Book picks similar to
Mastering Windows Network Forensics and Investigation by Scott Pearson
security
technical-books
webdev
digital-forensics
Augmented
Anthony James - 2018
Deep underground, something waits. It’s hostile and immune to every known weapon. Its arrival threatens much more than this single planet. What begins as a standard in-out mission leads to warfare on a galactic scale and a confrontation between two well-armed fleets. Keller is the best spaceship pilot in the Corps and Nation has his own unique skills. They’re going to have a hard time turning this situation into a positive. Augmented is a high-action science fiction adventure involving massive space battles, overwhelming odds and new technologies. It is the first book in the Transcended series. Book 2: Fleet Vanguard is available now.
Tor and The Dark Net: Remain Anonymous Online and Evade NSA Spying (Tor, Dark Net, Anonymous Online, NSA Spying)
James Smith - 2016
Some may know and choose to ignore the fact, but every single thing you do online is being tracked and guess what? For better or for worse it is there forever. Whether you're simply browsing websites or you are accessing confidential information that you would rather no one know about there are ways to remain anonymous. Imagine this scenario, you create an account on a forum with your name and decide to do some political freedom fighting with it. Years down the road a future employer of yours does a simple google search of your name and finds everything you've ever done. They don't hire you. This is a very simple scenario that just scratches the surface of reasons to stay anonymous but the point remains the same. Knowing when and how to remain anonymous is very important. Many people already realize this but have no clue where to start. This book has step by step instructions and techniques involving Tor, VPN's, Proxies, and more that will take you to the deepest levels of anonymity in which not even the all seeing NSA will be able to track you. Bonus download included in the book! (Step-by-step guide to setup TOR) A Preview of What You Will Learn ✔ How to Remain COMPLETELY Anonymous ✔ Exactly What Tor, VPN's, and PGP Are. ✔ How To Setup and Use Tor Correctly For Maximum Safety ✔ Key Mistakes To Avoid ✔ The Real Capabilities of The NSA ✔ Much, much more! Take back your privacy today. Scroll up and buy this book!
Founder’s Pocket Guide: Startup Valuation (Founder's Pocket Guide Book 1)
Stephen Poland - 2014
This guide provides a quick reference to all of the key topics around early-stage startup valuation and provides step-by-step examples for several valuation methods. In more detail, this Founder’s Pocket Guide helps startup founders learn: What a startup valuation is and when you need to start worrying about it. Key terms and definitions associated with valuation, such as pre-money, post-money, and dilution. How investors view the valuation task, and what their expectations are for early-stage companies. How the valuation fits with your target raise amount and resulting founder equity ownership. How to do the simple math for calculating valuation percentages. How to estimate your company valuation using several accepted methods. What accounting valuation methods are and why they are not well suited for early-stage startups.
The Delicate Art of Bureaucracy: Digital Transformation with the Monkey, the Razor, and the Sumo Wrestler
Mark Schwartz - 2020
Through humor, a healthy dose of history and philosophy, and real-life examples from his days as a government bureaucrat, Schwartz shows IT leaders (and the whole of business) how to master the arts of the Monkey, the Razor, and the Sumo Wrestler to create a lean, learning, and enabling bureaucracy. For anyone frustrated by roadblocks, irritated you can't move fast enough, suffering under the weight of crushing procedures, this book is for you. No matter your role, you need a playbook for bureaucracy. This is it. With this playbook, you can wield bureaucracy as a superpower and bust through it at the same time.
