Takedown's bookshelf: read en-US Sat, 14 Sep 2024 06:54:10 -0700 60 Takedown's bookshelf: read 144 41 /images/layout/goodreads_logo_144.jpg Blindsight (Firefall, #1) 2542808 A science fiction novel of burning, dark intensity.

Two months since the stars fell.

Two months since sixty-five thousand alien objects clenched around Earth like a luminous fist, screaming to the heavens as the atmosphere burned them to ash. Two months since that moment of brief, bright surveillance by agents unknown.

Two months of silence while a world holds its breath.

Now some half-derelict space probe hears a whisper from the edge of the solar system: a faint signal sweeping the cosmos like a lighthouse beam. Whatever’s out there isn’t talking to us. It’s talking to some distant star, perhaps. Or perhaps to something closer.]]>
384 Peter Watts 0765319640 Takedown 1 3.99 2006 Blindsight (Firefall, #1)
author: Peter Watts
name: Takedown
average rating: 3.99
book published: 2006
rating: 1
read at: 2015/11/10
date added: 2024/09/14
shelves:
review:

]]>
<![CDATA[Security Operations Center: Building, Operating, and Maintaining your SOC]]> 23880292 Security Operations Center is the complete guide to building, operating, and managing Security Operations Centers in any environment. Drawing on experience with hundreds of customers ranging from Fortune 500 enterprises to large military organizations, three leading experts thoroughly review each SOC model, including virtual SOCs. You’ll learn how to select the right strategic option for your organization, and then plan and execute the strategy you’ve chosen.
Security Operations Center walks you through every phase required to establish and run an effective SOC, including all significant people, process, and technology capabilities. The authors assess SOC technologies, strategy, infrastructure, governance, planning, implementation, and more. They take a holistic approach considering various commercial and open-source tools found in modern SOCs.
This best-practice guide is written for anybody interested in learning how to develop, manage, or improve a SOC. A background in network security, management, and operations will be helpful but is not required. It is also an indispensable resource for anyone preparing for the Cisco SCYBER exam. · Review high-level issues, such as vulnerability and risk management, threat intelligence, digital investigation, and data collection/analysis · Understand the technical components of a modern SOC · Assess the current state of your SOC and identify areas of improvement · Plan SOC strategy, mission, functions, and services · Design and build out SOC infrastructure, from facilities and networks to systems, storage, and physical security · Collect and successfully analyze security data · Establish an effective vulnerability management practice · Organize incident response teams and measure their performance · Define an optimal governance and staffing model · Develop a practical SOC handbook that people can actually use · Prepare SOC to go live, with comprehensive transition plans · React quickly and collaboratively to security incidents · Implement best practice security operations, including continuous enhancement and improvement]]>
448 Joseph Muñiz 0134052013 Takedown 0 to-read 3.88 2015 Security Operations Center: Building, Operating, and Maintaining your SOC
author: Joseph Muñiz
name: Takedown
average rating: 3.88
book published: 2015
rating: 0
read at:
date added: 2024/06/22
shelves: to-read
review:

]]>
<![CDATA[An Elegant Puzzle: Systems of Engineering Management]]> 45303387 289 Will Larson 1953953336 Takedown 0 to-read 4.08 2019 An Elegant Puzzle: Systems of Engineering Management
author: Will Larson
name: Takedown
average rating: 4.08
book published: 2019
rating: 0
read at:
date added: 2021/07/11
shelves: to-read
review:

]]>
<![CDATA[The Making of a Manager: What to Do When Everyone Looks to You]]> 38821039 Instant Wall Street Journal Bestseller!

Congratulations, you're a manager! After you pop the champagne, accept the shiny new title, and step into this thrilling next chapter of your career, the truth descends like a fog: you don't really know what you're doing.

That's exactly how Julie Zhuo felt when she became a rookie manager at the age of 25. She stared at a long list of logistics--from hiring to firing, from meeting to messaging, from planning to pitching--and faced a thousand questions and uncertainties. How was she supposed to spin teamwork into value? How could she be a good steward of her reports' careers? What was the secret to leading with confidence in new and unexpected situations?

Now, having managed dozens of teams spanning tens to hundreds of people, Julie knows the most important lesson of all: great managers are made, not born. If you care enough to be reading this, then you care enough to be a great manager.

The Making of a Manager is a modern field guide packed everyday examples and transformative insights, including:

* How to tell a great manager from an average manager (illustrations included)
* When you should look past an awkward interview and hire someone anyway
* How to build trust with your reports through not being a boss
* Where to look when you lose faith and lack the answers

Whether you're new to the job, a veteran leader, or looking to be promoted, this is the handbook you need to be the kind of manager you wish you had.]]>
288 Julie Zhuo 0735219567 Takedown 5 management 4.18 2019 The Making of a Manager: What to Do When Everyone Looks to You
author: Julie Zhuo
name: Takedown
average rating: 4.18
book published: 2019
rating: 5
read at: 2021/03/22
date added: 2021/03/22
shelves: management
review:

]]>
<![CDATA[Dare to Lead: Brave Work. Tough Conversations. Whole Hearts.]]> 40115162 #1 NEW YORK TIMES BESTSELLER � Brené Brown has taught us what it means to dare greatly, rise strong, and brave the wilderness. Now, based on new research conducted with leaders, change makers, and culture shifters, she’s showing us how to put those ideas into practice so we can step up and lead.Don’t miss the five-part HBO Max docuseries Brené Atlas of the Heart!NAMED ONE OF THE BEST BOOKS OF THE YEAR BY BLOOMBERG Leadership is not about titles, status, and wielding power. A leader is anyone who takes responsibility for recognizing the potential in people and ideas, and has the courage to develop that potential. When we dare to lead, we don’t pretend to have the right answers; we stay curious and ask the right questions. We don’t see power as finite and hoard it; we know that power becomes infinite when we share it with others. We don’t avoid difficult conversations and situations; we lean into vulnerability when it’s necessary to do good work. But daring leadership in a culture defined by scarcity, fear, and uncertainty requires skill-building around traits that are deeply and uniquely human. The irony is that we’re choosing not to invest in developing the hearts and minds of leaders at the exact same time as we’re scrambling to figure out what we have to offer that machines and AI can’t do better and faster. What can we do better? Empathy, connection, and courage, to start. Four-time #1 New York Times bestselling author Brené Brown has spent the past two decades studying the emotions and experiences that give meaning to our lives, and the past seven years working with transformative leaders and teams spanning the globe. She found that leaders in organizations ranging from small entrepreneurial startups and family-owned businesses to nonprofits, civic organizations, and Fortune 50 companies all ask the same How do you cultivate braver, more daring leaders, and how do you embed the value of courage in your culture? In this new book, Brown uses research, stories, and examples to answer these questions in the no-BS style that millions of readers have come to expect and love. Brown writes, “One of the most important findings of my career is that daring leadership is a collection of four skill sets that are 100 percent teachable, observable, and measurable. It’s learning and unlearning that requires brave work, tough conversations, and showing up with your whole heart. Easy? No. Because choosing courage over comfort is not always our default. Worth it? Always. We want to be brave with our lives and our work. It’s why we’re here.”Whether you’ve read Daring Greatly and Rising Strong or you’re new to Brené Brown’s work, this book is for anyone who wants to step up and into brave leadership.]]> 230 Brené Brown 0399592547 Takedown 0 to-read 4.30 2018 Dare to Lead: Brave Work. Tough Conversations. Whole Hearts.
author: Brené Brown
name: Takedown
average rating: 4.30
book published: 2018
rating: 0
read at:
date added: 2020/11/18
shelves: to-read
review:

]]>
<![CDATA[Permission to Screw Up: How I Learned to Lead by Doing (Almost) Everything Wrong]]> 34437136 The inspiring, unlikely, laugh-out-loud story of how one woman learned to lead–and how she ultimately succeeded, not despite her many mistakes, but because of them.

This is the story of how Kristen Hadeed built Student Maid, a cleaning company where people are happy, loyal, productive, and empowered, even while they’re mopping floors and scrubbing toilets. It’s the story of how she went from being an almost comically inept leader to a sought-after CEO who teaches others how to lead.
Ěý
Hadeed unintentionally launched Student Maid while attending college ten years ago. Since then, Student Maid has employed hundreds of students and is widely recognized for its industry-leading retention rate and its culture of trust and accountability. But Kristen and her company were no overnight sensa­tion. In fact, they were almost nothing at all.

Along the way, Kristen got it wrong almost as often as she got it right. Giving out hugs instead of feed­back, fixing errors instead of enforcing accountability, and hosting parties instead of cultivating meaning­ful relationships were just a few of her many mistakes. But Kristen’s willingness to admit and learn from those mistakes helped her give her people the chance to learn from their own screwups too.

Permission to Screw UpĚýdismisses the idea that leaders and orga­nizations should try to be perfect. It encourages people of all ages to go for it and learn to lead by acting, rather than waiting or thinking. Through a brutally honest and often hilarious account of her own strug­gles, Kristen encourages us to embrace our failures and proves that we’ll be better leaders when we do.
Ěý]]>
272 Kristen Hadeed 1591848296 Takedown 0 to-read 4.23 2017 Permission to Screw Up: How I Learned to Lead by Doing (Almost) Everything Wrong
author: Kristen Hadeed
name: Takedown
average rating: 4.23
book published: 2017
rating: 0
read at:
date added: 2020/11/18
shelves: to-read
review:

]]>
<![CDATA[The Manager's Path: A Guide for Tech Leaders Navigating Growth and Change]]> 33369254
In this book, author Camille Fournier takes you through the stages of technical management, from mentoring interns to working with the senior staff. You ll get actionable advice for approaching various obstacles in your path, whether you re a new manager, a mentor, or a more experienced leader looking for fresh advice. Pick up this book and learn how to become a better manager and leader in your organization.

