In May 2013, Glenn Greenwald set out for Hong Kong to meet an anonymous source who claimed to have astonishing evidence of pervasive government spying and insisted on communicating only through heavily encrypted channels. That source turned out to be the 29-year-old NSA contractor and whistleblower Edward Snowden, and his revelations about the agency's widespread, systemic overreach proved to be some of the most explosive and consequential news in recent history, triggering a fierce debate over national security and information privacy. As the arguments rage on and the government considers various proposals for reform, it is clear that we have yet to see the full impact of Snowden's disclosures.
Now for the first time, Greenwald fits all the pieces together, recounting his high-intensity ten-day trip to Hong Kong, examining the broader implications of the surveillance detailed in his reporting for The Guardian, and revealing fresh information on the NSA's unprecedented abuse of power with never-before-seen documents entrusted to him by Snowden himself.
Going beyond NSA specifics, Greenwald also takes on the establishment media, excoriating their habitual avoidance of adversarial reporting on the government and their failure to serve the interests of the people. Finally, he asks what it means both for individuals and for a nation's political health when a government pries so invasively into the private lives of its citizens—and considers what safeguards and forms of oversight are necessary to protect democracy in the digital age. Coming at a landmark moment in American history, No Place to Hide is a fearless, incisive, and essential contribution to our understanding of the U.S. surveillance state.
After reading this book, you should be able to use these tools to do some testing and even working on penetration projects. You just need to remember not to use these techniques in a production environment without having a formal approval.
As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them.
If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox.A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
In late 2010, thousands of hacktivists joined a mass digital assault on the websites of VISA, MasterCard, and PayPal to protest their treatment of WikiLeaks. Other targets were wide ranging-the websites of corporations from Sony Entertainment and Fox to the Vatican and the Church of Scientology were hacked, defaced, and embarrassed-and the message was that no one was safe. Thousands of user accounts from pornography websites were released, exposing government employees and military personnel.
Although some attacks were perpetrated by masses of users who were rallied on the message boards of 4Chan, many others were masterminded by a small, tight-knit group of hackers who formed a splinter group of Anonymous called LulzSec. The legend of Anonymous and LulzSec grew in the wake of each ambitious hack. But how were they penetrating intricate corporate security systems? Were they anarchists or activists? Teams or lone wolves? A cabal of skilled hackers or a disorganized bunch of kids?
WE ARE ANONYMOUS delves deep into the internet's underbelly to tell the incredible full story of the global cyber insurgency movement, and its implications for the future of computer security.
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data thieves, cybervandals, and other malicious computer intruders. In his bestselling The Art of Deception, Mitnick presented fictionalized case studies that illustrated how savvy computer crackers use "social engineering" to compromise even the most technically secure computer systems. Now, in his new book, Mitnick goes one step further, offering hair-raising stories of real-life computer break-ins-and showing how the victims could have prevented them. Mitnick's reputation within the hacker community gave him unique credibility with the perpetrators of these crimes, who freely shared their stories with him-and whose exploits Mitnick now reveals in detail for the first time, including: A group of friends who won nearly a million dollars in Las Vegas by reverse-engineering slot machines Two teenagers who were persuaded by terrorists to hack into the Lockheed Martin computer systems Two convicts who joined forces to become hackers inside a Texas prison A "Robin Hood" hacker who penetrated the computer systems of many prominent companies-andthen told them how he gained access With riveting "you are there" descriptions of real computer break-ins, indispensable tips on countermeasures security professionals need to implement now, and Mitnick's own acerbic commentary on the crimes he describes, this book is sure to reach a wide audience-and attract the attention of both law enforcement agencies and the media.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Learn how to:
* Crack passwords and wireless network keys with brute-forcing and wordlists
* Test web applications for vulnerabilities
* Use the Metasploit Framework to launch exploits and write your own Metasploit modules
* Automate social-engineering attacks
* Bypass antivirus software
* Turn access to one machine into total control of the enterprise in the post exploitation phase
You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework.
With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.
A thoroughly revised and updated edition of the essential guide to preserving your personal security
From cyberspace to crawl spaces, new innovations in information gathering have left the private life of the average person open to scrutiny, and worse, exploitation. In this thoroughly updated third edition of his immensely popular guide How to Be Invisible, J.J. Luna shows you how to protect your home address, hide your ownership of vehicles and real estate, use pagers with dumbphones, switch to low-profile banking and invisible money transfers, use alternate signatures, and how to secretly run a home-based business.
