The Shellcoder’s Handbook: Discovering and Exploiting Security Holes

Rating: 
Amazon Price: N/A (as of July 23, 2019 06:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files

How to Build a Beowulf: A Guide to the Implementation and Application of PC Clusters (Scientific and Engineering Computation)

Rating: 
Amazon Price: N/A (as of July 23, 2019 19:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Supercomputing research–the goal of which is to make computers that are
ever faster and more powerful–has been at the cutting edge of computer technology
since the early 1960s. Until recently, research cost in the millions of dollars, and
many of the companies that originally made supercomputers are now out of
business.The early supercomputers used distributed computing and parallel processing
to link processors together in a single machine, often called a mainframe.
Exploiting the same technology, researchers are now using off-the-shelf PCs to
produce computers with supercomputer performance. It is now possible to make a
supercomputer for less than $40,000. Given this new affordability, a number of
universities and research laboratories are experimenting with installing such
Beowulf-type systems in their facilities.This how-to guide provides step-by-step
instructions for building a Beowulf-type computer, including the physical elements
that make up a clustered PC computing system, the software required (most of which
is freely available), and insights on how to organize the code to exploit
parallelism. The book also includes a list of potential pitfalls.

Internet Core Protocols: The Definitive Guide: Help for Network Administrators

Rating: 
Amazon Price: N/A (as of July 23, 2019 02:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If you've ever been responsible for a network, you know that sinking feeling: your pager has gone off at 2 a.m., the network is broken, and you can't figure out why by using a dial-in connection from home. You drive into the office, dig out your protocol analyzer, and spend the next fourhours trying to put things back together before the staff shows up for work.

When this happens, you often find yourself looking at the low-level guts of the Internet protocols: you're deciphering individual packets, trying to figure out what is (or isn't) happening. Until now, the only real guide to the protocols has been the Internet RFCs–and they're hardlywhat you want to be reading late at night when your network is down. There hasn't been a good book on the fundamentals of IP networking aimed at network administrators–until now.
Continue reading “Internet Core Protocols: The Definitive Guide: Help for Network Administrators”

Designing the Internet of Things

Rating: 
Amazon Price: N/A (as of July 23, 2019 00:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Take your idea from concept to production with this unique guide

Whether it's called physical computing, ubiquitous computing, or the Internet of Things, it's a hot topic in technology: how to channel your inner Steve Jobs and successfully combine hardware, embedded software, web services, electronics, and cool design to create cutting-edge devices that are fun, interactive, and practical. If you'd like to create the next must-have product, this unique book is the perfect place to start.
Continue reading “Designing the Internet of Things”

Practical Packet Analysis

Rating: 
Amazon Price: N/A (as of July 30, 2017 21:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

It's easy enough to install Wireshark and begin capturing packets off the wire–or from the air. But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and moreBuild customized capture and display filtersTap into live network communicationGraph traffic patterns to visualize the data flowing across your networkUse advanced Wireshark features to understand confusing packetsBuild statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.