Book picks similar to
Developing More-Secure Microsoft® ASP.NET 2.0 Applications by Dominick Baier
moje-knjige
non-fiction
security
started
Fundamentals of Physics, Chapters 1 - 21, Enhanced Problems Version
David Halliday - 2000
This newest edition expands on the strengths of earlier versions, helping students bridge the gap between concepts and reasoning. Students are shown, rather than told about, how physics works and are given the opportunity to apply concepts to real-world problems. Each chapter and concept has been scrutinized to ensure clarity, currency, and accuracy while checkpoints, problem solving tactics, and sample problems help students make sense of new concepts. As always, Fundamentals of Physics covers every aspect of basic physics, from force and motion to relativity and will prepare today's students to be tomorrow's scientists.
Rootkits: Subverting the Windows Kernel
Greg Hoglund - 2005
It is truly cutting-edge. As the only book on the subject,
Rootkits
will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one word: Outstanding."--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight."Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine."Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to Understand the role of rootkits in remote command/control and software eavesdropping Build kernel rootkits that can make processes, files, and directories invisible Master key rootkit programming techniques, including hooking, runtime patching, and directly manipulating kernel objects Work with layered drivers to implement keyboard sniffers and file filters Detect rootkits and build host-based intrusion prevention software that resists rootkit attacks
RHCE Red Hat Certified Engineer Linux Study Guide: Exam (RH302)
Michael Jang - 2002
100% complete coverage of all objectives for exam RH302 Exam Readiness Checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off Inside the Exam sections in every chapter highlight key exam topics covered Real-world exercises modeled after hands-on exam scenarios Two complete lab-based exams simulate the format, tone, topics, and difficulty of the real exam Bonus content (available for download) includes installation screen review, basic instructions for using VMware and Xen as testbeds, and paper and pencil versions of the lab exams Covers all RH302 exam topics, including: Hardware installation and configuration The boot process Linux filesystem administration Package management and Kickstart User and group administration System administration tools Kernel services and configuration Apache and Squid Network file sharing services (NFS, FTP, and Samba) Domain Name System (DNS) E-mail (servers and clients) Extended Internet Services Daemon (xinetd), the Secure package, and DHCP The X Window System Firewalls, SELinux, and troubleshooting
Pro ASP.NET MVC 4
Adam Freeman - 2012
It provides a high-productivity programming model that promotes cleaner code architecture, test-driven development, and powerful extensibility, combined with all the benefits of ASP.NET.ASP.NET MVC 4 contains a number of significant advances over previous versions. New mobile and desktop templates (employing adaptive rendering) are included together with support for jQuery Mobile for the first time. New display modes allow your application to select views based on the browser that's making the request while Code Generation Recipes for Visual Studio help you auto-generate project-specific code for a wide variety of situtations including NuGet support.In this fourth edition, the core model-view-controller (MVC) architectural concepts are not simply explained or discussed in isolation, but are demonstrated in action. You'll work through an extended tutorial to create a working e-commerce web application that combines ASP.NET MVC with the latest C# language features and unit-testing best practices. By gaining this invaluable, practical experience, you'll discover MVC's strengths and weaknesses for yourself--and put your best-learned theory into practice.The book's authors, Steve Sanderson and Adam Freeman, have both watched the growth of ASP.NET MVC since its first release. Steve is a well-known blogger on the MVC Framework and a member of the Microsoft Web Platform and Tools team. Adam started designing and building web applications 15 years ago and has been responsible for some of the world's largest and most ambitious projects. You can be sure you are in safe hands.
World of Warcraft Dungeon Companion
Brady Games - 2006
Every Dungeon: Low-level instances and the toughest raid dungeons are all covered in this monstrous compendium. Light is shed on everything from Ragefire Chasm to Ahn' Qiraj.Outdoor World Boss Encounters: Learn exactly what you need to take down Azuregos, Lord Kazzak, and the Dragons of Nightmare.Much more: Monster Information, Quest Guidance, Rewards, and Secret Rooms.Platform: PC CD-ROM Genre: MMORPG This product is available for sale worldwide.
