Lists

Picture of a book: the elements of computing systems: building a modern computer from first principles
Picture of a book: The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary
Picture of a book: UNIX and Linux System Administration Handbook
Picture of a book: Hacking: The Art of Exploitation

4 Books

Coding

Sort by:
Recent Desc

Inspired by this list

Picture of a book: Metasploit: The Penetration Tester's Guide
books

Metasploit: The Penetration Tester's Guide

"The best guide to the Metasploit Framework."--HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.Learn how to:Find and exploit unmaintained, misconfigured, and unpatched systemsPerform reconnaissance and find valuable information about your targetBypass anti-virus technologies and circumvent security controlsIntegrate Nmap, NeXpose, and Nessus with Metasploit to automate discoveryUse the Meterpreter shell to launch further attacks from inside the networkHarness standalone Metasploit utilities, third-party tools, and plug-insLearn how to write your own Meterpreter post exploitation modules and scriptsYou'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Picture of a book: Hacking Exposed: Network Security Secrets & Solutions
books

Hacking Exposed: Network Security Secrets & Solutions

Stuart McClure, Joel Scambray, George Kurtz
\ The world's bestselling computer security book—fully expanded and updated\ "Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company, and your country fight cyber-crime." —From the Foreword by Dave DeWalt, President and CEO, McAfee, Inc."For security to be successful in any company, you must ‘think evil' and be attuned to your ‘real risk'...Hacking Expose 6 defines both." —Patrick Heim, CISO, Kaiser Permanente"The definitive resource to understanding the hacking mindset and the defenses against it." —Vince Rossi, CEO & President, St. Bernard Software"Identity theft costs billions every year and unless you understand the threat, you will be destined to be a victim of it. Hacking Exposed 6 gives you the tools you need to prevent being a victim." —Bill Loesch, CTO, Guard ID Systems"This book is current, comprehensive, thoughtful, backed by experience, and appropriately free of vendor-bias-prized features for any security practitioner in need of information." —Kip Boyle, CISO, PEMCO Mutual Insurance Company"The Hacking Exposed series has become the definitive reference for security professionals from the moment it was first released, and the 6th edition maintains its place on my bookshelf," —Jeff Moss, Founder of the popular Black Hat Security ConferenceMeet the formidable demands of security in today's hyperconnected world with expert guidance from the world-renowned Hacking Exposed team. Following the time-tested "attack-countermeasure" philosophy, this 10th anniversary edition has been fully overhauled to cover the latest insidious weapons in the hacker's extensive arsenal.New and updated material: \ New chapter on hacking hardware, including lock bumping, access card cloning, RFID hacks, USB U3 exploits, and Bluetooth device hijacking \ Updated Windows attacks and countermeasures, including new Vista and Server 2008 vulnerabilities and Metasploit exploits \ The latest UNIX Trojan and rootkit techniques and dangling pointer and input validation exploits \ New wireless and RFID security tools, including multilayered encryption and gateways \ All-new tracerouting and eavesdropping techniques used to target network hardware and Cisco devices \ Updated DoS, man-in-the-middle, DNS poisoning, and buffer overflow coverage \ VPN and VoIP exploits, including Google and TFTP tricks, SIP flooding, and IPsec hacking \ Fully updated chapters on hacking the Internet user, web hacking, and securing code
Picture of a book: The Hacker Crackdown: Law and Disorder on the Electronic Frontier
books

The Hacker Crackdown: Law and Disorder on the Electronic Frontier

Nonfiction! Woo! Computer CRIME!This is a classic non-fiction about late eighties and very early nineties hacking from both sides of the law, but what is most most interesting is not that it's written by a classic cyberpunk author, but that it's written in such a way as to awe and amaze us readers even this late in the internet game... before there was truly a real Internet. BBS's and phreaking was is its own kind of world, as was trashing and other kinds of social engineering. Not that we don't have our modern equivalents with our threads and skype.... and trashing and social engineering. :) Ah well, some things never change. :) But these days, the kinds of overreactions have really changed into all new kinds of overreactions. :)Still, it was kinda amazing to see just how crazy the computer world was back then. SOMEONE COPIED AN ELECTRONIC FILE! And each copy was worth 80K! (To who? No idea. It was about how the emergency 911 calls got routed through the telecom system. No one intended to do crap with it, but of course it became a big hoo-haw. With time in jail.) Seriously. It's like dark age stuff, and we're talking 1990.And then there was the phone outages that were AT&T's own fault, and yet they tried to blame everything on hackers who had absolutely nothing to do with it, and let's not forget the scares and the craze about just how evil these people are! You know, that 14 year old who is bragging to all his mates because he got into someone's system and he's treating it as a game without consequences? Yeah! That EVIL PERSON. Of course, there are real criminals out there but they're all identity theft people and credit swindlers, but most of them are just individuals who's gotten very specialized with very specific features of a computer. These aren't coders or creative types or explorers. These are just people trying to steal your wallet, and those people are a menace.It's really interesting to read about both sides of the coin and to see what horrible and stupid mistakes both sides made. Steve Jackson Games being the most prominent example, of course. Paladium Books! Obviously they're in deep. And the Secret Service never gave them their computers back. How embarrassing.This is equal parts a blast from the past and it's an exploration about how idiotic people are in real life. It's kinda freaky. :) I wouldn't be surprised if this book remains popular twenty years from now as a classic frontier novel. :)
Picture of a book: Applied Cryptography: Protocols, Algorithms, and Source Code in C
books

