Book picks similar to
Using and Managing PPP by Andrew Sun


computer
amazon-com
at-work-donated
hacking

Making Games with Python & Pygame


Al Sweigart - 2012
    Each chapter gives you the complete source code for a new game and teaches the programming concepts from these examples. The book is available under a Creative Commons license and can be downloaded in full for free from http: //inventwithpython.com/pygame This book was written to be understandable by kids as young as 10 to 12 years old, although it is great for anyone of any age who has some familiarity with Python.

Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier


Suelette Dreyfus - 1997
    Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.As riveting as the finest detective novel and meticulously researched, Underground follows the hackers through their crimes, their betrayals, the hunt, raids and investigations. It is a gripping tale of the digital underground.

Google Drive & Docs In 30 Minutes


Ian Lamont - 2012
    Millions of people use Google Drive and its popular word processor, Docs, every day. You too can use Drive and Docs to perform the following tasks: * Write letters and reports* Enter data into Sheets, Google's free online spreadsheet program* Give presentations using Slides* Collaborate online with classmates and colleagues on important documents* Convert documents to different file formats * Print documents, drawings, and spreadsheets* Export PDFs * Make pie charts, bar charts, and simple tables* Publish documents and spreadsheets onlineThere are a lot of features, including some unfamiliar ones for people who are used to Microsoft Office. "Google Drive & Docs In 30 Minutes" cuts through the clutter, using screenshots, step-by-step instructions, and plain English. After covering registration, file creation and other basics, the book zeroes in on the most important time-saving tips and productivity tools. Highlights include:* Converting files between Microsoft Office and Google Drive formats.* Best practices for organizing files in Google Drive.* What to expect with collaboration in Google Drive.* Using Google Drive on phones and tablets: What works, and what doesn't.* Accessing older versions of files.* How to publish your documents to the Web for colleagues or members of the public to view.* Sorting and filtering data in Google Spreadsheets (with examples).* Using Web Forms to gather data.* Google Slides: Is it a suitable alternative to Microsoft PowerPoint or Apple Keynote?* Working with offline files.* Downloading third-party apps."Google Drive And Docs In 30 Minutes" is an In 30 Minutes™ guide. Other books in the series include "Dropbox In 30 Minutes", "Google Blogger For Small Businesses In 30 Minutes", and "Excel Basics In 30 Minutes".

Google Hacks: Tips & Tools for Finding and Using the World's Information


Rael Dornfest - 2003
    But few people realize that Google also gives you hundreds of cool ways to organize and play with information.Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.The expanded third edition of Google Hacks is a brand-new and infinitely more useful book for this powerful search engine. You'll not only find dozens of hacks for the new Google services, but plenty of updated tips, tricks and scripts for hacking the old ones. Now you can make a Google Earth movie, visualize your web site traffic with Google Analytics, post pictures to your blog with Picasa, or access Gmail in your favorite email client. Industrial strength and real-world tested, this new collection enables you to mine a ton of information within Google's reach. And have a lot of fun while doing it:Search Google over IM with a Google Talk bot Build a customized Google Map and add it to your own web site Cover your searching tracks and take back your browsing privacy Turn any Google query into an RSS feed that you can monitor in Google Reader or the newsreader of your choice Keep tabs on blogs in new, useful ways Turn Gmail into an external hard drive for Windows, Mac, or Linux Beef up your web pages with search, ads, news feeds, and more Program Google with the Google API and language of your choice For those of you concerned about Google as an emerging Big Brother, this new edition also offers advice and concrete tips for protecting your privacy. Get into the world of Google and bend it to your will!

Perl in a Nutshell


Nathan Patwardhan - 1998
    This book covers all the core features of the language. It ranges widely through the Perl programmer's universe, gathering together in convenient form a wealth of information about Perl itself and its application to CGI scripts, network programming, database interaction, and graphical user interfaces. It also gives detailed coverage about using Perl within a Win32 environment.This book assembles more information about the language in one place than any other reference work. Here are just some of the topics covered in the book:Basic language reference Introduction to using Perl modules Perl and CGI: CGI basics, CGI.pm, mod_perl DBI, the database-independent API for Perl Sockets programming in Perl LWP, the library for World Wide Web programming in Perl The Net::* modules As part of the successful "in a Nutshell" series of books from O'Reilly & Associates, Perl in a Nutshell is for readers who want a single reference for all their needs.

