A Practical Guide to UNIX System V Release 4

Titre : A Practical Guide to UNIX System V Release 4
Auteur : M. G. Sobell
Éditeur : Addison Wesley Publishing Company
ISBN-13 : UOM:39015022330750
Libération : 1991-01-01

Télécharger Lire en ligne



This bestselling work has been revised and updated to reflect the newest release of UNIX System V, Release 4.0. Expanded coverage includes networking, variables, control structures, signal handling, and other aspects of programming using the Bourne Shell. Two chapters on word processing contain "vi", the "nroff" text formatter, and "mm" macros.

The Art of UNIX Programming

Titre : The Art of UNIX Programming
Auteur : Eric S. Raymond
Éditeur : Addison-Wesley Professional
ISBN-13 : 0132465884
Libération : 2003-09-23

Télécharger Lire en ligne



The Art of UNIX Programming poses the belief that understanding the unwritten UNIX engineering tradition and mastering its design patterns will help programmers of all stripes to become better programmers. This book attempts to capture the engineering wisdom and design philosophy of the UNIX, Linux, and Open Source software development community as it has evolved over the past three decades, and as it is applied today by the most experienced programmers. Eric Raymond offers the next generation of "hackers" the unique opportunity to learn the connection between UNIX philosophy and practice through careful case studies of the very best UNIX/Linux programs.

The Complete FreeBSD

Titre : The Complete FreeBSD
Auteur : Greg Lehey
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 0596005164
Libération : 2003

Télécharger Lire en ligne



This practical guidebook explains not only how to get a computer up and running with the FreeBSD operating system, but how to turn it into a highly functional and secure server that can host large numbers of users and disks, support remote access and provide key parts of the Inter

The Art of Computer Virus Research and Defense

Titre : The Art of Computer Virus Research and Defense
Auteur : Peter Szor
Éditeur : Pearson Education
ISBN-13 : 9780672333903
Libération : 2005-02-03

Télécharger Lire en ligne



Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly for white hats: IT and security professionals responsible for protecting their organizations against malware. Peter Szor systematically covers everything you need to know, including virus behavior and classification, protection strategies, antivirus and worm-blocking techniques, and much more. Szor presents the state-of-the-art in both malware and protection, providing the full technical detail that professionals need to handle increasingly complex attacks. Along the way, he provides extensive information on code metamorphism and other emerging techniques, so you can anticipate and prepare for future threats. Szor also offers the most thorough and practical primer on virus analysis ever published—addressing everything from creating your own personal laboratory to automating the analysis process. This book's coverage includes Discovering how malicious code attacks on a variety of platforms Classifying malware strategies for infection, in-memory operation, self-protection, payload delivery, exploitation, and more Identifying and responding to code obfuscation threats: encrypted, polymorphic, and metamorphic Mastering empirical methods for analyzing malicious code—and what to do with what you learn Reverse-engineering malicious code with disassemblers, debuggers, emulators, and virtual machines Implementing technical defenses: scanning, code emulation, disinfection, inoculation, integrity checking, sandboxing, honeypots, behavior blocking, and much more Using worm blocking, host-based intrusion prevention, and network-level defense strategies

The Future of Ideas

Titre : The Future of Ideas
Auteur : Lawrence Lessig
Éditeur : Vintage
ISBN-13 : 9781400033317
Libération : 2002-11-12

Télécharger Lire en ligne



The Internet revolution has come. Some say it has gone. In The Future of Ideas, Lawrence Lessig explains how the revolution has produced a counterrevolution of potentially devastating power and effect. Creativity once flourished because the Net protected a commons on which widest range of innovators could experiment. But now, manipulating the law for their own purposes, corporations have established themselves as virtual gatekeepers of the Net while Congress, in the pockets of media magnates, has rewritten copyright and patent laws to stifle creativity and progress. Lessig weaves the history of technology and its relevant laws to make a lucid and accessible case to protect the sanctity of intellectual freedom. He shows how the door to a future of ideas is being shut just as technology is creating extraordinary possibilities that have implications for all of us. Vital, eloquent, judicious and forthright, The Future of Ideas is a call to arms that we can ill afford to ignore. From the Trade Paperback edition.

The Architecture of Computer Hardware and System Software An Information Technology Approach 5th Edition

Titre : The Architecture of Computer Hardware and System Software An Information Technology Approach 5th Edition
Auteur : Irv Englander
Éditeur : Wiley Global Education
ISBN-13 : 9781118803301
Libération : 2014-01-08

Télécharger Lire en ligne



The Architecture of Computer Hardware and System Software provides the right amount of technical detail needed to succeed in the field. This accessible introduction provides the basic principles of computer system architecture and organization in the context of the current technological landscape. The author provides chapters on the fundamentals of networking as it relates to computer systems as well as all kinds of business systems, from entrepreneurial to small business, networked, distributed, and more. This valuable book provides IT professionals with several real-world case studies that clearly show how the concepts are applied in the field.

Software Studies

Titre : Software Studies
Auteur : Matthew Fuller
Éditeur : MIT Press
ISBN-13 : 9780262062749
Libération : 2008

Télécharger Lire en ligne



A cultural field guide to software: artists, computer scientists, designers, cultural theorists, programmers, and others define a new field of study and practice.

Hacking Exposed 7

Titre : Hacking Exposed 7
Auteur : Stuart McClure
Éditeur : McGraw Hill Professional
ISBN-13 : 9780071780292
Libération : 2012-07-23

Télécharger Lire en ligne



The latest tactics for thwarting digital attacks “Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the latest attack vectors and arms them for these continually evolving threats.” --Brett Wahlin, CSO, Sony Network Entertainment “Stop taking punches--let’s change the game; it’s time for a paradigm shift in the way we secure our networks, and Hacking Exposed 7 is the playbook for bringing pain to our adversaries.” --Shawn Henry, former Executive Assistant Director, FBI Bolster your system’s security and defeat the tools and tactics of cyber-criminals with expert advice and defense strategies from the world-renowned Hacking Exposed team. Case studies expose the hacker’s latest devious methods and illustrate field-tested remedies. Find out how to block infrastructure hacks, minimize advanced persistent threats, neutralize malicious code, secure web and database applications, and fortify UNIX networks. Hacking Exposed 7: Network Security Secrets & Solutions contains all-new visual maps and a comprehensive “countermeasures cookbook.” Obstruct APTs and web-based meta-exploits Defend against UNIX-based root access and buffer overflow hacks Block SQL injection, spear phishing, and embedded-code attacks Detect and terminate rootkits, Trojans, bots, worms, and malware Lock down remote access using smartcards and hardware tokens Protect 802.11 WLANs with multilayered encryption and gateways Plug holes in VoIP, social networking, cloud, and Web 2.0 services Learn about the latest iPhone and Android attacks and how to protect yourself

Security in Computing

Titre : Security in Computing
Auteur : Charles P. Pfleeger
Éditeur : Prentice Hall Professional
ISBN-13 : 0130355488
Libération : 2003

Télécharger Lire en ligne



This third edition of the all time classic computer security book provides an overview of all types of computer security from centralized systems to distributed networks. The book has been updated to make the most current information in the field available and accessible to today's professionals.

The New Hacker s Dictionary

Titre : The New Hacker s Dictionary
Auteur : Eric S. Raymond
Éditeur : MIT Press
ISBN-13 : 0262680920
Libération : 1996

Télécharger Lire en ligne



A listing of computer-buff slang is embellished by the myths, legends, and heroes of a hacker culture