• Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information

    Completely Rewritten Sixth Edition Sheds New Light on Open Source Intelligence Collection and AnalysisAuthor Michael Bazzell has been well known in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout twenty-five chapters of specialized websites, software solutions, and creative search techniques. Over 250 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for a... [Read More]

    • ASIN: 1984201573
    • ASIN: 1984201573
    • ISBN: 1984201573
    • Manufacturer: CreateSpace Independent Publishing Platform

  • GeoServer Beginner's Guide - Second Edition: Share geospatial data using Open Source standards

    This step-by-step guide will teach you how to use GeoServer to build custom and interactive maps using your data.About This BookExploit the power of GeoServer to provide agile, flexible, and low -cost community projectsShare real-time maps quicklyBoost your map server's performance using the power and flexibility of GeoServerWho This Book Is ForIf you are a web developer with knowledge of server side scripting, have experience in installing applications on the server, and want to go beyond Google Maps by offering dynamically built maps on your site with your latest geospatial data stored in My... [Read More]

    • ASIN: B075Z4ZD4M
    • ASIN: B075Z4ZD4M
    • Manufacturer: Packt Publishing

  • Threat Modeling: Designing for Security

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs aga... [Read More]

    • ASIN: 1118809998
    • UPC: 001118809998
    • ASIN: 1118809998
    • ISBN: 1118809998
    • Brand: Wiley
    • Manufacturer: Wiley

  • Hiding from the Internet: Eliminating Personal Online Information

    New 2018 Fourth Edition Take control of your privacy by removing your personal information from the internet with this updated Fourth Edition. Author Michael Bazzell has been well known in government circles for his ability to locate personal information about anyone through the internet. In Hiding from the Internet: Eliminating Personal Online Information, he exposes the resources that broadcast your personal details to public view. He has researched each source and identified the best method to have your private details removed from the databases that store profiles on all of us. This book w... [Read More]

    • ASIN: 1986621383
    • ASIN: 1986621383
    • ISBN: 1986621383
    • Manufacturer: CreateSpace Independent Publishing Platform

  • The Misbehavior of Markets: A Fractal View of Financial Turbulence

    Mathematical superstar and inventor of fractal geometry, Benoit Mandelbrot, has spent the past forty years studying the underlying mathematics of space and natural patterns. What many of his followers don't realize is that he has also been watching patterns of market change. In The (Mis)Behavior of Markets, Mandelbrot joins with science journalist and former Wall Street Journal editor Richard L. Hudson to reveal what a fractal view of the world of finance looks like. The result is a revolutionary reevaluation of the standard tools and models of modern financial theory. Markets, we learn, are f... [Read More]

    • ASIN: 0465043577
    • ASIN: 0465043577
    • ISBN: 0465043577
    • Brand: Mandelbrot, Benoit B./ Hudson, Richard L.
    • Manufacturer: Basic Books

  • Rtfm: Red Team Field Manual

    The Red Team Field Manual (RTFM) is a no fluff, but thorough reference guide for serious Red Team members who routinely find themselves on a mission without Google or the time to scan through a man page. The RTFM contains the basic syntax for commonly used Linux and Windows command line tools, but it also encapsulates unique use cases for powerful tools such as Python and Windows PowerShell. The RTFM will repeatedly save you time looking up the hard to remember Windows nuances such as Windows wmic and dsquery command line tools, key registry values, scheduled tasks syntax, startup locations an... [Read More]

    • ASIN: 1494295504
    • ASIN: 1494295504
    • ISBN: 1494295504
    • Brand: CreateSpace Independent Publishing Platform
    • Manufacturer: CreateSpace Independent Publishing Platform

  • The Hacker Playbook 3: Practical Guide To Penetration Testing

    Back for the third season, The Hacker Playbook 3 (THP3) takes your offensive game to the pro tier. With a combination of new strategies, attacks, exploits, tips and tricks, you will be able to put yourself in the center of the action toward victory. The main purpose of this book is to answer questions as to why things are still broken. For instance, with all the different security products, secure code reviews, defense in depth, and penetration testing requirements, how are we still seeing massive security breaches happening to major corporations and governments? The real question we need to ... [Read More]

