Take advantage of iPhone and iPad sensors and advanced geolocation technologies to build state-of-the-art location applications. In this concise hands-on guide, author Alasdair Allan (Learning iOS Programming) takes you deep inside Apple’s Core Location framework, Map Kit, and other iOS tools, using illustrative examples and sample Objective-C code. Learn how to build location-aware apps for both iPhones and iPads, using code that detects hardware features and then adjusts your app’s behavior.
If you’re a programmer with iOS experience, or a Mac developer familiar with Objective-C, this book helps you get off to a solid start in location-based app development.
You’ll learn about:
Core Location: Understand the significant-change location service and geo-fencing capabilities
Map Kit: Embed maps into your application’s views
Magnetometer: Use the on-board sensor as a digital compass
Geocoding capabilities: Translate geographic coordinates into place names, and vice versa
Heat maps: Get a code walkthrough for displaying these maps on top of a standard MapKit view
Third-party SDKs: Add unique geo-location capabilities to your app from SkyHook Wireless, MapBox, and other providers
E-book Details:
Paperback: 116 pages
Author: Alasdair Allan
Publisher: O’Reilly Media, 1 Edition, 2012-10-15
Language: English
ISBN-10: 1449308449
ISBN-13: 9781449308445
Format: PDF,EPUB
File Size: 7.4MB
Get a real feel for Windows 8 with a wealth of tips in this step-by-step guide. After using Windows 7 or XP, learning Microsoft’s latest operating system takes some adjustment. Never fear. Windows expert Mike Halsey starts with the basics and then takes you through the trickier parts of Microsoft’s latest operating system. You’ll quickly learn how to make the most of Windows 8 for work and entertainment, whether you use a touchscreen tablet, a laptop, or a PC with a keyboard and mouse.
Easily navigate the intuitive Windows 8 interface
Use email and the Internet—and keep your family safe
Share files online or with other devices in your home
Download and use all kinds of of apps and programs
Watch movies and listen to music
Import, view, and edit your own photos and videos
Learn how to use extra hardware and older software
Use expert tips to keep your computer running smoothly
Discover cool stuff that makes computer use really easy
E-book Details:
Paperback: 140 pages
Author: Mike Halsey
Publisher: O’Reilly Media, 1 Edition, 2012-10-15
Language: English
ISBN-10: 1449326641
ISBN-13: 9781449326647
Format: PDF,EPUB (Early Release)
File Size: 9MB
Python for Data Analysis is concerned with the nuts and bolts of manipulating, processing, cleaning, and crunching data in Python. It is also a practical, modern introduction to scientific computing in Python, tailored for data-intensive applications. This is a book about the parts of the Python language and libraries you’ll need to effectively solve a broad set of data analysis problems. This book is not an exposition on analytical methods using Python as the implementation language.
Written by Wes McKinney, the main author of the pandas library, this hands-on book is packed with practical cases studies. It’s ideal for analysts new to Python and for Python programmers new to scientific computing.
Use the IPython interactive shell as your primary development environment
Learn basic and advanced NumPy (Numerical Python) features
Get started with data analysis tools in the pandas library
Use high-performance tools to load, clean, transform, merge, and reshape data
Create scatter plots and static or interactive visualizations with matplotlib
Apply the pandas groupby facility to slice, dice, and summarize datasets
Measure data by points in time, whether it’s specific instances, fixed periods, or intervals
Learn how to solve problems in web analytics, social sciences, finance, and economics, through detailed examples
E-book Details:
Paperback: 470 pages
Author: Wes McKinney
Publisher: O’Reilly Media, 1 Edition, 2012-10-29
Language: English
ISBN-10: 1449319793
ISBN-13: 9781449319793
Format: PDF,EPUB
File Size: 10.2MB
Kevin Beaver, "Hacking for Dummies"
For Dummies | 2004 | ISBN: 076455784X | 378 pages | PDF | 9.3 MB
While you’re reading this, a hacker could be prying and spying his way into your company’s IT systems, sabotaging your operations, stealing confidential information, shutting down your Web site, or wreaking havoc in other diabolical ways. Hackers For Dummies helps you hack into a hacker’s mindset and take security precautions to help you avoid a hack attack. It outlines computer hacker tricks and techniques you can use to assess the security of your own information systems, find security vulnerabilities, and fix them before malicious and criminal hackers can exploit them. It covers:
* Hacking methodology and researching public information to see what a hacker can quickly learn about your operations
* Social engineering (how hackers manipulate employees to gain information and access), physical security, and password vulnerabilities
* Network infrastructure, including port scanners, SNMP scanning, banner grabbing, scanning, and wireless LAN vulnerabilities
* Operating systems, including Windows, Linux, and Novell NetWare
* Application hacking, including malware (Trojan horses, viruses, worms, rootkits, logic bombs, and more), e-mail and instant messaging, and Web applications
* Tests, tools (commercial, shareware, and freeware), and techniques that offer the most bang for your ethical hacking buck
With this guide you can develop and implement a comprehensive security assessment plan, get essential support from management, test your system for vulnerabilities, take countermeasures, and protect your network infrastructure. You discover how to beat hackers at their own game, with:
* A hacking toolkit, including War dialing software, password cracking software, network scanning software, network vulnerability assessment software, a network analyzer, a Web application assessment tool, and more
* All kinds of countermeasures and ways to plug security holes
* A list of more than 100 security sites, tools, and resources
Ethical hacking helps you fight hacking with hacking, pinpoint security flaws within your systems, and implement countermeasures. Complete with tons of screen shots, step-by-step instructions for some countermeasures, and actual case studies from IT security professionals, this is an invaluable guide, whether you’re an Internet security professional, part of a penetration-testing team, or in charge of IT security for a large or small business.
