Categories Unlimited Books

Walking Wounded: Inside the U.S. Cyberwar Machine

Forget everything you know about crime, war and espionage in cyberspace.Walking Wounded takes the layman to seasoned professional on an insider’s journey through the secret history, technologies, and strategies surrounding war and espionage in cyberspace. Walking Wounded is not another hacking book. It takes the reader behind the scenes and recounts the story of the […]

Read More
Categories Unlimited Books

The CERT C Secure Coding Standard (SEI Series in Software Engineering (Pape…

The CERT C Secure Coding Standard “I’m an enthusiastic supporter of the CERT Secure Coding Initiative. Programmers have lots of sources of advice on correctness, clarity, maintainability, performance, and even safety. Advice on how specific language features affect security has been missing. The CERT(R) C Secure Coding Standardfills this need.” -Randy Meyers, Chairman of ANSI […]

Read More
Categories Unlimited Books

The Ultimate GDPR Practitioner Guide: Demystifying Privacy & Data Protectio…

The Ultimate GDPR Practitioner Guide provides those tasked with implementing Data Protection processes, useful information on how to achieve compliance with GDPR. The book is crammed with advice, guidance and templates and also includes a copy of the full regulation text and the supporting recitals. Topics include: •The Data Protection Officer•Data Protection Policy•Data Protection / […]

Read More
Categories Unlimited Books

NASDAQ MARKET SIMULATION, A: INSIGHTS ON A MAJOR MARKET FROM THE SCIENCE OF…

This pioneering book describes the applications of agent-based modeling to financial markets. It presents a new paradigm for finance, where markets are treated as complex systems whose behavior emerges as a result of interactions of market participants, market institutions, and market rules. This includes both a presentation of the conceptual model and its software implementation. […]

Read More
Categories Unlimited Books

Linux Basics for Hackers: Getting Started with Networking, Bash, and Securi…

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. Many aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows […]

Read More