Book picks similar to
Cyber Security by Edward Amoroso
cyber
online-safety
technology
cyber-security
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
Dafydd Stuttard - 2007
The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications. The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias "PortSwigger," Dafydd developed the popular Burp Suite of web application hack tools.
Advanced Apex Programming for Salesforce.com and Force.com
Dan Appleman - 2012
Intended for developers who are already familiar with the Apex language, and experienced Java and C# developers who are moving to Apex, this book starts where the Force.com documentation leaves off. Instead of trying to cover all of the features of the platform, Advanced Apex programming focuses entirely on the Apex language and core design patterns. You’ll learn how to truly think in Apex – to embrace limits and bulk patterns. You’ll see how to develop architectures for efficient and reliable trigger handling, and for asynchronous operations. You’ll discover that best practices differ radically depending on whether you are building software for a specific organization or for a managed package. And you’ll find approaches for incorporating testing and diagnostic code that can dramatically improve the reliability and deployment of Apex software, and reduce your lifecycle and support costs. Based on his experience both as a consultant and as architect of a major AppExchange package, Dan Appleman focuses on the real-world problems and issues that are faced by Apex developers every day, along with the obscure problems and surprises that can sneak up on you if you are unprepared.
The Dark Net: Inside the Digital Underworld
Jamie Bartlett - 2014
A world that is as creative and complex as it is dangerous and disturbing. A world that is much closer than you think.The dark net is an underworld that stretches from popular social media sites to the most secretive corners of the encrypted web. It is a world that frequently appears in newspaper headlines, but one that is little understood, and rarely explored. The Dark Net is a revelatory examination of the internet today, and of its most innovative and dangerous subcultures: trolls and pornographers, drug dealers and hackers, political extremists and computer scientists, Bitcoin programmers and self-harmers, libertarians and vigilantes.Based on extensive first-hand experience, exclusive interviews and shocking documentary evidence, The Dark Net offers a startling glimpse of human nature under the conditions of freedom and anonymity, and shines a light on an enigmatic and ever-changing world.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson - 2008
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Metasploit: The Penetration Tester's Guide
David Kennedy - 2011
But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Signal Processing and Linear Systems
B.P. Lathi - 2000
Based on B. P. Lathi's widely used book, Linear Systems and Signals, it features additional applications to communications, controls, and filtering as well as new chapters on analog and digital filters and digital signal processing. Lathi emphasizes the physical appreciation of concepts rather than the mere mathematical manipulation of symbols. Avoiding the tendency to treat engineering as a branch of applied mathematics, he uses mathematics to enhance physical and intuitive understanding of concepts, instead of employing it only to prove axiomatic theory. Theoretical results are supported by carefully chosen examples and analogies, allowing students to intuitively discover meaning for themselves.
Security+ Guide to Network Security Fundamentals
Mark Ciampa - 2004
The book covers all of the new CompTIA Security+ 2008 exam objectives and maps to the new Security+ 2008 exam. This updated edition features many all-new topics, including topics new to the CompTIA exams like cross site scripting, SQL injection, rootkits, and virtualization, as well as topics of increasing importance in the industry as a whole, like the latest breeds of attackers, Wi-Fi Protected Access 2, and Microsoft Windows Vista security.
Kindle Fire HD For Dummies
Nancy C. Muir - 2012
This full-color guide will have you blazing through the web, staying entertained with the latest apps and games, watching your favorite TV shows and movies, and, of course, reading magazines, newspapers, and books to indulge all your interests. Whether this is your first tablet or you're upgrading from another device, you'll get to know your Kindle Fire HD and rekindle your love of reading with "Kindle Fire HD For Dummies"!Covers the Kindle Fire HD and original Kindle FireHelps you navigate the interface, customize your settings, get connected, and take advantage of Amazon CloudShows you how to work with the built-in apps and find new ones to to try out from the Amazon AppstoreExplains how to fill your Kindle Fire with cool stuff - from movies and music to videos, photos, apps, e-books, and moreWalks you through using Amazon's incredibly smooth Amazon Silk web browser to find anything you need online and keep in touch with e-mail, Skype, Facebook, and TwitterLight 'er up and unleash the fun with "Kindle Fire HD For Dummies"!
