Book picks similar to
AWS Security Best Practices (AWS Whitepaper) by Amazon Web Services
aws
tech
cybersecurity
computer-security
Cypherpunks: Freedom and the Future of the Internet
Julian Assange - 2012
Julian Assange, the editor-in-chief of and visionary behind WikiLeaks, has been a leading voice in the cypherpunk movement since its inception in the 1980s.Now, in what is sure to be a wave-making new book, Assange brings together a small group of cutting-edge thinkers and activists from the front line of the battle for cyber-space to discuss whether electronic communications will emancipate or enslave us. Among the topics addressed are: Do Facebook and Google constitute "the greatest surveillance machine that ever existed," perpetually tracking our location, our contacts and our lives? Far from being victims of that surveillance, are most of us willing collaborators? Are there legitimate forms of surveillance, for instance in relation to the "Four Horsemen of the Infopocalypse" (money laundering, drugs, terrorism and pornography)? And do we have the ability, through conscious action and technological savvy, to resist this tide and secure a world where freedom is something which the Internet helps bring about?The harassment of WikiLeaks and other Internet activists, together with attempts to introduce anti-file sharing legislation such as SOPA and ACTA, indicate that the politics of the Internet have reached a crossroads. In one direction lies a future that guarantees, in the watchwords of the cypherpunks, "privacy for the weak and transparency for the powerful"; in the other lies an Internet that allows government and large corporations to discover ever more about internet users while hiding their own activities. Assange and his co-discussants unpick the complex issues surrounding this crucial choice with clarity and engaging enthusiasm.
Building Evolutionary Architectures: Support Constant Change
Neal Ford - 2017
Over the past few years, incremental developments in core engineering practices for software development have created the foundations for rethinking how architecture changes over time, along with ways to protect important architectural characteristics as it evolves. This practical guide ties those parts together with a new way to think about architecture and time.
Chaos Engineering
Casey Rosenthal - 2017
You’ll never be able to prevent all possible failure modes, but you can identify many of the weaknesses in your system before they’re triggered by these events. This report introduces you to Chaos Engineering, a method of experimenting on infrastructure that lets you expose weaknesses before they become a real problem.Members of the Netflix team that developed Chaos Engineering explain how to apply these principles to your own system. By introducing controlled experiments, you’ll learn how emergent behavior from component interactions can cause your system to drift into an unsafe, chaotic state.- Hypothesize about steady state by collecting data on the health of the system- Vary real-world events by turning off a server to simulate regional failures- Run your experiments as close to the production environment as possible- Ramp up your experiment by automating it to run continuously- Minimize the effects of your experiments to keep from blowing everything up- Learn the process for designing chaos engineering experiments- Use the Chaos Maturity Model to map the state of your chaos program, including realistic goals
Silent Sales Machine 9.0: Your Comprehensive Proven Guide to Multiple Streams of Online Income
Jim Cockrum - 2015
Your purchase includes full audio (as ready by the author with bonus commentary & content) as well as Jim's top selling email marketing course which normally sells for $97! As one of the most read Internet business success authors of all time, Jim is committed to keeping his flagship book up to date and always full of the most cutting edge ideas. Multiple online business strategies are documented as the author advises everyone from "newbies" to seasoned professionals on what DOES and DOESN'T work in the world on online business and Internet marketing RIGHT NOW. The reader will learn to establish multiple automated income streams using proven, creative concepts with numerous examples of successful application given throughout the book. Topics covered include; Selling on Amazon.com, creative uses of eBay, finding and growing a loyal audience online, social marketing, automating your online efforts, effective email marketing and multiple real life success stories from his ever growing audience of creative and successful online entrepreneurs. BONUS: Buyers get full free access to Jim's $97 email marketing course (see chapter 3 for the link!) BONUS 2: Full audio of the book as read by the author!
Social Engineering: The Art of Human Hacking
Christopher Hadnagy - 2010
Mitnick claims that this socialengineering tactic was the single-most effective method in hisarsenal. This indispensable book examines a variety of maneuversthat are aimed at deceiving unsuspecting victims, while it alsoaddresses ways to prevent social engineering threats.Examines social engineering, the science of influencing atarget to perform a desired task or divulge informationArms you with invaluable information about the many methods oftrickery that hackers use in order to gather information with theintent of executing identity theft, fraud, or gaining computersystem accessReveals vital steps for preventing social engineeringthreatsSocial Engineering: The Art of Human Hacking does itspart to prepare you against nefarious hackers--now you can doyour part by putting to good use the critical information withinits pages.