Fodor's Costa Rica 2010
Fodor's Travel Publications Inc. - 1987
It’s no wonder. Little Costa Rica is endowed with a mosaic of natural landscapes that are packed with an amazing array of flora and fauna. This is also one of the easiest places in the world to experience the beauty and complexity of tropical nature. Now in full color, Fodor’s Costa Rica 2010 shows off the splendor of Costa Rica like no other guidebook. Features include:• More than 200 color photos to inspire you• An all-new, illustrated “Experience Costa Rica” chapter loaded with valuable advice, including tips on choosing an eco-lodge and planning a destination marriage or honeymoon• A brand-new, illustrated “Biodiversity” chapter to guide you through the country’s varied landscapes and help plan your vacation based on particular activities or topography• New magazine-style illustrated features highlight quintessential Costa Rica: surfing the Salsa Brava, sport-fishing off the Pacific coast, canopy tours in the cloud forests, turtle-nesting tours in Tortuguero, and bird-watching in the rare tropical dry forests of Guanacaste• Interactive full-color maps and planning pages help you easily get your bearings and plan the trip of a lifetimeFodor’s. For Choice Travel Experiences.
Thinking in C++
Bruce Eckel - 1995
It shows readers how to step back from coding to consider design strategies and attempt to get into the head of the designer.
Off-Camera Flash: Techniques for Digital Photographers
Neil van Niekerk - 2011
Seeking to address the various challenges of off-camera lighting, professional photographers and advanced amateurs alike will find a range of confidence-building instruction, beginning with basic how’s and why’s of lighting for creative effect, the types of equipment available and instruction about their proper use, clear definitions of various technical concepts such as managing shutter speed and controlling flash exposure, using ambient light as well as natural sunlight during a shoot, and incorporating off-camera flash into a portrait session. Concluding this lesson plan is a look at five different real-life photo sessions, each employing a different flash technique. Here, photographers get a deeper understanding of each concept put into practice, marrying the elements of lighting with the natural elements presented by the shoot.
Programming Entity Framework: Code First
Julia Lerman - 2011
With this concise book, you’ll work hands-on with examples to learn how Code First can create an in-memory model and database by default, and how you can exert more control over the model through further configuration.Code First provides an alternative to the database first and model first approaches to the Entity Data Model. Learn the benefits of defining your model with code, whether you’re working with an existing database or building one from scratch. If you work with Visual Studio and understand database management basics, this book is for you.Learn exactly what Code First does—and does not—enable you to doUnderstand how property attributes, relationships, and database mappings are inferred from your classes by Code FirstUse Data Annotations and the Fluent API to configure the Code First data modelPerform advanced techniques, such as controlling the database schema and overriding the default model cachingThis book is a continuation of author Julia Lerman’s Programming Entity Framework, widely recognized as the leading book on the topic.
Base Building for Cyclists: A New Foundation for Endurance and Performance
Thomas Chapple - 2006
Ultrafit coach Thomas Chapple shows how with this practical guide. Based on the idea that success depends on the extent to which cyclists build their foundation of aerobic fitness, or their "base," for the road ahead, the book explains step-by-step how to build a bigger aerobic engine, work up to higher volumes, and make significant improvements in strength, endurance, and speed.
Fallout 3 Game of the Year Edition - Prima Official Game Guide
David Hodgson - 2009
• Covers the entire main game and all five Add-On games: Operation: Anchorage, The Pitt, Broken Steel, Point Lookout, and Mothership Zeta.• Your Essential Wasteland Companion: walkthroughs and over 200 detailed maps give you all the tactics, locations, items, and rewards!• Info and stats on all the perks, armor, weapons, items, factions, and entities you'll encounter.• Moral compass choices revealed! Villain or virtuous? Our guide's flowcharts will let you know which road to follow for your chosen path.• Giant map poster to guide you through the Wasteland.
Computer Organization
V. Carl Hamacher - 1978
*A comprehensive overview of hardware and software issues make this a "must-have" for electrical and computer engineers*Contains new material on RISC processors, performance analysis, multiprocessors and memory systems*New two-color design and illustrations illuminate the text