* Discover how to manage small teams and large/multi-level teams
* Understand how to build and bootstrap a unifying culture in teams
* Deal with people problems and learn how to mentor other managers and new leaders
* Learn how to manage yourself: avoid common pitfalls that challenge many leaders
* Obtain several practices that you can incorporate and practice along the way]]>
226 Camille Fournier 1491973897 Takedown 0 to-read 4.23 2017 The Manager's Path: A Guide for Tech Leaders Navigating Growth and Change
author: Camille Fournier
name: Takedown
average rating: 4.23
book published: 2017
rating: 0
read at:
date added: 2020/11/18
shelves: to-read
review:

]]>
The First-Time Manager 18867856 241 Loren B. Belker 0814417841 Takedown 0 to-read 3.98 1978 The First-Time Manager
author: Loren B. Belker
name: Takedown
average rating: 3.98
book published: 1978
rating: 0
read at:
date added: 2020/11/18
shelves: to-read
review:

]]>
<![CDATA[First, Break All the Rules: What the World's Greatest Managers Do Differently]]> 50937 271 Marcus Buckingham 0684852861 Takedown 0 to-read 3.94 1998 First, Break All the Rules: What the World's Greatest Managers Do Differently
author: Marcus Buckingham
name: Takedown
average rating: 3.94
book published: 1998
rating: 0
read at:
date added: 2020/11/18
shelves: to-read
review:

]]>
<![CDATA[Network Security Assessment: Know Your Network]]> 20045601
If you're a network administrator, the pressure is on you to defend your systems from attack. But short of devoting your life to becoming a security expert, what can you do to ensure the safety of your mission critical systems? Where do you start?

Using the steps laid out by professional security analysts and consultants to identify and assess risks, "Network Security Assessment" offers an efficient testing model that an administrator can adopt, refine, and reuse to create proactive defensive strategies to protect their systems from the threats that are out there, as well as those still being developed.

This thorough and insightful guide covers offensive technologies by grouping and analyzing them at a higher level--from both an offensive and defensive standpoint--helping administrators design and deploy networks that are immune to offensive exploits, tools, and scripts. Network administrators who need to develop and implement a security assessment program will find everything they're looking for--a proven, expert-tested methodology on which to base their own comprehensive program--in this time-saving new book.]]>
607 Chris McNab Takedown 0 to-read 4.00 2004 Network Security Assessment: Know Your Network
author: Chris McNab
name: Takedown
average rating: 4.00
book published: 2004
rating: 0
read at:
date added: 2020/04/17
shelves: to-read
review:

]]>
Rogue Code (Jeff Aiken, #3) 18404119 Flash Boys revealed how high-frequency trading has created a ruthless breed of traders capable of winning whichever way the market turns. In Rogue Code, Mark Russinovich takes it one step further to show how their grip on high finance makes the stock market vulnerable to hackers who could bring about worldwide financial collapse.

Cyber security expert Jeff Aiken knows that no computer system is completely secure. When he's called to investigate a possible breach at the New York Stock Exchange, he discovers not only that their system has been infiltrated but that someone on the inside knows. Yet for some reason, they have allowed the hackers to steal millions of dollars from accounts without trying to stop the theft.

When Jeff uncovers the crime, the NYSE suddenly turns on him. Accused of grand larceny, he must find and expose the criminals behind the theft, not just to prove his innocence but to stop a multibillion-dollar heist that could upend the U.S. economy. Unwilling to heed Jeff's warnings, the NYSE plans to continue with a major IPO using a new, untested system, one that might be susceptible both to hackers and to ruthless high-frequency traders willing to take any risk to turn a profit.

Now Jeff Aiken must unearth the truth on his own, following the thread to the back alleys of Rio de Janeiro to take on one of the world's most ruthless cartels.

Praised for his combination of real-world technology and quick-paced action, with Rogue Code Mark Russinovich delivers an intense thriller about a cyber threat that seems all too possible---and the Wall Street traders who might allow it to happen.

Includes a foreword by Haim Bodek, author of The Problem of HFT: Collected Writings on High Frequency Trading & Stock Market Structure Reform.
]]>
400 Mark E. Russinovich 1250035376 Takedown 0 currently-reading 3.82 2014 Rogue Code (Jeff Aiken, #3)
author: Mark E. Russinovich
name: Takedown
average rating: 3.82
book published: 2014
rating: 0
read at:
date added: 2018/08/18
shelves: currently-reading
review:

]]>
Trojan Horse (Jeff Aiken, #2) 13538906
As the virus penetrates Western intelligence, and the terrifying truth about its creator is revealed, Jeff and Daryl find themselves in a desperate race to reverse it as the fate of both East and West hangs in the balance.]]>
319 Mark E. Russinovich 1250010489 Takedown 4 3.75 2012 Trojan Horse (Jeff Aiken, #2)
author: Mark E. Russinovich
name: Takedown
average rating: 3.75
book published: 2012
rating: 4
read at: 2018/08/18
date added: 2018/08/18
shelves: information-security, thriller
review:

]]>
<![CDATA[Intelligence-Driven Incident Response: Outwitting the Adversary]]> 28646667
Each method reinforces the other: threat intelligence supports and augments incident response, while incident response generates useful threat intelligence. This book helps incident managers, malware analysts, reverse engineers, digital forensics specialists, and intelligence analysts understand, implement, and benefit from this relationship.

In three parts, this in-depth book includes:



The fundamentals: get an introduction to cyber threat intelligence, the intelligence process, the incident-response process, and how they all work together

Practical application: walk through the intelligence-driven incident response (IDIR) process using the F3EAD process--Find, Fix Finish, Exploit, Analyze, and Disseminate

The way forward: explore big-picture aspects of IDIR that go beyond individual incident-response investigations, including intelligence team building]]>
282 Scott J. Roberts 1491934948 Takedown 0 currently-reading 4.16 Intelligence-Driven Incident Response: Outwitting the Adversary
author: Scott J. Roberts
name: Takedown
average rating: 4.16
book published:
rating: 0
read at:
date added: 2018/05/05
shelves: currently-reading
review:

]]>
<![CDATA[The Five Dysfunctions of a Team]]> 21343 The Five Dysfunctions of a Team Patrick Lencioni once again offers a leadership fable that is as enthralling and instructive as his first two best-selling books, The Five Temptations of a CEO and The Four Obsessions of an Extraordinary Executive. This time, he turns his keen intellect and storytelling power to the fascinating, complex world of teams.

Kathryn Petersen, Decision Tech's CEO, faces the ultimate leadership crisis: Uniting a team in such disarray that it threatens to bring down the entire company. Will she succeed? Will she be fired? Will the company fail? Lencioni's utterly gripping tale serves as a timeless reminder that leadership requires as much courage as it does insight.

Throughout the story, Lencioni reveals the five dysfunctions which go to the very heart of why teams even the best ones-often struggle. He outlines a powerful model and actionable steps that can be used to overcome these common hurdles and build a cohesive, effective team. Just as with his other books, Lencioni has written a compelling fable with a powerful yet deceptively simple message for all those who strive to be exceptional team leaders.]]>
228 Patrick Lencioni 0787960756 Takedown 4 business I also like the format of a tale, rather than dry theory.]]> 4.09 2002 The Five Dysfunctions of a Team
author: Patrick Lencioni
name: Takedown
average rating: 4.09
book published: 2002
rating: 4
read at: 2018/05/02
date added: 2018/05/02
shelves: business
review:
Interesting book about creating a team, however I find it a bit overly simplistic, but there is definitely some truth to it as well.
I also like the format of a tale, rather than dry theory.
]]>
<![CDATA[100 Deadly Skills: The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation]]> 25111028
In today’s increasingly dangerous world, threats to your personal safety are everywhere. From acts of terror to mass shootings, and from the unseen (and sometimes virtual) matrix of everyday crime, danger is no longer confined to dark alleys or unstable regions. Potentially life-threatening circumstances can arise anywhere, anytime, and Clint Emerson—former Navy SEAL—wants you to be prepared.

100 Deadly Skills contains proven self-defense skills, evasion tactics, and immobilizing maneuvers—modified from the world of black ops—to help you take action in numerous “worst case� scenarios from escaping a locked trunk, to making an improvised Taser, to tricking facial recognition software. With easy-to-understand instructions and illustrations, Emerson outlines in detail many life-saving strategies and teaches you how to think and act like a member of the special forces.

This complete course in survival teaches you how to prevent tracking, evade a kidnapping, elude an active shooter, rappel down the side of a building, immobilize a bad guy, protect yourself against cyber-criminals, and much more—all using low-tech to “no-tech� methods. Clear, detailed, and presented in an easy-to-understand and execute format, 100 Deadly Skills is an invaluable resource. Because let’s face it, when danger is imminent, you don’t have time for complicated instructions.]]>
272 Clint Emerson 147679605X Takedown 0 to-read 3.79 2015 100 Deadly Skills: The SEAL Operative's Guide to Eluding Pursuers, Evading Capture, and Surviving Any Dangerous Situation
author: Clint Emerson
name: Takedown
average rating: 3.79
book published: 2015
rating: 0
read at:
date added: 2018/03/03
shelves: to-read
review:

]]>
<![CDATA[Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information]]> 19824756




Details about this retired (2nd)

Second Edition Sheds New Light on Open Source Intelligence Collection and Analysis.