J.J. Luna is an expert and highly trained security consultant with years of experience protecting himself, his family, and his clients. Using real life stories and his own consulting experience, J.J. Luna divulges legal methods to attain the privacy you crave and deserve, whether you want to shield yourself from casual scrutiny or take your life savings with you and disappear without a trace. Whatever your needs, Luna reveals the shocking secrets that private detectives and other seekers of personal information use to uncover information and then shows how to make a serious commitment to safeguarding yourself.
There is a prevailing sense in our society that true privacy is a thing of the past. In a world where privacy concerns that only continue to grow in magnitude, How to Be Invisible, Third Edition is a critical antidote to the spread of new and more efficient ways of undermining our personal security.
Privacy is a commonly-lamented casualty of the Information Age and of the world's changing climate--but that doesn't mean you have to stand for it. This new edition of J. J. Luna's classic manual contains step-by-step advice on building and maintaining your personal security, including brand new chapters on:
- The dangers from Facebook, smartphones, and facial recognition
- How to locate a nominee (or proxy) you can trust
- The art of pretexting, aka social engineering
- Moving to Baja California Sur; San Miguel de Allende, Guanajuato; Cuenca, Ecuador; or Spain's Canary Islands
- The secrets of international privacy, and much more!
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.
“Bruce Schneier’s amazing book is the best overview of privacy and security ever written.”—Clay Shirky
Your cell phone provider tracks your location and knows who’s with you. Your online and in-store purchasing patterns are recorded, and reveal if you're unemployed, sick, or pregnant. Your e-mails and texts expose your intimate and casual friends. Google knows what you’re thinking because it saves your private searches. Facebook can determine your sexual orientation without you ever mentioning it.
The powers that surveil us do more than simply store this information. Corporations use surveillance to manipulate not only the news articles and advertisements we each see, but also the prices we’re offered. Governments use surveillance to discriminate, censor, chill free speech, and put people in danger worldwide. And both sides share this information with each other or, even worse, lose it to cybercriminals in huge data breaches.
Much of this is voluntary: we cooperate with corporate surveillance because it promises us convenience, and we submit to government surveillance because it promises us protection. The result is a mass surveillance society of our own making. But have we given up more than we’ve gained? In Data and Goliath, security expert Bruce Schneier offers another path, one that values both security and privacy. He brings his bestseller up-to-date with a new preface covering the latest developments, and then shows us exactly what we can do to reform government surveillance programs, shake up surveillance-based business models, and protect our individual privacy. You'll never look at your phone, your computer, your credit cards, or even your car in the same way again.
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.
This is the story of the code and the characters—idealists, anarchists, extremists—who are transforming the next generation’s notion of what activism can be.
With unrivaled access to such major players as Julian Assange, Daniel Domscheit-Berg, and WikiLeaks’ shadowy engineer known as the Architect, never before interviewed, reporter Andy Greenberg unveils the world of politically-motivated hackers—who they are and how they operate.
Rather than merely showing how to run existing exploits, author Jon Erickson explains how arcane hacking techniques actually work. To share the art and science of hacking in a way that is accessible to everyone, Hacking: The Art of Exploitation, 2nd Edition introduces the fundamentals of C programming from a hacker's perspective.
The included LiveCD provides a complete Linux programming and debugging environment-all without modifying your current operating system. Use it to follow along with the book's examples as you fill gaps in your knowledge and explore hacking techniques on your own. Get your hands dirty debugging code, overflowing buffers, hijacking network communications, bypassing protections, exploiting cryptographic weaknesses, and perhaps even inventing new exploits. This book will teach you how to:
* Program computers using C, assembly language, and shell scripts
* Corrupt system memory to run arbitrary code using buffer overflows and format strings Inspect processor registers and system memory with a debugger to gain a real understanding of what is happening
* Outsmart common security measures like nonexecutable stacks and intrusion detection systems
* Gain access to a remote server using port-binding or connect-back shellcode, and alter a server's logging behavior to hide your presence
* Redirect network traffic, conceal open ports, and hijack TCP connections
* Crack encrypted wireless traffic using the FMS attack, and speed up brute-force attacks using a password probability matrix
Hackers are always pushing the boundaries, investigating the unknown, and evolving their art. Even if you don't already know how to program, Hacking: The Art of Exploitation, 2nd Edition will give you a complete picture of programming, machine architecture, network communications, and existing hacking techniques. Combine this knowledge with the included Linux environment, and all you need is your own creativity.
Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Like the rest of us, governments and corporations inhabit “glass houses,” all but transparent to a new generation of spies who operate remotely from such places as China, the Middle East, Russia, and even France. In this urgent wake-up call, Brenner draws on his extraordinary background to show what we can—and cannot—do to prevent cyber spies and hackers from compromising our security and stealing our latest technology.
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you've built your foundation for penetration testing, you'll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You'll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Learn how to:
* Find and exploit unmaintained, misconfigured, and unpatched systems
* Perform reconnaissance and find valuable information about your target
* Bypass anti-virus technologies and circumvent security controls
* Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery
* Use the Meterpreter shell to launch further attacks from inside the network
* Harness standalone Metasploit utilities, third-party tools, and plug-ins
* Learn how to write your own Meterpreter post exploitation modules and scripts
You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.
Companies moving toward flexible SOA architectures often face difficult information management and integration challenges. The master data they rely on is often stored and managed in ways that are redundant, inconsistent, inaccessible, non-standardized, and poorly governed. Using Master Data Management (MDM), organizations can regain control of their master data, improve corresponding business processes, and maximize its value in SOA environments.
Enterprise Master Data Management provides an authoritative, vendor-independent MDM technical reference for practitioners: architects, technical analysts, consultants, solution designers, and senior IT decisionmakers. Written by the IBM® data management innovators who are pioneering MDM, this book systematically introduces MDM’s key concepts and technical themes, explains its business case, and illuminates how it interrelates with and enables SOA.
Drawing on their experience with cutting-edge projects, the authors introduce MDM patterns, blueprints, solutions, and best practices published nowhere else—everything you need to establish a consistent, manageable set of master data, and use it for competitive advantage.
How MDM and SOA complement each other Using the MDM Reference Architecture to position and design MDM solutions within an enterprise Assessing the value and risks to master data and applying the right security controls Using PIM-MDM and CDI-MDM Solution Blueprints to address industry-specific information management challenges Explaining MDM patterns as enablers to accelerate consistent MDM deployments Incorporating MDM solutions into existing IT landscapes via MDM Integration Blueprints Leveraging master data as an enterprise asset—bringing people, processes, and technology together with MDM and data governance Best practices in MDM deployment, including data warehouse and SAP integration
But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation “Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.
Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
In The Tangled Web, Michal Zalewski, one of the world's top browser security experts, offers a compelling narrative that explains exactly how browsers work and why they're fundamentally insecure. Rather than dispense simplistic advice on vulnerabilities, Zalewski examines the entire browser security model, revealing weak points and providing crucial information for shoring up web application security. You'll learn how to:
* Perform common but surprisingly complex tasks such as URL parsing and HTML sanitization
* Use modern security features like Strict Transport Security, Content Security Policy, and Cross-Origin Resource Sharing
* Leverage many variants of the same-origin policy to safely compartmentalize complex web applications and protect user credentials in case of XSS bugs
* Build mashups and embed gadgets without getting stung by the tricky frame navigation policy
* Embed or host user-supplied content without running into the trap of content sniffing
For quick reference, "Security Engineering Cheat Sheets" at the end of each chapter offer ready solutions to problems you're most likely to encounter. With coverage extending as far as planned HTML5 features, The Tangled Web will help you create secure web applications that stand the test of time.
For Java applications, App Engine provides a J2EE standard servlet container with a complete Java 7 JVM and standard library. Because App Engine supports common Java API standards, your code stays clean and portable.Get a hands-on introduction to App Engine's tools and features, using an example applicationSimulate App Engine on your development machine directly from EclipseStructure your app into individually addressable modules, each with its own scaling configurationExploit the power of the scalable Cloud Datastore, using queries, transactions, and data modeling with JPAUse Cloud SQL for standard relational databases with App Engine applicationsLearn how to deploy, manage, and inspect your application on Google infrastructure
—Jon “jcase” Sawyer, from the Foreword
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals—until now.
In Android Security Internals, top Android security expert Nikolay Elenkov takes us under the hood of the Android security system. Elenkov describes Android security architecture from the bottom up, delving into the implementation of major security-related components and subsystems, like Binder IPC, permissions, cryptographic providers, and device administration.
