Pages

Showing posts with label pc. Show all posts
Showing posts with label pc. Show all posts

Tuesday, 14 March 2017

Social Engineering by A Cheung

Social Engineering by A Cheung





Description:

The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitations, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unravelled the mystery in social engineering.
Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of manoeuvres that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats.
  • Examines social engineering, the science of influencing a target to perform the desired task or divulge information
  • Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access
  • Reveals vital steps for preventing social engineering threats
Social Engineering: The Art of Human Hacking does its part of preparing you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.

From the Author: Defining Neuro-Linguistic Hacking (NLH) 
NLH is a combination of the use of key parts of neuro-lingusitic programming, the functionality of microexpressions, body language, gestures and blend it all together to understand how to “hack” the human infrastructure. Let’s take a closer at each to see how it applies.

Neuro-Lingusitic Programming (NLP): NLP is a controversial approach to psychotherapy and organizational change based on "a model of interpersonal communication chiefly concerned with the relationship between successful patterns of behavior and the subjective experiences underlying them" and "a system of alternative therapy based on this which seeks to educate people in self-awareness and effective communication, and to change their patterns of mental and emotional behavior"

Neuro: This points to our nervous system which we process our five senses:
• Visual
• Auditory
• Kinesthetic
• Smell
• Taste

Linguistic: This points to how we use language and other nonverbal communication systems through which our neural representations are coded, ordered and given meaning. This can include things like:
• Pictures
• Sounds
• Feelings
• Tastes
• Smells
• Words

Programming: This is our ability to discover and utilize the programs that we run in our neurological systems to achieve our specific and desired outcomes.

In short, NLP is how to use the language of the mind to consistently achieve, modify and alter our specific and desired outcomes (or that of a target).

Microexpressions are the involuntary muscular reactions to emotions we feel. As the brain processes emotions it causes nerves to constrict certain muscle groups in the face. Those reactions can last from 1/25th of a second to 1 second and reveal a person’s true emotions.

Much study has been done on microexpressions as well as what is being labeled as subtle microexpressions. A subtle microexpression is an important part of NLH training as a social engineer as many people will display subtle hints of these expressions and give you clues as to their feelings.































                              Download












Blind Sql Injection with Regular Expressions Attack

Image result for Blind Sql Injection with Regular Expressions Attack

Blind SQL Injection with Regular
Expressions Attack







Description:

This is definitely a book to get if you want to learn SQLi from the ground up. Many other IT security related books devote a chapter to SQLi that feels rushed or doesn't fully explain the "in/out's" of SQLi. This book starts with the premise that the reader is completely new to the concept of SQLi. The author easily explains the concept, how to detect it, and how to prevent it in a way that is easy to understand. If you ever heard of the "Crawl, Walk, Run" approach, this book beautifully illustrates it. What I love best is that it gives you easy to follow examples without being wordy or verbose. It isn't a book that will melt your brain with the boring material, in fact, it is actually quite fun to read and follow along. Like any book that is fun to follow you will have an easier time remembering the material. The book is split into four sections - understanding SQL injection (Chapter 1), finding SQL injection (Chapters 2 and 3), exploiting SQL injection (Chapters 4-7), and defending against SQL injection (Chapters 8-10).

This book will definitely appeal to all audiences interested in the subject from the pro penetration tester, to the novice, IT security student new to the subject, or a database admin that just wants to write more securely.

So if you are debating to find a book about SQLi, look no further and pick this book up.



























                              Download























Reverse Engineering in Computer Applications

Reverse Engineering in Computer Applications








Description:

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language


























                              Download










































Reversing Secrets of Reverse Engineering Wiley(2005) by Eldad Eilam

Image result for Eldad Eilam Reversing Secrets of Reverse Engineering Wiley(2005)

Eldad Eilam Reversing Secrets of
Reverse Engineering Wiley(2005)





Description:

Beginning with a basic primer on reverse engineering-including computer internals, operating systems, and assembly language-and then discussing the various
applications of reverse engineering, this book provides readers with practical, in-depth techniques for software reverse engineering. The book is broken into two parts, the first deals with security-related reverse engineering and the second explores the more practical aspects of reverse engineering. In addition, the author explains how to reverse engineer a third-party software library to improve interfacing and how to reverse engineer a competitor's software to build a better product.
* The first popular book to show how software reverse engineering can help defend against security threats, speed up development, and unlock the secrets of competitive products
* Helps developers plug security holes by demonstrating how hackers exploit reverse engineering techniques to crack copy-protection schemes and identify software targets for viruses and other malware
* Offers a primer on advanced reverse-engineering, delving into "disassembly"-code-level reverse engineering-and explaining how to decipher assembly language


























                              Download










































Vulnerability Management for Dummies

Image result for Vulnerability Management for Dummies

Vulnerability Management
 for Dummies






Description:

If you are responsible for network security, you need to understand how to prevent attacks by eliminating network weaknesses that leave your business exposed and at risk. Whether your network consists of just a handful of computers or thousands of servers distributed around the world, this newly revised, 6-part book will clearly help:

