Archives: Shop

  • "In presenting us with a vision of organic exuberance and humandelight, which ecology and ecological design promise to open up forus, McHarg revives the hope for a better world." --LewisMumford ". . . important to America and all the rest of the world in ourstruggle to design rational, wholesome, and productive landscapes."--Laurie Olin, Hanna Olin, Ltd. "This century's most influential landscape architecture book."--Landscape Architecture ". . . an enduring contribution to the technical literature oflandscape planning and to that unfortunately small collection ofwritings which speak with emotional eloquence of the importance ofecological principles in regional planning." --Landscape and UrbanPlanning In the twenty-five years since it first took the academic world bystorm, Design With Nature has done much to redefine the fields oflandscape architecture, urban and regional planning, and ecologicaldesign. It has also left a permanent mark on the ongoing discussionof mankind's place in nature and nature's place in mankind withinthe physical sciences and humanities. Described by one enthusiasticreviewer as a "user's manual for our world," Design With Natureoffers a practical blueprint for a new, healthier relationshipbetween the built environment and nature. In so doing, it providesnothing less than the scientific, technical, and philosophicalfoundations for a mature civilization that will, as Lewis Mumfordecstatically put it in his Introduction to the 1969 edition,"replace the polluted, bulldozed, machine-dominated, dehumanized,explosion-threatened world that is even now disintegrating anddisappearing before our eyes."

  • At this critical point in your Business Continuity Management studies and research, you need one definitive, comprehensive professional textbook that will take you to the next step. In his 4th edition of Business Continuity Management: Global Best Practices, Andrew Hiles gives you a wealth of real-world analysis and advice ? based on international standards and grounded in best practices -- a textbook for today, a reference for your entire career. With so much to learn in this changing profession, you don't want to risk missing out on something you?ll need later.Does one of these describe you?Preparing for a Business Continuity Management career, needing step-by-step guidelines,Working in BCM, looking to deepen knowledge and stay current -- and create, update, or test a Business Continuity Plan.Managing in BCM, finance, facilities, emergency preparedness or other field, seeking to know as much as much as possible to make the decisions to keep the company going in the face of a business interruption.Hiles has designed the book for readers on three distinct levels: Initiate, Foundation, and Practitioner. Each chapter ends with an Action Plan, pinpointing the primary message of the chapter and a Business Continuity Road Map, outlining the actions for the reader at that level.NEW in the 4th Edition:Supply chain risk -- extensive chapter with valuable advice on contracting.Standards -- timely information and analysis of global/country-specific standards, with detailed appendices on ISO 22301/22313 and NFPA 1600.New technologies and their impact ? mobile computing, cloud computing, bring your own device, Internet of things, and more.Case studies ? vivid examples of crises and disruptions and responses to them.Horizon scanning of new risks ? and a hint of the future of BCM.Professional certification and training ? explores issues so important to your career.Proven techniques to win consensus on BC strategy and planning.BCP testing ? advice and suggestions on conducting a successful exercise or test of your planTo assist with learning -- chapter learning objectives, case studies, real-life examples, self-examination and discussion questions, forms, checklists, charts and graphs, glossary, and index.Downloadable resources and tools ? hundreds of pages, including project plans, risk analysis forms, BIA spreadsheets, BC plan formats, and more.Instructional Materials -- valuable classroom tools, including Instructor?s Manual, Test Bank, and slides -- available for use by approved adopters in college courses and professional development training.

  • A ground shaking exposé on the failure of popular cyber risk management methods How to Measure Anything in Cybersecurity Risk exposes the shortcomings of current "risk management" practices, and offers a series of improvement techniques that help you fill the holes and ramp up security. In his bestselling book How to Measure Anything, author Douglas W. Hubbard opened the business world's eyes to the critical need for better measurement. This book expands upon that premise and draws from The Failure of Risk Management to sound the alarm in the cybersecurity realm. Some of the field's premier risk management approaches actually create more risk than they mitigate, and questionable methods have been duplicated across industries and embedded in the products accepted as gospel. This book sheds light on these blatant risks, and provides alternate techniques that can help improve your current situation. You'll also learn which approaches are too risky to save, and are actually more damaging than a total lack of any security.  Dangerous risk management methods abound; there is no industry more critically in need of solutions than cybersecurity. This book provides solutions where they exist, and advises when to change tracks entirely. Discover the shortcomings of cybersecurity's "best practices" Learn which risk management approaches actually create risk Improve your current practices with practical alterations Learn which methods are beyond saving, and worse than doing nothing Insightful and enlightening, this book will inspire a closer examination of your company's own risk management practices in the context of cybersecurity. The end goal is airtight data protection, so finding cracks in the vault is a positive thing?as long as you get there before the bad guys do. How to Measure Anything in Cybersecurity Risk is your guide to more robust protection through better quantitative processes, approaches, and techniques.

  • The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

  • Learn application security from the very start, with this comprehensive and approachable guide!  Alice and Bob Learn Application Security is an accessible and thorough resource for anyone seeking to incorporate, from the beginning of the System Development Life Cycle, best security practices in software development. This book covers all the basic subjects such as threat modeling and security testing, but also dives deep into more complex and advanced topics for securing modern software systems and architectures. Throughout, the book offers analogies, stories of the characters Alice and Bob, real-life examples, technical explanations and diagrams to ensure maximum clarity of the many abstract and complicated subjects. Topics include: Secure requirements, design, coding, and deployment Security Testing (all forms) Common Pitfalls Application Security Programs Securing Modern Applications Software Developer Security Hygiene   Alice and Bob Learn Application Security is perfect for aspiring application security engineers and practicing software developers, as well as software project managers, penetration testers, and chief information security officers who seek to build or improve their application security programs.  Alice and Bob Learn Application Security illustrates all the included concepts with easy-to-understand examples and concrete practical applications, furthering the reader?s ability to grasp and retain the foundational and advanced topics contained within. 

