Koncocoo

Best Computer Cryptography

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon
The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
From Mary, Queen of Scots, trapped by her own code, to the Navajo Code Talkers who helped the Allies win World War II, to the incredible (and incredibly simple) logisitical breakthrough that made Internet commerce secure, The Code Book tells the story of the most powerful intellectual weapon ever known: secrecy. In the information age, the fear that drives cryptographic improvements is both capitalistic and libertarian--corporations need encryption to ensure that their secrets don't fall into the hands of competitors and regulators, and ordinary people need encryption to keep their everyday communications private in a free society. Similarly, the battles for greater decryption power come from said competitors and governments wary of insurrection.
Reviews
"The author does a brilliant job of telling the history of encryption and cryptanalysis including the consequences of each."
"What is in the book –. The book goes beyond many others in the area of codes and ciphers in that it discusses very up to date topics (at least up to 1999 when the book was written), such as the ciphers being used for Internet transactions and questions of privacy and code breaking. However, this material is not as detailed as the material in books such as Budainsky’s “Battle of Wits”, Kahn’s “Seizing the Enigma” or Sebag-Montefiore’s “The Battle for the Code”, so if this is your primary interest I would direct you to these sources."
"A very thorough, detailed (perhaps even so not exhaustive) coverage of a very complex subject."
"From secrecy during wartime, hieroglyphics, encrypting emails and online transactions, it was fascinating reading how various forms of cryptography were developed, decoded, cracked and then improved upon."
"The various techniques for creating and breaking secret messages throughout history are explained well and made more interesting by the historic contexts of those techniques."
"I'll be honest I'm a complete novice and just picked this book up because it really drew my attention."
"The book is well written, and provides an excellent look at the history of cryptography and cryptanalysis, covering in detail the impact that these two competing disciplines played in the outcomes or many wars and key political events of post medieval times, It also provides a very accessible introduction into how cryptography works (i.e. it spares the reader the mathematical details of the more advanced algorithms)."
"Read it for history, entertainment, enjoyment, and a few laughs."
Find Best Price at Amazon
CISSP All-in-One Exam Guide, Seventh Edition
Thoroughly updated for the latest release of the Certified Information Systems Security Professional exam, this comprehensive resource covers all exam domains, as well as the new. 2015 CISSP Common Body of Knowledge developed by the International Information Systems Security Certification Consortium (ISC) 2® . Written by leading experts in IT security certification and training, this completely up-to-date self-study system helps you pass the exam with ease and also serves as an essential on-the-job reference. Shon Harris, CISSP, was the founder and CEO of Logical Security LLC, an information security instructorand the author of several international bestselling books on information security which have sold over a million copies and have been translated into six languages.
Reviews
"It's pretty clear which parts are Shon Harris and which parts aren't."
"I was able to pass the exam first try with this book, the sybex book, and cybrary."
"Don't just say "Unfortunately you will run into questions on the CISSP exam that will be this confusing..." (p. 186)."
"This book is a deep dive into the 8 security domains. They know they need to apply these settings because there is a CVE or IAVA/STIG notice but they don't understand why and how an attacker could utilize that specific exploit vector. Which in my opinion makes it much easier for referencing specific concepts and ideas."
"It was such a chore reading through each chapter and I knew it was time to change up so I purchased this book. In addition to using this book, I also used SkillSoft, practice exams, Quizlet, and YouTube videos."
"This book is the one to turn to for your CISSP exam."
Find Best Price at Amazon

Best Web Encryption

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon

Best Privacy & Online Safety

Hacking: The Art of Exploitation, 2nd Edition
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. This book will teach you how to: – Program computers using C, assembly language, and shell scripts. – Corrupt system memory to run arbitrary code using buffer overflows and format strings. – Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening. – Outsmart common security measures like nonexecutable stacks and intrusion detection systems. – Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence. – Redirect network traffic, conceal open ports, and hijack TCP connections. – Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix. Jon Erickson has a formal education in computer science and speaks frequently at computer security conferences around the world.
Reviews
"I downloaded a program called infra recorder and made an iso of the disk."
"High quality and comes with a Linux Distribution that you can follow along with if that is what you wish to do."
"The book focuses on the fundamentals and it shows you the different approaches that one would take to find vulnerabilities in your software or system."
"Beyond security and hacking, I would recommend this textbook to any student interested in software engineering, possibly even before learning a high-level programming language (say like Java)."
"Great explanations of technique and tech."
"Great book, cd was there as expected and good price."
"The section covering an intro to the C languages deserves five stars in itself."
Find Best Price at Amazon