Author Michael Bazzell has been well known and respected in government circles for his ability to locate personal information about any target through Open Source Intelligence (OSINT). In this book, he shares his methods in great detail. Each step of his process is explained throughout sixteen chapters of specialized websites, application programming interfaces, and software solutions. Over 200 resources are identified with narrative tutorials and screen captures. This book will serve as a reference guide for anyone that is responsible for the collection of online content. It is written in a hands-on style that encourages the reader to execute the tutorials as they go. The search techniques offered will inspire analysts to "think outside the box" when scouring the internet for personal information.

Much of the content of this book has never been discussed in any publication. Always thinking like a hacker, the author has identified new ways to use various technologies for an unintended purpose. This book will improve anyone's online investigative skills. Among other techniques, you will learn how to

Twitter GPS & Account Data,
Hidden Social Network Content,
Cell Phone Owner Information,
Hidden Photo GPS & Metadata,
Deleted Websites & Posts,
Website Owner Information,
Alias Social Network Profiles,
Additional User Accounts,
Sensitive Documents & Photos,
Live Streaming Social Content,
Videos Uploaded by Location,
Newspaper Archives & Scans,
Social Content by Location,
Text Transcripts of Videos,
Historical Satellite Imagery,
Duplicate Copies of Photos,
Local Personal Radio Frequencies,
Compromised Email Information,
Wireless Routers by Location,
Hidden Mapping Applications,
Free Investigative Software,
Alternative Search Engines,
Stolen Items for Sale,
Unlisted Addresses,
Unlisted Phone Numbers,
Public Government Records,
Document Metadata,
Voter Registration Records,
Facebook Wall Posts,
Online Criminal Activity]]>
328 Michael Bazzell 1481282204 Takedown 0 to-read 4.33 2012 Open Source Intelligence Techniques: Resources for Searching and Analyzing Online Information
author: Michael Bazzell
name: Takedown
average rating: 4.33
book published: 2012
rating: 0
read at:
date added: 2018/02/18
shelves: to-read
review:

]]>
<![CDATA[Rise and Kill First: The Secret History of Israel's Targeted Assassinations]]> 33598223 The first definitive history of the Mossad, Shin Bet, and the IDF’s targeted killing programs, from the man hailed by David Remnick as “arguably [Israel’s] best investigative reporter�

The Talmud says: “If someone comes to kill you, rise up and kill him first.� This instinct to take every measure, even the most aggressive, to defend the Jewish people is hardwired into Israel’s DNA. From the very beginning of its statehood in 1948, protecting the nation from harm has been the responsibility of its intelligence community and armed services, and there is one weapon in their vast arsenal that they have relied upon to thwart the most serious threats: Targeted assassinations have been used countless times, on enemies large and small, sometimes in response to attacks against the Israeli people and sometimes preemptively. In this page-turning, eye-opening book, journalist and military analyst Ronen Bergman offers a riveting inside account of the targeted killing programs—their successes, their failures, and the moral and political price exacted on the men and women who approved and carried out the missions.

Bergman has gained the exceedingly rare cooperation of many current and former members of the Israeli government, including Prime Ministers Shimon Peres, Ehud Barak, Ariel Sharon, and Benjamin Netanyahu, as well as high-level figures in the country’s military and intelligence services: the IDF (Israel Defense Forces), the Mossad (the world’s most feared intelligence agency), Caesarea (a “Mossad within the Mossad� that carries out attacks on the highest-value targets), and the Shin Bet (an internal security service that implemented the largest targeted assassination campaign ever, in order to stop what had once appeared to be unstoppable: suicide terrorism).

Including never-before-reported, behind-the-curtain accounts of key operations, and based on hundreds of on-the-record interviews and thousands of files to which Bergman has gotten exclusive access over his decades of reporting, Rise and Kill First brings us deep into the heart of Israel’s most secret activities. Bergman traces, from statehood to the present, the gripping events and thorny ethical questions underlying Israel’s targeted killing campaign, which has shaped the Israeli nation, the Middle East, and the entire world.]]>
784 Ronen Bergman 1400069718 Takedown 0 to-read 4.40 2018 Rise and Kill First: The Secret History of Israel's Targeted Assassinations
author: Ronen Bergman
name: Takedown
average rating: 4.40
book published: 2018
rating: 0
read at:
date added: 2018/01/29
shelves: to-read
review:

]]>
The Quantum Spy 34068483 The latest of David Ignatius's timely, sharp-eyed espionage novels follows CIA agent Harris Chang into a quantum research lab compromised by a suspected Chinese informant. The breach provokes a mole hunt that is obsessive, destructive, and--above all--uncertain: Do the leaks expose real secrets, or are they false trails meant to deceive the Chinese? Chang soon finds that there is a thin line between loyalty and betrayal, as the investigation leads him down a rabbit hole as dangerous as it is deep.

Grounded in the real-world global charge toward technological dominance, The Quantum Spy presents a sophisticated game of cat-and-mouse wired to an exhilarating cyber thriller.

]]>
320 David Ignatius 0393254151 Takedown 0 to-read 3.55 2017 The Quantum Spy
author: David Ignatius
name: Takedown
average rating: 3.55
book published: 2017
rating: 0
read at:
date added: 2017/11/27
shelves: to-read
review:

]]>
Siro 16241205 626 David Ignatius 0393346307 Takedown 0 to-read 3.72 1991 Siro
author: David Ignatius
name: Takedown
average rating: 3.72
book published: 1991
rating: 0
read at:
date added: 2017/11/27
shelves: to-read
review:

]]>
<![CDATA[The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data]]> 30363785 Kevin Mitnick, the world's most famous hacker, teaches you easy cloaking and counter-measures for citizens and consumers in the age of Big Brother and Big Data.

Like it or not, your every move is being watched and analyzed. Consumer's identities are being stolen, and a person's every step is being tracked and stored. What once might have been dismissed as paranoia is now a hard truth, and privacy is a luxury few can afford or understand.

In this explosive yet practical book, Kevin Mitnick illustrates what is happening without your knowledge--and he teaches you "the art of invisibility." Mitnick is the world's most famous--and formerly the Most Wanted--computer hacker. He has hacked into some of the country's most powerful and seemingly impenetrable agencies and companies, and at one point he was on a three-year run from the FBI. Now, though, Mitnick is reformed and is widely regarded as the expert on the subject of computer security. He knows exactly how vulnerabilities can be exploited and just what to do to prevent that from happening.

In THE ART OF INVISIBILITY Mitnick provides both online and real life tactics and inexpensive methods to protect you and your family, in easy step-by-step instructions. He even talks about more advanced "elite" techniques, which, if used properly, can maximize your privacy. Invisibility isn't just for superheroes--privacy is a power you deserve and need in this modern age.]]>
320 Kevin D. Mitnick 0316380504 Takedown 0 to-read 3.94 2017 The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
author: Kevin D. Mitnick
name: Takedown
average rating: 3.94
book published: 2017
rating: 0
read at:
date added: 2017/10/08
shelves: to-read
review:

]]>
<![CDATA[I Have No Mouth & I Must Scream]]> 415459 I Have No Mouth and I Must Scream contains seven stories with copyrights ranging from 1958 through 1967. This edition contains the original introduction by Theodore Sturgeon and the original foreword by Harlan Ellison, along with a brief update comment by Ellison that was added in the 1983 edition. Among Ellison's more famous stories, two consistently noted as among his very best ever are the title story and the volume's concluding one, Pretty Maggie Moneyeyes.

Since Ellison himself strongly resists categorization of his work, we won't call them science fiction, or SF, or speculative fiction or horror or anything else except compelling reading experiences that are sui generis. They could only have been written by Harlan Ellison and they are incomparably original.

CONTENTS
"I Have No Mouth & I Must Scream"
"Big Sam Was My Friend"
"Eyes of Dust"
"World of the Myth"
"Lonelyache"
"Delusion for Dragonslayer"
"Pretty Maggie Moneyeyes"]]>
134 Harlan Ellison 0441363954 Takedown 0 to-read 3.93 1967 I Have No Mouth & I Must Scream
author: Harlan Ellison
name: Takedown
average rating: 3.93
book published: 1967
rating: 0
read at:
date added: 2017/08/13
shelves: to-read
review:

]]>
<![CDATA[The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws]]> 13087608 The highly successful security book returns with a new edition, completely updated

Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.

Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks

Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.

