Archives: Shop

  • Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presenceRedirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the accompanying Linux environment, and all you need is your own creativity.

  • JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

  • Learn application security from the very start, with this comprehensive and approachable guide!  Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene   Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs.  Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader?s ability to grasp and retain the foundational and advanced topics contained within. 

  • The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

  • A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.  Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing?as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

  • At this critical point in your Business Continuity Management studies and research, you need one definitive, comprehensive professional textbook that will take you to the next step. In his 4th edition of Business Continuity Management: Global Best Practices, Andrew Hiles gives you a wealth of real-world analysis and advice ? based on international standards and grounded in best practices -- a textbook for today, a reference for your entire career. With so much to learn in this changing profession, you don't want to risk missing out on something you?ll need later.Does one of these describe you?Preparing for a Business Continuity Management career, needing step-by-step guidelines,Working in BCM, looking to deepen knowledge and stay current -- and create, update, or test a Business Continuity Plan.Managing in BCM, finance, facilities, emergency preparedness or other field, seeking to know as much as much as possible to make the decisions to keep the company going in the face of a business interruption.Hiles has designed the book for readers on three distinct levels: Initiate, Foundation, and Practitioner. Each chapter ends with an Action Plan, pinpointing the primary message of the chapter and a Business Continuity Road Map, outlining the actions for the reader at that level.NEW in the 4th Edition:Supply chain risk -- extensive chapter with valuable advice on contracting.Standards -- timely information and analysis of global/country-specific standards, with detailed appendices on ISO 22301/22313 and NFPA 1600.New technologies and their impact ? mobile computing, cloud computing, bring your own device, Internet of things, and more.Case studies ? vivid examples of crises and disruptions and responses to them.Horizon scanning of new risks ? and a hint of the future of BCM.Professional certification and training ? explores issues so important to your career.Proven techniques to win consensus on BC strategy and planning.BCP testing ? advice and suggestions on conducting a successful exercise or test of your planTo assist with learning -- chapter learning objectives, case studies, real-life examples, self-examination and discussion questions, forms, checklists, charts and graphs, glossary, and index.Downloadable resources and tools ? hundreds of pages, including project plans, risk analysis forms, BIA spreadsheets, BC plan formats, and more.Instructional Materials -- valuable classroom tools, including Instructor?s Manual, Test Bank, and slides -- available for use by approved adopters in college courses and professional development training.

  • "In presenting us with a vision of organic exuberance and humandelight, which ecology and ecological design promise to open up forus, McHarg revives the hope for a better world." --LewisMumford ". . . important to America and all the rest of the world in ourstruggle to design rational, wholesome, and productive landscapes."--Laurie Olin, Hanna Olin, Ltd. "This century's most influential landscape architecture book."--Landscape Architecture ". . . an enduring contribution to the technical literature oflandscape planning and to that unfortunately small collection ofwritings which speak with emotional eloquence of the importance ofecological principles in regional planning." --Landscape and UrbanPlanning In the twenty-five years since it first took the academic world bystorm, Design With Nature has done much to redefine the fields oflandscape architecture, urban and regional planning, and ecologicaldesign. It has also left a permanent mark on the ongoing discussionof mankind's place in nature and nature's place in mankind withinthe physical sciences and humanities. Described by one enthusiasticreviewer as a "user's manual for our world," Design With Natureoffers a practical blueprint for a new, healthier relationshipbetween the built environment and nature. In so doing, it providesnothing less than the scientific, technical, and philosophicalfoundations for a mature civilization that will, as Lewis Mumfordecstatically put it in his Introduction to the 1969 edition,"replace the polluted, bulldozed, machine-dominated, dehumanized,explosion-threatened world that is even now disintegrating anddisappearing before our eyes."

  • Essential site planning and design strategies, up-to-date with the latest sustainable development techniquesDiscover how to incorporate sound environmental considerations into traditional site design processes. Written by a licensed landscape architect with more than 20 years of professional experience, this authoritative guide combines established approaches to site planning with sustainable practices and increased environmental sensitivity. Fully revised and updated, Site Planning and Design Handbook, Second Edition discusses the latest standards and protocols-including LEED. The book features expanded coverage of green site design topics such as water conservation, energy efficiency, green building materials, site infrastructure, and brownfield restoration. This comprehensive resource addresses the challenges associated with site planning and design and lays the groundwork for success. Site Planning and Design Handbook, Second Edition explains how to: Integrate sustainability into site design Gather site data and perform site analysis Meet community standards and expectations Plan for pedestrians, traffic, parking, and open space Use grading techniques to minimize erosion and maximize site stability Implement low-impact stormwater management and sewage disposal methods Manage brownfield redevelopment Apply landscape ecology principles to site design Preserve historic landscapes and effectively utilize vegetation

