505 Unbelievably Stupid Webpages

505 Unbelievably Stupid Webpages

Author: Dan Crowley

Publisher: Sourcebooks, Inc.

Published: 2007-11

Total Pages: 276

ISBN-13: 9781402248214

DOWNLOAD EBOOK

With more than 25,000 copies sold this new edition is completely updated and revised to include the most bizarre websites to emerge in the last few years.


505 Unbelievably Stupid Web Pages

505 Unbelievably Stupid Web Pages

Author: Dan Crowley

Publisher: Turtleback

Published: 2003-09-01

Total Pages:

ISBN-13: 9780613912396

DOWNLOAD EBOOK

Imagine the dumbest thing you've ever seen online. Here are 505 pages that put that to shame.


The Thing Around Your Neck

The Thing Around Your Neck

Author: Chimamanda Ngozi Adichie

Publisher: Knopf Canada

Published: 2010-06-01

Total Pages: 11

ISBN-13: 0307375234

DOWNLOAD EBOOK

These twelve dazzling stories from Chimamanda Ngozi Adichie — the Orange Broadband Prize–winning author of Half of a Yellow Sun — are her most intimate works to date. In these stories Adichie turns her penetrating eye to the ties that bind men and women, parents and children, Nigeria and the United States. In “A Private Experience,” a medical student hides from a violent riot with a poor Muslim woman, and the young mother at the centre of “Imitation” finds her comfortable life in Philadelphia threatened when she learns that her husband has moved his mistress into their Lagos home. Searing and profound, suffused with beauty, sorrow and longing, this collection is a resounding confirmation of Adichie’s prodigious literary powers.


The Basics of Hacking and Penetration Testing

The Basics of Hacking and Penetration Testing

Author: Patrick Engebretson

Publisher: Elsevier

Published: 2013-06-24

Total Pages: 223

ISBN-13: 0124116418

DOWNLOAD EBOOK

The Basics of Hacking and Penetration Testing, Second Edition, serves as an introduction to the steps required to complete a penetration test or perform an ethical hack from beginning to end. The book teaches students how to properly utilize and interpret the results of the modern-day hacking tools required to complete a penetration test. It provides a simple and clean explanation of how to effectively utilize these tools, along with a four-step methodology for conducting a penetration test or hack, thus equipping students with the know-how required to jump start their careers and gain a better understanding of offensive security.Each chapter contains hands-on examples and exercises that are designed to teach learners how to interpret results and utilize those results in later phases. Tool coverage includes: Backtrack Linux, Google reconnaissance, MetaGooFil, dig, Nmap, Nessus, Metasploit, Fast Track Autopwn, Netcat, and Hacker Defender rootkit. This is complemented by PowerPoint slides for use in class.This book is an ideal resource for security consultants, beginning InfoSec professionals, and students. - Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases - Written by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University - Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test


The Algorithm Design Manual

The Algorithm Design Manual

Author: Steven S Skiena

Publisher: Springer Science & Business Media

Published: 2009-04-05

Total Pages: 742

ISBN-13: 1848000707

DOWNLOAD EBOOK

This newly expanded and updated second edition of the best-selling classic continues to take the "mystery" out of designing algorithms, and analyzing their efficacy and efficiency. Expanding on the first edition, the book now serves as the primary textbook of choice for algorithm design courses while maintaining its status as the premier practical reference guide to algorithms for programmers, researchers, and students. The reader-friendly Algorithm Design Manual provides straightforward access to combinatorial algorithms technology, stressing design over analysis. The first part, Techniques, provides accessible instruction on methods for designing and analyzing computer algorithms. The second part, Resources, is intended for browsing and reference, and comprises the catalog of algorithmic resources, implementations and an extensive bibliography. NEW to the second edition: • Doubles the tutorial material and exercises over the first edition • Provides full online support for lecturers, and a completely updated and improved website component with lecture slides, audio and video • Contains a unique catalog identifying the 75 algorithmic problems that arise most often in practice, leading the reader down the right path to solve them • Includes several NEW "war stories" relating experiences from real-world applications • Provides up-to-date links leading to the very best algorithm implementations available in C, C++, and Java


The Art of Deception

The Art of Deception

Author: Kevin D. Mitnick

Publisher: John Wiley & Sons

Published: 2011-08-04

Total Pages: 375

ISBN-13: 076453839X

DOWNLOAD EBOOK

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.