]]>
1232 Dafydd Stuttard Takedown 5 information-security 4.27 2007 The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
author: Dafydd Stuttard
name: Takedown
average rating: 4.27
book published: 2007
rating: 5
read at: 2014/07/25
date added: 2017/07/31
shelves: information-security
review:
This is the best web security book period. Absolutely awesome, easy to read and filled with practical tips and tricks with no bullshit. Highly recommended.
]]>
<![CDATA[Real Digital Forensics: Computer Security and Incident Response]]> 692556 688 Keith J. Jones 0321240693 Takedown 4 information-security Incident Response is way more important today than back then, but it blows my mind that some people started doing it way back before it became mainstream. Truly pioneers of the field.
It is a practical, hands-on DFIR book, however most of the tools is outdated. This is expected for any technical books, that focus on tools.
It is still useful and relevant today since methods largely the same, so worth a read anyway. You just have to find a tools yourself.]]>
4.20 2005 Real Digital Forensics: Computer Security and Incident Response
author: Keith J. Jones
name: Takedown
average rating: 4.20
book published: 2005
rating: 4
read at: 2017/05/07
date added: 2017/05/07
shelves: information-security
review:
I love how old this book is and yet how relevant those topics are today.
Incident Response is way more important today than back then, but it blows my mind that some people started doing it way back before it became mainstream. Truly pioneers of the field.
It is a practical, hands-on DFIR book, however most of the tools is outdated. This is expected for any technical books, that focus on tools.
It is still useful and relevant today since methods largely the same, so worth a read anyway. You just have to find a tools yourself.
]]>
<![CDATA[Terrorism and Counterintelligence: How Terrorist Groups Elude Detection (Columbia Studies in Terrorism and Irregular Warfare)]]> 13696359
Discussing the challenges terrorist groups face as they multiply and plot international attacks, while at the same time providing a framework for decoding the strengths and weaknesses of their counterintelligence, Blake W. Mobley provides an indispensable text for the intelligence, military, homeland security, and law enforcement fields. He outlines concrete steps for improving the monitoring, disruption, and elimination of terrorist cells, primarily by exploiting their mistakes in counterintelligence.

A key component of Mobley's approach is to identify and keep close watch on areas that often exhibit weakness. While some counterintelligence pathologies occur more frequently among certain terrorist groups, destructive bureaucratic tendencies, such as mistrust and paranoia, pervade all organizations. Through detailed case studies, Mobley shows how to recognize and capitalize on these shortcomings within a group's organizational structure, popular support, and controlled territory, and he describes the tradeoffs terrorist leaders make to maintain cohesion and power. He ultimately shows that no group can achieve perfect secrecy while functioning effectively and that every adaptation or new advantage supposedly attained by these groups also produces new vulnerabilities.]]>
352 Blake W. Mobley 0231158769 Takedown 4 intelligence 4.45 2012 Terrorism and Counterintelligence: How Terrorist Groups Elude Detection (Columbia Studies in Terrorism and Irregular Warfare)
author: Blake W. Mobley
name: Takedown
average rating: 4.45
book published: 2012
rating: 4
read at: 2017/04/29
date added: 2017/04/29
shelves: intelligence
review:

]]>
<![CDATA[Hacking Exposed 7 : Network Security Secrets & Solutions]]> 18871435 A fully updated edition of the world’s bestselling computer security book

Hacking Exposed 7: Network Security Secrets and Solutions is filled with all-new information on today's most devastating attacks and proven countermeasures. The book covers: advanced persistent threats; infrastructure hacks; industrial automation and embedded devices; wireless security; the new SCADA protocol hacks; Microsoft Windows Server 2010; Web 2.0; Ubuntu Linux; hardware; Cisco; RFID; malware; and more! The 7th Edition also features a new �5 Deployments� approach for the first time that provides five key actions for every countermeasure—focused on five areas of expertise:

1. Network Security
2. Server Security
3. Mobile Security
4. Endpoint Security
5. Web Security

Hacking Exposed 7 applies the authors� internationally recognized and highly sought-after computer security methodologies, technical rigor, and from-the-trenches experience to making computer technology usage and deployments safer and more secure for businesses and consumers. It uncovers new, cutting-edge computer security issues.

New to This Edition

Brand-new Advanced Persistent Threats chapter details the tricks and techniques used by hackers to inject malware into networks and establish botnets, and provides countermeasures to defend against these increasingly prevalent threats NEW Countermeasures Map is a first-time feature that visually guides you through the time-saving “one best� command that can be deployed to fight the greatest number of potential attacks Brand-new Embedded Systems Hacking chapter shows how hackers gain access to and control remote devices and provides countermeasures to defend against these hacks New content on SCADA protocols and updates to Web 2.0, hardware, Ubuntu Linux, Windows Server 2010, Cisco, RFID, data theft, and more

Praise for Previous Editions
“If there was an Encyclopedia Britannica of computer security, it would be Hacking Exposed.� --Marty Roesch, creator of the Snort tool

“Informational gold.� --Bruce Schneier, CTO, Counterpane Internet Security, Inc.

“Real security is proven by trying to break it, and few sources will show you how to do that better than Hacking Exposed� --Thomas Ptacek, Researcher at Arbor Networks

“If this book doesn't scare and motivate you to take security seriously, nothing will.� --AlephOne, Bugtraq Moderator

“The best just got better. More info, more up to date, and more timely than ever. The best full-disclosure security book you can buy.� - Simple Nomad, author of The Hack FAQ and Pandora

“A critical step to knowing your enemy is first understanding their tools. Hacking Exposed, Fifth Edition delivers just that...and more.� --Lance Spitzner, President and Founder of the Honeynet Project

]]>
1185 Stuart McClure 0071780297 Takedown 4 3.90 2000 Hacking Exposed 7 : Network Security Secrets & Solutions
author: Stuart McClure
name: Takedown
average rating: 3.90
book published: 2000
rating: 4
read at: 2014/02/26
date added: 2017/04/25
shelves:
review:
Comprehensive as always. Good book for broad security topics and hackers techniques. Not that much new stuff from older editions and still have some outdated information, but anyway good book.
]]>
<![CDATA[Hacking Exposed: Network Security Secrets & Solutions]]> 4286146 720 Stuart McClure 0071613749 Takedown 5 information-security 3.83 2000 Hacking Exposed: Network Security Secrets & Solutions
author: Stuart McClure
name: Takedown
average rating: 3.83
book published: 2000
rating: 5
read at: 2010/04/01
date added: 2017/04/25
shelves: information-security
review:
Great overview book on information security in general.
]]>
Zero Day 10468758 336 Mark E. Russinovich Takedown 5 Actually this book is a pretty good infosec fiction, realistic and technically accurate.
A bit Tom clanc'y for me, but overall I really enjoy it. ]]>
3.79 2011 Zero Day
author: Mark E. Russinovich
name: Takedown
average rating: 3.79
book published: 2011
rating: 5
read at:
date added: 2017/03/29
shelves: information-security, thriller
review:
I was cautious to read this book due to bad reviews, but it was uncalled for.
Actually this book is a pretty good infosec fiction, realistic and technically accurate.
A bit Tom clanc'y for me, but overall I really enjoy it.
]]>
Zero Day (Jeff Aiken, #1) 9763010
At first, these random computer failures seem like unrelated events. But Jeff Aiken, a former government analyst who quit in disgust after witnessing the gross errors that led to 9/11, thinks otherwise. Jeff fears a more serious attack targeting the U.S. computer infrastructure is already under way. And as other menacing computer malfunctions pop up around the world, some with deadly results, he realizes that there isn't much time if he hopes to prevent an international catastrophe.

Written by a global authority on cyber security, Zero Day presents a chilling "what if" scenario that, in a world completely reliant on technology, is more than possible today -- it's a cataclysmic disaster just waiting to happen.]]>
328 Mark E. Russinovich 031261246X Takedown 5 3.51 2011 Zero Day (Jeff Aiken, #1)
author: Mark E. Russinovich
name: Takedown
average rating: 3.51
book published: 2011
rating: 5
read at: 2017/03/29
date added: 2017/03/29
shelves: thriller, information-security
review:

]]>
Tagged: The Apocalypse 19492453 They own the night. These zombies are a new breed and fast; hair like women; teeth like lions and sharp claws. They hunt in overwhelmingly large packs like a plague of locusts. The government and military are overrun, retreating underground and leaving the populace to fend for themselves.
Lucky for Sven and his Cannabis growing crew they find shelter in a nuclear power plant. The lights keep them at bay - at least for a while. But how long will it last?
In the lawless environment they survive by their own code until the Government and military return to establish a new world order.
Fast, deadly zombies and end times biblical prophecy meet in this compelling new look at the apocalypse.]]>
120 Joseph M. Chiron Takedown 2 post-apocalyptic Meh. 3.30 2011 Tagged: The Apocalypse
author: Joseph M. Chiron
name: Takedown
average rating: 3.30
book published: 2011
rating: 2
read at: 2017/03/02
date added: 2017/03/02
shelves: post-apocalyptic
review:
Meh.
]]>
<![CDATA[CEH Certified Ethical Hacker All-in-One Exam Guide]]> 19040995
COVERS ALL EXAM TOPICS,

Introduction to ethical hackingCryptographyReconnaissance and footprintingNetwork scanningEnumerationSystem hackingEvasion techniquesSocial engineering and physical securityHacking web servers and applicationsSQL injectionViruses, trojans, and other attacksWireless hackingPenetration testingElectronic content

Two practice examsBonus appendix with author's recommended tools, sites, and references]]>
418 Matt Walker 0071772286 Takedown 0 to-read 3.47 CEH Certified Ethical Hacker All-in-One Exam Guide
author: Matt Walker
name: Takedown
average rating: 3.47
book published:
rating: 0
read at:
date added: 2017/02/25
shelves: to-read
review:

]]>
<![CDATA[Sam's Journal (Lorien Legacies: The Lost Files Bonus)]]> 15845821 7 Pittacus Lore Takedown 5 sci-fi 3.59 2012 Sam's Journal (Lorien Legacies: The Lost Files Bonus)
author: Pittacus Lore
name: Takedown
average rating: 3.59
book published: 2012
rating: 5
read at:
date added: 2017/02/23
shelves: sci-fi
review:

]]>
Zone One 10365343
Now the plague is receding, and Americans are busy rebuild­ing civilization under orders from the provisional govern­ment based in Buffalo. Their top mission: the resettlement of Manhattan. Armed forces have successfully reclaimed the island south of Canal Street—aka Zone One—but pockets of plague-ridden squatters remain. While the army has eliminated the most dangerous of the infected, teams of civilian volunteers are tasked with clearing out a more innocuous variety—the “malfunctioning� stragglers, who exist in a catatonic state, transfixed by their former lives.