  • Build your skills in the assessment of musculoskeletal pathology! Orthopedic Physical Assessment, 7th Edition covers the principles of assessment for all of the body?s structures and joints, including topics such as gait, posture, the head and face, amputees, primary care, and sports emergencies. The 7th edition offers additional functional assessment forms (e-tools), updated evidence-based reliability and validity tables, and hundreds of video clips demonstrating special tests on how to perform musculoskeletal assessment. Written by noted PT educators David J. Magee and Robert C. Manske, this reference uses a systematic, evidence-based approach to prepare you for success in clinicals, board exams, and in rehabilitation practice. Over 2,500 full-color illustrations and photographs depict key concepts, along with assessment techniques and special tests. At-a-glance icons show the clinical utility of special tests, supplemented by updated, evidence-based reliability and validity tables for tests and techniques Quick-reference data includes hundreds of summary boxes, red-flag and yellow-flag boxes, differential diagnosis tables, muscle and nerve tables, and classification, normal values, and grading tables. A Summary (Précis) of Assessment in each chapter serves as a review of assessment steps. Combined with other books in the Musculoskeletal Rehabilitation series ? Scientific Foundations and Principles of Practice, Pathology and Intervention, and Athletic and Sports Issues ? this book provides you with the knowledge and background necessary to assess and treat musculoskeletal conditions. NEW! Updated information in all chapters includes new special tests, as well as photos, line drawings, boxes, tables, and references. NEW! Head and Face chapter features updated information on concussion management. NEW! Enhanced Diagnostic Ultrasound Imaging section added to applicable chapters, along with new photos and diagnostic images. NEW! Updated psychometric tables for special tests list reliability, sensitivity, specificity, and + and ? likelihood ratios when available. NEW! More case studies present real-life scenarios to help you develop assessment and diagnostic skills using information from the chapter. NEW! Additional functional assessment forms (e-tools) have been incorporated. NEW! Video clips demonstrate special tests to give you a clearer understanding of how to perform musculoskeletal assessment. NEW! Enhanced ebook version, included with print purchase, provides access to all of the text, figures, and references from the book on a variety of devices.

  • Develop your knowledge of chiropractic and osteopathy with this comprehensive guide to advanced skills and peripheral manipulation techniques. This practical handbook takes into account the latest research, highlighting the neurophysiological effects of these techniques, and providing clear, step-by-step guidance from experienced manual therapists.Covering key topics such as the effects of manipulation on organs, working in sports settings, and motion palpation misconceptions, the book demonstrates how to work with a range of joints with advice on diagnostics, contraindications and safety precautions. This is an expert collaboration between professions and can be used as the go-to clinical handbook for all manual therapists.

  • Wound Management, First Edition, is the first volume in the Series that that follows the Curriculum Blueprint designed by the Wound Ostomy Continence Nurses Society (WOCN). Is the ideal resource for anyone seeking certification as a wound, ostomy or continence nurse, covering wounds caused by external mechanical factors and specific disease process, lower extremity ulcers, and the management of enterocutaneous fistulas and percutaneous tubes.

  • Prevent and manage wounds with this expert, all-inclusive resource! Acute & Chronic Wounds: Current Management Concepts, 5th Edition provides the latest diagnostic and treatment guidelines to help you provide quality care for patients with wounds. This textbook presents an interprofessional approach to maintaining skin integrity and managing the numerous types of skin damage including topics that range from the physiology of wound healing, general principles of wound management, vulnerable patient populations, management of percutaneous tubes, and specific care instructions to program development. Written by respected nursing educators Ruth Bryant and Denise Nix, this bestselling reference also provides excellent preparation for all wound certification exams. A comprehensive approach to the care of patients with acute and chronic wounds guides students and health care providers to design, deliver and evaluate quality skin and wound care in a systematic fashion; the comprehensive approach includes the latest advances in diagnosis, differentiation of wound types, nutrition, prevention, treatment, and pharmacology. Self-assessment questions and answers in each chapter help you assess your knowledge and prepare for all wound certification exams. Checklists offer a concise, easy-to-read summary of the steps needed to achieve the best patient care outcomes. Risk assessment scales help in determining a patient's risk for developing a wound, and wound classification tools identify the proper terminology to be used in documentation. Learning objectives at the beginning of each chapter focus your study on the most important content.  Principles for practice development boost outcomes and productivity in agencies and institutions, home care, acute care, long-term care, and long-term acute care settings. NEW coverage includes the latest guidelines from WOCN, AAWC, NPUAP, EPUAP, and PPPIA, and the American College of Physicians. New sections cover the prevention and management of biofilm, the new skin tear classification system, MASD and MARCI, CTP terminology and classification scheme, and integration of the Health Belief Model. NEW! Additional full-color photographs show the differential diagnosis of types of skin damage, management of fistulas, and NPWT procedures. NEW! Clinical Consult features help in applying concepts to clinical practice, showing students and health care professionals how to assess, manage, and document real-life patient and staff encounters using the ADPIE framework. NEW two-color illustrations and design make the book more visually appealing.