* How Android permissions are declared, used, and enforced
* How Android manages application packages and employs code signing to verify their authenticity
* How Android implements the Java Cryptography Architecture (JCA) and Java Secure Socket Extension (JSSE) frameworks
* About Android’s credential storage system and APIs, which let applications store cryptographic keys securely
* About the online account management framework and how Google accounts integrate with Android
* About the implementation of verified boot, disk encryption, lockscreen, and other device security features
* How Android’s bootloader and recovery OS are used to perform full system updates, and how to obtain root access
With its unprecedented level of depth and detail, Android Security Internals is a must-have for any security-minded Android developer.
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.
When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.
The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.
The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.
The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain’s double identity. As prominent “white-hat” hacker Max “Vision” Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat “Iceman,” he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring.
And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police.
Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull’s-eye on his forehead.
Through the story of this criminal’s remarkable rise, and of law enforcement’s quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen’s remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today.
Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.
From the Hardcover edition.
Protect wireless networks against all real-world hacks by learning how hackers operate. Wireless Network Security: A Beginner's Guide discusses the many attack vectors that target wireless networks and clients--and explains how to identify and prevent them. Actual cases of attacks against WEP, WPA, and wireless clients and their defenses are included.
This practical resource reveals how intruders exploit vulnerabilities and gain access to wireless networks. You'll learn how to securely deploy WPA2 wireless networks, including WPA2-Enterprise using digital certificates for authentication. The book provides techniques for dealing with wireless guest access and rogue access points. Next-generation wireless networking technologies, such as lightweight access points and cloud-based wireless solutions, are also discussed. Templates, checklists, and examples give you the hands-on help you need to get started right away.
Wireless Network Security: A Beginner's Guide features:Lingo--Common security terms defined so that you’re in the know on the job IMHO--Frank and relevant opinions based on the author's years of industry experience In Actual Practice--Exceptions to the rules of security explained in real-world contexts Your Plan--Customizable checklists you can use on the job now Into Action--Tips on how, why, and when to apply new skills and techniques at work
This is an excellent introduction to wireless security and their security implications. The technologies and tools are clearly presented with copious illustrations and the level of presentation will accommodate the wireless security neophyte while not boring a mid-level expert to tears. If the reader invests the time and resources in building a lab to follow along with the text, s/he will develop a solid, basic understanding of what "wireless security" is and how it can be implemented in practice. This is definitely a recommended read for its intended audience. - Richard Austin, IEEE CIPHER, IEEE Computer Society's TC on Security and Privacy (E109, July 23, 2012)
Author Josh Lockhart—creator of PHP The Right Way, a popular initiative to encourage PHP best practices—reveals these new language features in action. You’ll learn best practices for application architecture and planning, databases, security, testing, debugging, and deployment. If you have a basic understanding of PHP and want to bolster your skills, this is your book.Learn modern PHP features, such as namespaces, traits, generators, and closuresDiscover how to find, use, and create PHP componentsFollow best practices for application security, working with databases, errors and exceptions, and moreLearn tools and techniques for deploying, tuning, testing, and profiling your PHP applicationsExplore Facebook’s HVVM and Hack language implementations—and how they affect modern PHPBuild a local development environment that closely matches your production server
The key to succeeding with service-oriented architecture (SOA) is in comprehending the meaning and significance of its most fundamental building block: the service. It is through an understanding of service design that truly “service-oriented” solution logic can be created in support of achieving the strategic goals associated with SOA and service-oriented computing. Bestselling SOA author Thomas Erl guides you through a comprehensive, insightful, and visually rich exploration of the service-orientation design paradigm, revealing exactly how services should and should not be designed for real-world SOA.
She writes, ÒContent platforms and social media networks do not have the power to restrain stalkers, end intimate partner violence, eliminate child abuse, or stop street harassment. But they can cultivate better interactions and better discourse, through thoughtful architecture, active moderation and community management.Ó
So how do we filter content from garbage? Read on.
Sarah Jeong writes about technology, policy and law with bylines at Forbes, The Verge, The Guardian, Slate and WIRED.
