Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software


Michael Sikorski - 2011
    When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.You'll learn how to:Set up a safe virtual environment to analyze malware Quickly extract network signatures and host-based indicators Use key analysis tools like IDA Pro, OllyDbg, and WinDbg Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques Use your newfound knowledge of Windows internals for malware analysis Develop a methodology for unpacking malware and get practical experience with five of the most popular packers Analyze special cases of malware with shellcode, C++, and 64-bit code Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis.

Disrupt: Think the Unthinkable to Spark Transformation in Your Business


Luke Williams - 2010
    For anyonewho wants to thrive in this new order, this requires a revolution in thinking--a steady stream of disruptive strategies and unexpected solutions. "Disrupt" "Think the Unthinkable to Spark Transformation in Your Business" shows how to generate and execute those solutions--a disruptive approach for a disruptive age. Author Luke Williams demonstrates his experience creating disruptive products and services at frog design, one of the world s leading innovation firms. Williams combines the fluid creativity of "disruptive thinking" with the analytical rigor that is indispensable to business success. The result is a simple yet complete five-stage process for imagining a powerful market disruption and transforming it into reality. Using many examples and a book-length case study of Little Miss Matched, Williams shows how the more unexpected an idea, the smaller the number of competitors, and the more successful the company that brings it to market. He walks through generating a disruptive hypothesis, defining a disruptive market opportunity, creating multiple disruptive ideas, shaping them into an actionable solution, and persuading key stakeholders to adopt or invest in the solution. "Disrupt "offers readers a systematic way to redefine the future of a company, catch entire industries by surprise, and leave competitors scrambling to catch up."

Red Team: How to Succeed By Thinking Like the Enemy


Micah Zenko - 2015
    The concept is as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams are used widely in both the public and the private sector by those seeking to better understand the interests, intentions, and capabilities of institutional rivals. In the right circumstances, red teams can yield impressive results, giving businesses an edge over their competition, poking holes in vital intelligence estimates, and troubleshooting dangerous military missions long before boots are on the ground. But not all red teams are created equal; indeed, some cause more damage than they prevent. Drawing on a fascinating range of case studies, Red Team shows not only how to create and empower red teams, but also what to do with the information they produce. In this vivid, deeply-informed account, national security expert Micah Zenko provides the definitive book on this important strategy -- full of vital insights for decision makers of all kinds.

Negotiating with Backbone: Eight Sales Strategies to Defend Your Price and Value


Reed K. Holden - 2012
    Regardless of their size, industry, country, customer type, nature of the relationship or amount of value they provide, sales professionals are finding that purchasing decisions are increasingly being limited by procurement. The modern procurement function is purchasing on steroids. Where traditional purchasing managers negotiated, procurement officials attempt to dictate. Procurement deploys a variety of tactics designed to do one thing: gain unprecedented discounts and concessions out of even the most sophisticated sales professionals. This book is a strategy guide for salespeople to help them level the procurement playing field by showing readers how to assess the game procurement plays, describing proven ways to resist discounting and protect margins, demonstrating ways to keep value at the forefront of negotiations, offering targeted tactics to protect hard-earned profits from mindless discounting, and detailing eight strategies effective in any type of pricing negotiation. This book will be an invaluable resource for B2B sales professionals, customer-facing professionals, and executives responsible for leading successful sales organizations.

Renegades Write the Rules: How the Digital Royalty Use Social Media to Innovate


Amy Jo Martin - 2012
    In this book she shows how to build a faithful following and beat the competition clamoring for people's attention by continually delivering value - when, where, and how people want it. People want to be heard, to be involved, to be entertained, to be adventurous, to be informed.Reveals the winning strategies for using social media to achieve dramatic results Shows how to gain influence with social media that requires an unprecedented (and potentially uncomfortable) level of accessibility and ongoing affinity Filled with illustrative examples of social media successes (including Dwayne 'The Rock' Johnson, Shaquille O'Neal, and Nike) that show how humanizing a brand through social media leads to monetization Explores how Amy Jo Martin and other successful entrepreneurs are becoming renegades by using social media to innovate their personal and professional lives The book reveals one of the basic rules of digital media success: Humans connect with humans, not logos and creative taglines.

Kali Linux Revealed: Mastering the Penetration Testing Distribution


Raphaël Hertzog - 2017
    They provided a secure and reliable foundation, allowing us to concentrate on securing our digital world.An amazing community has built up around Kali Linux. Every month, more than 300,000 of us download a version of Kali. We come together in online and real-world training rooms and grind through the sprawling Offensive Security Penetration Testing Labs, pursuing the near-legendary Offensive Security certifications. We come together on the Kali forums, some 40,000 strong, and hundreds of us at a time can be found on the Kali IRC channel. We gather at conferences and attend Kali Dojos to learn from the developers themselves how to best leverage Kali.However, the Kali team has never released an official Kali Linux manual, until now.In this book, we'll focus on the Kali Linux platform itself, and help you understand and maximize Kali from the ground up. The developers will walk you through Kali Linux features and fundamentals, provide a crash course in basic Linux commands and concepts, and then walk you through the most common Kali Linux installation scenarios. You'll learn how to configure, troubleshoot and secure Kali Linux and then dive into the powerful Debian package manager. Throughout this expansive section, you'll learn how to install and configure packages, how to update and upgrade your Kali installation, and how to create your own custom packages. Then you'll learn how to deploy your custom installation across massive enterprise networks. Finally, you'll be guided through advanced topics such as kernel compilation, custom ISO creation, industrial-strength encryption, and even how to install crypto kill switches to safeguard your sensitive information.Whether you're a veteran or an absolute n00b, this is the best place to start with Kali Linux, the security professional's platform of choice.

