Amazon Price: N/A (as of November 20, 2018 17:56 –
The book is logically divided into 5 main categories with each category representing a major skill set required by most security professionals:
1. Coding – The ability to program and script is quickly becoming a mainstream requirement for just about everyone in the security industry. This section covers the basics in coding complemented with a slue of programming tips and tricks in C/C++, Java, Perl and NASL.
Continue reading “Sockets, Shellcode, Porting, and Coding: Reverse Engineering Exploits and Tool Coding for Security Professionals: Reverse Engineering Exploits and Tool Coding for Security Professionals”
Amazon Price: $39.99 $30.99 You save: $9.00 (23%). (as of November 20, 2018 16:35 –
The smash hit introductory design book that debuted at #18 on Amazon
Hackers are able to accomplish so much in so little time because they come from a community that's built upon sharing knowledge. When it comes to programming, they can learn whatever they need to learn by reading manuals, or simply typing in a Google search. But learning design isn't so simple.
Many design books try to teach design through lists of "do's" and "don'ts." But hackers know you need a deeper understanding of something to really do it well. Design for Hackers takes apart design by "reverse-engineering" Impressionist painting, Renaissance sculpture, the Mac OS X Aqua interface, Twitter's web interface, and much more. You'll learn about color theory, typography, proportions, and design principles. This theoretical advice is mixed with concrete, actionable advice such as suggestions for color scheme tools, and a chart of "all of the fonts you'll ever need" (available along with the free design course at designforhackers.com).
Continue reading “Design for Hackers: Reverse Engineering Beauty”
Amazon Price: $129.00 $103.13 You save: $25.87 (20%). (as of November 20, 2018 04:00 –
EW 101 has been a popular column in the Journal of Electronic Defense for a number of years. This compilation of tutorial articles from JED provides introductory level electronic warfare instruction for students of the discipline.
Amazon Price: N/A (as of November 20, 2018 17:31 –
Web mining aims to discover useful information and knowledge from the Web hyperlink structure, page contents, and usage data. Although Web mining uses many conventional data mining techniques, it is not purely an application of traditional data mining due to the semistructured and unstructured nature of the Web data and its heterogeneity. It has also developed many of its own algorithms and techniques. Liu has written a comprehensive text on Web data mining. Key topics of structure mining, content mining, and usage mining are covered both in breadth and in depth. His book brings together all the essential concepts and algorithms from related areas such as data mining, machine learning, and text processing to form an authoritative and coherent text. The book offers a rich blend of theory and practice, addressing seminal research ideas, as well as examining the technology from a practical point of view. It is suitable for students, researchers and practitioners interested in Web mining both as a learning text and a reference book. Lecturers can readily use it for classes on data mining, Web mining, and Web search. Additional teaching materials such as lecture slides, datasets, and implemented algorithms are available online.
Amazon Price: $39.99 $30.76 You save: $9.23 (23%). (as of November 20, 2018 18:09 –
It's nearly impossible to pick up a newspaper or read your favorite online news source these days without seeing yet another article about identity theft or credit card numbers being stolen from unprotected databases. Cyber crime and the threat of computer-related attacks are growing daily, and the need for security professionals who understand how attackers compromise networks is growing right along with the threat. Government agencies and private companies rely on "ethical hackers"–professional security testers–to put their networks to the test and discover vulnerabilities before attackers do. If you have an understanding of computers and networking basics and are considering becoming a security tester, HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE will show you how to get started in this fascinating, growing field. This book covers the gamut, from the legalities of ethical hacking to the details of malware, network attacks, cryptography, OS vulnerabilities, wireless network hacking, and much more. Successful security testers know their work calls for creative, critical thinking, and they enjoy the challenge of digging deep to solve complex problems. Step up to the challenge with HANDS-ON ETHICAL HACKING AND NETWORK DEFENSE.