Privacy in the Age of Big Data highlights the many positive outcomes of digital surveillance and data collection while also outlining those forms of data collection to which we do not always consent, and of which we are likely unaware, as well as the dangers inherent in such surveillance and tracking. Payton and Claypoole skillfully introduce readers to the many ways we are “watched” and how to change behaviors and activities to recapture and regain more of our privacy. The authors suggest remedies from tools, to behavior changes, to speaking out to politicians to request their privacy back. Anyone who uses digital devices for any reason will want to read this book for its clear and no-nonsense approach to the world of big data and what it means for all of us.
By reading this book and working step by step through the essential tasks discussed, you can learn to:
Install Web and application servers Enable and configure remote administration Perform administration using the command-line and Windows PowerShell Configure Web sites, servers, and virtual directories Manage the global IIS configuration settings Customize Web content, HTTP headers, and error messages Use included files, custom file types, and caching Set up logging and track usage statistics
This book is designed for anyone who wants to learn how to manage IIS 8, including those who manage or support computers running Windows Server 2012 and Windows Server 2012 R2. Inside, you'll find comprehensive overviews, step-by-step procedures, frequently used tasks, documented examples, and much more. One of the goals is to keep the content so concise that the book remains compact and easy to navigate while at the same time ensuring that the book is packed with as much information as possible--making it a valuable resource.
Your every step online is being tracked and stored, and your identity literally stolen. Big companies and big governments want to know and exploit what you do, and privacy is a luxury few can afford or understand.
In this explosive yet practical book, Kevin Mitnick uses true-life stories to show exactly what is happening without your knowledge, teaching you "the art of invisibility"--online and real-world tactics to protect you and your family, using easy step-by-step instructions. Reading this book, you will learn everything from password protection and smart Wi-Fi usage to advanced techniques designed to maximize your anonymity.
Kevin Mitnick knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening. The world's most famous--and formerly the US government's most wanted--computer hacker, he has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point was on a three-year run from the FBI. Now Mitnick is reformed and widely regarded as the expert on the subject of computer security.
Invisibility isn't just for superheroes--privacy is a power you deserve and need in the age of Big Brother and Big Data.
This book is intended for those who want to learn to build RESTful web services with the Spring Framework. To make best use of the code samples included in the book, you should have a basic knowledge of the Java language. Previous experience with the Spring Framework would also help you get up and running quickly.What You Will LearnDeep dive into the principles behind RESTExpose CRUD operations through RESTful endpoints with the Spring FrameworkDevise response formats and error handling strategies, offering a consistent and flexible structure to simplify integration for service consumersFollow the best approaches for dealing with a service's evolution while maintaining backward compatibilityUnderstand techniques to secure web servicesComply with the best ways to test RESTful web services, including tips for load testingOptimise and scale web services using techniques such as caching and clusteringIn Detail
REST is an architectural style that tackles the challenges of building scalable web services. In today's connected world, APIs have taken a central role on the web. APIs provide the fabric through which systems interact, and REST has become synonymous with APIs.
The depth, breadth, and ease of use of Spring makes it one of the most attractive frameworks in the Java ecosystem. Marrying the two technologies is therefore a very natural choice.
This book takes you through the design of RESTful web services and leverages the Spring Framework to implement these services. Starting from the basics of the philosophy behind REST, you'll go through the steps of designing and implementing an enterprise-grade RESTful web service. Taking a practical approach, each chapter provides code samples that you can apply to your own circumstances.
This book goes beyond the use of Spring and explores approaches to tackle resilience, security, and scalability concerns. You'll learn techniques to deal with security in Spring and discover how to implement unit and integration test strategies.
Finally, the book ends by walking you through building a Java client for your RESTful web service, along with some scaling techniques for it.Style and approach
This book is a step-by-step, hands-on guide to designing and building RESTful web services. The book follows the natural cycle of developing these services and includes multiple code samples to help you.