  • Explain the critical need for Vulnerability Management (VM)
  • Describe the essential steps of a successful VM Program
  • Outline solution options - including the pros & cons of each
  • Highlight the award-winning Qualys VM solution
  • Note the benefits of using automation to continuously monitor your network
  • Provide a 10-point checklist for removing vulnerabilities














                              Download






















Thursday, 9 March 2017

Operating System Concepts 8th Edition

Operating System Concepts

 8th Edition







Description:

Keep pace with the fast-developing world of operating systems
Open-source operating systems, virtual machines, and clustered computing are among the leading fields of operating systems and networking that are rapidly changing. With substantial revisions and organizational changes, Silberschatz, Galvin, and Gagne’s Operating System Concepts, Eighth Edition remains as current and relevant as ever, helping you master the fundamental concepts of operating systems while preparing yourself for today’s emerging developments.
As in the past, the text brings you up to speed on core knowledge and skills, including:
  • What operating systems are, what they do, and how they are designed and constructed
  • Process, memory, and storage management
  • Protection and security
  • Distributed systems
  • Special-purpose systems
Beyond the basics, the Eight Edition sports substantive revisions and organizational changes that clue you in to such cutting-edge developments as open-source operating systems, multi-core processors, clustered computers, virtual machines, transactional memory, NUMA, Solaris 10 memory management, Sun’s ZFS file system, and more. New to this edition is the use of a simulator to dynamically demonstrate several operating system topics.
Best of all, a greatly enhanced WileyPlus, a multitude of new problems and programming exercises, and other enhancements to this edition all work together to prepare you enter the world of operating systems with confidence.























                                     Download







McGraw-Hill Schaum's Outline of Programming with Cpp 2nd Edition

McGraw-Hill Schaum's Outline of
Programming with Cpp 2nd Edition


Description:


Fortunately for you, there are Schaum's Outlines. More than 40 million students have trusted Schaum's to help them succeed in the classroom and on exams. Schaum's is the key to faster learning and higher grades in every subject. Each Outline presents all the essential course information in an easy-to-follow, topic-by-topic format. You also get hundreds of examples, solved problems, and practice exercises to test your skills.

This Schaum's Outline gives you

  • Practice problems with full explanations that reinforce knowledge
  • Coverage of the most up-to-date developments in your course field
  • In-depth review of practices and applications
Fully compatible with your classroom text, Schaum's highlights all the important facts you need to know. Use Schaum's to shorten your study time-and get your best test scores!
Schaum's Outlines-Problem Solved.



















                         Download 






















Tuesday, 7 March 2017

Data Structures Problem Solving Using Java

Data Structures Problem Solving Using Java







Description:

Data Structures and Problem Solving Using Java takes a practical and unique approach to data structures that separates interface from implementation. It is suitable for the second or third programming course.

This book provides a practical introduction to data structures with an emphasis on abstract thinking and problem-solving, as well as the use of Java. It does this through what remains a unique approach that clearly separates each data structure’s interface (how to use a data structure) from its implementation (how to actually program that structure). Parts I (Tour of Java), II (Algorithms and Building Blocks), and III (Applications) lay the groundwork by discussing basic concepts and tools and providing some practical examples, while Part IV (Implementations) focuses on the implementation of data structures. This forces the reader to think about the functionality of the data structures before the hash table is implemented.

The Fourth Edition features many new updates as well as new exercises




















     

                         Download































Data Structures and Algorithm Analysis In C++ (4th edition)

Image result for data structures in c++ amazon

Data Structures and Algorithm Analysis
 In C++ (4th edition)




Description:

Data Structures and Algorithm Analysis in C++ is an advanced algorithms book that bridges the gap between traditional CS2 and Algorithms Analysis courses.
As the speed and power of computers increases, so does the need for effective programming and algorithm analysis. By approaching these skills in tandem, Mark Allen Weiss teaches readers to develop well-constructed, maximally efficient programs using the C++ programming language.
This book explains topics from binary heaps to sorting to NP-completeness, and dedicates a full chapter to amortized analysis and advanced data structures and their implementation. Figures and examples illustrating successive stages of algorithms contribute to Weiss’ careful, rigorous and in-depth analysis of each type of algorithm.













                          Download























Data Structures and Algorithms in Java

Image result for Data_Structures_and_Algorithms_in_Java amazon

Data Structures and Algorithms in Java







Description:

Data Structures and Algorithms in Java, Second Edition is designed to be easy to read and understand although the topic itself is complicated. Algorithms are the procedures that software programs use to manipulate data structures. Besides clear and simple example programs, the author includes a workshop as a small demonstration program executable on a Web browser. The programs demonstrate in graphical form what data structures look like and how they operate. In the second edition, the program is rewritten to improve operation and clarify the algorithms, the example programs are revised to work with the latest version of the Java JDK, and questions and exercises will be added at the end of each chapter making the book even more useful.

Educational Supplement
Suggested solutions to the programming projects found at the end of each chapter are made available to instructors at recognized educational institutions. This educational supplement can be found at www.prenhall.com, in the Instructor Resource Center.

