Amazon.com is a great big database concerned with lots of stuff - books, of course, but also tools, clothing, films on DVD, kitchen equipment, and lots and lots (and lots) of Harry Potter paraphernalia. Want to wear an Anna Kournikova exercise brassiere while juicing celery (presumably with considerable vigor)? Amazon can help. Need a cricket bat, radar gun, dietary fiber supplement, or vibrasonic molechaser? Amazon has what you need. Which is all great, but the real value of Amazon.com isn't that these things are in the database. The real value of this site lies in the information about all that stuff - reviews, sales rankings, recommendations, and the like - and the large number of ways to access it. Amazon Hacks explains how to get the most out of Amazon.com as an ordinary customer with a Web browser and as a software developer interested in the site's considerable collection of Web Services.
In Amazon Hacks, Paul Bausch documents most of the avenues Amazon.com has opened up for exploration of the database. A lot of his coverage borders on the obvious: Sections on how to "Power-Search for Books" and "Put an Item Up for Bid at Amazon Auctions" aren't too different from Amazon's own explanatory articles. Coverage of how to add an Amazon search box to your own site, and add Amazon Associates item links to various kinds of Weblogs (including Blosxom and Moveable Type) are much handier. Bausch really shines when explaining Amazon.com's Web Services (AWS), the remotely accessible software interfaces that enables programs to search the database. He includes AWS-enabled programs in PHP, Python, and Perl.
Henk C.A. van Tilborg, Sushil Jajodia, "Encyclopedia of Cryptography and Security, 2nd edition"
English | 2011 | 1457 Pages | ISBN: 144195905X | PDF | 32 MB
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. As a critical enhancement to the First Edition’s base of 464 entries, the information in the Encyclopedia is relevant for researchers and professionals alike. Topics for this comprehensive reference were elected, written, and peer-reviewed by a pool of distinguished researchers in the field. The Second Edition’s editorial board now includes 34 scholars, which was expanded from 18 members in the First Edition. Representing the work of researchers from over 30 countries, the Encyclopedia is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The text’s practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature. Extensive cross-references to other entries within the Encyclopedia support efficient, user-friendly searches for immediate access to relevant information. Key concepts presented in the Encyclopedia of Cryptography and Security include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysis and security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online. The online edition features hyperlinks to cross-references, in addition to significant research.
Denny Cherry, "Securing SQL Server: Protecting Your Database from Attackers"
English | ISBN: 1597496251 | 2011 | PDF | 272 pages | 4,42 mb
There is a lot at stake for administrators taking care of servers, since they house sensitive data like credit cards, social security numbers, medical records, and much more. In Securing SQL Server you will learn about the potential attack vectors that can be used to break into your SQL Server database, and how to protect yourself from these attacks. Written by a Microsoft SQL Server MVP and MCM, you will learn how to properly secure your database, from both internal and external threats. Best practices and specific tricks employed by the author will also be revealed. Learn expert techniques to protect your SQL database environment.
