Author: Eric Charton
Publisher: Pearson Education France
Que veulent les hackers, pourquoi êtes-vous leur cible ? Quelles sont leurs techniques pour modifier le contenu de votre disque dur, pénétrer dans l'intranet de votre entreprise ou encore pirater vos mots de passe ? Qu'ils cherchent à asservir votre ordinateur, à voler votre identité réelle ou sur les réseaux sociaux, les hackers utilisent des méthodes contre lesquelles il est possible de développer des contre-mesures efficaces et se protéger durablement. Toutes les réponses sont dans cet ouvrage: Nouvelles informations sur les logiciels de décodage de mots de passe, d'asservissement de PC, de scan de réseaux sans fil. Exposition des principes de la stéganographie, présentation des coffres-forts logiciels ainsi que des logiciels d'anonymat. Description du phénomène des botnets. Méthodes de hacking dans les réseaux sociaux. Étude détaillée de la question de l'identité numérique. Cette édition a été revue, corrigée et propose des nouveautés : Protection de ses données personnelles sur les réseaux Wifi. Cracker les clés WEP et se protéger. Utilisation et protection des tablettes et smartphones pour le hacking. Vulnérabilités d'iOS et Android. Ingénierie sociale.
This book teaches you everything you need to know to understand computer programming at a fundamental level. You will learn what the major programming langauiges are, how they work, and what to do.
A listing of computer-buff slang is embellished by the myths, legends, and heroes of a hacker culture
Includes, 1982-1995: Les Livres du mois, also published separately.
Author: Jim O'Gorman, Devon Kearns, Mati Aharoni
Publisher: No Starch Press
"The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, documentation is lacking and the tool can be hard to grasp for first-time users. Metasploit: A Penetration Tester's Guide fills this gap by teaching you how to harness the Framework, use its many features, and interact with the vibrant community of Metasploit contributors. The authors begin by building a foundation for penetration testing and establishing a fundamental methodology. From there, they explain the Framework's conventions, interfaces, and module system, as they show you how to assess networks with Metasploit by launching simulated attacks. Having mastered the essentials, you'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, devastating wireless attacks, and targeted social engineering attacks. Metasploit: A Penetration Tester's Guide willteach you how to: Find and exploit unmaintained, misconfigured, and unpatched systems Perform reconnaissance and find valuable information about your target Bypass anti-virus technologies and circumvent security controls Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery Use the Meterpreter shell to launch further attacks from inside the network Harness standalone Metasploit utilities, third-party tools, and plug-ins Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to make your own networks more secure or to put someone else's to the test, Metasploit: A Penetration Tester's Guide will take you there and beyond"--
why's (poignant) Guide to Ruby, sometimes called w(p)GtR or just "the poignant guide", is an introductory book to the Ruby programming language, written by why the lucky stiff. The book is distributed under the Creative Commons Attribution-ShareAlike license.The book is unusual among programming books in that it includes quite a lot of strange humour and narrative side tracks which are sometimes completely unrelated to the topic. Many motifs have become inside jokes in the Ruby community, such as references to the words "chunky bacon". The book includes many characters which have become popular as well, particularly the cartoon foxes and Trady Blix, a large black feline friend of why's, who acts as a guide to the foxes (and occasionally teaches them some Ruby).
Crimes of the Internet
Author: Frank Schmalleger, Michael Pittaro
Publisher: Pearson Prentice Hall
This book contains 31 original scholarly articles on all aspects of cybercrime--from emerging global crimes of the Internet, to criminological perspectives on cybercrime to investigating and prosecuting cybercrimes. Offering a collection of previously unpublished works, this book examines emerging global crimes, challenges faced by law enforcement, and the underlying reasons for the rise in such activities. Through a variety of essays, it explores the role of the cybercriminal, the victim, and the cybercriminal's impact on the criminal justice system.
The practical guide to simulating, detecting, and responding to network attacks Create step-by-step testing plans Learn to perform social engineering and host reconnaissance Evaluate session hijacking methods Exploit web server vulnerabilities Detect attempts to breach database security Use password crackers to obtain access information Circumvent Intrusion Prevention Systems (IPS) and firewall protections and disrupt the service of routers and switches Scan and penetrate wireless networks Understand the inner workings of Trojan Horses, viruses, and other backdoor applications Test UNIX, Microsoft, and Novell servers for vulnerabilities Learn the root cause of buffer overflows and how to prevent them Perform and prevent Denial of Service attacks Penetration testing is a growing field but there has yet to be a definitive resource that instructs ethical hackers on how to perform a penetration test with the ethics and responsibilities of testing in mind. Penetration Testing and Network Defense offers detailed steps on how to emulate an outside attacker in order to assess the security of a network. Unlike other books on hacking, this book is specifically geared towards penetration testing. It includes important information about liability issues and ethics as well as procedures and documentation. Using popular open-source and commercial applications, the book shows you how to perform a penetration test on an organization's network, from creating a test plan to performing social engineering and host reconnaissance to performing simulated attacks on both wired and wireless networks. Penetration Testing and Network Defense also goes a step further than other books on hacking, as it demonstrates how to detect an attack on a live network. By detailing the method of an attack and how to spot an attack on your network, this book better prepares you to guard against hackers. You will learn how to configure, record, and thwart these attacks and how to harden a system to protect it against future internal and external attacks. Full of real-world examples and step-by-step procedures, this book is both an enjoyable read and full of practical advice that will help you assess network security and develop a plan for locking down sensitive data and company resources. "This book goes to great lengths to explain the various testing approaches that are used today and gives excellent insight into how a responsible penetration testing specialist executes his trade." -Bruce Murphy, Vice President, World Wide Security Services, Cisco Systems�
The Art of Deception
Author: Kevin D. Mitnick, William L. Simon
Publisher: John Wiley & Sons
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
Oh Joy Sex Toy
Author: Erika Moen, Matthew Nolan
Publisher: Limerence Press
Every week Erika Moen draws a cornucopia (pornucopia?) of fun, naughty pairings for the critically-acclaimed sex education comic OH JOY SEX TOY. Now YOU can join in the sexy fun by adding your own color choices in OH JOY SEX TOY: COLORING BOOK! An alluring collection of NSFW illustrations, featuring a wide variety of sexy humans, awaits you! Whether you want to color for relaxation, saucy enjoyment, or to make a unique work of art for a special someone, this book is sure to please.
