You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
A computer security expert shows readers how to build more secure software by building security in and putting it into practice. The CD-ROM contains a tutorial and demo of the Fortify Source Code Analysis Suite.
Meet the world's top ethical hackers and explore the tools of the trade Hacking the Hacker takes you inside the world of cybersecurity to show you what goes on behind the scenes, and introduces you to the men and women on the front lines of this technological arms race. Twenty-six of the world's top white hat hackers, security researchers, writers, and leaders, describe what they do and why, with each profile preceded by a no-experience-necessary explanation of the relevant technology. Dorothy Denning discusses advanced persistent threats, Martin Hellman describes how he helped invent public key encryption, Bill Cheswick talks about firewalls, Dr. Charlie Miller talks about hacking cars, and...
Do you know where browser is pointing?. The Java security model. Serious holes in the security model. Malicious applets. Antidotes and guidelines for Java users. Tomorrow's Java security. Java security. Cert alerts. References. Index.
Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book’s expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security. This book will help you und...
"Imagine trying to play defense in football without ever studying offense. You would not know when a run was coming, how to defend pass patterns, nor when to blitz. In computer systems, as in football, a defender must be able to think like an attacker. I say it in my class every semester, you don't want to be the last person to attack your own system--you should be the first. "The world is quickly going online. While I caution against online voting, it is clear that online gaming is taking the Internet by storm. In our new age where virtual items carry real dollar value, and fortunes are won and lost over items that do not really exist, the new threats to the intrepid gamer are all too real....
Most organizations have a firewall, antivirus software, and intrusion detection systems, all of which are intended to keep attackers out. So why is computer security a bigger problem today than ever before? The answer is simple--bad software lies at the heart of all computer security problems. Traditional solutions simply treat the symptoms, not the problem, and usually do so in a reactive way. This book teaches you how to take a proactive approach to computer security. Building Secure Software cuts to the heart of computer security to help you get security right the first time. If you are serious about computer security, you need to read this book, which includes essential lessons for both ...
Drowning in unnecessary complexity, unmanaged state, and tangles of spaghetti code? In the best tradition of Lisp, Clojure gets out of your way so you can focus on expressing simple solutions to hard problems. Clojure cuts through complexity by providing a set of composable tools--immutable data, functions, macros, and the interactive REPL. Written by members of the Clojure core team, this book is the essential, definitive guide to Clojure. This new edition includes information on all the newest features of Clojure, such as transducers and specs. Clojure joins the flexibility and agility of Lisp with the reach, stability, and performance of Java. Combine Clojure's tools for maximum effective...
The iconic actor Charles McGraw appeared in over 140 roles on films and television, including the classic noir pictures The Killers (1946) and The Narrow Margin (1952). Whether portraying tough cops or sadistic killers, McGraw brought a unique authenticity to the screen. Emphasizing his impact on the film noir style, this comprehensive biography examines McGraw's lengthy career against the backdrop of a changing Hollywood. Through numerous personal interviews with his surviving intimates, close acquaintances and co-workers, his tumultuous personal life is detailed from his earliest days to his bizarre, accidental death. Also included are an extensive critical filmography of McGraw's feature film career, a complete list of television appearances and previously unpublished film stills and personal photos.
Praise for Mind Gym "Believing in yourself is paramount to success for any athlete. Gary's lessons and David's writing provide examples of the importance of the mental game." --Ben Crenshaw, two-time Masters champion and former Ryder Cup captain "Mind Gym hits a home run. If you want to build mental muscle for the major leagues, read this book." --Ken Griffey Jr., Major League Baseball MVP "I read Mind Gym on my way to the Sydney Olympics and really got a lot out of it. Gary has important lessons to teach, and you'll find the exercises fun and beneficial." --Jason Kidd, NBA All-Star and Olympic gold-medal winner In Mind Gym, noted sports psychology consultant Gary Mack explains how your mind influences your performance on the field or on the court as much as your physical skill does, if not more so. Through forty accessible lessons and inspirational anecdotes from prominent athletes--many of whom he has worked with--you will learn the same techniques and exercises Mack uses to help elite athletes build mental "muscle." Mind Gym will give you the "head edge" over the competition.