- Table View
- List View
Practical IoT Hacking: The Definitive Guide to Attacking the Internet of Things
by Fotios Chantzis Ioannis Stais Paulino Calderon Evangelos Deirmentzoglou Beau WoodsThe definitive guide to hacking the world of the Internet of Things (IoT) -- Internet connected devices such as medical devices, home assistants, smart home appliances and more.Drawing from the real-life exploits of five highly regarded IoT security researchers, Practical IoT Hacking teaches you how to test IoT systems, devices, and protocols to mitigate risk. The book begins by walking you through common threats and a threat modeling framework. You&’ll develop a security testing methodology, discover the art of passive reconnaissance, and assess security on all layers of an IoT system. Next, you&’ll perform VLAN hopping, crack MQTT authentication, abuse UPnP, develop an mDNS poisoner, and craft WS-Discovery attacks. You&’ll tackle both hardware hacking and radio hacking, with in-depth coverage of attacks against embedded IoT devices and RFID systems. You&’ll also learn how to: • Write a DICOM service scanner as an NSE module • Hack a microcontroller through the UART and SWD interfaces • Reverse engineer firmware and analyze mobile companion apps • Develop an NFC fuzzer using Proxmark3 • Hack a smart home by jamming wireless alarms, playing back IP camera feeds, and controlling a smart treadmill The tools and devices you&’ll use are affordable and readily available, so you can easily practice what you learn. Whether you&’re a security researcher, IT team member, or hacking hobbyist, you&’ll find Practical IoT Hacking indispensable in your efforts to hack all the things REQUIREMENTS: Basic knowledge of Linux command line, TCP/IP, and programming
Foundations of Information Security: A Straightforward Introduction
by Jason AndressHigh-level overview of the information security field. Covers key concepts like confidentiality, integrity, and availability, then dives into practical applications of these ideas in the areas of operational, physical, network, application, and operating system security.In this high-level survey of the information security field, best-selling author Jason Andress covers the basics of a wide variety of topics, from authentication and authorization to maintaining confidentiality and performing penetration testing.Using real-world security breaches as examples, Foundations of Information Security explores common applications of these concepts, such as operations security, network design, hardening and patching operating systems, securing mobile devices, as well as tools for assessing the security of hosts and applications. You'll also learn the basics of topics like:Multifactor authentication and how biometrics and hardware tokens can be used to harden the authentication processThe principles behind modern cryptography, including symmetric and asymmetric algorithms, hashes, and certificatesThe laws and regulations that protect systems and dataAnti-malware tools, firewalls, and intrusion detection systemsVulnerabilities such as buffer overflows and race conditionsA valuable resource for beginning security professionals, network systems administrators, or anyone new to the field, Foundations of Information Security is a great place to start your journey into the dynamic and rewarding field of information security.
Trauma Through a Child's Eyes: Awakening the Ordinary Miracle of Healing
by Peter A. Levine Ph.D. Maggie KlineWhat parents, educators, and health professionals can do to recognize, prevent, and heal childhood trauma, from infancy through adolescence—by the author of Waking the TigerTrauma can result not only from catastrophic events such as abuse, violence, or loss of loved ones, but from natural disasters and everyday incidents like auto accidents, medical procedures, divorce, or even falling off a bicycle. At the core of this book is the understanding of how trauma is imprinted on the body, brain, and spirit—often resulting in anxiety, nightmares, depression, physical illnesses, addictions, hyperactivity, and aggression. Rich with case studies and hands-on activities, Trauma Through a Child&’s Eyes gives insight into children&’s innate ability to rebound with the appropriate support, and provides their caregivers with tools to overcome and prevent trauma.&“Trauma Through A Child&’s Eyes . . . creates its own mold in a way that everyone concerned with the health and happiness of children will be grateful for.&” —Gabor Maté, MD, author of Hold On to Your Kids
Evading EDR: The Definitive Guide to Defeating Endpoint Detection Systems.
by Matt HandEDR, demystified! Stay a step ahead of attackers with this comprehensive guide to understanding the attack-detection software running on Microsoft systems—and how to evade it.Nearly every enterprise uses an Endpoint Detection and Response (EDR) agent to monitor the devices on their network for signs of an attack. But that doesn't mean security defenders grasp how these systems actually work. This book demystifies EDR, taking you on a deep dive into how EDRs detect adversary activity. Chapter by chapter, you&’ll learn that EDR is not a magical black box—it&’s just a complex software application built around a few easy-to-understand components.The author uses his years of experience as a red team operator to investigate each of the most common sensor components, discussing their purpose, explaining their implementation, and showing the ways they collect various data points from the Microsoft operating system. In addition to covering the theory behind designing an effective EDR, each chapter also reveals documented evasion strategies for bypassing EDRs that red teamers can use in their engagements.
