Showing all 23 results
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.After a crash course on iOS application structure and Objective-C design patterns, you’ll move on to spotting bad code and plugging the holes. You’l learn about:The iOS security model and the limits of its built-in protectionsThe myriad ways sensitive data can leak into places it shouldn’t, such as through the pasteboardHow to implement encryption with the Keychain, the Data Protection API, and CommonCryptoLegacy flaws from C that still cause problems in modern iOS applicationsPrivacy issues related to gathering user data and how to mitigate potential pitfallsDon’t let your app’s security leak become another headline.
The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming—each one more pernicious than the last—from China, Russia, Iran, North Korea, the Middle East, and points unknown. The continuing attacks raise a deeply disturbing question: Is the issue simply beyond the reach of our government, political leaders, business leaders, and technology visionaries to resolve? In Hacked, veteran cybersecurity journalist Charlie Mitchell reveals the innovative, occasionally brilliant, and too-often hapless government and industry responses to growing cybersecurity threats.
This authoritative guide explores computer network infrastructures and protocol design security flaws, as well as discussing current security solutions and best practices, in both fixed and mobile computer networks. It broadly surveys thought-provoking security issues and discusses and raises questions about the impact of these new technologies and protocols, with particular emphasis on the rapid growth and skyrocketing interests and use in mobile technologies. It explores the security threats and vulnerabilities in the current network infrastructure and protocols and outlines current security efforts.
I am not a recruiter. I am a software engineer. And as such, I know what it’s like to be asked to whip up brilliant algorithms on the spot and then write flawless code on a whiteboard. I’ve been through this—as a candidate and as an interviewer.
Cracking the Coding Interview, 6th Edition is here to help you through this process, teaching you what you need to know and enabling you to perform at your very best. I’ve coached and interviewed hundreds of software engineers. The result is this book.
Learn how to uncover the hints and hidden details in a question, discover how to break down a problem into manageable chunks, develop techniques to unstick yourself when stuck, learn (or re-learn) core computer science concepts, and practice on 189 interview questions and solutions.
These interview questions are real; they are not pulled out of computer science textbooks. They reflect what’s truly being asked at the top companies, so that you can be as prepared as possible.
189 programming interview questions, ranging from the basics to the trickiest algorithm problems.
A walk-through of how to derive each solution, so that you can learn how to get there yourself.
Hints on how to solve each of the 189 questions, just like what you would get in a real interview.
Five proven strategies to tackle algorithm questions, so that you can solve questions you haven’t seen.
Extensive coverage of essential topics, such as big O time, data structures, and core algorithms.
A “behind the scenes” look at how top companies, like Google and Facebook, hire developers.
Techniques to prepare for and ace the “soft” side of the interview: behavioral questions.
For interviewers and companies: details on what makes a good interview question and hiring process.
A shortcut straight to power-user level with over 300 tips, tricks, hints, and hacks to make your Apple device the one thing you can’t live without. Learn the secrets of FaceTime, Maps, Safari, and Mail. Transform your Apple device into a go-to office tool, as well as tighten security to deter theft. Designed to be dipped into, most tips in iPad and iPhone Kung Fu take only a minute to implement, but will change your life. Good for iOS 7 on iPhone, iPad, iPod Touch.
Apple changed the world with the iPhone and iPad.
Hacking Secret Ciphers with Python not only teaches you how to write in secret ciphers with paper and pencil. This book teaches you how to write your own cipher programs and also the hacking programs that can break the encrypted messages from these ciphers.
Want To Master The Basics Of Hacking In A Short Period? If so, you’re in the right place! This book is exactly what you need. FREE Bonus at the end of the Book! If you’ve wanted to learn how to use Hacking you have probably thought it was a difficult and long process. This is actually not the case at all. Hacking can be an extremely easy and straightforward process. The days of searching countless websites to find what you’re looking for are over. With this book you will have everything you could possibly need, all in one place! What This Book Will Give You: Hacking Basics For Beginners This book will take the process of Scrum and break it down into straightforward simple steps that anyone can follow along to.
This is your ticket into the elusive underworld of the Internet, home to millions of elite computer hackers. 1337 h4x0r h4ndb00k will show you how to walk-the-walk and talk-the-talk of this exclusive community. Soon, you too will be able to go into a chat room and carry on conversations speaking the cryptic 1337 language. 1337 h4x0r h4ndb00k will also review the nature of computer viruses, different practical jokes to play on your desktop and tips on how to live the hacker lifestyle. Join the elite society of computer hackers with 1337 h4x0r h4ndb00k as your guide.
A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver.
This book is directed to academics, educators, and government policy-makers who are concerned about addressing emerging cyber-bullying and anti-authority student expressions through the use of cell phone and Internet technologies. There is a current policy vacuum relating to the extent of educators’ legal responsibilities to intervene when such expression takes place outside of school hours and school grounds on home computers and personal cell phones.
This one–of–a–kind resource contains 401 pages of jaw–dropping hacks, mods, and customizations. These include creating mashups with data from other sources such as Flickr, building a space station tracker, hacking Maps with Firefox PiggyBank, and building a complete community site with Maps and Earth. Now you can map out locations, get driving directions, zoom into any point on the globe, display real time traffic, and much more.
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web.
Are you worried about your online security but don’t know where to start? Do you have a Gmail account and want to make it more secure? Do you want to protect your emails from opportunist identity thieves, hackers and scammers? Then this guide is for you! There are people out there whose sole job it is to steal personal and financial information. This book will give you step by step instructions on how to make it very difficult for hackers to get into your Google account or trick you into giving you the information they need to hijack your life.
Learn to hack your own system to protect against malicious attacks from outsideIs hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks.
For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged. But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet.
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you′ve always dreamed of creating.
The El Capitan Edition of Customizing OS X is the 4th book in the Customizing OS X series and contains over 400 fantastic tweaks, hacks, secret commands, and hidden features to completely customize your OS X El Capitan user experience. Learn how to completely personalize your Mac, fine-tuning every aspect of OS X to help you become more productive and efficient by making OS X El Capitan more closely match your personal computing style. You will learn how to tinker and tweak OS X, bending it to your every will and squeezing every last drop of performance out of your Mac.
A well-rounded, accessible exposition of honeypots in wired and wireless networks, this book addresses the topic from a variety of perspectives. Following a strong theoretical foundation, case studies enhance the practical understanding of the subject. The book covers the latest technology in information security and honeypots, including honeytokens, honeynets, and honeyfarms.
Given our increasing dependency on computing technology in daily business processes, and the growing opportunity to use engineering technologies to engage in illegal, unauthorized, and unethical acts aimed at corporate infrastructure, every organization is at risk.
Crimeware: Understanding New Attacks and Defenses will help security professionals, technical managers, students, and researchers understand and prevent specific crimeware threats.
Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" – the techniques hackers use to break into systems.
Beginning with definitions of such basic terms as cryptanalysis, encryption, and decryption, this introduction from the Intelligence and Counterintelligence series emphasizes the point that cryptography is now a part of everyday business, not limited to espionage and the military. The narrative explains how various ciphers are constructed, from the simplest to the most complex, then covers basic concepts and types of cryptanalysis. After a short overview of cryptology through history, the survey concludes with a look at the development of modern electronic cryptology.
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government―international, national, state, and local.• Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers• Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics• Supplies examinations of both the domestic and international efforts to combat cybercrime• Serves an ideal text for first-year undergraduate students in criminal justice programs
Showing all 23 results