COVERS ALL SIX EXAM DOMAINS:
Legal and ethical principles
Hybrid and emerging technologies
ELECTRONIC CONTENT INCLUDES:250 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or by exam domain
Author David Greenberg shows you how Mesos manages your entire datacenter as a single logical entity, eliminating the need to assign fixed sets of machines to applications. You’ll quickly discover why Mesos is the ultimate DevOps tool.Understand Mesos architecture, and learn how it manages CPU, memory, and other resources across a clusterBuild an application on top of Mesos with Marathon, a platform for hosting services on MesosCreate new, production-ready frameworks for MesosWrite a custom executor to provide richer interaction between the Mesos scheduler and workersDive into advanced topics, including the reconciliation process, Docker integration, dynamic reservations, and persistent volumesLearn about today’s Mesos initiatives that will likely become tomorrow’s features
Beautiful Security explores this challenging subject with insightful essays and analysis on topics that include:
The underground economy for personal information: how it works, the relationships among criminals, and some of the new ways they pounce on their preyHow social networking, cloud computing, and other popular trends help or hurt our online securityHow metrics, requirements gathering, design, and law can take security to a higher levelThe real, little-publicized history of PGP
This book includes contributions from:
Peiter "Mudge" ZatkoJim StickleyElizabeth NicholsChenxi WangEd BellisBen EdelmanPhil Zimmermann and Jon CallasKathy WangMark CurpheyJohn McManusJames RouthRandy V. SabettAnton ChuvakinGrant Geyer and Brian DunphyPeter WaynerMichael Wood and Fernando Francisco
All royalties will be donated to the Internet Engineering Task Force (IETF).
CASP: CompTIA Advanced Security Practitioner Study Guide: CAS-002 is the updated edition of the bestselling book covering the CASP certification exam. CompTIA approved, this guide covers all of the CASP exam objectives with clear, concise, thorough information on crucial security topics. With practical examples and insights drawn from real-world experience, the book is a comprehensive study resource with authoritative coverage of key concepts. Exam highlights, end-of-chapter reviews, and a searchable glossary help with information retention, and cutting-edge exam prep software offers electronic flashcards and hundreds of bonus practice questions. Additional hands-on lab exercises mimic the exam's focus on practical application, providing extra opportunities for readers to test their skills.
CASP is a DoD 8570.1-recognized security certification that validates the skillset of advanced-level IT security professionals. The exam measures the technical knowledge and skills required to conceptualize, design, and engineer secure solutions across complex enterprise environments, as well as the ability to think critically and apply good judgment across a broad spectrum of security disciplines. This study guide helps CASP candidates thoroughly prepare for the exam, providing the opportunity to:Master risk management and incident response Sharpen research and analysis skills Integrate computing with communications and business Review enterprise management and technical component integration
Experts predict a 45-fold increase in digital data by 2020, with one-third of all information passing through the cloud. Data has never been so vulnerable, and the demand for certified security professionals is increasing quickly. The CASP proves an IT professional's skills, but getting that certification requires thorough preparation. This CASP study guide provides the information and practice that eliminate surprises on exam day.
Also available as a set, Security Practitoner & Crypotography Set, 9781119071549 with Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition.
An inside look at who's watching you, what they know and why it matters. We are being watched.
We see online ads from websites we've visited, long after we've moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what's in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
In Dragnet Nation, award-winning investigative journalist Julia Angwin reports from the front lines of America's surveillance economy, offering a revelatory and unsettling look at how the government, private companies, and even criminals use technology to indiscriminately sweep up vast amounts of our personal data. In a world where we can be watched in our own homes, where we can no longer keep secrets, and where we can be impersonated, financially manipulated, or even placed in a police lineup, Angwin argues that the greatest long-term danger is that we start to internalize the surveillance and censor our words and thoughts, until we lose the very freedom that makes us unique individuals. Appalled at such a prospect, Angwin conducts a series of experiments to try to protect herself, ranging from quitting Google to carrying a "burner" phone, showing how difficult it is for an average citizen to resist the dragnets' reach.
Her book is a cautionary tale for all of us, with profound implications for our values, our society, and our very selves.
For Web services to succeed as part of SOA, they require balanced, effective technical contracts that enable services to be evolved and repeatedly reused for years to come. Now, a team of industry experts presents the first end-to-end guide to designing and governing Web service contracts. Writing for developers, architects, governance specialists, and other IT professionals, the authors cover the following areas:Understanding Web Service Contract Technologies Fundamental and Advanced WSDL Fundamental and Advanced XML Schema Fundamental and Advanced WS-Policy Fundamental Message Design with SOAP Advanced Message Design with WS-Addressing Advanced Message Design with MTOM, and SwA Versioning Techniques and Strategies Web Service Contracts and SOA
--Aaron Skonnard, member of technical staff and cofounder, Pluralsight
" Essential ASP.NET 2.0 gets under the hood and dismantles the engine before your eyes. Fritz and Keith understand that we as developers need to understand how it works and this book does exactly that. Their explanation of the ASP.NET 2.0 page event sequence is worth the price of the book alone."