               

                            Download
























Accounting Principles10th edition

Image result for Accounting Principles10th edition amazon

Accounting Principles10th edition








Description:


Book by Weygandt, Jerry J., Kimmel, Paul D., Kieso, Donald E.



















                          Download





Data and Computer Communication 8th edition william stallings

Image result for Data and Computer Communication 8th edition william stallings amazon

Data and Computer Communication
8th edition William Stallings






Description:

Dr William Stallings is an American author. He has written textbooks on computer science topics such as operating systems, computer networks, computer organization, and cryptography. He also maintains a website titled Computer Science Student Resource. He has authored 17 titles and counting revised editions, a total of over 40 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently, he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.

Stallings received his doctorate in computer science from Massachusetts Institute of Technology.

He has received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association three times.
Bio from Wikipedia, the free encyclopaedia.


















                           Download



































Data and Computer Communication 8th edition william stallings Solution Manual

Image result for Data and Computer Communication 8th edition william stallings amazon

Data and Computer Communication 8th edition

 William Stallings Solution Manual





Description:

Dr William Stallings is an American author. He has written textbooks on computer science topics such as operating systems, computer networks, computer organization, and cryptography. He also maintains a website titled Computer Science Student Resource. He has authored 17 titles and counting revised editions, a total of over 40 books on various aspects of these subjects. In over 20 years in the field, he has been a technical contributor, technical manager, and an executive with several high-technology firms. Currently, he is an independent consultant whose clients have included computer and networking manufacturers and customers, software development firms, and leading-edge government research institutions.

Stallings received his doctorate in computer science from Massachusetts Institute of Technology.

He has received the award for the best Computer Science textbook of the year from the Text and Academic Authors Association three times.
Bio from Wikipedia, the free encyclopaedia.


















                           Download















Assembly Language for x86 Processors 6th edition (Prentice Hall)

Image result for Assembly Language for x86 Processors 6th edition (Prentice Hall) amazon

Assembly Language for x86 Processors
6th edition (Prentice Hall)






Description:

Assembly Language for x86 Processors, 6/e is ideal for undergraduate courses in assembly language programming and introductory courses in computer systems and computer architecture.

Written specifically for the Intel/Windows/DOS platform, this complete and fully updated study of assembly language teaches students to write and debug programs at the machine level. Based on the Intel processor family, the text simplifies and demystifies concepts that students need to grasp before they can go on to more advanced computer architecture and operating systems courses. Students put theory into practice through writing software at the machine level, creating a memorable experience that gives them the confidence to work in any OS/machine-oriented environment. Proficiency in one other programming language, preferably Java, C, or C++, is recommended.





















                          Download

























Art of Assembly Language 6th edition

Image result for Assembly Language for x86 Processors 6th edition (Prentice Hall) amazon

Art of assembly Language 6th edition 






Description:


Assembly Language for x86 Processors, 6/e is ideal for undergraduate courses in assembly language programming and introductory courses in computer systems and computer architecture.

Written specifically for the Intel/Windows/DOS platform, this complete and fully updated study of assembly language teaches students to write and debug programs at the machine level. Based on the Intel processor family, the text simplifies and demystifies concepts that students need to grasp before they can go on to more advanced computer architecture and operating systems courses. Students put theory into practice through writing software at the machine level, creating a memorable experience that gives them the confidence to work in any OS/machine-oriented environment. Proficiency in one other programming language, preferably Java, C, or C++, is recommended.















                         Download

















Monday, 6 March 2017

Probability & Statistics for Engineers & Scientists Solution Manual (Ninth Edition)

Image result for probability and statistics for engineers and scientists 9th edition amazon

Probability & Statistics for Engineers

& Scientists (Ninth Edition) Solution Manual




Description:


This classic text provides a rigorous introduction to basic probability theory and statistical inference, with a unique balance of theory and methodology. Interesting, relevant applications use real data from actual studies, showing how the concepts and methods can be used to solve problems in the field. This revision focuses on improved clarity and deeper understanding.














                                                       

                         Download












































Probability & Statistics for Engineers & Scientists (Ninth Edition)

Image result for probability and statistics for engineers and scientists 9th edition amazon

Probability & Statistics for Engineers
& Scientists (Ninth Edition)






Description:


This classic text provides a rigorous introduction to basic probability theory and statistical inference, with a unique balance of theory and methodology. Interesting, relevant applications use real data from actual studies, showing how the concepts and methods can be used to solve problems in the field. This revision focuses on improved clarity and deeper understanding.














                                                       

                         Download
















Saturday, 4 March 2017

Java how to program 9th edition.pdf

Image result for Java how to program 9th edition.pdf  amazon

Java how to program 9th edition.pdf 





Description:

The Deitels’ groundbreaking How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. Their Live Code Approach features thousands of lines of code in hundreds of complete working programs. This enables readers  to confirm that programs run as expected. Java How to Program (Early Objects) 9e contains an optional extensive OOD/UML 2 case study on developing and implementing the software for an automated teller machine.This edition covers both Java SE7 and SE6.











                                                           Download