Best Computer Networking

CompTIA Network+ All-In-One Exam Guide, Sixth Edition (Exam N10-006)
From Mike Meyers, the #1 name in CompTIA training and exam preparation, a thorough revision of his bestselling exam guide―updated to cover the 2015 release of the CompTIA Network+ exam. Network architectures Cabling and topology Ethernet basics Network installation TCP/IP applications and network protocols Routing Network naming Advanced networking devices IPv6 Remote connectivity Wireless networking Virtualization and cloud computing Network operations Managing risk Network security Network monitoring and troubleshooting. Mike Meyers, CompTIA A+, CompTIA Network+, CompTIA Security+, is the industry's leading authority on CompTIA certifications and the bestselling author of eight editions of CompTIA A+ Certification All-in-One Exam Guide .
Reviews
"Very good overview."
"Very understandable, pulls together concepts in very logical fashion with good detail."
"Mike Meyer's in depth look at objectives on the test has been very helpful in my studying!"
"Will take the test next week."
"great gift for beginners."
"necessary for exam study."
Find Best Price at Amazon

Best Computer Viruses

CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
You'll prepare for the exam smarter and faster with Sybex thanks to expert content, real-world examples, advice on passing each section of the exam, access to the Sybex online interactive learning environment, and much more. More than 650 Electronic Flashcards to reinforce your learning and give you last-minute test prep before the exam A searchable glossary in PDF to give you instant access to the key terms you need to know for the exam. Covers 100% of exam 2015 CISSP candidate information bulletin objectives including, Access Control, Application Development Security, Business Continuity and Disaster Recovery Planning, Cryptography and much more…. More than 1,400 practice questions More than 1000 electronic flashcards Searchable key term glossary Interactive test engine. More than 1000 Electronic Flashcards to reinforce learning and last minute prep before the exam Comprehensive glossary in PDF format gives you instant access to the key terms so you are fully prepared. The vendor-neutral CISSP certification is the ideal credential for those with proven deep technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage their overall information security program to protect organizations from growing sophisticated attacks.
Reviews
"Exam Essentials is the special section where the author has taken the time to highlight all of the things he thinks you MUST know to take the test. If I didn't understand one of the Exam Essential items I went to that chapter and read in extreme detail about the concept and took notes so I would not have to look it up again. The trick I used was walking around my apartment (in my mind) and visually associating things with the test. During the last phase I simply did all the practice questions the author provided both in the book and on their website. At the end of all the thousands of test questions I had another 2 or 3 pages of notes to add to my memory. On another note I did one practice exam a day to be sure I could not remember questions because of the sheer volume of them. The questions felt like they were written by a lawyer and required an intense concentration to even understand what they were asking. The practice questions were tricky in this book but they are not written the same strange way as the real exam in my opinion."
"I found the book to be well put together as are most of the sybex books. The book is a good supplement to a layered study approach. I wouldn't recommend just reading the book and taking the exam."
"If you don't want to read my really long review I summarize as get the Kindle version, read the entire thing, take advantage of the Sybex online content (sample tests) and that should be enough to pass. There were a few questions that I don't think the book covered but I felt like they were practical things that a security engineer would already know. In the case of this book, there is a lot of formatting that is lost in the Kindle version. The Kindle tends to squish whitespace and indents and such so some of the visual layout just becomes text. Another annoyance on the Kindle was that the TOC drop down interface only had the chapter heads and no easy jump to a specific subsection. I used highlights to mark things I knew I wanted to review multiple times like the big encryption algorithm comparison table and some of the model definitions or process summaries. One awesome feature is that after you are registered and verified your purchase you can download a PDF version of the book. The PDF also has all the perfectly excellent formatting that the paper book includes. The Sybex online material also includes electronic versions of all the chapter tests. This becomes painfully apparent if you select several chapters but only want (AKA have time for) a limited number of questions. This seems like a pretty awesome bonus and it is nice but the interface for the exams is slightly different from the chapter tests. In the online help is says this is a feature to mimic the actual CISSP exam which generates a giant WTF from me. I theorize that as long as you are in the review screen you won't have problems but there is some sort of session check when you transition."
Find Best Price at Amazon