  • JUMPSTART YOUR NEW AND EXCITING CAREER AS A PENETRATION TESTER The Pentester BluePrint: Your Guide to Being a Pentester offers readers a chance to delve deeply into the world of the ethical, or "white-hat" hacker. Accomplished pentester and author Phillip L. Wylie and cybersecurity researcher Kim Crawley walk you through the basic and advanced topics necessary to understand how to make a career out of finding vulnerabilities in systems, networks, and applications. You'll learn about the role of a penetration tester, what a pentest involves, and the prerequisite knowledge you'll need to start the educational journey of becoming a pentester. Discover how to develop a plan by assessing your current skillset and finding a starting place to begin growing your knowledge and skills. Finally, find out how to become employed as a pentester by using social media, networking strategies, and community involvement. Perfect for IT workers and entry-level information security professionals, The Pentester BluePrint also belongs on the bookshelves of anyone seeking to transition to the exciting and in-demand field of penetration testing. Written in a highly approachable and accessible style, The Pentester BluePrint avoids unnecessarily technical lingo in favor of concrete advice and practical strategies to help you get your start in pentesting. This book will teach you: The foundations of pentesting, including basic IT skills like operating systems, networking, and security systems The development of hacking skills and a hacker mindset Where to find educational options, including college and university classes, security training providers, volunteer work, and self-study Which certifications and degrees are most useful for gaining employment as a pentester How to get experience in the pentesting field, including labs, CTFs, and bug bounties

  • Hacking is the art of creative problem solving, whether that means finding an unconventional solution to a difficult problem or exploiting holes in sloppy programming. Many people call themselves hackers, but few have the strong technical foundation needed to really push the envelope.Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:Program computers using C, assembly language, and shell scripts Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening Outsmart common security measures like nonexecutable stacks and intrusion detection systems Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presenceRedirect network traffic, conceal open ports, and hijack TCP connections Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the accompanying Linux environment, and all you need is your own creativity.

  • The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.

  • Cutting-edge techniques for finding and fixing critical security flawsFortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker?s Handbook, Fifth Edition explains the enemy?s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition.?Build and launch spoofing exploits with Ettercap?Induce error conditions and crash software using fuzzers?Use advanced reverse engineering to exploit Windows and Linux software?Bypass Windows Access Control and memory protection schemes?Exploit web applications with Padding Oracle Attacks?Learn the use-after-free technique used in recent zero days?Hijack web browsers with advanced XSS attacks?Understand ransomware and how it takes control of your desktop?Dissect Android malware with JEB and DAD decompilers?Find one-day vulnerabilities with binary diffing?Exploit wireless systems with Software Defined Radios (SDR)?Exploit Internet of things devices?Dissect and exploit embedded devices?Understand bug bounty programs?Deploy next-generation honeypots?Dissect ATM malware and analyze common ATM attacks?Learn the business side of ethical hacking

  • The definitive guide?fully updated for Windows 10 and Windows Server 2016   Delve inside Windows architecture and internals, and see how core components work behind the scenes. Led by a team of internals experts, this classic guide has been fully updated for Windows 10 and Windows Server 2016. Whether you are a developer or an IT professional, you?ll get critical, insider perspectives on how Windows operates. And through hands-on experiments, you?ll experience its internal behavior firsthand?knowledge you can apply to improve application design, debugging, system performance, and support.     This book will help you: ·        Understand the Window system architecture and its most important entities, such as processes and threads ·        Examine how processes manage resources and threads scheduled for execution inside processes ·        Observe how Windows manages virtual and physical memory ·        Dig into the Windows I/O system and see how device drivers work and integrate with the rest of the system ·        Go inside the Windows security model to see how it manages access, auditing, and authorization, and learn about the new mechanisms in Windows 10 and Server 2016

  • Python is fast becoming the programming language of choice for hackers, reverse engineers, and software testers because it's easy to write quickly, and it has the low-level support and libraries that make hackers happy. But until now, there has been no real manual on how to use Python for a variety of hacking tasks. You had to dig through forum posts and man pages, endlessly tweaking your own code to get everything working. Not anymore.Gray Hat Python explains the concepts behind hacking tools and techniques like debuggers, trojans, fuzzers, and emulators. But author Justin Seitz goes beyond theory, showing you how to harness existing Python-based security tools?and how to build your own when the pre-built ones won't cut it.You'll learn how to:?Automate tedious reversing and security tasks?Design and program your own debugger?Learn how to fuzz Windows drivers and create powerful fuzzers from scratch?Have fun with code and library injection, soft and hard hooking techniques, and other software trickery?Sniff secure traffic out of an encrypted web browser session?Use PyDBG, Immunity Debugger, Sulley, IDAPython, PyEMU, and moreThe world's best hackers are using Python to do their handiwork. Shouldn't you?

  • Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker?s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus. Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifactsWrite code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devicesData-mine popular social media websites and evade modern anti-virus