Fundamentals of Digital Image Processing


Anil K. Jain - 1988
    Includes a comprehensive chapter on stochastic models for digital image processing. Covers aspects of image representation including luminance, color, spatial and temporal properties of vision, and digitization. Explores various image processing techniques. Discusses algorithm development (software/firmware) for image transforms, enhancement, reconstruction, and image coding.

Kotlin for Android Developers: Learn Kotlin the easy way while developing an Android App


Antonio Leiva - 2016
    

CEH Certified Ethical Hacker Study Guide


Kimberly Graves - 2010
    That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this important area with this advanced study guide that covers all exam objectives for the challenging CEH Certified Ethical Hackers exam. The book provides full coverage of exam topics, real-world examples, and a CD with additional materials for extra review and practice. Covers ethics and legal issues, footprinting, scanning, enumeration, system hacking, trojans and backdoors, sniffers, denial of service, social engineering, session hijacking, hacking Web servers, Web application vulnerabilities, and more Walks you through exam topics and includes plenty of real-world scenarios to help reinforce concepts Includes a CD with review questions, bonus exams, and more study tools This is the ideal guide to prepare you for the new CEH certification exam. Reviews

Security+ Guide to Network Security Fundamentals


Mark Ciampa - 2004
    The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.

CCNA Portable Command Guide


Scott D. Empson - 2005
    The 'CCNA Portable Command Guide' is a supplementary guide to assist network administrators in the proper use of the Cisco IOS and of the commands needed to pass the CCNA vendor exam.

C for Dummies


Dan Gookin - 1997
    Actually, it's computer sense--C programming. After digesting C For Dummies, 2nd Edition, you'll understand it. C programs are fast, concise and versatile. They let you boss your computer around for a change. So turn on your computer, get a free compiler and editor (the book tells you where), pull up a chair, and get going. You won't have to go far (page 13) to find your first program example. You'll do short, totally manageable, hands-on exercises to help you make sense of:All 32 keywords in the C language (that's right--just 32 words) The functions--several dozen of them Terms like printf(), scanf(), gets (), and puts () String variables, numeric variables, and constants Looping and implementation Floating-point values In case those terms are almost as intimidating as the idea of programming, be reassured that C For Dummies was written by Dan Gookin, bestselling author of DOS For Dummies, the book that started the whole library. So instead of using expletives and getting headaches, you'll be using newly acquired skills and getting occasional chuckles as you discover how to:Design and develop programs Add comments (like post-it-notes to yourself) as you go Link code to create executable programs Debug and deploy your programs Use lint, a common tool to examine and optimize your code A helpful, tear-out cheat sheet is a quick reference for comparison symbols, conversion characters, mathematical doodads, C numeric data types, and more. C For Dummies takes the mystery out of programming and gets you into it quickly and painlessly.

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics


John Sammons - 2011
    This book teaches you how to conduct examinations by explaining what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Readers will also learn how to collect evidence, document the scene, and recover deleted data. This is the only resource your students need to get a jump-start into digital forensics investigations.This book is organized into 11 chapters. After an introduction to the basics of digital forensics, the book proceeds with a discussion of key technical concepts. Succeeding chapters cover labs and tools; collecting evidence; Windows system artifacts; anti-forensics; Internet and email; network forensics; and mobile device forensics. The book concludes by outlining challenges and concerns associated with digital forensics. PowerPoint lecture slides are also available.This book will be a valuable resource for entry-level digital forensics professionals as well as those in complimentary fields including law enforcement, legal, and general information security.

Backtrack 5 Wireless Penetration Testing Beginner's Guide


Vivek Ramachandran - 2011
    Every new attack is described in the form of a lab exercise with rich illustrations of all the steps associated. You will practically implement various attacks as you go along. If you are an IT security professional or a security consultant who wants to get started with wireless testing with Backtrack, or just plain inquisitive about wireless security and hacking, then this book is for you. The book assumes that you have familiarity with Backtrack and basic wireless concepts.

