Arjun Srivastava's Library
home

Arjun Srivastava's Library

The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, William L. Simon
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech securityKevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of arti...
The Art of Network Penetration Testing: Taking Over Any Company in the World
Royce Davis
The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system an...
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
Heather Adkins and Betsy Beyer and Paul Blankinship and Piotr Lewandowski and Ana Oprea and Adam Stubblefield
Can a system be considered truly reliable if it isn't fundamentally secure? Or can it be considered secure if it's unreliable? Security is crucial to the design and operation of scalable systems in production, as it plays an important part in produc...
Coders: Who They Are, What They Think and How They Are Changing Our World
Clive Thompson
'Masterful . . . [Thompson] illuminates both the fascinating coders and the bewildering technological forces that are transforming the world in which we live.' - David Grann, author of The Lost City of Z.Facebook’s algorithms shaping the news. Uber’...
Hacker's Delight
Henry S. Warren
-- At long last, proven short-cuts to mastering difficult aspects of computer programming.-- Learn to program at a more advanced level than is generally taught in schools and training courses, and much more advanced than can be learned through indivi...
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize,...
Zero Trust Networks: Building Secure Systems in Untrusted Networks
Evan Gilman and Doug Barth
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an a...