Mark Spitz is a member of one of the civilian teams work­ing in lower Manhattan. Alternating between flashbacks of Spitz’s desperate fight for survival during the worst of the outbreak and his present narrative, the novel unfolds over three surreal days, as it depicts the mundane mission of straggler removal, the rigors of Post-Apocalyptic Stress Disorder, and the impossible job of coming to grips with the fallen world.

And then things start to go wrong.

Both spine chilling and playfully cerebral, Zone One bril­liantly subverts the genre’s conventions and deconstructs the zombie myth for the twenty-first century.]]>
259 Colson Whitehead 0385528078 Takedown 1 3.23 2011 Zone One
author: Colson Whitehead
name: Takedown
average rating: 3.23
book published: 2011
rating: 1
read at: 2017/02/09
date added: 2017/02/09
shelves:
review:

]]>
<![CDATA[Last Defense (Lorien Legacies: The Lost Files #14)]]> 25742694
When the Garde split up, heading off to New York City and Mexico, Malcolm decided to stay behind in Ashwood Estates, the Mog’s formerly hidden base located near Washington DC. He wanted to search the facility for anything that might help John Smith and the others stop the alien invasion. But once the spaceships descended, that plan went up in smoke.

Before he gets a chance to come up with a plan B, armed soldiers storm the base. As one of the few humans who knows anything about Loric and their war with the Mogadorians, Malcolm is an invaluable asset—and they’ve been tasked with safely escorting him to the president’s secret bunker. With Mogs hot on their trail, though, it’ll be easier said than done. Luckily, Malcolm has some backup in the form of a Chimæra. But even if he makes it to his destination, will Malcolm be able to help what’s left of the government find a way to defeat the Mogs? Or will he be too late?]]>
0 Pittacus Lore 0062387693 Takedown 5 sci-fi 4.05 2016 Last Defense (Lorien Legacies: The Lost Files #14)
author: Pittacus Lore
name: Takedown
average rating: 4.05
book published: 2016
rating: 5
read at: 2017/02/08
date added: 2017/02/08
shelves: sci-fi
review:

]]>
<![CDATA[Digital Forensics with Open Source Tools]]> 8985825 288 Harlan Carvey 1597495867 Takedown 4 information-security Short, concise and to the point, it's packing a lot of useful information in a few pages making it a quick and useful read.]]> 4.23 2011 Digital Forensics with Open Source Tools
author: Harlan Carvey
name: Takedown
average rating: 4.23
book published: 2011
rating: 4
read at: 2017/02/04
date added: 2017/02/04
shelves: information-security
review:
Good book for beginners, focused on "how" with free and OSS tools, but still explaining things where necessary.
Short, concise and to the point, it's packing a lot of useful information in a few pages making it a quick and useful read.
]]>
<![CDATA[The Fugitive (Lorien Legacies: The Lost Files, #10)]]> 21805399
A sequel to I Am Number Four: The Lost Files: Return to Paradise, this novella picks up with Mark racing to Dulce, New Mexico, evading capture from both the Mogadorians and the FBI. On the road, his mysterious new ally—a fellow blogger from They Walk Among Us who Mark knows only by the screen name GUARD—sends him a care package to help in his quest to find Sarah. Inside is a stack of cash, high-tech equipment, and some seriously advanced weaponry, all begging Mark to once again ask the question: Just who exactly is this guy? As Mark gets closer to tracking down Sarah, he also gets closer to discovering the identity of this enigmatic figure who seems to know so much about the Loric. When the truth about GUARD is finally revealed, nothing will ever be the same.]]>
0 Pittacus Lore 0062364022 Takedown 5 sci-fi 4.12 2014 The Fugitive (Lorien Legacies: The Lost Files, #10)
author: Pittacus Lore
name: Takedown
average rating: 4.12
book published: 2014
rating: 5
read at: 2017/02/02
date added: 2017/02/02
shelves: sci-fi
review:

]]>
<![CDATA[The Guard (Lorien Legacies: The Lost Files #12)]]> 23507369
A sequel to I Am Number Four: The Lost Files: The Navigator, this novella picks up with Lexa shortly after the Mogadorians raided her hideout and murdered her friend. Determined to get her revenge but knowing she can't take the Mogs head on, Lexa goes in search of a weapon that just might help her do some real damage: the spaceship the Garde flew to Earth. The only problem is it's under lock and key at a highly guarded base in Dulce, New Mexico.

Lexa's quest to retrieve the ship and track down the Garde has her cross paths with an ally of Pittacus Lore, come under fire from both the FBI and the Mogs, and team up with a headstrong teenager from Paradise, Ohio, by the name of Mark James. To get her secret weapon, Lexa will do whatever it takes. But as the Mogadorians begin their invasion, will it be enough to help save the Garde—and the world?]]>
100 Pittacus Lore 0062364030 Takedown 5 sci-fi 4.11 2015 The Guard (Lorien Legacies: The Lost Files #12)
author: Pittacus Lore
name: Takedown
average rating: 4.11
book published: 2015
rating: 5
read at: 2017/01/16
date added: 2017/01/16
shelves: sci-fi
review:

]]>
<![CDATA[Five's Betrayal (Lorien Legacies: The Lost Files, #9)]]> 18738863
This sequel to I Am Number Four: The Lost Files: Five’s Legacy finds Number Five entering the ranks of the Mogadorian army. The Mogs have convinced him that they will be the victor in their war for Earth, and Five decides he would rather be on the winning side. Realizing that the only thing that matters is his survival, Five allies himself with the sworn enemies of the Lorien and pledges to help the Mogs take down the very people he was meant to protect. Is he too far gone to be saved? Discover how Five became one of Earth’s and Lorien’s most dangerous adversaries and decide for yourself.]]>
91 Pittacus Lore 0062287672 Takedown 5 sci-fi 4.03 2014 Five's Betrayal (Lorien Legacies: The Lost Files, #9)
author: Pittacus Lore
name: Takedown
average rating: 4.03
book published: 2014
rating: 5
read at: 2017/01/10
date added: 2017/01/10
shelves: sci-fi
review:

]]>
<![CDATA[The OSSI Model - The Gannon Transcripts]]> 29509194
How will they build and secure a system that not only thrives amongst FATF and CFATF recommendations, but also prospers in today's globally regulated banking environment? In this vivid tale of money laundering and South Asia outsourcing, you'll get a moment in time glimpse into the influential families and banking empires that keep money, weapons and power flowing between sovereign nations and the black markets they serve.

During the mid-1980's, proceeds from the Latin American drug trade and Soviet-Afghan war flowed into these banks at a rate of over six hundred million dollars per month and with little global regulation, the families grew in wealth and political power, quickly adding billions in cash and real estate to their already vast portfolios.

By the late 1980's, these families were faced with a digital landscape that would change everything. The data revolution was taking hold and the old ways would no longer keep them in power or safe.

This work has been published from a recorded audio book narrative as told by K. Stern. The Kindle e-book follows the original script format.]]>
2307 Kent Stern Takedown 0 to-read 4.53 2012 The OSSI Model - The Gannon Transcripts
author: Kent Stern
name: Takedown
average rating: 4.53
book published: 2012
rating: 0
read at:
date added: 2017/01/03
shelves: to-read
review:

]]>
The Scorpion 24860887
Three friends innocently stumble upon government information that describes a top-secret underwater excavation site and refinery that processes a newly discovered source of energy. The friends are determined to reveal the truth about the facility to the American public and stop the flow of misinformation being dispensed by corrupt authorities within the United States Government. They realize that just because something is legal doesn’t mean it’s right.

“The Scorpion is a Thriller on steroids!”]]>
330 John A. Autero 1508486700 Takedown 0 to-read 4.08 2015 The Scorpion
author: John A. Autero
name: Takedown
average rating: 4.08
book published: 2015
rating: 0
read at:
date added: 2017/01/03
shelves: to-read
review:

]]>
<![CDATA[Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response]]> 17659622 352 Leighton Johnson 159749996X Takedown 0 to-read 3.67 2013 Computer Incident Response and Forensics Team Management: Conducting a Successful Incident Response
author: Leighton Johnson
name: Takedown
average rating: 3.67
book published: 2013
rating: 0
read at:
date added: 2017/01/03
shelves: to-read
review:

]]>
Python Forensics 20911147 352 Chet Hosmer 0124186769 Takedown 0 to-read 4.50 2014 Python Forensics
author: Chet Hosmer
name: Takedown
average rating: 4.50
book published: 2014
rating: 0
read at:
date added: 2017/01/03
shelves: to-read
review:

]]>
<![CDATA[The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference]]> 505564 The TCP/IP Guide is both an encyclopedic and comprehensible guide to the TCP/IP protocol suite that will appeal to newcomers and the seasoned professional. It details the core protocols that make TCP/IP internetworks function, and the most important classical TCP/IP applications. Its personal, easy-going writing style lets anyone understand the dozens of protocols and technologies that run the Internet, with full coverage of PPP, ARP, IP, IPv6, IP NAT, IPSec, Mobile IP, ICMP, RIP, BGP, TCP, UDP, DNS, DHCP, SNMP, FTP, SMTP, NNTP, HTTP, Telnet and much more. The author offers not only a detailed view of the TCP/IP protocol suite, but also describes networking fundamentals and the important OSI Reference Model.]]> 1616 Charles M. Kozierok 159327047X Takedown 5 networking 4.49 2005 The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
author: Charles M. Kozierok
name: Takedown
average rating: 4.49
book published: 2005
rating: 5
read at:
date added: 2016/12/24
shelves: networking
review:

