Amazon Price: N/A (as of June 26, 2017 13:56 –
This book will teach the reader how to make the most of their WRT54G series hardware. These handy little inexpensive devices can be configured for a near endless amount of networking tasks. The reader will learn about the WRT54G’s hardware components, the different third-party firmware available and the differences between them, choosing the firmware that is right for you, and how to install different third-party firmware distributions. Never before has this hardware been documented in this amount of detail, which includes a wide-array of photographs and complete listing of all WRT54G models currently available, including the WRTSL54GS.
Once this foundation is laid, the reader will learn how to implement functionality on the WRT54G for fun projects, penetration testing, various network tasks, wireless spectrum analysis, and more! This title features never before seen hacks using the WRT54G. For those who want to make the most out of their WRT54G you can learn how to port code and develop your own software for the OpenWRT operating system.
* Never before seen and documented hacks, including wireless spectrum analysis
* Most comprehensive source for documentation on how to take advantage of advanced features on the inexpensive wrt54g platform
* Full coverage on embedded device development using the WRT54G and OpenWRT
Amazon Price: $31.00 $31.00 (as of June 26, 2017 04:26 –
Zero-day vulnerabilities—software vulnerabilities for which no patch or fix has been publicly released—and their exploits are useful in cyber operations, as well as in defensive and academic settings. This report provides findings from real-world zero-day vulnerability and exploit data that can inform ongoing policy debates regarding stockpiling (i.e., keeping zero-day vulnerabilities private) versus disclosing them to the public.
Amazon Price: N/A (as of June 26, 2017 20:30 –
How a boy and a girl hacker meet, fall in love, and agree to a life together that threatens to tear them apart…
Not long ago, Martin Spencer turned from a black hat to a white hat hacker. Except he's more gray than white when he finds himself in the epicenter of an investigation to unravel a sophisticated Cyber scam perpetrated against the Stock Market. What he discovers should make him question everything he believes about the reliability and safety of wealth. Feral, the hacker he finds on the other end of the digital heist, will make him face a choice between the quest for prosperity and his desire to live free.
Amazon Price: N/A (as of June 26, 2017 05:18 –
Parallel Computing for Data Science: With Examples in R, C++ and CUDA is one of the first parallel computing books to concentrate exclusively on parallel data structures, algorithms, software tools, and applications in data science. It includes examples not only from the classic "n observations, p variables" matrix format but also from time series, network graph models, and numerous other structures common in data science. The examples illustrate the range of issues encountered in parallel programming.
With the main focus on computation, the book shows how to compute on three types of platforms: multicore systems, clusters, and graphics processing units (GPUs). It also discusses software packages that span more than one type of hardware and can be used from more than one type of programming language. Readers will find that the foundation established in this book will generalize well to other languages, such as Python and Julia.
Amazon Price: $19.99 $19.99 (as of June 26, 2017 12:51 –
Ransomware like WannaCry can be defeated through a combination of cyber security planning, policies, procedures, guidelines and standards. This book introduces these key concepts, allowing for real world change to be effected, preventing ransomware and other attacks from crippling your organisation.