--Shawn Wildermuth, Microsoft MVP (C#), "The ADO Guy"
" Essential ASP.NET 2.0 is an incredibly useful must-read for any developer.Many books drag you through theory and mindless detail, but this one actually sets up the problems you may encounter with ASP.NET 2.0 and rolls out the alternatives."
--Patrick Hynds, Microsoft Regional Director and President, CriticalSites
"This book is essential for any ASP.NET developer moving from version 1.x to 2.0. Onion and Brown not only cover the new features, but provide a wealth of insight and detail about how to use them effectively."
--Ron Petrusha, author of Visual Basic 2005: The Complete Reference
"Drawing on their deep technical knowledge and real-world experience, Fritz and Keith take the reader into some of the less explored and much improved areas of ASP.NET such as diagnostics and state management and performance. Readers will turn to this book over and over again."
--John Timney, Microsoft MVP, Senior Web Services Consultant,British Telecom
"Fritz and Keith, both established developers and writers in our industry, have succeeded again--enlightening us on the latest advancements found in ASP.NET 2.0. If you're new to ASP.NET or a seasoned veteran, you'll benefit tremendously from their overview, analysis, and sample code."
--Joe "MSJoe" Flanigen
"This book seeks not only to explain how to effectively build Web sites with ASP.NET, it also gives the reader an idea of how the process works. This insight is essential to creating applications that work with the infrastructure rather than fighting it."
--Justin Burtch, Vice President, Newbrook Solutions
Essential ASP.NET 2.0 is the Microsoft developer's definitive reference for ASP.NET 2.0 programming. It covers all you need to know to build robust, well-designed Web applications with ASP.NET 2.0, Visual Studio 2005, and .NET 2.0. ASP.NET MVP Fritz Onion and Developer Security MVP Keith Brown draw on their unparalleled experience working with ASP.NET 2.0 and teaching it to professional developers. From data binding to security, UIs to performance, they demystify ASP.NET 2.0's most difficult areas, and introduce little-known techniques for leveraging it to the fullest.
The perfect companion to his previous classic, Essential ASP.NET with Examples in C#, Essential ASP.NET 2.0 offers hundreds of new C# examples that illuminate today's best Web development practices. (Both C# and VB 2005 versions of all code examples can be downloaded from the companion Web site.)
Topics explored in-depth include:Application architecture Code behind Master pages Themes and skins Navigation controls Data binding State management Security Web Parts Diagnostics Performance optimization Asynchronous tasks and pages
Simply put, if you want to design and build better ASP.NET 2.0 Web applications, Essential ASP.NET 2.0 delivers everything you need: insider's knowledge, proven best practices, and outstanding code samples.
In Executing SOA, four experienced SOA implementers share realistic, proven, “from-the-trenches” guidance for successfully delivering on even the largest and most complex SOA initiative.
This book follows up where the authors’ best-selling Service-Oriented Architecture Compass left off, showing how to overcome key obstacles to successful SOA implementation and identifying best practices for all facets of execution—technical, organizational, and human. Among the issues it addresses: introducing a services discipline that supports collaboration and information process sharing; integrating services with preexisting technology assets and strategies; choosing the right roles for new tools; shifting culture, governance, and architecture; and bringing greater agility to the entire organizational lifecycle, not just isolated projects.
Executing SOA is an indispensable resource for every enterprise architect, technical manager, and IT leader tasked with driving value from SOA in complex environments.
· Implementing SOA governance that reflects the organization’s strategic and business focus
· Running SOA projects successfully: practical guidelines and proven methodologies around service modeling and design
· Leveraging reusable assets: making the most of your SOA repository
· Enabling the architect to choose the correct tools and products containing the features required to execute on the SOA method for service design and implementation
· Defining information services to get the right information to the right people at the right time
· Integrating SOA with Web 2.0 and other innovative products and solutions
· Providing highly usable human interfaces in SOA environments
This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties--without compromising national security.
JavaFX Essentials will help you to design and build high performance JavaFX 8-based applications that run on a variety of devices.
Starting with the basics of the framework, it will take you all the way through creating your first working application to discovering the core and main JavaFX 8 features, then controlling and monitoring your outside world. The examples provided illustrate different JavaFX and Java SE 8 features.
This guide is an invaluable tutorial if you are planning to develop and create JavaFX 8 applications to run on a variety of devices and platforms.