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy


Patrick Engebretson - 2011
    No prior hacking experience is needed. You learn how to properly utilize and interpret the results of modern day hacking tools, which are required to complete a penetration test. Tool coverage includes Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, Hacker Defender rootkit, and more. A simple and clean explanation of how to effectively utilize these tools as well as the introduction to a four-step methodology for conducting a penetration test or hack, will provide you with know-how required to jump start your career or gain a better understanding of offensive security. The book serves as an introduction to penetration testing and hacking and will provide you with a solid foundation of knowledge. After completing the book readers will be prepared to take on in-depth and advanced topics in hacking and penetration testing. The book walks through each of the steps and tools in a structured, orderly manner allowing readers to understand how the output from each tool can be fully utilized in the subsequent phases of the penetration test. This process allows readers to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phasesWritten by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State UniversityUtilizes the Backtrack Linux distribution and focuses on the seminal tools required to complete a penetration test

Network Warrior


Gary A. Donahue - 2007
    What you need to learn to pass a Cisco certification exam such as CCNA and what you need to know to survive in the real world are two very different things. The strategies that this book offers weren 't on the exam, but they 're exactly what you need to do your job well.Network Warrior takes you step by step through the world of hubs, switches, firewalls, and more, including ways to troubleshoot a congested network, and when to upgrade and why. Along the way, you 'll gain an historical perspective of various networking features, such as the way Ethernet evolved. Based on the author 's own experience as well as those he worked for and with, Network Warrior is a Cisco-centric book, focused primarily on the TCP/IP protocol and Ethernet networks -- the realm that Cisco Systems now dominates. The book covers: The type of networks now in use, from LANs, WANs and MANs to CANsThe OSI Model and the layers involved in sending data Hubs, repeaters, switches, and trunks in practice Auto negotiation and why it 's a common problem in network slowdowns Route maps, routing protocols, and switching algorithms in Cisco routers The resilient Ethernet -- how to make things truly redundant Cisco 6500 multi-layer switches and the Catalyst 3750 switch Telecom nomenclature -- why it 's different from the data world T1 and DS3 Firewall theory, designing access lists, authentication in Cisco devices Server load balancing technology Content switch module in action Designing QOS and what QOS does not do IP design and subnetting made easy The book also explains how to sell your ideas to management, how networks become a mess as a company grows, and why change control is your friend. Network Warrior will help network administrators and engineers win the complex battles they face every day.

Java 2: The Complete Reference


Herbert Schildt - 2000
    This book is the most complete and up-to-date resource on Java from programming guru, Herb Schildt -- a must-have desk reference for every Java programmer.

CSS and Documents


Eric A. Meyer - 2012
    

Ethereum: The Ultimate Guide to the World of Ethereum, Ethereum Mining, Ethereum Investing, Smart Contracts, Dapps and DAOs, Ether, Blockchain Technology


Ikuya Takashima - 2017
    This book is going to provide you with everything you need to know about Ethereum and whether it is worth investing in now. Like many people, I became interested in Bitcoin years ago, when Bitcoin was still relatively new, but hinting at a huge profit margin for those who took the risk and invested. It was after a couple of years playing around on the Bitcoin market that I heard about a new type of blockchain technology, one that wasn’t just a digital form of payment, but one that could support potentially endless different types of applications. Not only that, but it comes with its own currency. This, to me, sounded like a potentially profitable situation, so I decided to dig a little deeper. Unlike Bitcoin, Ethereum is still largely unknown to those who don’t keep up with the cryptocurrency world, so the amount of information available is limited or highly technical. Still, it was fascinating and the more I read about Ethereum, the more I began to see its huge potential. And I’m not alone. More and more Fortune 500 companies are investing in Ethereum technology as it becomes increasingly lucrative and poises to change business processes as we know them. I decided to condense my research and share my knowledge on Ethereum by writing this book. The book is designed for those who are new to cryptocurrency, but want to invest in it or learn more about it, as well as for more experienced traders looking to expand their portfolios. With a 5,000% increase in value in the first few months of 2017, Ethereum is proving to be a profitable currency. Still, as it is so new – it was only launched in 2015 – it comes with many infancy-related risks. It’s partly this that makes it so exciting. This book will help you make your own investment decisions and decide if Ethereum is the right coin for you after weighing up the pros and cons that are presented here. So far, Ethereum has made me good money and I was lucky to make the investment when I did. However, now is not too late to invest, not by a long shot. In fact, now is the perfect moment to make the most of Ethereum’s infancy and gain potential first-mover advantages. Ethereum’s technology is only at the beginning of its potential growth stages, possibly reaching to dozens of industries and thousands of services. If its technology is adopted the way it is expected to be, Ethereum will enjoy a long and lucrative spot at the top. The profits are ripe for the taking. Here Is A Preview Of What’s Included… What Is Ethereum? Smart Contracts, Dapps, And DAOs The Technology Behind Ethereum What Is Ethereum Mining? Uses Of Ethereum What Is Ether? The Financial History Of Ether How to Buy, Sell, And Store Ether The Mining Process Of Ether Should I Invest In Ether? The Future Of Ethereum Much, Much More! Get your copy today!