]]>
<![CDATA[Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel]]> 998922 --Mark Russinovich, editor, Windows IT Pro / Windows & .NET Magazine "This material is not only up-to-date, it defines up-to-date. It is truly cutting-edge. As the only book on the subject, Rootkits will be of interest to any Windows security researcher or security programmer. It's detailed, well researched and the technical information is excellent. The level of technical detail, research, and time invested in developing relevant examples is impressive. In one Outstanding."
--Tony Bautts, Security Consultant; CEO, Xtivix, Inc. "This book is an essential read for anyone responsible for Windows security. Security professionals, Windows system administrators, and programmers in general will want to understand the techniques used by rootkit authors. At a time when many IT and security professionals are still worrying about the latest e-mail virus or how to get all of this month's security patches installed, Mr. Hoglund and Mr. Butler open your eyes to some of the most stealthy and significant threats to the Windows operating system. Only by understanding these offensive techniques can you properly defend the networks and systems for which you are responsible."
--Jennifer Kolde, Security Consultant, Author, and Instructor "What's worse than being owned? Not knowing it. Find out what it means to be owned by reading Hoglund and Butler's first-of-a-kind book on rootkits. At the apex the malicious hacker toolset--which includes decompilers, disassemblers, fault-injection engines, kernel debuggers, payload collections, coverage tools, and flow analysis tools--is the rootkit. Beginning where Exploiting Software left off, this book shows how attackers hide in plain sight.

"Rootkits are extremely powerful and are the next wave of attack technology. Like other types of malicious code, rootkits thrive on stealthiness. They hide away from standard system observers, employing hooks, trampolines, and patches to get their work done. Sophisticated rootkits run in such a way that other programs that usually monitor machine behavior can't easily detect them. A rootkit thus provides insider access only to people who know that it is running and available to accept commands. Kernel rootkits can hide files and running processes to provide a backdoor into the target machine.

"Understanding the ultimate attacker's tool provides an important motivator for those of us trying to defend systems. No authors are better suited to give you a detailed hands-on understanding of rootkits than Hoglund and Butler. Better to own this book than to be owned."
--Gary McGraw, Ph.D., CTO, Cigital, coauthor of Exploiting Software (2004) and Building Secure Software (2002), both from Addison-Wesley "Greg and Jamie are unquestionably the go-to experts when it comes to subverting the Windows API and creating rootkits. These two masters come together to pierce the veil of mystery surrounding rootkits, bringing this information out of the shadows. Anyone even remotely interested in security for Windows systems, including forensic analysis, should include this book very high on their must-read list."
--Harlan Carvey, author of Windows Forensics and Incident Recovery (Addison-Wesley, 2005) Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology--learn how attackers can get in and stay in for years, without detection. Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers. After reading this book, readers will be able to]]>
352 Greg Hoglund 0321294319 Takedown 0 to-read 4.11 2005 Rootkits: Subverting the Windows Kernel: Subverting the Windows Kernel
author: Greg Hoglund
name: Takedown
average rating: 4.11
book published: 2005
rating: 0
read at:
date added: 2016/12/24
shelves: to-read
review:

]]>
<![CDATA[The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System]]> 6420240
The spectrum of topics covered includes how to:

* Hook kernel structures on multi-processor systems
* Use a kernel debugger to reverse system internals
* Inject call gates to create a back door into Ring-0
* Use detour patches to sidestep group policy
* Modify privilege levels on Vista by altering kernel objects
* Utilize bootkit technology
* Defeat live incident response and post-mortem forensics
* Implement code armoring to protect your deliverables
* Establish covert channels using the WSK and NDIS 6.0]]>
908 Bill Blunden 1598220616 Takedown 0 to-read 4.12 2009 The Rootkit Arsenal: Escape and Evasion in the Dark Corners of the System
author: Bill Blunden
name: Takedown
average rating: 4.12
book published: 2009
rating: 0
read at:
date added: 2016/12/24
shelves: to-read
review:

]]>
<![CDATA[The Hacker Playbook 2: Practical Guide To Penetration Testing]]> 25791488
Through a series of football-style “plays,� this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.

From “Pregame� research to “The Drive� and “The Lateral Pass,� the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.

This second version of The Hacker Playbook takes all the best "plays" from the original book and incorporates the latest attacks, tools, and lessons learned. Double the content compared to its predecessor, this guide further outlines building a lab, walks through test cases for attacks, and provides more customized code.

Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.]]>
359 Peter Kim Takedown 0 to-read 4.21 2015 The Hacker Playbook 2: Practical Guide To Penetration Testing
author: Peter Kim
name: Takedown
average rating: 4.21
book published: 2015
rating: 0
read at:
date added: 2016/12/24
shelves: to-read
review:

]]>
<![CDATA[Incident Response & Computer Forensics, Third Edition]]> 17079654 Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind--and remediation strategies for--today's most insidious attacks.


Architect an infrastructure that allows for methodical investigation and remediation
Develop leads, identify indicators of compromise, and determine incident scope
Collect and preserve live data
Perform forensic duplication
Analyze data from networks, enterprise services, and applications
Investigate Windows and Mac OS X systems
Perform malware triage
Write detailed incident response reports
Create and implement comprehensive remediation plans]]>
624 Jason T. Luttgens 0071798684 Takedown 5 information-security Easy and concise to read, filled with tips and practical examples, this is the best fundamental IR material from the people who basically invent the field. As a bonus you get a unique glimpse into how Mandiant operate. What more do you need?
This book would be useful for technical IR personnel in the trenches as well as management folks, especially people creating and leading CSIRT teams.
Look no further if you want to know what Incident Response is all about!]]>
4.35 2013 Incident Response & Computer Forensics, Third Edition
author: Jason T. Luttgens
name: Takedown
average rating: 4.35
book published: 2013
rating: 5
read at: 2016/12/24
date added: 2016/12/24
shelves: information-security
review:
Written by Mandiant founders and experts - this book covers a full lifecycle of Incident Response including various non-technical considerations.
Easy and concise to read, filled with tips and practical examples, this is the best fundamental IR material from the people who basically invent the field. As a bonus you get a unique glimpse into how Mandiant operate. What more do you need?
This book would be useful for technical IR personnel in the trenches as well as management folks, especially people creating and leading CSIRT teams.
Look no further if you want to know what Incident Response is all about!
]]>
<![CDATA[Five's Legacy (Lorien Legacies: The Lost Files, #7)]]> 18053086 75 Pittacus Lore 0062287656 Takedown 5 sci-fi 3.97 2014 Five's Legacy (Lorien Legacies: The Lost Files, #7)
author: Pittacus Lore
name: Takedown
average rating: 3.97
book published: 2014
rating: 5
read at: 2016/12/13
date added: 2016/12/13
shelves: sci-fi
review:

]]>
<![CDATA[The Forgotten Ones (Lorien Legacies: The Lost Files, #6)]]> 16065602
Adam helped Sam Goode and his father, Malcolm, escape the Mogadorian base in Dulce, New Mexico. Using the Legacy that One bestowed upon him, Adam sacrificed himself and brought the entire facility crumbling down on his head.

Miraculously, Adam survives in one piece, and he also discovers something incredible that the Mogadorians had been hiding from the Garde. Separated from his allies, Adam sets out on a quest to find the one thing the Garde have been missing all these years, the very thing that could turn the tide in this war.]]>
0 Pittacus Lore 0062218794 Takedown 5 sci-fi 4.21 2013 The Forgotten Ones (Lorien Legacies: The Lost Files, #6)
author: Pittacus Lore
name: Takedown
average rating: 4.21
book published: 2013
rating: 5
read at: 2016/12/06
date added: 2016/12/06
shelves: sci-fi
review:

]]>
<![CDATA[Agent Storm: My Life Inside al Qaeda and the CIA]]> 22669471
Agent Storm takes readers inside the jihadist world like never before, showing the daily life of zealous men set on mass murder, from dodging drones with al-Qaeda leaders in the Arabian desert to training in extremist gyms in Britain and performing supply drops in Kenya. The book also provides a tantalizing look at his dangerous life undercover, as Storm traveled the world for missions targeting its most dangerous terrorists , and into the world’s most powerful spy agencies: their tradecraft, rivalries, and late-night carousing, as well as their ruthless use of a beautiful blonde in an ambitious honey trap. Agent Storm is a captivating, utterly unique, real-life espionage tale.]]>
320 Morten Storm Takedown 0 to-read 4.01 2014 Agent Storm: My Life Inside al Qaeda and the CIA
author: Morten Storm
name: Takedown
average rating: 4.01
book published: 2014
rating: 0
read at:
date added: 2016/12/04
shelves: to-read
review:

]]>
<![CDATA[Chinese intelligence operations]]> 4698564 174 Nicholas Eftimiades 0964953129 Takedown 0 to-read 3.74 1994 Chinese intelligence operations
author: Nicholas Eftimiades
name: Takedown
average rating: 3.74
book published: 1994
rating: 0
read at:
date added: 2016/12/04
shelves: to-read
review:

]]>
The Art of Intelligence 13590828
For a crucial period, Henry Crumpton led the CIA's global covert operations against America's terrorist enemies, including al Qaeda. In the days after 9/11, the CIA tasked Crumpton to organize and lead the Afghanistan campaign. With Crumpton's strategic initiative and bold leadership, from the battlefield to the Oval Office, U.S. and Afghan allies routed al Qaeda and the Taliban in less than ninety days after the Twin Towers fell. At the height of combat against the Taliban in late 2001, there were fewer than five hundred Americans on the ground in Afghanistan, a dynamic blend of CIA and Special Forces. The campaign changed the way America wages war. This book will change the way America views the CIA.