DEN Volume 3: Children of Fire (DEN)
by Richard CorbenThe third volume presenting the long-out-print masterpiece Den, by fantasy legend Richard Corben!This special edition collects the third volume of the long out-of-print Den, and also features bonus material, art pages restored by long-time Corben collaborator José Villarrubia, re-lettered by Nate Piekos of Blambot, and an introduction by Matt Kindt, all presented in a gorgeous hardcover with a dust jacket.Aliens flee their planet after a monster attack and crash-land near a sorcerer&’s castle in Neverwhere. They must fight for survival and protect their egg and future kin at all costs from the many beasts, pirates, and other threats to their safety.Den: Children of Fire is the next book in a series of deluxe graphic novels from renowned creator Richard Corben&’s library to be published by Dark Horse Comics.FOR MATURE READERS&“The artist I most want to aspire to is Richard Corben. His style is visual and it tells the story just as you see it... ...my favorite is Corben. I love everything he does, I love his stuff ...he&’s an amazing artist.&”—Guillermo del Toro"Richard Corben stands among us like an extraterrestrial peak. He has sat in his throne a long time, above the moving and multi-colored field of world comics, like an effigy of the leader, a strange monolith, a sublime visitor, a solitary enigma"—Moebius&“Mr. Richard Corben... a genuine giant of his chosen medium.&”—Alan MooreWell known for his legendary fantasy underground masterpieces published by Fantagor Press as well as Heavy Metal, Richard Corben&’s work has been recognized internationally having been awarded one of the most prestigious recognitions in comics literature the Grand Prix at Angoulême as well having been inducted into the Will Eisner Award Hall of Fame.
War and Peace: A Historical Novel, Volume 2 (Modern Library Classics)
by Leo TolstoyNominated as one of America&’s best-loved novels by PBS&’s The Great American ReadOften called the greatest novel ever written, War and Peace is at once an epic of the Napoleonic Wars, a philosophical study, and a celebration of the Russian spirit. Tolstoy&’s genius is seen clearly in the multitude of characters in this massive chronicle—all of them fully realized and equally memorable. Out of this complex narrative emerges a profound examination of the individual&’s place in the historical process, one that makes it clear why Thomas Mann praised Tolstoy for his Homeric powers and placed War and Peace in the same category as the Iliad: &“To read him . . . is to find one&’ s way home . . . to everything within us that is fundamental and sane.&”
The Tangled Web: A Guide to Securing Modern Web Applications
by Michal ZalewskiModern web applications are built on a tangle of technologies that have been developed over time and then haphazardly pieced together. Every piece of the web application stack, from HTTP requests to browser-side scripts, comes with important yet subtle security consequences. To keep users safe, it is essential for developers to confidently navigate this landscape.In The Tangled Web, Michal Zalewski, one of the world’s top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they’re fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security.You’ll learn how to:–Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization–Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing–Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs–Build mashups and embed gadgets without getting stung by the tricky frame navigation policy–Embed or host user-supplied content without running into the trap of content sniffingFor quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you’re most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.
Human Longevity: Omega-3 Fatty Acids, Bioenergetics, Molecular Biology, and Evolution
by Raymond C. Valentine David L. ValentineMore than 7 billion people inhabit the earth and all of them are subject to aging. This book is aimed at persons interested in a molecular explanation of how our cells age. Human Longevity: Omega-3 Fatty Acids, Bioenergetics, Molecular Biology, and Evolution is built on the proposition that we age as our mitochondria age. It suggests a revised vers
Handbook of Functional Beverages and Human Health (Nutraceutical Science and Technology)
by Fereidoon Shahidi Cesarettin AlasalvarHandbook of Functional Beverages and Human Health provides potential applications and new developments in functional beverages, nutraceuticals, and health foods. In addition to serving as a reference manual, it summarizes the current state of knowledge in key research areas and contains novel ideas for future research and development. Additionally,
Dermatotoxicology
by Klaus-Peter Wilhelm Hongbo Zhai Howard I. MaibachThe foundational reference in dermal toxicology, this classic text has been completely revised to bring it up to date in the new Eighth Edition, with almost a third of its chapters being newly added. The structure of the text has also been reorganized to enable easier location of a topic of interest. With contributions from leading international ex
Essential Oil-Bearing Grasses: The genus Cymbopogon
by Anand AkhilaWhen enjoying a southeast asian soup or cup of herbal tea, we are really savoring the flavor of lemongrass. Similarly, the sweet aroma of mosquito-repelling lotions comes from the citronella oil present in them. Fine perfumes, candles, and herbal pillows with the pleasing smell of rose are often in fact scented with palmarosa. Providing an in-depth
The Unified Process Construction Phase: Best Practices in Implementing the UP
by Scott AmblerIs the Unified Process the be all and end all standard for developing object-oriented component-based software? This book focuses on the design and implementation skeletal versions of systems for purposes of testing early in the life cycle for quality control.