Global Trends 2030: Alternative Worlds


National Research Council - 2012
    As with the NIC’s previous Global Trends reports, we do not seek to predict the future—which would be an impossible feat—but instead provide a framework for thinking about possible futures and their implications.In-depth research, detailed modeling and a variety of analytical tools drawn from public, private and academic sources were employed in the production of Global Trends 2030. NIC leadership engaged with experts in nearly 20 countries—from think tanks, banks, government offices and business groups—to solicit reviews of the report.Available here: Global Trends 2030.

Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

Habeas Data: Privacy vs. the Rise of Surveillance Tech


Cyrus Farivar - 2018
    That means all of the technologies that have made our lives easier, faster, better, and/or more efficient have also simultaneously made it easier to keep an eye on our activities. Or, as we recently learned from reports about Cambridge Analytica, our data might be turned into a propaganda machine against us.  In 10 crucial legal cases, Habeas Data explores the tools of surveillance that exist today, how they work, and what the implications are for the future of privacy.

The Machine: A Radical Approach to the Design of the Sales Function


Justin Roff-Marsh - 2015
    Roff-Marsh calls these executives his silent revolutionaries. This revolution has been brewing for a long time. For the last 20 years, organizations’ ability to produce has overtaken their ability to sell, and, for at least as long, customers have unfailingly embraced every opportunity to avoid interacting with traditional field salespeople. Applying the division of labor to sales might not seem controversial, but this innocent-sounding idea decimates the sales management orthodoxy and replaces it with a strange new world where sales is primarily an inside activity, where salespeople earn fixed salaries and focus their attention exclusively on selling conversations, where regional sales offices become redundant, and where marketing and engineering become seamlessly integrated with sales.The Machine is a field guide for the executive who’s prepared to wrestle sales away from autonomous field-based artisans in favor of a tightly synchronized team of specialists. Readers will embrace The Machine either to exploit the new sales order or to avoid falling victim to it.

The Red Web: The Struggle Between Russia's Digital Dictators and the New Online Revolutionaries


Andrei Soldatov - 2015
    Perhaps both. On the eighth floor of an ordinary-looking building in an otherwise residential district of southwest Moscow, in a room occupied by the Federal Security Service (FSB), is a box the size of a VHS player marked SORM. The Russian government's front line in the battle for the future of the Internet, SORM is the world's most intrusive listening device, monitoring e-mails, Internet usage, Skype, and all social networks. But for every hacker subcontracted by the FSB to interfere with Russia's antagonists abroad -- such as those who, in a massive denial-of-service attack, overwhelmed the entire Internet in neighboring Estonia -- there is a radical or an opportunist who is using the web to chip away at the power of the state at home. Drawing from scores of interviews personally conducted with numerous prominent officials in the Ministry of Communications and web-savvy activists challenging the state, Andrei Soldatov and Irina Borogan peel back the history of advanced surveillance systems in Russia. From research laboratories in Soviet-era labor camps, to the legalization of government monitoring of all telephone and Internet communications in the 1990s, to the present day, their incisive and alarming investigation into the Kremlin's massive online-surveillance state exposes just how easily a free global exchange can be coerced into becoming a tool of repression and geopolitical warfare. Dissidents, oligarchs, and some of the world's most dangerous hackers collide in the uniquely Russian virtual world of The Red Web.

Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation


Bruce Dang - 2014
    Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.

Social Media: Strategies To Mastering Your Brand- Facebook, Instagram, Twitter and Snapchat (Social Media, Social Media Marketing)


David Kelly - 2016
    You'll be excited to see all the opportunities from your social media growth and presence just from these advanced strategies. Would you like to know more about: The Advance Strategies That The Pros Use. Doubling Your Instagram Followers Understanding Facebook Ad marketing Top Strategies For Growth Monetizing Your Social Media This book breaks training down into easy-to-understand modules. It starts from the very beginning of dog training, so you can get great results - even as a beginner! Download Social Media:Strategies To Mastering Your Brand- Facebook, Instagram, Twitter and Snapchat Scroll to the top and select the "BUY" button for instant download. You’ll be happy you did!

Beyond the Idea: How to Execute Innovation in Any Organization


Vijay Govindarajan - 2013
    

Beyond Blame: Learning From Failure and Success


Dave Zwieback - 2015
    Our increasingly complex world demands that we continuously learn from failures (and successes) in order to survive and thrive. And yet, our learning is too often undermined. We construct biased but comfortable stories, which often feature a simple, single "root cause"--a villain, someone to take the blame. Having done that, we short-circuit the possibility of developing any deeper understanding of the complex systems we work with. With this common approach, our systems will become more fragile and drift into failure. In this concise and entertaining book, I.T. veteran Dave Zwieback describes an incident that threatens the very existence of a large financial institution, and the counterintuitive steps its leadership took to stop the downward spiral. Their novel approach is grounded in proven concepts from complexity science, resilience engineering, human factors, cognitive science, and organizational psychology. It allows us to identify the underlying conditions for failure, and make our systems (and organizations) safer and more resilient.- Get a clear understanding of the downside of blame- Learn how to identify (and counteract) cognitive biases in groups- See how organizations can determine the real root cause of problems- Establish real accountability with your organization- Use the Learning Review Framework to fully learn from failures of complex systems- Find practical insights and tips for moving beyond blame in your own organization