The Art of Intelligence draws from the full arc of Crumpton's espionage and covert action exploits to explain what America's spies do and why their service is more valuable than ever. From his early years in Africa, where he recruited and ran sources, from loathsome criminals to heroic warriors; to his liaison assignment at the FBI, the CIA's Counterterrorism Center, the development of the UAV Predator program, and the Afghanistan war; to his later work running all CIA clandestine operations inside the United States, he employs enthralling storytelling to teach important lessons about national security, but also about duty, honor, and love of country.

No book like The Art of Intelligence has ever been written-not with Crumpton's unique perspective, in a time when America faced such grave and uncertain risk. It is an epic, sure to be a classic in the annals of espionage and war.]]>
11 Henry A. Crumpton 1611760712 Takedown 0 to-read 3.82 2012 The Art of Intelligence
author: Henry A. Crumpton
name: Takedown
average rating: 3.82
book published: 2012
rating: 0
read at:
date added: 2016/12/04
shelves: to-read
review:

]]>
<![CDATA[The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda]]> 10954987 A book that will change the way we think about al-Qaeda, intelligence, and the events that forever changed America.

On September 11, 2001, FBI Special Agent Ali H. Soufan was handed a secret file. Had he received it months earlier—when it was requested—the attacks on New York and Washington could have been prevented. During his time on the front lines, Soufan helped thwart plots around the world and elicited some of the most important confessions from terrorists in the war against al-Qaeda—without laying so much as a hand on them. Most of these stories have never been reported before, and never by anyone with such intimate firsthand knowledge.

This narrative account of America's successes and failures against al-Qaeda is essential to an understanding of the terrorist group. We are taken into hideouts and interrogation rooms. We have a ringside seat at bin Laden's personal celebration of the 9/11 bombings. Such riveting details show us not only how terrorists think and operate but also how they can be beaten and brought to justice.

]]>
572 Ali H. Soufan 0393079422 Takedown 0 to-read 4.26 2011 The Black Banners: The Inside Story of 9/11 and the War Against al-Qaeda
author: Ali H. Soufan
name: Takedown
average rating: 4.26
book published: 2011
rating: 0
read at:
date added: 2016/12/04
shelves: to-read
review:

]]>
<![CDATA[See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism]]> 9073
A veteran case officer in the CIA’s Directorate of Operations in the Middle East, Baer witnessed the rise of terrorism first hand and the CIA’s inadequate response to it, leading to the attacks of September 11, 2001. This riveting book is both an indictment of an agency that lost its way and an unprecedented look at the roots of modern terrorism, and includes a new afterword in which Baer speaks out about the American war on terrorism and its profound implications throughout the Middle East.

“Robert Baer was considered perhaps the best on-the-ground field
officer in the Middle East.�
–Seymour M. Hersh, The New Yorker

From The Preface
This book is a memoir of one foot soldier’s career in the other cold war, the one against terrorist networks. It’s a story about places most Americans will never travel to, about people many Americans would prefer to think we don’t need to do business with.

This memoir, I hope, will show the reader how spying is supposed to work, where the CIA lost its way, and how we can bring it back again. But I hope this book will accomplish one more purpose as well: I hope it will show why I am angry about what happened to the CIA. And I want to show why every American and everyone who cares about the preservation of this country should be angry and alarmed, too.

The CIA was systematically destroyed by political correctness, by petty Beltway wars, by careerism, and much more. At a time when terrorist threats were compounding globally, the agency that should have been monitoring them was being scrubbed clean instead. Americans were making too much money to bother. Life was good. The White House and the National Security Council became cathedrals of commerce where the interests of big business outweighed the interests of protecting American citizens at home and abroad. Defanged and dispirited, the CIA went along for the ride. And then on September 11, 2001, the reckoning for such vast carelessness was presented for all the world to see.]]>
336 Robert B. Baer 140004684X Takedown 0 to-read 3.94 2002 See No Evil: The True Story of a Ground Soldier in the CIA's War on Terrorism
author: Robert B. Baer
name: Takedown
average rating: 3.94
book published: 2002
rating: 0
read at:
date added: 2016/12/04
shelves: to-read
review:

]]>
<![CDATA[Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer]]> 5979810
Originally published in 1987, "Thwarting Enemies at Home and Abroad" is a unique primer that teaches the principles, strategy, and tradecraft of counterintelligence (CI). CI is often misunderstood and narrowly equated with security and catching spies, which are only part of the picture. As William R. Johnson explains, CI is the art of actively protecting secrets but also aggressively thwarting, penetrating, and deceiving hostile intelligence organizations to neutralize or even manipulate their operations.

Johnson, a career CIA intelligence officer, lucidly presents the nuts and bolts of the business of counterintelligence and the characteristics that make a good CI officer. Although written during the late Cold War, this book continues to be useful for intelligence professionals, scholars, and students because the basic principles of CI are largely timeless. General readers will enjoy the lively narrative and detailed descriptions of tradecraft that reveal the real world of intelligence and espionage. A new foreword by former CIA officer and noted author William Hood provides a contemporary perspective on this valuable book and its author.]]>
240 William R. Johnson 1589012550 Takedown 0 to-read 3.83 1987 Thwarting Enemies at Home and Abroad: How to Be a Counterintelligence Officer
author: William R. Johnson
name: Takedown
average rating: 3.83
book published: 1987
rating: 0
read at:
date added: 2016/12/03
shelves: to-read
review:

]]>
<![CDATA[Return to Paradise (Lorien Legacies: The Lost Files, #8)]]> 18053087
After Four leaves town to find the rest of the Garde, Mark is left behind to pick up the pieces. His school has been destroyed, his home burned down, and, worst yet, Mark now knows the horrifying truth: aliens live among us and some of them seek to destroy us. Even with the FBI tailing him and Sarah Hart, Mark tries to return to a normal life. But when Sarah goes missing, he knows he can no longer sit back and do nothing. His quest to find her will lead him to new allies and a startling revelation about the Mogadorians� plan for invasion.]]>
106 Pittacus Lore 0062287664 Takedown 5 sci-fi Mark story 3.98 2014 Return to Paradise (Lorien Legacies: The Lost Files, #8)
author: Pittacus Lore
name: Takedown
average rating: 3.98
book published: 2014
rating: 5
read at: 2016/11/29
date added: 2016/11/29
shelves: sci-fi
review:
Mark story
]]>
<![CDATA[The Search for Sam (Lorien Legacies: The Lost Files, #4)]]> 15752308
In I Am Number Four: The Lost Files #4, discover what has happened to one of the people with information crucial to the Garde coming together to fight to save Lorien—and Earth.]]>
144 Pittacus Lore 0062218778 Takedown 5 sci-fi Adam and Malcolm story 4.24 2012 The Search for Sam (Lorien Legacies: The Lost Files, #4)
author: Pittacus Lore
name: Takedown
average rating: 4.24
book published: 2012
rating: 5
read at: 2016/11/24
date added: 2016/11/24
shelves: sci-fi
review:
Adam and Malcolm story
]]>
<![CDATA[The Navigator (Lorien Legacies: The Lost Files #11)]]> 22500624
Lexa was never part of the Elders' plan. She had no idea the Garde children were being evacuated to our planet. But when the Mogadorian attack began, she used her expertise to get an old spaceship in a museum operational once more and became irrevocably entwined with the Garde's fate. In addition to her friend, a pack of Chimæra, and a Cêpan named Crayton, her relic of a ship also carried Ella, the tenth Garde.

With all of their CĂŞpans now gone, the Garde think they are the last of the Loric people. But they are wrong. They have forgotten all about the crew that brought them to Earth. Where have the pilots for both ships been all these years? And why haven't they joined in the fight against the Mogs? In The Navigator, discover the truth behind their escape from Lorien and what happened to them after they arrived on our planet.]]>
120 Pittacus Lore 0062364014 Takedown 5 sci-fi Lexa story 4.12 2015 The Navigator (Lorien Legacies: The Lost Files #11)
author: Pittacus Lore
name: Takedown
average rating: 4.12
book published: 2015
rating: 5
read at: 2016/11/22
date added: 2016/11/22
shelves: sci-fi
review:
Lexa story
]]>
<![CDATA[Legacies Reborn (Lorien Legacies: The Lost Files #13)]]> 25066109
At first, Daniela Morales thought the spaceship attacking New York City on the television was just part of some science fiction movie. Then the horrible truth became clear: it was happening in real life. Aliens do exist, and they were invading the planet.