Handbook of Spatial Epidemiology (Chapman & Hall/CRC Handbooks of Modern Statistical Methods)
by Andrew B. Lawson Sudipto Banerjee Robert P. Haining María Dolores UgarteHandbook of Spatial Epidemiology explains how to model epidemiological problems and improve inference about disease etiology from a geographical perspective. Top epidemiologists, geographers, and statisticians share interdisciplinary viewpoints on analyzing spatial data and space-time variations in disease incidences. These analyses can provide imp
The Hilbert-Huang Transform in Engineering
by Norden Huang Nii O. Attoh-OkineData used to develop and confirm models suffer from several shortcomings: the total data is too limited, the data are non-stationary, and the data represent nonlinear processes. The Hilbert-Huang transform (HHT) is a relatively new method that has grown into a robust tool for data analysis and is ready for a wide variety of applications.Thi
Get Through Final FRCA: MCQs (Get Through)
by Nawal Bahal Mubeen Khan Aliki ManorasWith more than 950 questions, and containing diagrams found in the actual exam, this book encompasses the syllabus of the Final FRCA as set by the Royal College of Anaesthetists, including five complete examinations, each comprising of 90 MCQs. Questions have been modelled on actual exam questions so that they accurately reflect the style and level
A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis (Chapman & Hall/CRC Applied Algorithms and Data Structures series)
by Anne Benoit Yves Robert Frédéric VivienPresenting a complementary perspective to standard books on algorithms, A Guide to Algorithm Design: Paradigms, Methods, and Complexity Analysis provides a roadmap for readers to determine the difficulty of an algorithmic problem by finding an optimal solution or proving complexity results. It gives a practical treatment of algorithmic complexity and guides readers in solving algorithmic problems.Divided into three parts, the book offers a comprehensive set of problems with solutions as well as in-depth case studies that demonstrate how to assess the complexity of a new problem. Part I helps readers understand the main design principles and design efficient algorithms. Part II covers polynomial reductions from NP-complete problems and approaches that go beyond NP-completeness. Part III supplies readers with tools and techniques to evaluate problem complexity, including how to determine which instances are polynomial and which are NP-hard. Drawing on the authors’ classroom-tested material, this text takes readers step by step through the concepts and methods for analyzing algorithmic complexity. Through many problems and detailed examples, readers can investigate polynomial-time algorithms and NP-completeness and beyond.
Multimedia over Cognitive Radio Networks: Algorithms, Protocols, and Experiments
by Fei Hu Sunil KumarWith nearly 7 billion mobile phone subscriptions worldwide, mobility and computing have become pervasive in our society and business. Moreover, new mobile multimedia communication services are challenging telecommunication operators. To support the significant increase in multimedia traffic-especially video-over wireless networks, new technological
The Quiet Americans: Four CIA Spies at the Dawn of the Cold War--a Tragedy in Three Acts
by Scott AndersonFrom the bestselling author of Lawrence in Arabia—the gripping story of four CIA agents during the early days of the Cold War—and how the United States, at the very pinnacle of its power, managed to permanently damage its moral standing in the world. &“Enthralling … captivating reading.&” —The New York Times Book Review At the end of World War II, the United States was considered the victor over tyranny and a champion of freedom. But it was clear—to some—that the Soviet Union was already seeking to expand and foment revolution around the world, and the American government&’s strategy in response relied on the secret efforts of a newly formed CIA. Chronicling the fascinating lives of four agents, Scott Anderson follows the exploits of four spies: Michael Burke, who organized parachute commandos from an Italian villa; Frank Wisner, an ingenious spymaster who directed actions around the world; Peter Sichel, a German Jew who outwitted the ruthless KGB in Berlin; and Edward Lansdale, a mastermind of psychological warfare in the Far East. But despite their lofty ambitions, time and again their efforts went awry, thwarted by a combination of ham-fisted politicking and ideological rigidity at the highest levels of the government.