The Rails 3 Way
Obie Fernandez - 2010
"The Rails(TM) 3 Way"is the only comprehensive, authoritative guide to delivering production-quality code with Rails 3. Pioneering Rails expert Obie Fernandez and a team of leading experts illuminate the entire Rails 3 API, along with the idioms, design approaches, and libraries that make developing applications with Rails so powerful. Drawing on their unsurpassed experience and track record, they address the real challenges development teams face, showing how to use Rails 3 to maximize your productivity. Using numerous detailed code examples, the author systematically covers Rails 3 key capabilities and subsystems, making this book a reference that you will turn to again and again. He presents advanced Rails programming techniques that have been proven effective in day-to-day usage on dozens of production Rails systems and offers important insights into behavior-driven development and production considerations such as scalability. Dive deep into the Rails 3 codebase and discover why Rails is designed the way it is--and how to make it do what you want it to do.This book will help youLearn what's new in Rails 3 Increase your productivity as a web application developer Realize the overall joy in programming with Rails Leverage Rails' powerful capabilities for building REST-compliant APIs Drive implementation and protect long-term maintainability using RSpec Design and manipulate your domain layer using Active Record Understand and program complex program flows using Action Controller Master sophisticated URL routing concepts Use Ajax techniques via Rails 3 support for unobtrusive JavaScript Learn to extend Rails with popular gems and plugins, and how to write your own Extend Rails with the best third-party plug-ins and write your own Integrate email services into your applications with Action Mailer Improve application responsiveness with background processing Create your own non-Active Record domain classes using Active Model Master Rails' utility classes and extensions in Active Support
Ghost in the Wires: My Adventures as the World's Most Wanted Hacker
Kevin D. Mitnick - 2011
While other nerds were fumbling with password possibilities, this adept break-artist was penetrating the digital secrets of Sun Microsystems, Digital Equipment Corporation, Nokia, Motorola, Pacific Bell, and other mammoth enterprises. His Ghost in the Wires memoir paints an action portrait of a plucky loner motivated by a passion for trickery, not material game. (P.S. Mitnick's capers have already been the subject of two books and a movie. This first-person account is the most comprehensive to date.)
The Deal of the Century: The Breakup of AT&T
Steve Coll - 1986
Over the following decade, an army of lawyers, executives, politicians, and judges spent countless hours clashing over what amounted to the biggest corporate breakup in American history. From boardroom to courtroom, Steve Coll untangles the myriad threads of this complex and critical case and gives readers “an excellent behind-the-scenes look” at the human drama involved in the remaking of an entire industry (The Philadelphia Inquirer). Hailed by the New York Times Book Review as “rich, intricate and convincing,” The Deal of the Century is the definitive narrative of a momentous turning point in the way America does business. A New York Times–bestselling author’s “superbly reported” account of the dismantling of the world’s largest corporation (The Washington Post). Written by the two-time Pulitzer Prize–winning author of Ghost Wars and Private Empire, The Deal of the Century chronicles the decade-long war for control of AT&T.
Meditation for Warriors
Loren W. Christensen - 2013
Nor do you need to burn incense or rub crystals.This book shows you easy ways to meditate whenever and wherever you want—you’ll learn how to do it without anyone knowing—and still hang out with your military pals, cop buddies, and fellow martial arts students. You can still own a pit bull, drive a Harley, and share lies with your drinking buddies. The same is true whether you’re a firefighter, doorman, bodyguard, medic, or security officer. The simple fact is, meditation as taught within these pages, will make you a better warrior.
Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World
Joel Brenner - 2011
He saw at close range the battleground on which adversaries are attacking us: cyberspace.Like the rest of us, governments and corporations inhabit “glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can—and cannot—do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.
Programming Windows 8 Apps with HTML, CSS, and JavaScript
Kraig Brockschmidt - 2012
Exam Ref 70-486: Developing ASP.NET MVC 4 Web Applications
William Penberthy - 2013
Designed for experienced developers ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Specialist level.Focus on the expertise measured by these objectives:Design the application architectureDesign the user experienceDevelop the user experienceTroubleshoot and debug web applicationsDesign and implement securityThis Microsoft Exam Ref:Organizes its coverage by exam objectives.Features strategic, what-if scenarios to challenge you.Includes a 15% exam discount from Microsoft. (Limited time offer)
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon
Kim Zetter - 2014
The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.
Android Hacker's Handbook
Joshua J. Drake - 2013
Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
The Future of Almost Everything: The global changes that will affect every business and all our lives
Patrick Dixon - 2015
In short, with great perception and insight, Patrick Dixon highlights the risks that a future-proof business needs to be aware of, and what to prepare for if it is to prosper and survive in a world where customers and markets, politics and demographics, technology and skills, and opportunities and choices will be very different.