Book picks similar to
Digital Watermarking and Steganography by Ingemar J. Cox
digital-forensics
it
non-fiction
ebook
I Blame the Hormones: A Raw and Honest Account of One Woman's Fight Against Depression (HarperTrue Life - A Short Read)
Caroline Church - 2014
Yet through exploring the correlation between her depressive episodes and the basic elements of female nature, over many years she discovered that what she thought was a mental disorder was actually due to a hormonal imbalance. And the best bit? She learnt what she could do and take to control it.Shocking, vivid, and a must read for women, their partners and healthcare professionals alike, I Blame the Hormones is the uplifting memoir of Caroline’s journey to pull herself through despite all the odds.
Stealing the Network: The Complete Series Collector's Edition, Final Chapter, and DVD: The Complete Series
Johnny Long - 2009
It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one' - from the Foreword to the first "Stealing the Network" book, "How to Own the Box", Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON. For the very first time, the complete "Stealing the Network" epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage! These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass. This book contains all of the material from each of the four books in the "Stealing the Network" series. All of the stories and tech from: "How to Own the Box"; "How to Own a Continent"; "How to Own an Identity"; and, "How to Own a Shadow". Plus: finally - find out how the story ends! The final chapter is here! There is a DVD full of behind the scenes stories and insider info about the making of these cult classics! Now for the first time the entire series is one 1000 plus page book. The DVD contains 20 minutes of behind the scenes footage. Readers will finally learn the fate of 'Knuth' in the much anticipated final chapter.
Beginning Web Programming with HTML, XHTML and CSS
Jon Duckett - 2004
It follows standards-based principles, but also teaches readers ways around problems they are likely to face using (X)HTML.While XHTML is the "current" standard, the book still covers HTML because many people do not yet understand that XHTML is the official successor to HTML, and many readers will still stick with HTML for backward compatibility and simpler/informal Web pages that don't require XHTML compliance.The book teaches basic principles of usability and accessibility along the way, to get users into the mode of developing Web pages that will be available to as many viewers as possible from the start. The book also covers the most commonly used programming/scripting language -- JavaScript -- and provides readers with a roadmap of other Web technologies to learn after mastering this book to add more functionality to their sites.
APIs: A Strategy Guide
Daniel Jacobson - 2011
Salesforce.com (more than 50%) and Twitter (more than 75% fall into this category. Ebay gets more than 8 billion API calls a month. Facebook and Google, have dozens of APIs that enable both free services and e-commerce, get more than 5 billion API calls each day. Other companies like NetFlix have expanded their service of streaming movies over the the web to dozens of devices using API. At peak times, more than 20 percent of all traffic is accounted for by Netflix through its APIs. Companies like Sears and E-Trade are opening up their catalogs and other services to allow developers and entrepreneurs to create new marketing experiences.
Making an API work to create a new channel is not just a matter of technology. An API must be considered in terms of business strategy, marketing, and operations as well as the technical aspects of programming. This book, written by Greg Brail, CTO of Apigee, and Brian Mulloy, VP of Products, captures the knowledge of all these areas gained by Apigee, the leading company in supporting the rollout of high traffic APIs.
The River Is Home
Patrick D. Smith - 2012
It is the story of Skeeter, a young boy growing up in a family poor in material goods but rich in the appreciation of their natural surroundings. The river they live on is the source of life—and death.
101 Dumb Emergency Calls
Stuart Gray - 2013
Mostly from the USA and UK, they bring into sharp focus the extent of the abuse of our critical life-saving services.With cartoons to depict calls and hyperlinks to take the reader to the original audio (some of them released in the public domain by the police and ambulance services in order to show the world how badly a minority of individuals will misuse valuable resources), this book promises to amuse and shock every right-minded person who understands what these services are here for.The author and illustrator are professional front line paramedics, so they know a thing or two about the subject; and from calls to the police for directions to 999 rants about the lack of buses, they have experienced their fair share of such stupidity.You won't believe some of the calls that have been made in the name of personal crisis. You simply won't believe what some people think is an emergency!
Wake Up! How starting your day at 5 a.m. will change your life
Eliott Reich - 2013
This book will show you what successful early risers do once they are up and teach you step-by-step how you can become an early riser.
El Infierno: Drugs, Gangs, Riots and Murder: My time inside Ecuador’s toughest prisons
Pieter Tritton - 2017
I hurled myself through the doorway and into the room. I didn’t look back.”Caught in an Ecuador hotel room with 8kg of cocaine, Pieter Tritton was no mule or dupe. He had planned and organised everything. The consequence: a 12-year sentence inside one of the world’s deadliest prison systems, where gun fights, executions and riots are a part of everyday life. As a Brit banged up abroad, Pieter had to learn how to survive – and fast – because one wrong move would mean death.This is the insider account of what it’s like to live in a place worse than hell and come out a changed man on the other side.