Black Squadron
Michael Stephen Fuchs - 2021
engagement from the invasion of Sicily to Black Hawk Down. The Rangers are upright, loyal, and never leave their brothers behind.But now the Rangers may be the only ones who can stop a rogue Black Squadron from leaving everyone bleeding out in the street – and also kicking off a shooting war between two nuclear powers.It’s Black Hawk Down meets Training Day in this explosive collision of two legendary special-operations units battling to survive and prevail in the most dangerous city on the planet.
MAYA: Symbiogenesis Book One
Pete Barber - 2016
The last-resort treatment transforms Maya's genetic fingerprint. While Lauren struggles to disguise the reason for her daughter's miraculous recovery, Maya develops unique abilities that may signal a new, more hope-filled future for humankind, or perhaps sound its death knell.
Cyberwar: The Next Threat to National Security & What to Do About It
Richard A. Clarke - 2010
Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.
100 Things Every Designer Needs to Know about People
Susan M. Weinschenk - 2011
We want them to buy something, read more, or take action of some kind. Designing without understanding what makes people act the way they do is like exploring a new city without a map: results will be haphazard, confusing, and inefficient. This book combines real science and research with practical examples to deliver a guide every designer needs. With it you'll be able to design more intuitive and engaging work for print, websites, applications, and products that matches the way people think, work, and play.Learn to increase the effectiveness, conversion rates, and usability of your own design projects by finding the answers to questions such as: What grabs and holds attention on a page or screen?What makes memories stick?What is more important, peripheral or central vision?How can you predict the types of errors that people will make?What is the limit to someone's social circle?How do you motivate people to continue on to (the next step?What line length for text is best?Are some fonts better than others? These are just a few of the questions that the book answers in its deep-dive exploration of what makes people tick.
Australian Serial Killers
Gordon Kerr - 2011
That all changed when Eric Edgar Cooke launched his one-man crime wave, a spree of senseless killing that shocked Perth, changing the city and its inhabitants forever. Read the horrific account of Cooke's killings as well as the stories of many other Australian serial killers – doing it because they had the urge and ... because they enjoyed it too much to stop. Contents: Eric Edgar Cooke, William the Mutilator Macdonald, Paul Charles Denyer, Ivan Milat, The Snowtown Murderers, John Wayne Glover, Peter Dupas, Catherine and David Birnie
File System Forensic Analysis
Brian Carrier - 2005
Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed. Carrier begins with an overview of investigation and computer foundations and then gives an authoritative, comprehensive, and illustrated overview of contemporary volume and file systems: Crucial information for discovering hidden evidence, recovering deleted data, and validating your tools. Along the way, he describes data structures, analyzes example disk images, provides advanced investigation scenarios, and uses today's most valuable open source file system analysis tools--including tools he personally developed. Coverage includes Preserving the digital crime scene and duplicating hard disks for dead analysis Identifying hidden data on a disk's Host Protected Area (HPA) Reading source data: Direct versus BIOS access, dead versus live acquisition, error handling, and more Analyzing DOS, Apple, and GPT partitions; BSD disk labels; and Sun Volume Table of Contents using key concepts, data structures, and specific techniques Analyzing the contents of multiple disk volumes, such as RAID and disk spanning Analyzing FAT, NTFS, Ext2, Ext3, UFS1, and UFS2 file systems using key concepts, data structures, and specific techniques Finding evidence: File metadata, recovery of deleted files, data hiding locations, and more Using The Sleuth Kit (TSK), Autopsy Forensic Browser, and related open source tools When it comes to file system analysis, no other book offers this much detail or expertise. Whether you're a digital forensics specialist, incident response team member, law enforcement officer, corporate security specialist, or auditor, this book will become an indispensable resource for forensic investigations, no matter what analysis tools you use.
Almost Perfect: How a Bunch of Regular Guys Built WordPerfect Corporation
W.E. Pete Peterson - 1993
A former executive at the WordPerfect Corporation details the company's rise in the computer industry and what compelled him to leave after ten years as a driving force in the company.
