transformed—the survivors of the initial attack scramble for food, water, and medical supplies. With thousands already dead, the death toll will continue to rise in the coming days.StaticThe thin thread holding the civilized world together has been severed. Millions of citizens have been thrust into the unknown, breeding fear into the minds and souls of those seeking to survive. Wren Burton, an architect from Chicago, has been engulfed by the chaotic aftermath of an EMP blast. Her family is injured. The enemy is unknown. And help is nowhere to be found.The Coldest NightDuring the coldest winter on record, an EMP sends American back into the Stone Age. Jack and his family find sanctuary in their cabin in a small, remote town, hidden deep in the forest. Little does Jack know the Blizzard will be the least of his problems.
Debbie Macomber's Heart of Texas Series Volume 2: Dr. Texas\Nell's Cowboy\Lone Star Baby
Debbie Macomber - 2014
It's a ranching town in the Texas hill country�and it's a place with a mysterious past. But Promise has a heart of goodness, and everyone here knows what really matters in life. Love, family, community…Now meet the people of Promise.They call her Dr. Texas. She's Jane Dickinson, a newly graduated physician from California who's working at the Promise clinic. They call him Mr. Grouch. Cal Patterson was left at the altar by his out-of-state fiancée, and he's not over it yet. Too bad Jane reminds him so much of the woman he's trying to forget! Dr. TexasNell Bishop, widowed mother of two children, is turning Twin Canyons into a dude ranch. One of her first guests is Travis Grant, a wannabe cowboy, an Easterner known for his books about the West. Nell's kids are crazy about him, and Nell�she could fall for him herself. Except that it's too soon… Nell's CowboyWade McMillen might be a minister, but he's also a man. Is it as a man that he responds to the lovely young woman who shows up in Promise, pregnant and alone? Or as a man of God? Maybe it's both. Amy Thornton hopes to make a new life for herself and her baby, and she needs Reverend McMillen's help. What she wants is the love of a man named Wade. Lone Star Baby
The Heart of Texas. There's no place like it!
Linkers and Loaders
John R. Levine - 1999
But do you know how to use them to their greatest possible advantage? Only now, with the publication of Linkers & Loaders, is there an authoritative book devoted entirely to these deep-seated compile-time and run-time processes. The book begins with a detailed and comparative account of linking and loading that illustrates the differences among various compilers and operating systems. On top of this foundation, the author presents clear practical advice to help you create faster, cleaner code. You'll learn to avoid the pitfalls associated with Windows DLLs, take advantage of the space-saving, performance-improving techniques supported by many modern linkers, make the best use of the UNIX ELF library scheme, and much more. If you're serious about programming, you'll devour this unique guide to one of the field's least understood topics. Linkers & Loaders is also an ideal supplementary text for compiler and operating systems courses.
UNIX System Administration Handbook
Evi Nemeth - 1989
The third edition has been expanded to include "direct from the frontlines" coverage of Red Hat Linux. UNIX System Administration Handbook describes every aspect of system administration - from basic topics to UNIX esoterica - and provides explicit cover of four popular UNIX systems:- Red Hat Linux- Solaris- HP-UX- FreeBSDThis book stresses a practical approach to system administration. It's packed with war stories and pragmatic advice, not just theory and watered-down restatements of the manuals. Difficult subjects such as sendmail, kernel building, and DNS configuration are tackled head-on. Examples are provided for all four versions of UNIX and are drawn from real-life systems - warts and all.
The Ghost: How a California Golden Boy Became America's Most Unlikely-and Elusive- Fugitive
Paige Williams - 2012
He's the prime suspect in the 2004 murder of Keith Palomares, a 25-year-old armored truck guard. Despite the FBI's active investigation, Brown remains at large living among us without a trace. And yet, a faint pulse of his identity surfaces from time to time, haunting the detectives tasked to find him. In the Kindle Single The Ghost, crime writer Paige Williams chronicles the case and draws a portrait of a killer who is as slippery and elusive as he is enigmatic. Jason Derek Brown was raised by a Mormon father who held a high position in the church despite being a known con man. Jason himself was a devout Mormon for years, and maintained his generosity and Southern California charm even as he slid into a life of excessive materialism fueled by theft. Aside from the murder, he has no history of violence. His case is downright perplexing, and Williams captures it from multiple viewpoints in pitch-perfect prose. --Paul Diamond
Physics, Volume 1
Robert Resnick - 1966
The Fourth Edition of volumes 1 and 2 is concerned with mechanics and E&M/Optics. New features include: expanded coverage of classic physics topics, substantial increases in the number of in-text examples which reinforce text exposition, the latest pedagogical and technical advances in the field, numerical analysis, computer-generated graphics, computer projects and much more.