Counter Hack Reloaded: A Step-By-Step Guide to Computer Attacks and Effective Defenses


Edward Skoudis - 2005
    I asked other people and they didn't seem to know how these things work, or at least they couldn't explain them in a way that I could understand. Counter Hack Reloaded is the clearest explanation of these tools I have ever seen. Thank you!" --Stephen Northcutt, CEO, SANS Institute "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "Ed Skoudis is a rare individual. He knows the innards of all the various systems, knows all the latest exploits and defenses, and yet is able to explain everything at just the right level. The first edition of Counter Hack was a fascinating read. It's technically intriguing and very clear. . . . A book on vulnerabilities, though, will get out of date, and so we definitely needed this updated and significantly rewritten second edition. This book is a wonderful overview of the field." --From the Foreword by Radia Perlman, series editor, The Radia Perlman Series in Computer Networking and Security; author of Interconnections; and coauthor of Network Security: Private Communications in a Public World "What a great partnership! Ed Skoudis and Tom Liston share an uncanny talent for explaining even the most challenging security concepts in a clear and enjoyable manner. Counter Hack Reloaded is an indispensable resource for those who want to improve their defenses and understand the mechanics of computer attacks." --Lenny Zeltser, coauthor of Malware: Fighting Malicious Code "Ed Skoudis does it again! With this new edition, Ed takes a phenomenal work to the next level! This book is a 'must-have' and a 'must-read' for anyone remotely associated with computers and computer security." --Harlan Carvey, CISSP, author of Windows Forensics and Incident Recovery "In addition to having breadth of knowledge about and probing insights into network security, Ed Skoudis's real strength is in his ability to show complex topics in an understandable form. By the time he's done, what started off as a hopeless conglomeration of acronyms starts to sound comfortable and familiar. This book is your best source for understanding attack strategies, attack tools, and the defenses against both." --William Stearns, network security expert, www.stearns.org "This book is a must-have for anyone in the Internet security game. It covers everything from the basic principles to the fine details of online attack methods and counter-strategies and is very engagingly written." --Warwick Ford, coauthor of Secure Electronic Commerce For years, Counter Hack has been the primary resource for every network/system administrator and security professional who needs a deep, hands-on understanding of hacker attacks and countermeasures. Now, leading network security expert Ed Skoudis, with Tom Liston, has thoroughly updated this best-selling guide, showing how to defeat today's newest, most sophisticated, and most destructive attacks.For this second edition, more than half the content is new and updated, including coverage of the latest hacker techniques for scanning networks, gaining and maintaining access, and preventing detection. The authors walk you through each attack and demystify every tool and tactic. You'll learn exactly how to establish effective defenses, recognize attacks in progress, and respond quickly and effectively in both UNIX/Linux and Windows environments.Important features of this new edition includeAll-new "anatomy-of-an-attack" scenarios and tools An all-new section on wireless hacking: war driving, wireless sniffing attacks, and more Fully updated coverage of reconnaissance tools, including Nmap port scanning and "Google hacking" New coverage of tools for gaining access, including uncovering Windows and Linux vulnerabilities with Metasploit New information on dangerous, hard-to-detect, kernel-mode rootkits

Red Team Field Manual


Ben Clark - 2014
    The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations and Windows scripting. More importantly, it should teach you some new red team techniques.

Security Engineering: A Guide to Building Dependable Distributed Systems


Ross J. Anderson - 2008
    Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize, they get better. In this indispensable, fully updated guide, Ross Anderson reveals how to build systems that stay dependable whether faced with error or malice. Here's straight talk on critical topics such as technical engineering basics, types of attack, specialized protection mechanisms, security psychology, policy, and more.

Fire in the Valley: The Making of the Personal Computer


Paul Freiberger - 1984
    It reveals the visions they shared, the sacrifices they made, and the rewards they reaped.

Cloud Computing for Dummies


Judith Hurwitz - 2009
    If you've been put in charge of implementing cloud computing, this straightforward, plain-English guide clears up the confusion and helps you get your plan in place.You'll learn how cloud computing enables you to run a more green IT infrastructure, and access technology-enabled services from the Internet ("in the cloud") without having to understand, manage, or invest in the technology infrastructure that supports them. You'll also find out what you need to consider when implementing a plan, how to handle security issues, and more.Cloud computing is a way for businesses to take advantage of storage and virtual services through the Internet, saving money on infrastructure and support This book provides a clear definition of cloud computing from the utility computing standpoint and also addresses security concerns Offers practical guidance on delivering and managing cloud computing services effectively and efficiently Presents a proactive and pragmatic approach to implementing cloud computing in any organization Helps IT managers and staff understand the benefits and challenges of cloud computing, how to select a service, and what's involved in getting it up and running Highly experienced author team consults and gives presentations on emerging technologies Cloud Computing For Dummies gets straight to the point, providing the practical information you need to know.