Author Denny Cherry is a Microsoft MVP and MCM for his expertise in the SQL Server product
Learn expert techniques to protect your SQL database environment
Discover how to identify what an intruder accessed or damaged
Nitesh Dhanjani, Billy Rios, Brett Hardin, "Hacking: The Next Generation"
ISBN: 0596154577 | 2009 | EPUB/MOBI | 304 pages | 5 MB/6 MB
With the advent of rich Internet applications, the explosion of social media, and the increased use of powerful cloud computing infrastructures, a new generation of attackers has added cunning new techniques to its arsenal. For anyone involved in defending an application or a network of systems, Hacking: The Next Generation is one of the few books to identify a variety of emerging attack vectors.
You'll not only find valuable information on new hacks that attempt to exploit technical flaws, you'll also learn how attackers take advantage of individuals via social networking sites, and abuse vulnerabilities in wireless technologies and cloud infrastructures. Written by seasoned Internet security professionals, this book helps you understand the motives and psychology of hackers behind these attacks, enabling you to better prepare and defend against them.
Learn how "inside out" techniques can poke holes into protected networks
Understand the new wave of "blended threats" that take advantage of multiple application vulnerabilities to steal corporate data
Recognize weaknesses in today's powerful cloud infrastructures and how they can be exploited
Prevent attacks against the mobile workforce and their devices containing valuable data
Be aware of attacks via social networking sites to obtain confidential information from executives and their assistants
Get case studies that show how several layers of vulnerabilities can be used to compromise multinational corporations
Encyclopedia of Cryptography and Security by Henk C.A. van Tilborg and Sushil Jajodia
Publisher: Springer; 2nd ed. 2011 edition (Sep 6, 2011) | ISBN: 144195905X | English | PDF | 1457 pages | 32 MB
Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all levels Extensive resource with more than 700 contributions in Second Edition 5643 references, more than twice the number of references that appear in the First Edition With over 300 new entries, appearing in an A-Z format, the Encyclopedia of Cryptography and Security provides easy, intuitive access to information on all aspects of cryptography and security. As a critical enhancement to the First Edition’s base of 464 entries, the information in the Encyclopedia is relevant for researchers and professionals alike. Topics for this comprehensive reference were elected, written, and peer-reviewed by a pool of distinguished researchers in the field. The Second Edition’s editorial board now includes 34 scholars, which was expanded from 18 members in the First Edition. Representing the work of researchers from over 30 countries, the Encyclopedia is broad in scope, covering everything from authentication and identification to quantum cryptography and web security. The text’s practical style is instructional, yet fosters investigation. Each area presents concepts, designs, and specific implementations. The highly-structured essays in this work include synonyms, a definition and discussion of the topic, bibliographies, and links to related literature. Extensive cross-references to other entries within the Encyclopedia support efficient, user-friendly searches for immediate access to relevant information. Key concepts presented in the Encyclopedia of Cryptography and Security include: Authentication and identification; Block ciphers and stream ciphers; Computational issues; Copy protection; Cryptanalysis and security; Cryptographic protocols; Electronic payment and digital certificates; Elliptic curve cryptography; Factorization algorithms and primality tests; Hash functions and MACs; Historical systems; Identity-based cryptography; Implementation aspects for smart cards and standards; Key management; Multiparty computations like voting schemes; Public key cryptography; Quantum cryptography; Secret sharing schemes; Sequences; Web Security. Topics covered: Data Structures, Cryptography and Information Theory; Data Encryption; Coding and Information Theory; Appl.Mathematics/Computational Methods of Engineering; Applications of Mathematics; Complexity. This authoritative reference will be published in two formats: print and online. The online edition features hyperlinks to cross-references, in addition to significant research.
Seven Deadliest Wireless Technologies Attacks By Brad Haines
2010 | 140 Pages | ISBN: 1597495417 | PDF | 2 MB
Do you need to keep up with the latest hacks, attacks, and exploits affecting wireless technology? Then you need Seven Deadliest Wireless Technologies Attacks. This book pinpoints the most dangerous hacks and exploits specific to wireless technologies, laying out the anatomy of these attacks, inluding how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable.
Attacks detailed in this book include:
802.11 Wireless-Infrastructure Attacks
802.11 Wireless-Client Attacks
Bluetooth Attacks
RFID Attacks
Analog Wireless Device Attacks
Bad Encryption
Attacks on Cell Phones, PDAs and Other Hybrid Devices
Hadi Nahari, Ronald L. Krutz, "Web Commerce Security: Design and Development"
2011 | ISBN-10: 0470624469 | PDF | 504 pages | 7 MB
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems.
Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce requires a high degree of security to protect you during transactions. This book not only explores all critical security issues associated with both e-commerce and mobile commerce (m-commerce), it is also a technical manual for how to create a secure system. Covering all the technical bases, this book provides the detail that developers, system architects, and system integrators need to design and implement secure, user-friendly, online commerce systems.