Automate the Boring Stuff with Python, 2nd Edition: Practical Programming for Total Beginners
by Al SweigartLearn how to code while you write programs that effortlessly perform useful feats of automation!The second edition of this international fan favorite includes a brand-new chapter on input validation, Gmail and Google Sheets automations, tips for updating CSV files, and more.If you've ever spent hours renaming files or updating spreadsheet cells, you know how tedious tasks like these can be. But what if you could have your computer do them for you? Automate the Boring Stuff with Python, 2nd Edition teaches even the technically uninclined how to write programs that do in minutes what would take hours to do by hand—no prior coding experience required!This new, fully revised edition of Al Sweigart&’s bestselling Pythonic classic, Automate the Boring Stuff with Python, covers all the basics of Python 3 while exploring its rich library of modules for performing specific tasks, like scraping data off the Web, filling out forms, renaming files, organizing folders, sending email responses, and merging, splitting, or encrypting PDFs. There&’s also a brand-new chapter on input validation, tutorials on automating Gmail and Google Sheets, tips on automatically updating CSV files, and other recent feats of automations that improve your efficiency.Detailed, step-by-step instructions walk you through each program, allowing you to create useful tools as you build out your programming skills, and updated practice projects at the end of each chapter challenge you to improve those programs and use your newfound skills to automate similar tasks. Boring tasks no longer have to take to get through—and neither does learning Python!
Getting Started with FPGAs: Digital Circuit Design, Verilog, and VHDL for Beginners
by Russell MerrickSkip the complexity and learn to program FPGAs the easy way through this hands-on, beginner-friendly introduction to digital circuit design with Verilog and VHDL.Whether you have been toying with field programmable gate arrays (FPGAs) for years or are completely new to these reprogrammable devices, this book will teach you to think like an FPGA engineer and develop reliable designs with confidence.Through detailed code examples, patient explanations, and hands-on projects, Getting Started with FPGAs will actually get you started. Russell Merrick, creator of the popular blog Nandland.com, will guide you through the basics of digital logic, look-up tables, and flip-flops, as well as high-level concepts like state machines. You&’ll explore the fundamentals of the FPGA build process including simulation, synthesis, and place and route.You&’ll learn about key FPGA primitives, such as DSP blocks and PLLs, and examine how FPGAs handle math operations and I/O.Code examples are provided in both Verilog and VHDL, making the book a valuable resource no matter your language of choice. You&’ll discover how to:Implement common design building blocks like multiplexers, LFSRs, and FIFOsCross between clock domains without triggering metastable conditions or timing errorsAvoid common pitfalls when performing mathTransmit and receive data at lightning speeds using SerDesWrite testbench code to verify your designs are workingWith this accessible, hands-on guide, you&’ll be creating your own functional FPGA projects in no time. Getting started with FPGAs has never been easier.
Hacks, Leaks, and Revelations: The Art of Analyzing Hacked and Leaked Data
by Micah LeeData-science investigations have brought journalism into the 21st century, and—guided by The Intercept&’s infosec expert Micah Lee— this book is your blueprint for uncovering hidden secrets in hacked datasets.Unlock the internet&’s treasure trove of public interest data with Hacks, Leaks, and Revelations by Micah Lee, an investigative reporter and security engineer. This hands-on guide blends real-world techniques for researching large datasets with lessons on coding, data authentication, and digital security. All of this is spiced up with gripping stories from the front lines of investigative journalism.Dive into exposed datasets from a wide array of sources: the FBI, the DHS, police intelligence agencies, extremist groups like the Oath Keepers, and even a Russian ransomware gang. Lee&’s own in-depth case studies on disinformation-peddling pandemic profiteers and neo-Nazi chatrooms serve as blueprints for your research.Gain practical skills in searching massive troves of data for keywords like &“antifa&” and pinpointing documents with newsworthy revelations. Get a crash course in Python to automate the analysis of millions of files.You will also learn how to:Master encrypted messaging to safely communicate with whistleblowers.Secure datasets over encrypted channels using Signal, Tor Browser, OnionShare, and SecureDrop.Harvest data from the BlueLeaks collection of internal memos, financial records, and more from over 200 state, local, and federal agencies.Probe leaked email archives about offshore detention centers and the Heritage Foundation.Analyze metadata from videos of the January 6 attack on the US Capitol, sourced from the Parler social network.We live in an age where hacking and whistleblowing can unearth secrets that alter history. Hacks, Leaks, and Revelations is your toolkit for uncovering new stories and hidden truths. Crack open your laptop, plug in a hard drive, and get ready to change history.
