Arjun Srivastava's Library
home

Arjun Srivastava's Library

The Art of Deception: Controlling the Human Element of Security
Kevin D. Mitnick, William L. Simon
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech securityKevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of arti...
The Art of Network Penetration Testing: Taking Over Any Company in the World
Royce Davis
The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system an...
Go in Action
Brian Ketelsen and Erik St. Martin and William Kennedy
Summary Go in Action introduces the Go language, guiding you from inquisitive developer to Go guru. The book begins by introducing the unique features and concepts of Go. Then, you'll get hands-on experience writing real-world applications includin...
IOS Hacker's Handbook
Charlie Miller , Dion Blazakis , Dino Daizovi , Stefan Esser , Vincenzo Iozzo , Ralf-Philip Weinmann
Discover all the security risks and exploits that can threaten iOS-based mobile devices iOS is Apple's mobile operating system for the iPhone and iPad. With the introduction of iOS5, many security issues have come to light. This book explains and di...
Security Engineering: A Guide to Building Dependable Distributed Systems
Ross J. Anderson
The world has changed radically since the first edition of this book was published in 2001. Spammers, virus writers, phishermen, money launderers, and spies now trade busily with each other in a lively online criminal economy and as they specialize,...
The Wealth of Networks: How Social Production Transforms Markets and Freedom
Yochai Benkler
With the radical changes in information production that the Internet has introduced, we stand at an important moment of transition, says Yochai Benkler in this thought-provoking book. The phenomenon he describes as social production is reshaping mar...
Zero Trust Networks: Building Secure Systems in Untrusted Networks
Evan Gilman and Doug Barth
The perimeter defenses guarding your network perhaps are not as secure as you think. Hosts behind the firewall have no defenses of their own, so when a host in the "trusted" zone is breached, access to your data center is not far behind. That’s an a...