SUSE Linux 10 Unleashed
Author: Michael McCallister
Publisher: Sams Publishing
Provides information on the installation, use, and administration of Suse Linux 10.
Author: Walidah Imarisha, adrienne maree brown
Publisher: AK Press
Whenever we envision a world without war, without prisons, without capitalism, we are producing speculative fiction. Organizers and activists envision, and try to create, such worlds all the time. Walidah Imarisha and adrienne maree brown have brought twenty of them together in the first anthology of short stories to explore the connections between radical speculative fiction and movements for social change. The visionary tales of Octavia’s Brood span genres—sci-fi, fantasy, horror, magical realism—but all are united by an attempt to inject a healthy dose of imagination and innovation into our political practice and to try on new ways of understanding ourselves, the world around us, and all the selves and worlds that could be. The collection is rounded off with essays by Tananarive Due and Mumia Abu-Jamal, and a preface by Sheree Renée Thomas. PRAISE FOR OCTAVIA'S BROOD: "Those concerned with justice and liberation must always persuade the mass of people that a better world is possible. Our job begins with speculative fictions that fire society's imagination and its desire for change. In adrienne maree brown and Walidah Imarisha's visionary conception, and by its activist-artists' often stunning acts of creative inception, Octavia's Brood makes for great thinking and damn good reading. The rest will be up to us." —Jeff Chang, author of Who We Be: The Colorization of America “Conventional exclamatory phrases don’t come close to capturing the essence of what we have here in Octavia’s Brood. One part sacred text, one part social movement manual, one part diary of our future selves telling us, ‘It’s going to be okay, keep working, keep loving.’ Our radical imaginations are under siege and this text is the rescue mission. It is the new cornerstone of every class I teach on inequality, justice, and social change....This is the text we’ve been waiting for.” —Ruha Benjamin, professor of African American Studies at Princeton University and author of People’s Science: Bodies and Rights on the Stem Cell Frontier "Octavia once told me that two things worried her about the future of humanity: The tendency to think hierarchically, and the tendency to place ourselves higher on the hierarchy than others. I think she would be humbled beyond words that the fine, thoughtful writers in this volume have honored her with their hearts and minds. And that in calling for us to consider that hierarchical structure, they are not walking in her shadow, nor standing on her shoulders, but marching at her side." —Steven Barnes, author of Lion’s Blood “Never has one book so thoroughly realized the dream of its namesake. Octavia's Brood is the progeny of two lovers of Octavia Butler and their belief in her dream that science fiction is for everybody.... Butler could not wish for better evidence of her touch changing our literary and living landscapes. Play with these children, read these works, and find the children in you waiting to take root under the stars!” —Moya Bailey and Ayana Jamieson, Octavia E. Butler Legacy “Like [Octavia] Butler's fiction, this collection is cartography, a map to freedom.” —dream hampton, filmmaker and Visiting Artist at Stanford University’s Institute for Diversity in the Arts Walidah Imarisha is a writer, organizer, educator, and spoken word artist. She is the author of the poetry collectionScars/Stars and facilitates writing workshops at schools, community centers, youth detention facilities, and women's prisons. adrienne maree brown is a 2013 Kresge Literary Arts Fellow writing science fiction in Detroit, Michigan. She received a 2013 Detroit Knight Arts Challenge Award to run a series of Octavia Butler–based writing workshops.
CCH Accounting for Business Combinations, Goodwill, and Other Intangible Assets offers practical guidance on accounting for business combinations, as well as intangible assets and goodwill under both U.S. and international accounting standards. It covers a broad range of transactions, including: acquisitions of businesses by acquiring assets or stock; acquisitions of minority interests; leveraged buyouts; reverse acquisitions; rollup transactions; and transfers and exchanges between companies under common control. This comprehensive resource draws on a variety of accounting literature to amplify the text of FASB Statements No. 141, Business Combinations, and No. 142, Goodwill and Other Intangible Assets, for U.S. standards, and International Financial Reporting Standard 3, Business Combinations, and International Accounting Standard 38, Intangible Assets, for international standards, as issued by the International Accounting Standards Board. It provides professionals with a practical reference resource by selectively combining information from the official text of these statements, along with information drawn from the rules and releases of the SEC, consensuses of the FASBs Emerging Issues Task Force and the International Financial Reporting Committee, and lessons learned from leading accounting practitioners.
Author: Rob Flickenger
Publisher: "O'Reilly Media, Inc."
Provides tips and techniques on wireless networking, covering a variety of topics, including wireless standards, Bluetooth, hardware, antennas, and wireless security.