When My Mind Wanders It Brings Back Souvenirs
Gordon Kirkland - 2005
Kirkland is a master at finding the small hidden bits of humor in events that the rest of us might just as easily overlook. His goal with his writing has always been to let his readers laugh with him and at him, and by doing so, finding a way to laugh at themselves. His previous books have been called "a must-have for all of us who love to just sit back and laugh." This book follows that tradition.Recipient of the 2006 Stephen Leacock Award of Merit for Humour (Canada.)
Learning React Native: Building Native Mobile Apps with JavaScript
Bonnie Eisenman - 2016
With this hands-on guide, you'll learn how to build applications that target iOS, Android, and other mobile platforms instead of browsers. You'll also discover how to access platform features such as the camera, user location, and local storage.With code examples and step-by-step instructions, author Bonnie Eisenman shows web developers and frontend engineers how to build and style interfaces, use mobile components, and debug and deploy apps. Along the way, you'll build several increasingly sophisticated sample apps with React Native before putting everything together at the end.Learn how React Native provides an interface to native UI componentsExamine how the framework uses native components analogous to HTML elementsCreate and style your own React Native components and applicationsInstall modules for APIs and features not supported by the frameworkGet tools for debugging your code, and for handling issues outside of JavaScriptPut it all together with the Zebreto effective-memorization flashcard appDeploy apps to the iOS App Store and Google's Play Store
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Managing the Testing Process: Practical Tools and Techniques for Managing Hardware and Software Testing
Rex Black - 1999
The preeminent expert in his field, Mr.Black draws upon years of experience as president of both theInternational and American Software Testing Qualifications boardsto offer this extensive resource of all the standards, methods, andtools you'll need.The book covers core testing concepts and thoroughly examinesthe best test management practices and tools of leading hardwareand software vendors. Step-by-step guidelines and real-worldscenarios help you follow all necessary processes and avoidmistakes.Producing high-quality computer hardware and software requirescareful, professional testing; Managing the Testing Process, Third Edition explains how to achieve that by following adisciplined set of carefully managed and monitored practices andprocessesThe book covers all standards, methods, and tools you need forprojects large and smallPresents the business case for testing products and reviews theauthor's latest test assessmentsTopics include agile testing methods, risk-based testing, IEEEstandards, ISTQB certification, distributed and outsourced testing, and moreOver 100 pages of new material and case studies have been addedto this new editionIf you're responsible for managing testing in the real world, Managing the Testing Process, Third Edition is the valuablereference and guide you need.
Black Hat Python: Python Programming for Hackers and Pentesters
Justin Seitz - 2014
But just how does the magic happen?In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:Create a trojan command-and-control using GitHubDetect sandboxing and automate common malware tasks, like keylogging and screenshottingEscalate Windows privileges with creative process controlUse offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machineExtend the popular Burp Suite web-hacking toolAbuse Windows COM automation to perform a man-in-the-browser attackExfiltrate data from a network most sneakilyInsider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python."
Bug Out Bag
Miles Bennett - 2013
This book (written specifically for the novice) will change that by teaching you what you need to have ready-to-go in a Bug Out Bag to keep you and your loved ones alive for seventy-two hours until help arrives.Bug Out Bag ContentsThe problem I found with current Bug Out Bag books is the contents suggested are not needed or are outdated. For instance, some will tell you to have change available so you can use a pay phone.When is the last time you even saw a pay phone?Others will advise jamming a bag full of stuff like snares, axes and other items that really belong in a survival kit, not a Bug Out Bag...A bug-out bag is a portable kit that contains the items one would require to survive for seventy-two hours when evacuating from a disaster. It is also known as a 72-hour kit, a grab bag, a battle box, and other popular names include "Personal Emergency Relocation Kits" (PERKs) GO Bag and GOOD (Get Out Of Dodge) bag. The focus is on evacuation, rather than long-term survival, distinguishing the bug-out bag from a survival kit, a boating or aviation emergency kit, or a fixed-site disaster supplies kit. - WikipediaThis book is not a survival book, nor is it a book for seasoned disaster preparedness "pros"; it is a book that show's anyone wanting to build a Bug Out Bag EXACTLY what you need to have in your bag to wait it out until help comes.The Right StuffYou see, the key to a functional Bug Out Bag is having the right items while keeping the bag manageable. After all, if your bag weighs 60 pounds what are the odds you will be able to grab it and take shelter in an emergency?Bug Out Bag contains the essential items necessary to sustain life but as a bonus I also include Nice To Have items if you want to enhance your bag's contents and don't mind the extra bulk.Don't get caught like I did years ago when vandals sawed through power lines causing my family to be without electricity and water for two days.Buy this book now and get your family prepared!