Co-authored by Hadi Nahari, one of the world’s most renowned experts in Web commerce security; he is currently the Principal Security, Mobile and DevicesArchitect at eBay, focusing on the architecture and implementation of eBay and PayPal mobile
Co-authored by Dr. Ronald Krutz; information system security lecturer and co-author of the best-selling Wiley CISSP Prep Guide Series
Shows how to architect and implement user-friendly security for e-commerce and especially, mobile commerce
Covers the fundamentals of designing infrastructures with high availability, large transactional capacity, and scalability
Includes topics such as understanding payment technologies and how to identify weak security, and how to augment it.
Get the essential information you need on Web commerce security—as well as actual design techniques—in this expert guide.
Randy J Boyle, Raymond Panko, "Corporate Computer Security (3rd Edition)"
English | 2012 | 688 Pages | ISBN: 0132145359 | PDF | 14 MB
A strong business focus through a solid technical presentation of security tools.
Boyle/Panko provides a strong business focus along with a solid technical understanding of security tools. This text gives readers the IT security skills they need for the workplace.
This edition is more business focused and contains additional hands-on projects, coverage of wireless and data security, and case studies.
Keys to the Kingdom: Impressioning, Privilege Escalation, Bumping, and Other Key-Based Attacks Against Physical Locks By Deviant Ollam
2012 | 256 Pages | ISBN: 1597499838 | EPUB + MOBI | 6 MB + 5 MB
Lockpicking has become a popular topic with many in the security community. While many have chosen to learn the fine art of opening locks without keys, few people explore the fascinating methods of attack that are possible WITH keys. Keys to the Kingdom addresses the topics of impressioning, master key escalation, skeleton keys, and bumping attacks that go well beyond any treatment of these topics in the author's previous book, Practical Lock Picking.
This material is all new and focuses on locks currently in use as well as ones that have recently emerged on the market. Hackers and pen testers or persons tasked with defending their infrastructure and property from invasion will find these techniques uniquely valuable. As with Deviant Ollam's previous book, Practical Lock Picking, Keys to the Kingdom includes full-color versions of all diagrams and photographs. Check out the companion website which includes instructional videos that provide readers with a full-on training seminar from the author.
Excellent companion to Deviant Ollam's Practical Lock Picking.
Understand the typical failings of common security hardware in order to avoid these weaknesses.
Learn advanced methods of physical attack in order to be more successful with penetration testing.
Detailed full-color photos in the book make learning easy, and companion website is filled with invalualble training videos from Dev!
A Guide to Kernel Exploitation: Attacking the Core
Syngr.ss | 2010 | ISBN: 1597494860 | 442 pages | PDF | 15 MB
The number of security countermeasures against user-land exploitation is on the rise. Because of this, kernel exploitation is becoming much more popular among exploit writers and attackers. Playing with the heart of the operating system can be a dangerous game: This book covers the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits and applies them to different operating systems (Linux, Solaris, Mac OS X, and Windows). Kernel exploits require both art and science to achieve. Every OS has its quirks and so every exploit must be molded to fully exploit its target. This book discusses the most popular OS families-UNIX derivatives, Mac OS X, and Windows-and how to gain complete control over them. Concepts and tactics are presented categorically so that even when a specifically detailed exploit has been patched, the foundational information that you have read will help you to write a newer, better attack or a more concrete design and defensive structure.
Make the most of everything your exciting new iPhone 5 has to offer
Now that you have the latest and greatest iPhone, it’s time to find all the best and most fun ways to use it. This quick and handy guide presents all the important stuff you want to know, in a hip, helpful way. Packed with tips, tricks, and techniques, this edition covers the practical as well as the newest and coolest features, things like iOS 5, Siri, FaceTime video calling, HD video recording, multitasking, and much more.
Packs a boatload of tips, tricks, and techniques in a handy size to help you get the most out of your iPhone 5
Uses the hip, practical Portable Genius approach, designed to show you the key features that keep your digital lifestyle humming
Spotlights innovative ways to complete various tasks and help you save time and hassle
Reveals tips and tricks for working with the newest features, including iOS 5, Siri, FaceTime, HD video recording and editing, multitasking, and more
iPhone 5 Portable Genius is an essential accessory to your new iPhone.
Table of Contents
Chapter 1. How Do I Start Using My iPhone?
Chapter 2. How Do I Configure My iPhone?
