Book picks similar to
Hacking: The Art of Exploitation, 2nd Edition by Jon Erickson, No Starch Press by Jon Erickson
hacking
coding
cybersecurity
tech
Gray Hat Hacking: The Ethical Hacker's Handbook
Shon Harris - 2004
Section I: Exploits 202; Chapter 1: Survival; Chapter 2: Basic Exploits; Chapter 3: Advance Exploits; Chapter 4: Writing Shell Code; Section II: Vulnerability Analysis; Chapter 5: Passive Analysis; Chapter 6: Active Analysis; Chapter 7: Bug to Exploit; Chapter 8: Mitigation; Section III: Advanced System Hacks; Chapter 9: Advanced.
Beneath a Surface
Brad Sams - 2018
The company was forced to write-down $900 million in inventory and Surface’s future was in jeopardy.Beneath A Surface tells the inside story of how Microsoft turned its hardware dreams into a reality with new details about the challenges Panos and his team had to overcome as well as the internal politics that nearly killed the brand.For fans of Microsoft and those who are interested in the business of building brands, Beneath A Surface is a must read that tells the inside story of how Microsoft turned a failure into a fortune.
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson - 2008
Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.
Cryptography Engineering: Design Principles and Practical Applications
Niels Ferguson - 2010
Cryptography is vital to keeping information safe, in an era when the formula to do so becomes more and more challenging. Written by a team of world-renowned cryptography experts, this essential guide is the definitive introduction to all major areas of cryptography: message security, key negotiation, and key management. You'll learn how to think like a cryptographer. You'll discover techniques for building cryptography into products from the start and you'll examine the many technical changes in the field.After a basic overview of cryptography and what it means today, this indispensable resource covers such topics as block ciphers, block modes, hash functions, encryption modes, message authentication codes, implementation issues, negotiation protocols, and more. Helpful examples and hands-on exercises enhance your understanding of the multi-faceted field of cryptography.An author team of internationally recognized cryptography experts updates you on vital topics in the field of cryptography Shows you how to build cryptography into products from the start Examines updates and changes to cryptography Includes coverage on key servers, message security, authentication codes, new standards, block ciphers, message authentication codes, and more Cryptography Engineering gets you up to speed in the ever-evolving field of cryptography.
Threat Modeling: Designing for Security
Adam Shostack - 2014
Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies.Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling.Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.
Learning React: A Hands-On Guide to Building Maintainable, High-Performing Web Application User Interfaces Using the React JavaScript Library
Kirupa Chinnathambi - 2016
Cyberpunk: Outlaws and Hackers on the Computer Frontier
Katie Hafner - 1991
In a book filled with as much adventure as any Ludlum novel, the authors show what motivates these young hackers to access systems, how they learn to break in, and how little can be done to stop them.
Ray Tracing in One Weekend (Ray Tracing Minibooks Book 1)
Peter Shirley - 2016
Each mini-chapter adds one feature to the ray tracer, and by the end the reader can produce the image on the book cover. Details of basic ray tracing code architecture and C++ classes are given.
Reversing: Secrets of Reverse Engineering
Eldad Eilam - 2005
The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product. * The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products * Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware * Offers a primer on advanced reverse-engineering, delving into disassembly-code-level reverse engineering-and explaining how to decipher assembly language
Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers
T.J. O'Connor - 2012
Instead of relying on another attacker's tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.
Coding Freedom: The Ethics and Aesthetics of Hacking
Gabriella Coleman - 2012
In telling the story of the F/OSS movement, the book unfolds a broader narrative involving computing, the politics of access, and intellectual property.E. Gabriella Coleman tracks the ways in which hackers collaborate and examines passionate manifestos, hacker humor, free software project governance, and festive hacker conferences. Looking at the ways that hackers sustain their productive freedom, Coleman shows that these activists, driven by a commitment to their work, reformulate key ideals including free speech, transparency, and meritocracy, and refuse restrictive intellectual protections. Coleman demonstrates how hacking, so often marginalized or misunderstood, sheds light on the continuing relevance of liberalism in online collaboration.
Kindle Tips, Tricks, and Shortcuts
Michael Gallagher - 2010
Topics include:• Archived Items • Battery Replacement • Calculator Functionality • Checking Your Email • Collections • Contacting Amazon's Kindle Customer Service • Converting PDF Documents to Kindle Format • Discussion Boards • Displaying the Time • Download Problems - What To Do • Formatting Issues in a Kindle Book - What To Do • Games on Your Kindle • Gifting a Kindle Book / Gift Certificates • Internet Access (it’s free) on Your Kindle • Internet Bookmarks• Kindle Reading to You (Text to Speech) • Lending Books• Losing Your Place While Reading • Lost Kindle Tip • Mobile Websites - Access Them on Your Kindle • Password Protection • Permanent Deletion of a Title • Pictures on Your Kindle • Playing Music on Your Kindle • Popular Highlights Feature - Turning it Off • Reset Your Kindle • Samples of Books • Screen Freeze Fix • Screenshots - Printing Out What You See • Social Networking with Facebook and Twitter • Transferring Books to Your Kindle • Transferring Existing Collections to Your New Kindle • Checking the Weather • Wireless Coverage for Your Kindle • Random Tips • Blogs Available on Your KindleMichael Gallagher is the author of several bestselling Kindle “how-to” guides, and his title “Free Kindle Books and How to Find Them” has been the #1 Kindle reference guide for over two years, garnering #53 and #72 on the Top 100 Kindle bestseller lists for all Kindle book titles in 2010 and 2011, respectively. His “Kindle Books and Tips” blog has been the #1 bestselling subscription blog in the Amazon Kindle Store since 2010. You can visit his author page on the Amazon website at http://www.amazon.com/author/gallagher
Operational Excellence Pillar: AWS Well-Architected Framework (AWS Whitepaper)
AWS Whitepapers - 2017
It provides guidance to help you apply best practices in the design, delivery, and maintenance of AWS environments. This documentation is offered for free here as a Kindle book, or you can read it in PDF format at https://aws.amazon.com/whitepapers/.
Everyday Rails Testing with RSpec
Aaron Sumner
A practical approach to test-driven development for Ruby on Rails using RSpec and related tools.
The Rails 4 Way
Obie Fernandez - 2013
It has conquered developer mindshare at startups and enterprises alike with its focus of simplicity, convention and clean, maintainable code. The latest version, Rails 4, continues the tradition of enhanced performance, security and developer productivity, with improvements that enable professional developers to focus on what matters most: delivering business value quickly and consistently.The Rails™ 4 Way is the only comprehensive, authoritative guide to delivering production-quality code with Rails 4. Pioneering Rails expert Obie Fernandez and his team of leading Rails experts illuminate the entire set of Rails APIs, along with the idioms, design approaches, and libraries that make developing applications with Rails so powerful. Drawing on their unsurpassed experience and track record, they address the real challenges development teams face, showing how to use Rails to maximize your productivity.Using numerous detailed code examples, the author systematically cover Rails key capabilities and subsystems, making this book a reference that you depend on everyday. He presents advanced Rails programming techniques that have been proven effective in day-to-day usage on dozens of production Rails systems and offers important insights into behavior-driven development and production considerations such as scalability. Dive deep into the subtleties of the asset pipeline and other advanced Rails topics such as security and scalability. The Rails 4 Way is your best guide for making Rails do exactly what you want it to do.