Best E-Commerce

Mastering Bitcoin: Programming the Open Blockchain
The second edition includes: A broad introduction to bitcoin--ideal for non-technical users, investors, and business executives An explanation of the technical foundations of bitcoin and cryptographic currencies for developers, engineers, and software and systems architects Details of the bitcoin decentralized network, peer-to-peer architecture, transaction lifecycle, and security principles New developments such as Segregated Witness, Payment Channels, and Lightning Network Improved explanations of keys, addresses and wallets User stories, analogies, examples, and code snippets illustrating key technical concepts. With experience ranging from hardware and electronics to high level business and financial systems technology consulting and years as CTO/CIO/CSO in many companies — he combines authority and deep knowledge with an ability to make complex subjects easy to understand. His expertise includes Bitcoin, crypto-currencies, Information Security, Cryptography, Cloud Computing, Data Centers, Linux, Open Source and robotics software development.
Reviews
"Deep complex book for programmers."
"This is an outstanding introduction to the technology behind Bitcoin and cryptocurrency."
"Good technical introduction to bitcoin."
"Fantastic book if you want to learn what Bitcoin is and how it works."
"detailed, comprehensive, and masterful."
"great book very technical."
"He also tackles ways one might lose their bitcoins, and the ideas that are quite different from the centralized payment systems and banks we've become familiar with: one of these being the transference back to the asset owner of the responsibility for security--with suggestions as to how to go about securing them, even providing ways of leaving them to the family even in the event of death of the owner."
"One of the best technical books about blockchain technology I have ever come across."
Find Best Price at Amazon

Best Software Coding Theory

Error Control Coding (2nd Edition)
A reorganized and comprehensive major revision of a classic book, this edition provides a bridge between introductory digital communications and more advanced treatment of information theory. In 1970 the first author published a book entitled An Introduction to Error-Correcting Codes, which presented the fundamentals of the previous two decades of work covering both block and convolutional codes. Other major additions included a comprehensive treatment of the error-detecting capabilities of block codes and an emphasis on soft decoding methods for convolutional codes. Three of these new developments stand out in particular: the application of binary convolutional and block codes to expanded (nonbinary) modulation alphabets, the development of practical soft decoding methods for block codes, and the discovery of soft-input, soft-output iterative decoding techniques for block and convolutional codes. A total of seven new chapters covering these topics have been added to this edition: two chapters on trellis- and block-coded modulation techniques, three chapters on soft decoding methods for block codes, and two chapters on turbo and low-density parity-check codes and iterative decoding. Chapters 3 through 10 cover in detail the fundamentals of block codes. Chapter 8 provides detailed coverage of majority-logic decodable codes, including the important classes of Euclidean and projective geometry codes. Chapter 9 develops the theory of the trellis structure of block codes, laying the groundwork for the introduction of trellis-based soft decoding algorithms in Chapter 14. Chapter 10, written by Professor Marc Fossorier, presents comprehensive coverage of reliability-based soft decoding methods for block codes and includes an introduction to iterative decoding techniques. Convolutional codes are introduced in Chapter 11, with the encoder state diagram serving as the basis for studying code structure and distance properties. Chapter 12 covers optimum decoding methods for convolutional codes, with an emphasis on the (maximum likelihood) Viterbi decoding algorithm for both hard and soft demodulator decisions. Chapter 13 covers suboptimum decoding methods for convolutional codes, with an emphasis on sequential decoding, using both the ZJ (stack) and Fano algorithms, and majority-logic decoding. Chapter 14 extends the soft decoding methods introduced for convolutional codes in Chapter 12 to block codes. This completely new chapter makes extensive use of the block code trellis structures introduced in Chapter 9. Chapter 15 discusses the important concepts of code concatenation, multistage decoding, and code decomposition. Chapter 16 introduces the area of parallel concatenation, or turbo coding, and its related iterative decoding techniques based on the BCJR algorithm presented in Chapter 12. Both block (Chapter 20) and convolutional (Chapter 21) burst-error-correcting codes are included. As a text the book can be used as the basis for a two-semester sequence in coding theory, with Chapters 1-10 on the fundamentals of block codes covered in one semester and the remaining chapters on convolutional codes and advanced block code topics in a second semester. Another possibility is to cover Chapters 1-8 and 11-13, which include the fundamentals of both block and convolutional codes, in one semester, followed by a second semester devoted to advanced topics. A course on block codes comprise Chapters 1-7 plus selected topics from Chapters 8-10, 14-15, 17, 19-20, and 22, whereas Chapters 1, 11-13, 16, 18, and 21 provide a thorough coverage of convolutional codes.
Reviews
"There are so many codes included in this book, and I am not interested in 'knowing' every code in the world, so for me the real world application is more important then I can choose a certain code to learn if I have limited time."
"At last a readable book on this important subject."
"Lin & Costello is the standard book on error correcting codes for a reason."
"I had the previous version of this book as my text at USC."
"Delicious reading, and presented a delicate math."
"Great book."
Find Best Price at Amazon