McIntyre Security Bodyguard Series - Box Set 1


April Wilson - 2017
     Book 1: Vulnerable Beth Jamison had a rough start in life. She survived a childhood abduction, but her emotionally traumatic past still haunts her, and she suffers from anxiety and issues with intimacy. She doesn't know it, but the man who kidnapped her has just been released early from prison. Now she has secret bodyguards keeping her safe 24/7. When CEO Shane McIntyre meets Beth, their mutual attraction is instant and intense, and Shane falls hard for Beth. Shane has his work cut out for him if he’s going to gain her trust before it’s too late. This alpha protector is determined to keep Beth safe and make her his. Book 2: Fearless Beth Jamison - Since childhood, I’ve lived under a shadow of fear and anxiety, afraid to trust anyone. All that changed when I met Shane. He's my lover, my protector, and my best friend. He's also my avenger. He taught me to cope with my fears. He gave me the courage to let someone in. But the threat’s still out there, and it’s coming back for me. I know Shane won’t let him get me this time, but at what cost? I can’t lose Shane. I just can’t. Book 2.5: Shane (a novella) Shane is a 26,000-word novella that retells the ending of Fearless from Shane's point of view, plus some additional material. Shane McIntyre will do anything to protect the love of his life. Even kill a monster. When convicted kidnapper Howard Kline comes after Beth Jamison to exact revenge for his two decades spent in prison, Shane will be waiting for him, ready to put an end to Beth's nightmare once and for all. Book 3: Broken Lia McIntyre - As a 22-year-old female professional bodyguard, Lia’s a rarity in a male-dominated field. She may be a petite, cute blond, but she’s a master of martial arts and Krav Maga, and she can render a man twice her size unconscious in just seconds. Lia hides a painful past behind a snarky, take-no-prisoners attitude. She was horribly betrayed by her first love, and she’s determined never to let anyone use her or hurt her again. To make sure that never happens again, she’s got rules. One, never sleep with a client. And two, never sleep with the same guy twice. The walls she’s built up to protect herself are rock solid. Until she meets her new client, Jonah Locke, a swoon-worthy rock star with a heart of gold. Jonah Locke - Jonah Locke is the front man for the most popular rock band in the United States. His band dominates the charts, and he’s constantly hounded by crowds of fan-girls and paparazzi. The guy can’t sneeze without everyone on social media knowing. A bad break-up with the Queen of Pop sends him from LA to Chicago, where he just wants to lie low and write new songs. Unfortunately, trouble follows him to Chicago. When he meets his new bodyguard, he falls hard for her. But lust transforms into something more when he gets to know the woman beneath the kick-ass shell.

Network Security: Private Communication in a Public World


Charlie Kaufman - 1995
    In the second edition of Network Security, this most distinguished of author teams draws on hard-won experience to explain every facet of information security, from the basics to advanced cryptography and authentication; secure Web and email services; and emerging security standards. Highlights of the book's extensive new coverage include Advanced Encryption Standard (AES), IPsec, SSL, PKI Standards, and Web security.

Web Hacking 101


Peter Yaworski
    With few exceptions, existing books are overly technical, only dedicate a single chapter to website vulnerabilities or don't include any real world examples. This book is different.Using publicly disclosed vulnerabilities, Web Hacking 101 explains common web vulnerabilities and will show you how to start finding vulnerabilities and collecting bounties. With over 30 examples, the book covers topics like:HTML InjectionCross site scripting (XSS)Cross site request forgery (CSRF)Open RedirectsRemote Code Execution (RCE)Application Logicand more...Each example includes a classification of the attack, a report link, the bounty paid, easy to understand description and key takeaways. After reading this book, your eyes will be opened to the wide array of vulnerabilities that exist and you'll likely never look at a website or API the same way.