Applied Cryptography: Protocols, Algorithms, and Source Code in C

"…the best introduction to cryptography I've ever seen. … The book the National Security Agency wanted never to be published." –Wired Magazine "…monumental… fascinating… comprehensive… the definitive work on cryptography for computer programmers…" –Dr. Dobb's Journal"…easily ranks as one of the most authoritative in its field." —PC Magazine"…the bible of code hackers." –The Millennium Whole Earth CatalogThis new edition of the cryptography classic provides you with a comprehensive survey of modern cryptography. The book details how programmers and electronic communications professionals can use cryptography—the technique of enciphering and deciphering messages-to maintain the privacy of computer data. It describes dozens of cryptography algorithms, gives practical advice on how to implement them into cryptographic software, and shows how they can be used to solve security problems. Covering the latest developments in practical cryptographic techniques, this new edition shows programmers who design computer applications, networks, and storage systems how they can build security into their software and systems. What's new in the Second Edition? * New information on the Clipper Chip, including ways to defeat the key escrow mechanism * New encryption algorithms, including algorithms from the former Soviet Union and South Africa, and the RC4 stream cipher * The latest protocols for digital signatures, authentication, secure elections, digital cash, and more * More detailed information on key management and cryptographic implementations
Picture of a book: Hacker's Delight
books

Hacker's Delight

Henry S. Warren Jr.
Imagine a minicomputer programmer in 1972 or a microcomputer programmer in 1982 who needed to implement more integer operations than the standard plus, minus, bitwise and, or and xor provided by the computer's architecture: things like the number of one bits in a word, the position of the rightmost one bit in a word, cyclic redundancy check, the difference between two integers or zero if it is negative, and so on. It is possible to write straightforward algorithms implementing these operations, but it is also possible to do it by combining bitwise logical and arithmetic operations in a clever trick. This book is a chock full of such tricks. The problem is that by 2012, none of it made sense. First, silicon is so cheap nowadays that many of these operations are implemented in hardware in commodity processors: Intel architecture processors have had an instruction for the position of the rightmost one bit in a word since the 80386; ARM processors have had it since version 5 of their architecture. Second, modern processors are superscalar: they execute multiple instructions at the same time unless there are data dependencies between the instructions; in order to compare the performance of a straightforward algorithm with that of a tricky one, one has to look at these dependencies, which the book doesn't. Third, since the 1990s, many commodity processors have had a vector instruction set: MMX and SSEx in the Intel architecture, AltiVec in the Power architecture, and so on; one would think that if the goal is to speed things up, one would look at them, but they do not merit a mention in this book. So one should look at this book as being not so much a practical computer science book as a microprocessor-punk novel.
Picture of a book: Linux Kernel Development
books

Linux Kernel Development

Robert Love
"Linux Kernel Development" details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding. The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs. The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers. The third edition of Linux Kernel Development includes new and updated material throughout the book:An all-new chapter on kernel data structuresDetails on interrupt handlers and bottom halvesExtended coverage of virtual memory and memory allocationTips on debugging the Linux kernelIn-depth coverage of kernel synchronization and lockingUseful insight into submitting kernel patches and working with the Linux kernel community
Picture of a book: Understanding the Linux Kernel
books

Understanding the Linux Kernel

Daniel P. Bovet, Marco Cesati
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks.The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:Memory management, including file buffering, process swapping, and Direct memory Access (DMA)The Virtual Filesystem layer and the Second and Third Extended FilesystemsProcess creation and schedulingSignals, interrupts, and the essential interfaces to device driversTimingSynchronization within the kernelInterprocess Communication (IPC)Program executionUnderstanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.