Amazon Price: $39.99 $39.99 (as of February 20, 2018 16:49 –
Optimizing HPC Applications with Intel® Cluster Tools takes the reader on a tour of the fast-growing area of high performance computing and the optimization of hybrid programs. These programs typically combine distributed memory and shared memory programming models and use the Message Passing Interface (MPI) and OpenMP for multi-threading to achieve the ultimate goal of high performance at low power consumption on enterprise-class workstations and compute clusters.
The book focuses on optimization for clusters consisting of the Intel® Xeon processor, but the optimization methodologies also apply to the Intel® Xeon Phi™ coprocessor and heterogeneous clusters mixing both architectures. Besides the tutorial and reference content, the authors address and refute many myths and misconceptions surrounding the topic. The text is augmented and enriched by descriptions of real-life situations.
Continue reading “Optimizing HPC Applications with Intel Cluster Tools: Hunting Petaflops”
Amazon Price: $34.99 $7.50 You save: $27.49 (79%). (as of February 21, 2018 02:31 –
Your expert guide to building Microsoft® SharePoint® applications in the cloud
Deliver custom, cloud-based business solutions using SharePoint 2010 and Windows Azure™ together. By applying hands-on techniques from Microsoft cloud development expert Steve Fox, you'll learn how to increase the reach, resource capability, and reusability of your apps. Get the practical code exercises and solid advice you need—whether you're planning to build complete data-driven applications or hybrid solutions with simple Web parts.
Continue reading “Developing Microsoft SharePoint Applications Using Windows Azure (Developer Reference)”
Amazon Price: N/A (as of February 21, 2018 01:04 –
"This is one of the most interesting infosec books to come out in the last several years."
–Dino Dai Zovi, Information Security Professional
"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner
Continue reading “A Bug Hunter's Diary: A Guided Tour Through the Wilds of Software Security”
Amazon Price: N/A (as of February 20, 2018 07:32 –
"A fascinating look at the new direction fuzzing technology is taking — useful for both QA engineers and bug hunters alike!"
–Dave Aitel, CTO, Immunity Inc.
Continue reading “Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)”
Amazon Price: N/A (as of February 21, 2018 05:16 –
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks
Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.
Continue reading “Penetration Testing and Network Defense (Networking Technology)”