    • ASIN: 1980901759
    • ASIN: 1980901759
    • ISBN: 1980901759
    • Manufacturer: Independently published

  • MacOS and iOS Internals, Volume I: User Mode (v1.3)

    In this first volume of the "Mac OS and *OS Internals" trilogy, Jonathan Levin takes on the user mode components of Apple's operating systems. Starting with an introduction as to their layered architecture, touring private frameworks and libraries, and then delving into the internals of applications, process, thread and memory management, Mach messaging, launchd and XPC internals, and wrapping up with advanced debugging and tracing techniques using the most powerful APIs that were hitherto unknown and unused outside Apple's own applications. As with the other books in this series, the approach... [Read More]

    • ASIN: 099105556X
    • ASIN: 099105556X
    • ISBN: 099105556X
    • Manufacturer: Technologeeks Press

  • Guide To Investing in Gold & Silver: Protect Your Financial Future

    The highly anticipated 2nd edition of the best-selling gold and silver investing book of the century.  Completely revised, with over 100 entirely new pages of content."Throughout the ages, many things have been used as currency: livestock, grains, spices, shells, beads, and now paper. But only two things have ever been money: gold and silver. When paper money becomes too abundant, and thus loses its value, man always turns back to precious metals. During these times there is always an enormous wealth transfer, and it is within your power to transfer that wealth away from you or toward you." ... [Read More]

    • ASIN: 1937832740
    • ASIN: 1937832740
    • ISBN: 1937832740
    • Brand: Rda Pr Llc
    • Manufacturer: WealthCycle Press

  • Machine Trading: Deploying Computer Algorithms to Conquer the Markets (Wiley Trading)

    Dive into algo trading with step-by-step tutorials and expert insight Machine Trading is a practical guide to building your algorithmic trading business. Written by a recognized trader with major institution expertise, this book provides step-by-step instruction on quantitative trading and the latest technologies available even outside the Wall Street sphere. You'll discover the latest platforms that are becoming increasingly easy to use, gain access to new markets, and learn new quantitative strategies that are applicable to stocks, options, futures, currencies, and even bitcoins. The compani... [Read More]

    • ASIN: 1119219604
    • UPC: 001119219604
    • ASIN: 1119219604
    • ISBN: 9781119219606
    • Brand: Wiley
    • Manufacturer: Wiley

  • Deep Learning for Computer Vision: Expert techniques to train advanced neural networks using TensorFlow and Keras

    Learn how to model and train advanced neural networks to implement a variety of Computer Vision tasksKey FeaturesTrain different kinds of deep learning model from scratch to solve specific problems in Computer VisionCombine the power of Python, Keras, and TensorFlow to build deep learning models for object detection, image classification, similarity learning, image captioning, and moreIncludes tips on optimizing and improving the performance of your models under various constraintsBook DescriptionDeep learning has shown its power in several application areas of Artificial Intelligence, especia... [Read More]

    • ASIN: 1788295625
    • ASIN: 1788295625
    • ISBN: 1788295625
    • Manufacturer: Packt Publishing

  • DevOps & Microservices Handbook: Non-Programmer's Guide to DevOps and Microservices

    Are you a non-coder looking for insight into DevOps and Microservices Architecture?  As the industry is moving towards maximum digitization there is consensus that DevOps practices help you deliver software faster, more reliably, and with fewer errors.You may be a consultant, Advisor, Project Manager or a novice into IT industry; after going through this guide you would be able to appreciate DevOps, Microservices and other related concepts like Kanban,Scrum,Agile, SOA, Monolith Architecture, DevOps, Docker, Kubernetes etc.You would also get to know about the leaders in DevOps and Microservic... [Read More]

    • ASIN: B07CRJDL6C
    • ASIN: B07CRJDL6C

  • NETGEAR WiFi Range Extender EX3700 - Coverage up to 1000 sq.ft. and 15 devices with AC750 Dual Band Wireless Signal Booster & Repeater (up to 750Mbps speed), and Compact Wall Plug Design