Brookland Security


Clara Kendrick - 2017
    Lots of suspense, mystery, and romance. No cliffhangers! Protecting Faun When Faun moves away from the big city to start up her very own cafe in the middle of nowhere, she thinks she's left her stalker behind her. Her sister doesn't think so and employs the local security firm to watch over things. When thinks start getting broken and Faun believes she is being watched, she becomes grateful for the steady, confident presence of Randal Brookland, owner of Brookland security. Randal becomes sure that what is hunting Faun isn't human. It's a good thing that he isn't human either. Can this cowboy werewolf protect the woman that he comes to love? Bear Dreams Growing up, Tiffany Bowman wanted for nothing. But she desperately wanted to make a name for herself outside of her father's business of selling artifacts as unique as they are rare. When her father recieves a blackmail note that shows Tiffany is in the cross hairs Orson has to take on the job of keeping her safe. Orson, werebear and former military, can't keep memories of his old unit being taken out at bay. Can he keep the woman he doesn't want to like safe? Can he admit to himself that he is falling for this princess of fashion? In the Eye of the Tiger Leon Nmir loves women, and they love him too, but when prickly detective Eloise Barlow gets under his skin he realizes that no one but her will do. Eloise has no interest in repeating a one night incident with Leon, even when it becomes clear that single night is going to give her nine months of problems, nameless becoming princess of the Nmir Tiger Clan. When a vengeful Oni targets Eloise Leon must put every skill he has as an agent of security to work to keep the woman he is falling in love with safe. Siren's Song All Serena has ever wanted to do was sing. She knows that being a hopeful star comes with risks, and even takes the weird messages she gets after achieving some social media notoriety in stride. But can she handle it when her own strange musical gifts start to awaken? Uther has spent a millennia as a dragon trapped in a human body, with his gifts limited by a witches curse. Will being half the dragon he was be enough to keep the naggingly charming Serena safe while a super fan becomes criminally obsessed? The Raven's Heart When Adelle Harper loses her job as the top CEO of Harper Industries she thinks it's the worst thing that could happen. That is, of course, until someone starts writing strange symbols and leaving dead animals in her upper New York home. Adelle has to turn to biker bad boy Bran Quinn to keep her safe when her life turns from the mundane to the magical. Who is trying to kill her? And can they stop it in time?

Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet


Eoghan Casey - 1999
    Though an increasing number of criminals are using computers and computer networks, few investigators are well-versed in the evidentiary, technical, and legal issues related to digital evidence. As a result, digital evidence is often overlooked, collected incorrectly, and analyzed ineffectively. The aim of this hands-on resource is to educate students and professionals in the law enforcement, forensic science, computer security, and legal communities about digital evidence and computer crime. This work explains how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence. As well as gaining a practical understanding of how computers and networks function and how they can be used as evidence of a crime, readers will learn about relevant legal issues and will be introduced to deductive criminal profiling, a systematic approach to focusing an investigation and understanding criminal motivations. Readers will receive access to the author's accompanying Web site which contains simulated cases that integrate many of the topics covered in the text. Frequently updated, these cases teaching individuals about: • Components of computer networks • Use of computer networks in an investigation • Abuse of computer networks • Privacy and security issues on computer networks • The law as it applies to computer networks• Provides a thorough explanation of how computers and networks function, how they can be involved in crimes, and how they can be used as a source of evidence • Offers readers information about relevant legal issues • Features coverage of the abuse of computer networks and privacy and security issues on computer networks• Free unlimited access to author's Web site which includes numerous and frequently updated case examples

Code: Version 2.0


Lawrence Lessig - 1999
    Harvard Professor Lawrence Lessig warns that, if we're not careful we'll wake up one day to discover that the character of cyberspace has changed from under us. Cyberspace will no longer be a world of relative freedom; instead it will be a world of perfect control where our identities, actions, and desires are monitored, tracked, and analyzed for the latest market research report. Commercial forces will dictate the change, and architecture—the very structure of cyberspace itself—will dictate the form our interactions can and cannot take. Code And Other Laws of Cyberspace is an exciting examination of how the core values of cyberspace as we know it—intellectual property, free speech, and privacy-—are being threatened and what we can do to protect them. Lessig shows how code—the architecture and law of cyberspace—can make a domain, site, or network free or restrictive; how technological architectures influence people's behavior and the values they adopt; and how changes in code can have damaging consequences for individual freedoms. Code is not just for lawyers and policymakers; it is a must-read for everyone concerned with survival of democratic values in the Information Age.

Stealing the Network: How to Own a Shadow


Johnny Long - 2007
    Stealing the Network: How to Own a Shadow is the final book in Syngress ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth. . The final book in the Stealing the Network series will be a must read for the 50,000 readers worldwide of the first three titles . The companion Web site to the book will provide challenging scenarios from the book to allow the reader to track down Knuth . Law enforcement and security professionals will gain practical, technical knowledge for apprehending the most supplicated cyber-adversaries