Cracking the Coding Interview: 150 Programming Questions and Solutions
Gayle Laakmann McDowell - 2008
This is a deeply technical book and focuses on the software engineering skills to ace your interview. The book is over 500 pages and includes 150 programming interview questions and answers, as well as other advice.The full list of topics are as follows:The Interview ProcessThis section offers an overview on questions are selected and how you will be evaluated. What happens when you get a question wrong? When should you start preparing, and how? What language should you use? All these questions and more are answered.Behind the ScenesLearn what happens behind the scenes during your interview, how decisions really get made, who you interview with, and what they ask you. Companies covered include Google, Amazon, Yahoo, Microsoft, Apple and Facebook.Special SituationsThis section explains the process for experience candidates, Program Managers, Dev Managers, Testers / SDETs, and more. Learn what your interviewers are looking for and how much code you need to know.Before the InterviewIn order to ace the interview, you first need to get an interview. This section describes what a software engineer's resume should look like and what you should be doing well before your interview.Behavioral PreparationAlthough most of a software engineering interview will be technical, behavioral questions matter too. This section covers how to prepare for behavioral questions and how to give strong, structured responses.Technical Questions (+ 5 Algorithm Approaches)This section covers how to prepare for technical questions (without wasting your time) and teaches actionable ways to solve the trickiest algorithm problems. It also teaches you what exactly "good coding" is when it comes to an interview.150 Programming Questions and AnswersThis section forms the bulk of the book. Each section opens with a discussion of the core knowledge and strategies to tackle this type of question, diving into exactly how you break down and solve it. Topics covered include• Arrays and Strings• Linked Lists• Stacks and Queues• Trees and Graphs• Bit Manipulation• Brain Teasers• Mathematics and Probability• Object-Oriented Design• Recursion and Dynamic Programming• Sorting and Searching• Scalability and Memory Limits• Testing• C and C++• Java• Databases• Threads and LocksFor the widest degree of readability, the solutions are almost entirely written with Java (with the exception of C / C++ questions). A link is provided with the book so that you can download, compile, and play with the solutions yourself.Changes from the Fourth Edition: The fifth edition includes over 200 pages of new content, bringing the book from 300 pages to over 500 pages. Major revisions were done to almost every solution, including a number of alternate solutions added. The introductory chapters were massively expanded, as were the opening of each of the chapters under Technical Questions. In addition, 24 new questions were added.Cracking the Coding Interview, Fifth Edition is the most expansive, detailed guide on how to ace your software development / programming interviews.
The Practice of Network Security Monitoring: Understanding Incident Detection and Response
Richard Bejtlich - 2013
The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks — no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools.You'll learn how to:Determine where to deploy NSM platforms, and size them for the monitored networks Deploy stand-alone or distributed NSM installations Use command line and graphical packet analysis tools, and NSM consoles Interpret network evidence from server-side and client-side intrusions Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.
Hannah And The Gnome
Melinda Smart - 2014
This picture book is packed with beautiful illustrations and is intended for little ones looking to read a book by their self for the very first time! Children's Book: Hannah And The Gnome for bedtime reading for children from 2-5, as well as independent reading for children 6-8 years. Do your children like beautiful picture books? Hannah And The Gnome is a sweet children's book written especially for you and your aged 2-8 children. The story is suitable as a read aloud book for preschoolers or a self-read book for beginner readers. Download your copy today! Take action today and download this book for a limited time discount! Tags: kids books, kids kindle books, kids kindle books, childrens books, childrens books for kindle free, childrens books by age 5-8, childrens books by age 9-12, kids reading, kids picture book, kids picture books free, childrens stories, childrens books for kindle free, childrens picture books, childrens picture books for kindle, childrens learning books, children book free, children book funny, children book series, children book collection, children book kindle unlimited, children book illustration, bedtime story books for kids by all ages, bedtime story preschool, bedtime story book, bedtime story free, bedtime story collection, kids poetry, beginner readers, beginner readers free, beginner readers children's books collection, bedtime story, values, growing up, friendship, illustration books, illustration for kids, fairy tales, fairy tales every child should know, fairy tales for kids, fairy tales for children, fairy tales for adults, fairy tales romance, fairy tales every child should know kindle edition, fairy tales every child should know free