Chapter 3. How Do I Connect My iPhone to a Network?
Chapter 4. How Can I Get More Out of the Phone App?
Chapter 5. How Can I Make the Most of iPhone Web Surfing?
Chapter 6. How Do I Maximize iPhone E-mail?
Chapter 7. How Do I Synchronize My iPhone?
Chapter 8. How Can I Get More Out of My iPhone’s Audio Features?
Chapter 9. How Do I Max Out the iPhone Photo and Video Features?
Chapter 10. Can I Use My iPhone to Manage Contacts and Appointments?
Chapter 11. How Do I Use My iPhone to Navigate My World?
Chapter 12. How Do I Manage My E-book Library?
Chapter 13. How Do I Keep My Life in Sync with iCloud?
Chapter 14. How Do I Fix My iPhone?
Book Details
Paperback: 384 pages
Publisher: Wiley (October 2012)
Language: English
ISBN-10: 1118352785
ISBN-13: 978-1118352786
iPhone 5 For Dummies, 6th Edition
Book Description
The full-color guide to getting the most out of your iPhone
Completely updated and revised to include iOS 6, iCloud, and the latest iPhone 5 features, this full-color book is your guide to all things iPhone. Bestselling veteran authors Edward Baig and Bob “Dr. Mac” LeVitus introduce you to the capabilities of the iPhone for making phone calls, browsing the Internet, sending and receiving e-mails, working with the calendar, watching and recording HD videos, taking and editing great photos, and much more.
You’ll discover how to set up iTunes, buy music and videos, protect your information, troubleshoot, multitask, and download the hundreds of thousands of apps available from the App Store.
Includes coverage of iPhone 5 and iPhone 4S as well as the older iPhone 4 model
Gets you started with your iPhone, and introduces you to the multitouch interface, synching with iCloud, making phone and video calls, texting, working with the calendar, and more
Explains setting up iTunes, watching your favorite movies and TV shows, taking stunning photos, and listening to your favorite music
Helps you get organized with the calendar and Reminders features, keep on top of the latest news with Notification Center, and communicate with Siri, your voice-activated virtual assistant
Walks you through connecting wirelessly, sending and receiving e-mails, making FaceTime video calls, getting directions from the all new Maps app, protecting your information, and troubleshooting
Addresses the latest updates, iCloud, and new iOS 6 features that make your iPhone even more powerful and easy to use
iPhone 5 For Dummies, 6th Edition is presented in the straightforward-but-fun style that defines the series. It’s just the book you need to get acquainted with your brand-new iPhone.
Table of Contents
Part I: Getting to Know Your iPhone
Chapter 1. Unveiling the iPhone
Chapter 2. iPhone Basic Training
Chapter 3. Synchronicity: Getting Stuff to and from Your iPhone
Chapter 4. Understanding the Phone-damentals
Part II: The PDA iPhone
Chapter 5. Texting 1, 2, 3: Messages and Notes
Chapter 6. Six Indispensible Utilities
Chapter 7. Taking the iPhone Siri-ously
Part III: The Multimedia iPhone
Chapter 8. Get in Tune(s): Audio on Your iPhone
Chapter 9. “Smile”: Taking Pictures with Your iPhone
Chapter 10. You Oughta Be in Pictures: Video on Your iPhone
Part IV: The Internet iPhone
Chapter 11. Going On a Mobile Safari
Chapter 12. The E-Mail Must Get Through
Chapter 13. Tracking with Maps, Compass, Stocks, and Weather
Part V: The Undiscovered iPhone
Chapter 14. Setting You Straight on Settings
Chapter 15. Apps-O-Lutely!
Chapter 16. When Good iPhones Go Bad
Part VI: The Part of Tens
Chapter 17. Ten Appetizing Apps
Chapter 18. Ten Apps Worth Paying For
Chapter 19. Ten Helpful Hints, Tips, and Shortcuts
Book Details
Paperback: 416 pages
Publisher: For Dummies; 6th Edition (November 2012)
Language: English
ISBN-10: 1118352017
ISBN-13: 978-1118352014
Michael Welschenbach - Cryptography in C and C++ (2nd edition)
Published: 2005-05-26 | ISBN: 1590595025 | DJVU | 504 pages | 4 MB
This book covers everything you need to know to write professional-level cryptographic code. This expanded, improved second edition includes about 100 pages of new material as well as numerous improvements to the original text.
The chapter about random number generation has been completely rewritten, and the latest cryptographic techniques are covered in detail. Furthermore, this book covers the recent improvements in primality testing.