Best Linguistics

The Only Grammar Book You'll Ever Need: A One-Stop Source for Every Writing Assignment
Using dozens of examples, The Only Grammar Book You'll Ever Need provides guidelines for: Understanding the parts of speech and elements of a sentence Avoiding the most common grammar and punctuation mistakes Using correct punctuating in every sentence Writing clearly and directly Approaching writing projects, whether big or small. She edits and publishes Class Act, a national magazine that features grammar, writing, and ideas for English teachers, and has written more than fifty articles on English instruction, as well as a number of study guides. If a sentence contains a misplaced or dangling modifier or is essentially illogical, it becomes confusing at best and ludicrous at worst. This chapter will give you some pointers for looking critically at your sentence construction as well as the tools to fix any problems you find. The way the sentence is written, the ambulance driver is barely speaking—but surely that’s not what the writer meant. Witnesses reported that the woman was driving the getaway car with flowing black hair. Witnesses reported that the woman with flowing black hair was driving the getaway car. Mrs. Anderson could not stop thinking about her sick baby running in the six-mile road race. The clause running in the six-mile road race is out of place; it should be closer to the noun it modifies (Mrs. Anderson).
Reviews
"The problem is that often the description is useful, but the example given is so incredibly bad that one wonders if they missed something. For instance, in the section on plural possessives, the author correctly points out that plural possessives are usually formed with an apostrophe but not 's' on the end. All that noise related only tangentially to the actual point—how to punctuate plural possessives, NOT how to find plural nouns (as if finding the word with the "s" on the end is like divining water or casting magic spells). My guess is that readers will be more rather than less confused after reading this section. Meanwhile, the author adds sections about predicates, gerunds, and similar concepts that most beginning students will find quite difficult to understand because they are more nuanced than simple subject–verb constructions."
"I would suggest purchasing The McGraw-HIll Book of English Grammar and Usage, along with this book and workbook, should you need more explanations on some of the topics. However, I will say that the commonly misspelled words in this book is more comprehensive than any other grammar books I've taken a look at recently."
"Small enough to fit in a purse or bag and easy to read/find what you need quickly."
"Excellent book on Grammar, with this one, you won't need any other!"
"Using this text for a homeschool study skills class."
"Good book for learning a new word each day."
"Purchase it to review English grammar."
"Arrived quickly and as described."
Find Best Price at Amazon