Lonely Planet Cancun, Cozumel & the Yucatan
Lonely Planet - 2010
Marvel at Chichen Itza's massive El Castilo pyramid, swim in a cenote, and party in a steamy Caribbean cantina in Merida; all with your trusted travel companion. Get to the heart of Cancun, Cozumel and the Yucatan and begin your journey now! Inside Lonely Planet Cancun, Cozumel & the Yucatan Travel Guide: Color maps and images throughout Highlights and itineraries help you tailor your trip to your personal needs and interests Insider tips to save time and money and get around like a local, avoiding crowds and trouble spots Essential info at your fingertips - hours of operation, phone numbers, websites, transit tips, prices Honest reviews for all budgets - eating, sleeping, sight-seeing, going out, shopping, hidden gems that most guidebooks miss Cultural insights give you a richer, more rewarding travel experience - cuisine, history, art, literature, Maya heritage, landscapes, wildlife, customs and etiquette Over 30 maps Covers Cancun, Isla Mujeres, Isla Cozumel, Riviera Maya, Costa Maya and the Southern Caribbean Coast, Yucatan State, Chichen Itza, Campeche, Chiapas and more eBook Features: (Best viewed on tablet devices and smartphones) Downloadable PDF and offline maps prevent roaming and data charges Effortlessly navigate and jump between maps and reviews Add notes to personalise your guidebook experience Seamlessly flip between pages Bookmarks and speedy search capabilities get you to key pages in a flash Embedded links to recommendations' websites Zoom-in maps and images Inbuilt dictionary for quick referencing The Perfect Choice: Lonely Planet Cancun, Cozumel & the Yucatan, our most comprehensive guide to Cancun, Cozumel and the Yucatan, is perfect for both exploring top sights and taking roads less traveled. Looking for more extensive coverage? Check out Lonely Planet Mexico for a comprehensive look at all the country has to offer. Authors: Written and researched by Lonely Planet, John Hecht, Lucas Vidgen. About Lonely Planet: Since 1973, Lonely Planet has become the world's leading travel media company with guidebooks to every destination, an award-winning website, mobile and digital travel products, and a dedicated traveler community. Lonely Planet covers must-see spots but also enables curious travelers to get off beaten paths to understand more of the culture of the places in which they find themselves.
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang - 2014
Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
The AI Delusion
Gary Smith - 2018
The Computer Revolution may be even more life-changing than the Industrial Revolution. We can do things with computers that could never be done before, and computers can do things for us that could never be done before.But our love of computers should not cloud our thinking about their limitations.We are told that computers are smarter than humans and that data mining can identify previously unknown truths, or make discoveries that will revolutionize our lives. Our lives may well be changed, but not necessarily for the better. Computers are very good at discovering patterns, but are uselessin judging whether the unearthed patterns are sensible because computers do not think the way humans think.We fear that super-intelligent machines will decide to protect themselves by enslaving or eliminating humans. But the real danger is not that computers are smarter than us, but that we think computers are smarter than us and, so, trust computers to make important decisions for us.The AI Delusion explains why we should not be intimidated into thinking that computers are infallible, that data-mining is knowledge discovery, and that black boxes should be trusted.
WordPress Websites Step-by-Step - The Complete Beginner's Guide to Building a Website or Blog With WordPress
Caimin Jones - 2013
You won't need to learn any web programming or turn yourself into a computer geek.What is WordPress?WordPress is a powerful publishing tool that's the single most popular way of publishing websites and blogs. It's used by Fortune 500 companies, startups, small businesses, bloggers and non-profits alike to build a professional presence on the web.Because WordPress lets you add and edit content through a web-based admin area, it's easier to use then you might imagine. In fact, you can build a great-looking site without being a web designer or computer geek. You can edit your website design as much as you like and add new features with a few clicks of the mouse, or you can use the default design for an equally professional-looking site.In plain English, this step-by-step book, written by a WordPress expert, helps you buy a domain name, get web hosting and set up WordPress so you can make a beautiful website or blog.Clear explanations and over 55 images of the admin screens and tools mean you can see exactly how to do all this.What you'll learn in WordPress Step-by-Step*How to choose a great domain name and get professional, reliable hosting * How to install WordPress in a few mouse clicks* How to publish posts and pages with correctly formatted text* How to give your website a professional touch by using images and videos* How to customize the design of your site without needing to be a programmer* How to extend your site even further with "plugins" * How to structure your site so you'll get found by Google* How to keep your website secure * How to solve the most common WordPress problems...and more.There's also a free bonus chapter on getting the first visitors to your site.Plus, the book is packed with links to additional resources and free design themes and plugins to help you build a website on a budget.By the time you've read the book you'll have a unique, professional and easy-to-use website to be proud of - and you'll have created it yourself!Important: This book is currently the most up-to-date WordPress book available on Amazon. Some of the older WordPress books were published more than a year ago - a lot has changed since then. This guide describes how to use the latest version of WordPress (3.5).Whether you want to build a simple website for your company or organization, make money with a blog or a full online store, this non-geek guide will get you online quickly.
