Git Pocket Guide

Rating: 
Amazon Price: N/A (as of October 15, 2019 20:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This pocket guide is the perfect on-the-job companion to Git, the distributed version control system. It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.

Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks

Developing Microsoft SharePoint Applications Using Windows Azure (Developer Reference)

Rating: 
Amazon Price: $34.99 $8.29 You save: $26.70 (76%). (as of October 15, 2019 01:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Your expert guide to building Microsoft® SharePoint® applications in the cloud

Deliver custom, cloud-based business solutions using SharePoint 2010 and Windows Azure™ together. By applying hands-on techniques from Microsoft cloud development expert Steve Fox, you'll learn how to increase the reach, resource capability, and reusability of your apps. Get the practical code exercises and solid advice you need—whether you're planning to build complete data-driven applications or hybrid solutions with simple Web parts.
Continue reading “Developing Microsoft SharePoint Applications Using Windows Azure (Developer Reference)”

Software Security: Building Security In

Rating: 
Amazon Price: $74.99 $47.24 You save: $27.75 (37%). (as of October 15, 2019 21:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"When it comes to software security, the devil is in the details. This book tackles the details."
–Bruce Schneier, CTO and founder, Counterpane, and author of Beyond Fear and Secrets and Lies

"McGraw's book shows you how to make the 'culture of security' part of your development lifecycle."
–Howard A. Schmidt, Former White House Cyber Security Advisor
Continue reading “Software Security: Building Security In”

A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security

Rating: 
Amazon Price: N/A (as of October 14, 2019 22:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"This is one of the most interesting infosec books to come out in the last several years."
–Dino Dai Zovi, Information Security Professional

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner
Continue reading “A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security”

Penetration Testing and Network Defense (Networking Technology)

Rating: 
Amazon Price: N/A (as of October 15, 2019 13:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks

Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network.
Continue reading “Penetration Testing and Network Defense (Networking Technology)”