Amazon Price: N/A (as of December 11, 2017 13:40 –
Have you always been curious about the seemingly mysterious and daunting world of hacking? Do you want to explore and learn the art of hacking? Well, you have come to the right place.
This book is for beginners who want to learn about ethical hacking by starting with a solid foundation. Written in a down to earth style, it contains the key terms and concepts you need coupled with links to online resources that let you build your skills outside the book.
Continue reading “Hacking: 101 Hacking Guide: Computer Hacking, 2nd edition (Tech Geek Book 3)”
Amazon Price: N/A (as of December 11, 2017 13:10 –
Comprehensive tips and analytical approach to providing defense in depth for networks and components. This will help protect the network.
Amazon Price: N/A (as of December 11, 2017 00:18 –
The issue of privacy on the Internet has long been a difficult one: there are a lot of good reasons that you might be leery of strangers reading your emails or spying on the websites you visit.
A number of powerful tools exist which allow you to protect your privacy online. One of the most useful of these tools is called Tor. Tor provides truly anonymous and untraceable browsing and messaging, as well as access to the so called "Deep Web", a network of anonymous, untraceable, unblockable websites, available only through Tor, which provide everything from resources for political activists to pirated movies. The military-grade encryption behind Tor is so powerful that it can't plausibly be broken by any organization on the planet.
Continue reading “Really Private Browsing: An Unofficial User's Guide to Tor”
Amazon Price: N/A (as of December 11, 2017 01:18 –
If you’ve been asked to maintain large and complex Hadoop clusters, this book is a must. Demand for operations-specific material has skyrocketed now that Hadoop is becoming the de facto standard for truly large-scale data processing in the data center. Eric Sammer, Principal Solution Architect at Cloudera, shows you the particulars of running Hadoop in production, from planning, installing, and configuring the system to providing ongoing maintenance.
Rather than run through all possible scenarios, this pragmatic operations guide calls out what works, as demonstrated in critical deployments.Get a high-level overview of HDFS and MapReduce: why they exist and how they workPlan a Hadoop deployment, from hardware and OS selection to network requirementsLearn setup and configuration details with a list of critical propertiesManage resources by sharing a cluster across multiple groupsGet a runbook of the most common cluster maintenance tasksMonitor Hadoop clusters—and learn troubleshooting with the help of real-world war storiesUse basic tools and techniques to handle backup and catastrophic failure
Amazon Price: N/A (as of December 11, 2017 07:25 –
Hacker extraordinaire Kevin Mitnick delivers the explosive encore to his bestselling The Art of Deception
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.