    NETGEAR AC750 WiFi Range Extender (EX3700-100NAS). System Requirements:2.4 and/or 5GHz 802.11 a/b/g/n/ac wireless router or gateway,Microsoft. Internet Explorer. 8.0, Firefox. 20, Safari. 5.1, Google Chrome 25.0 browsers or higher. Trouble shooting tip- If you cannot get a WiFi connection working, you can use an Ethernet cable to connect your computer to the extender. Data throughput, signal range, and wireless coverage per sq. ft. may vary due to differences in operating environments of wireless networks, including without limitation building materials and wireless interference. Operating tem... [Read More]

    • ASIN: B00R92CL5E
    • UPC: 606449108484
    • ASIN: B00R92CL5E
    • Brand: NETGEAR
    • Size: AC750
    • Manufacturer: Netgear

  • First Alert Smoke Detector and Carbon Monoxide Detector Alarm | Battery Operated, SCO5CN


    • ASIN: B000MXJ498
    • UPC: 704335118101
    • ASIN: B000MXJ498
    • Brand: First Alert
    • Size: 1 Pack
    • Manufacturer: First Alert

  • Linksys WRT AC3200 Dual-Band Open Source Router for Home (Tri-Stream Fast Wireless WiFi Router, MU-MIMO Gigabit Wireless Router)

    The WRT3200ACM MU MIMO Gigabit Wi Fi Router is powered by Tri Stream 160 technology, which doubles the bandwidth on all spatial streams for the fastest dual band router on the market to power all your high bandwidth activities.* Featuring MU MIMO technology, it’s like a dedicated router to multiple devices for Wi Fi at the same time, same speed. Open source ready with OpenWrt and DD WRT for complete flexibility and customization of networking functions, or to optimize your router for specific use cases. Upgraded Smart Wi Fi app allows you to manage and monitor your home Wi Fi from a mobile d... [Read More]

    • ASIN: B01JOXW3YE
    • UPC: 745883714674
    • ASIN: B01JOXW3YE
    • Brand: Linksys
    • Size: 7.70in. x 1.90in. x 9.70in.
    • Manufacturer: Linksys

  • Network Performance and Security : Testing and Analyzing Using Open Source and Low-Cost Tools

    Network Performance Security: Testing and Analyzing Using Open Source and Low-Cost Tools gives mid-level IT engineers the practical tips and tricks they need to use the best open source or low cost tools available to

    • UPC: 54869040

  • Security Bit Steel SET 3.8mm + 4.5mm Security Bit Screwdriver Tool (7cm Length) Open NES SNES N64 Super Nintendo 64 Cartridges & Systems

    Security Bit Steel SET 3.8mm + 4.5mm Security Bit Screwdriver Tool (7cm Length) Open NES SNES N64 Super Nintendo 64 Cartridges &

    • UPC: 289672100
    • Rating: 5.0

  • Open Source Security Tools: A Practical Guide to Security Applications [With CDROM]

    For Sale is a brand new version of Open Source Security Tools Practical Guide to Security Applications, A by Tony Howlett and is ready for immediate

    • UPC: 24826822

  • Open Source Intelligence Methods and Tools - eBook

    Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism

    • UPC: 335639676

  • Open Source Intelligence Methods and Tools : A Practical Guide to Online Intelligence

    Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism

    • UPC: 326477856

  • Digital Forensics with Open Source Tools

    "Digital Forensics with Open Source Tools" is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide and explains the use of these

    • UPC: 14494429

  • Digital Forensics with Open Source Tools - eBook

    Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of open

    • UPC: 797709862

  • 3.8mm Screwdriver Security Bit Open NES SNES Nintendo 64 & Game Boy Games

    Steel 3.8mm Screwdriver Security Bit Open NES SNES Nintendo 64 & Game Boy

    • UPC: 217973642

  • Open Source Security Tools : Market Offer

    Open Source Security Tools: Market

    • UPC: 125759674

  • Open-Source Security Tools Standard Requirements

    Open-Source Security Tools Standard

    • UPC: 470381179

  • Top 10 Open Source Cyber Security Tools

    OpenSource Pentesting & Security Analysis Tools | Christian Schneider

    All-in-one security with open source tools - DevSecCon Singapore 2018