Learn Robotics with Raspberry Pi: Build and Code Your Own Moving, Sensing, Thinking Robots
by Matt Timmons-BrownIn Learn Robotics with Raspberry Pi, you'll learn how to build and code your own robot projects with just the Raspberry Pi microcomputer and a few easy-to-get components - no prior experience necessary!Learn Robotics with Raspberry Pi will take you from inexperienced maker to robot builder. You'll start off building a two-wheeled robot powered by a Raspberry Pi minicomputer and then program it using Python, the world's most popular programming language. Gradually, you'll improve your robot by adding increasingly advanced functionality until it can follow lines, avoid obstacles, and even recognize objects of a certain size and color using computer vision. Learn how to:- Control your robot remotely using only a Wii remote- Teach your robot to use sensors to avoid obstacles- Program your robot to follow a line autonomously - Customize your robot with LEDs and speakers to make it light up and play sounds- See what your robot sees with a Pi CameraAs you work through the book, you'll learn fundamental electronics skills like how to wire up parts, use resistors and regulators, and determine how much power your robot needs. By the end, you'll have learned the basics of coding in Python and know enough about working with hardware like LEDs, motors, and sensors to expand your creations beyond simple robots.
Black Hat Go: Go Programming For Hackers and Pentesters
by Tom Steele Chris Patten Dan KottmannLike the best-selling Black Hat Python, Black Hat Go explores the darker side of the popular Go programming language. This collection of short scripts will help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset.Black Hat Go explores the darker side of Go, the popular programming language revered by hackers for its simplicity, efficiency, and reliability. It provides an arsenal of practical tactics from the perspective of security practitioners and hackers to help you test your systems, build and automate tools to fit your needs, and improve your offensive security skillset, all using the power of Go.You'll begin your journey with a basic overview of Go's syntax and philosophy and then start to explore examples that you can leverage for tool development, including common network protocols like HTTP, DNS, and SMB. You'll then dig into various tactics and problems that penetration testers encounter, addressing things like data pilfering, packet sniffing, and exploit development. You'll create dynamic, pluggable tools before diving into cryptography, attacking Microsoft Windows, and implementing steganography.You'll learn how to:Make performant tools that can be used for your own security projectsCreate usable tools that interact with remote APIsScrape arbitrary HTML dataUse Go's standard package, net/http, for building HTTP serversWrite your own DNS server and proxyUse DNS tunneling to establish a C2 channel out of a restrictive networkCreate a vulnerability fuzzer to discover an application's security weaknessesUse plug-ins and extensions to future-proof productsBuild an RC2 symmetric-key brute-forcerImplant data within a Portable Network Graphics (PNG) image.Are you ready to add to your arsenal of security tools? Then let's Go!
Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
by James ForshawAttacking Network Protocols is a deep dive into network protocol security from James Forshaw, one of the world&’s leading bug hunters. This comprehensive guide looks at networking from an attacker&’s perspective to help you discover, exploit, and ultimately protect vulnerabilities.You&’ll start with a rundown of networking basics and protocol traffic capture before moving on to static and dynamic protocol analysis, common protocol structures, cryptography, and protocol security. Then you&’ll turn your focus to finding and exploiting vulnerabilities, with an overview of common bug classes, fuzzing, debugging, and exhaustion attacks. Learn how to:- Capture, manipulate, and replay packets- Develop tools to dissect traffic and reverse engineer code to understand the inner workings of a network protocol- Discover and exploit vulnerabilities such as memory corruptions, authentication bypasses, and denials of service- Use capture and analysis tools like Wireshark and develop your own custom network proxies to manipulate network trafficAttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to understand and discover network vulnerabilities.
Drive: Scraping By in Uber's America, One Ride at a Time
by Jonathan RigsbyOne father, 3 years, and thousands of ridesPoverty, By America meets Maid in this dad&’s darkly humorous yet humanizing story of working long hours and late nights behind the wheel as a rideshare driverJonathan Rigsby spends his days as a crime intelligence analyst and his nights as an Uber driver. Reeling from his divorce and struggling to pay rent while caring for his autistic son, Rigsby became a rideshare driver, joining the millions of people with a side hustle just to make ends meet.With a compelling blend of honesty and sardonic wit, Rigsby invites readers into his car to reveal the harsh reality of gig work for so many: grueling hours, living paycheck to paycheck, and hoping to avoid disaster long enough to prepare for the next bill. Along the way, he showcases the humor and humanity in the private moments of vulnerability that happen when people are left alone with a stranger—from the amusing tales of drunk college students to a passenger getting sick on the dashboard, a mother expressing distress about her son&’s addiction, and a violent encounter on the job.Unflinching and raw, Drive exposes an ugly truth that hides in the gaudy background of the American dream: you can do everything right and still fail. Buckle up.