Cyberphobia: Identity, Trust, Security and the Internet
Edward Lucas - 2015
Stories about weaknesses in cybersecurity like the "Heartbleed" leak, or malicious software on the cash registers at your local Target have become alarmingly common. Even more alarming is the sheer number of victims associated with these crimes--the identities and personal information of millions is stolen outright as criminals drain bank accounts and max out credit cards. The availability of stolen credit card information is now so common that it can be purchased on the black market for as little as four dollars with potentially thousands at stake for the victims. Possibly even more catastrophic are hackers at a national level that have begun stealing national security, or economic and trade secrets. The world economy and geopolitics hang in the balance.In Cyberphobia, Edward Lucas unpacks this shadowy, but metastasizing problem confronting our security--both for individuals and nations. The uncomfortable truth is that we do not take cybersecurity seriously enough. Strong regulations on automotive safety or guidelines for the airline industry are commonplace, but when it comes to the internet, it might as well be the Wild West. Standards of securing our computers and other internet-connected technology are diverse, but just like the rules of the road meant to protect both individual drivers and everyone else driving alongside them, weak cybersecurity on the computers and internet systems near us put everyone at risk. Lucas sounds a compelling and necessary alarm on behalf of cybersecurity and prescribes immediate and bold solutions to this grave threat.
Mars Direct: Space Exploration, the Red Planet, and the Human Future: A Special from Tarcher/Penguin
Robert Zubrin - 2013
In the coming years, we will make decisions regarding our human spaceflight program that will lead to one of two familiar futures: the open universe of "Star Trek, "where we allow ourselves the opportunity to spread our wings and attempt to flourish as an interplanetary species--or the closed, dystopian, and ultimately self-destructive world of "Soylent Green." If we ever hope to live in the future that is the former scenario, our first stepping stone must be a manned mission to Mars. In this four-part e-special, Dr. Robert Zubrin details the challenges of a manned Earth-to-Mars mission. Challenges which, according to Zubrin, we are technologically more prepared to overcome than the obstacles of the missions to the moon of the sixties and seventies. Dr. Zubrin's relatively simple plan, called Mars Direct, could feasibly have humans on the surface of Mars within a decade. Zubrin also discusses the current predicament of NASA, the promise of privatized space flight from companies like SpaceX, and the larger implication behind the absolute necessity to open the final frontier to humanity--the human race's future as a species that takes the necessary baby steps away from the cradle that is planet Earth or, ultimately, perishes here.
Mexico CIty: An Opinionated Guide for the Curious Traveler
Jim Johnston - 2006
Thankfully, Mexico City: An Opinionated Guide for the Curious Traveler lends a thorough, guiding hand to help make the visitor's stay outstanding. Written by a longtime resident who knows the city inside and out, this travel guide delivers detailed walking tours of the city that include the most popular tourist sights as well as lesser-known spots. Johnston knows where to stay, what to do, and where to eat: everything from authentic market food to sophisticated Mexican cuisine.What began as a collection of notes to share with good friends is now available to every newcomer looking for a joyful, memorable stay in Mexico City."This is the guidebook that I want. Wonderfully written, airtight information, organized in the smartest possibly way. I can't imagine a better Mexico City guide for these times."-Tony Cohan, author of Mexican Days and On Mexican Time"Johnston is the friend you wish you had in every great city, toting you from palace to museum to park but never missing the exquisite pastelería, the grand hotel lobby or the clean public bathroom."-San Francisco Chronicle