Unable to reach her mother, Daniela makes it her mission to get to her mom's job downtown to find her. But with the city under fire, trying to make it from her apartment in Harlem to the Financial District proves nearly impossible—until Daniela makes an incredible discovery. When a squad of Mogs get the jump on her, she is somehow able to throw them across the street, using telekinesis. Daniela doesn't know where this power came from or why she suddenly has it, but she is sure as hell going to use it. Aliens are tearing up her city and she'll destroy every last one of them that gets in her way. But when she comes face-to-face with the Garde, will she be a friend or a foe?]]>
87 Pittacus Lore 0062387685 Takedown 5 sci-fi Daniela story 3.90 2015 Legacies Reborn (Lorien Legacies: The Lost Files #13)
author: Pittacus Lore
name: Takedown
average rating: 3.90
book published: 2015
rating: 5
read at: 2016/11/16
date added: 2016/11/16
shelves: sci-fi
review:
Daniela story
]]>
<![CDATA[Eight's Origin (Lorien Legacies: The Lost Files Bonus)]]> 15843845 11 Pittacus Lore Takedown 5 sci-fi 3.88 2012 Eight's Origin (Lorien Legacies: The Lost Files Bonus)
author: Pittacus Lore
name: Takedown
average rating: 3.88
book published: 2012
rating: 5
read at: 2016/11/10
date added: 2016/11/10
shelves: sci-fi
review:

]]>
<![CDATA[The Fallen Legacies (Lorien Legacies: The Lost Files, #3)]]> 13622863
In I Am Number Four: The Lost Files: The Fallen Legacies, you'll learn the true story behind these ill-fated members of the Garde. Before they were murdered by the Mogadorians, before Number Four was next, they were all just kids on an alien planet called Earth—discovering their powers, trying to stay hidden, and running for their lives.]]>
101 Pittacus Lore 0062194798 Takedown 5 sci-fi Adam story 4.24 2012 The Fallen Legacies (Lorien Legacies: The Lost Files, #3)
author: Pittacus Lore
name: Takedown
average rating: 4.24
book published: 2012
rating: 5
read at: 2016/11/09
date added: 2016/11/09
shelves: sci-fi
review:
Adam story
]]>
<![CDATA[Nine's Legacy (Lorien Legacies: The Lost Files, #2)]]> 13425352 144 Pittacus Lore 006219478X Takedown 5 sci-fi 4.18 2012 Nine's Legacy (Lorien Legacies: The Lost Files, #2)
author: Pittacus Lore
name: Takedown
average rating: 4.18
book published: 2012
rating: 5
read at: 2016/11/06
date added: 2016/11/06
shelves: sci-fi
review:

]]>
<![CDATA[Six's Legacy (Lorien Legacies: The Lost Files, #1)]]> 11237412 I Am Number Four she’s strong, powerful, and ready to fight. But who is she? Where has she been living? How has she been training? When did she develop her legacies? And how does she know so much about the Mogadorians?

In I Am Number Four: The Lost Files: Six’s Legacy, discover the story behind Six. Before Paradise, Ohio, before John Smith, Six was traveling through West Texas with her cêpan, Katarina. What happened there would change Six forever�.]]>
128 Pittacus Lore Takedown 5 sci-fi 4.09 2011 Six's Legacy (Lorien Legacies: The Lost Files, #1)
author: Pittacus Lore
name: Takedown
average rating: 4.09
book published: 2011
rating: 5
read at: 2016/10/31
date added: 2016/10/31
shelves: sci-fi
review:

]]>
<![CDATA[The Last Days of Lorien (Lorien Legacies: The Lost Files, #5)]]> 15762770
Before Number Four and the others arrived on Earth, they lived on the planet Lorien. A planet filled with others who also had extraordinary abilities. A peaceful planet––until the day the Mogadorians attacked, and nearly annihilated, the Loric people.

Only a handful of Loric survived the battle. This is Sandor’s story.

Sandor was tired of being a teenager, tired of going to school and obeying his teachers and playing by his parents' rules. He enjoyed breaking the rules rather than following them. But when he makes one mistake too many, Sandor's life takes an unexpected turn, and he is forced join the Lorien Defense Academy.

Sandor had never believed in the crazy idea that Lorien needed to defend itself—Lorien was a peaceful planet, with no apparent enemies. But when Mogadorians suddenly attack, Sandor learns how real that threat was. Now Sandor is one of only a handful of Loric left alive, and the fate of Lorien is in their hands.]]>
108 Pittacus Lore 0062218786 Takedown 5 sci-fi The story about Sandor 4.19 2013 The Last Days of Lorien (Lorien Legacies: The Lost Files, #5)
author: Pittacus Lore
name: Takedown
average rating: 4.19
book published: 2013
rating: 5
read at: 2016/10/27
date added: 2016/10/27
shelves: sci-fi
review:
The story about Sandor
]]>
<![CDATA[United as One (Lorien Legacies, #7)]]> 27161189
The Mogadorians have invaded Earth. Their warships loom over our most populated cities, and no country will risk taking them head on. The Garde are all that stand in the way, but they’ll need an army of their own to win this fight.

They’ve teamed up with the US military, but it might not be enough. The Garde need reinforcements, and they’ve found them in the most unexpected place. Teenagers from across the globe, like John Smith’s best friend, Sam, have developed abilities. So John and the others must get to them before the Mogs, because if they don’t their enemies will use these gifted teens for their own sinister plan.

But after all the Mogadorians have taken from John—his home, his family, his friends, and the person he loves most—he might not want to put any more lives in danger. He’s got nothing left to lose, and he’s just discovered he has been given an incredible new Legacy. Now he can turn himself into the ultimate weapon. So will he risk his life to save the world, or will he realize that power in numbers will save us all?]]>
449 Pittacus Lore 0062387650 Takedown 5 sci-fi 4.28 2016 United as One (Lorien Legacies, #7)
author: Pittacus Lore
name: Takedown
average rating: 4.28
book published: 2016
rating: 5
read at: 2016/10/20
date added: 2016/10/20
shelves: sci-fi
review:

]]>
<![CDATA[Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan]]> 25648074
Written by members of Cisco’s Computer Security Incident Response Team, this book shows IT and information security professionals how to create an InfoSec playbook by developing strategy, technique, and architecture.

Learn incident response fundamentals—and the importance of getting back to basicsUnderstand threats you face and what you should be protectingCollect, mine, organize, and analyze as many relevant data sources as possibleBuild your own playbook of repeatable methods for security monitoring and responseLearn how to put your plan into action and keep it running smoothlySelect the right monitoring and detection tools for your environmentDevelop queries to help you sort through data and create valuable reportsKnow what actions to take during the incident response phase]]>
456 Jeff Bollinger 1491913568 Takedown 0 to-read 3.90 2015 Crafting the InfoSec Playbook: Security Monitoring and Incident Response Master Plan
author: Jeff Bollinger
name: Takedown
average rating: 3.90
book published: 2015
rating: 0
read at:
date added: 2016/09/22
shelves: to-read
review:

]]>
<![CDATA[Malware Forensics: Investigating and Analyzing Malicious Code]]> 3505019 592 Cameron H. Malin 159749268X Takedown 0 to-read 4.00 2008 Malware Forensics: Investigating and Analyzing Malicious Code
author: Cameron H. Malin
name: Takedown
average rating: 4.00
book published: 2008
rating: 0
read at:
date added: 2016/09/22
shelves: to-read
review:

]]>
Mastering Python Forensics 27477192 169 Michael Spreitzenbarth 1783988045 Takedown 0 to-read 1.00 Mastering Python Forensics
author: Michael Spreitzenbarth
name: Takedown
average rating: 1.00
book published:
rating: 0
read at:
date added: 2016/09/22
shelves: to-read
review:

]]>
<![CDATA[The Fate of Ten (Lorien Legacies, #6)]]> 24488476 New York Times bestselling I Am Number Four series! For years the Garde have fought the Mogadorians in secret. Now all of that has changed. The invasion has begun. If the Garde can't find a way to stop the Mogs, humanity will suffer the same fate as the Lorien: annihilation.

There is still hope. When the Elders sent the Garde to Earth, they had a plan—one which the Garde are finally starting to understand. In the climax of The Revenge of Seven, a group of the Garde traveled to an ancient pyramid in Mexico known to their people as the Sanctuary. There they awoke a power that had been hidden within our planet for generations. Now this power can save the world . . . or destroy it. It will all depend on who wields it.]]>
409 Pittacus Lore Takedown 5 sci-fi 4.28 2015 The Fate of Ten (Lorien Legacies, #6)
author: Pittacus Lore
name: Takedown
average rating: 4.28
book published: 2015
rating: 5
read at: 2016/09/22
date added: 2016/09/22
shelves: sci-fi
review:

]]>
<![CDATA[The Revenge of Seven (Lorien Legacies, #5)]]> 19346451
In Chicago, John makes the unlikeliest of allies: Adam, a Mogadorian who turned his back on his people. He has invaluable information about Mog technology, battle strategies, and weaknesses. Most important, he knows where to hit them: their command base near Washington, DC. During the assault, however, John and Adam learn the unimaginable truth: it is too late. The Mogadorians have commenced their ultimate invasion plans.

With a front-row seat to the impending invasion, Ella finds herself in the hands of the enemy. For some reason she's more valuable to them alive, and they'll stop at nothing to turn her.

Meanwhile, Six, Nine, and Marina make their way through the Florida Everglades, hot on the trail of the traitorous Five. With the development of a new Legacy, Marina finally has the power to fight back—if her thirst for revenge doesn't consume her first.]]>
371 Pittacus Lore 0062194720 Takedown 5 sci-fi 4.25 2014 The Revenge of Seven (Lorien Legacies, #5)
author: Pittacus Lore
name: Takedown
average rating: 4.25
book published: 2014
rating: 5
read at: 2016/09/07
date added: 2016/09/07
shelves: sci-fi
review:

]]>
<![CDATA[The Fall of Five (Lorien Legacies, #4)]]> 15861491 Alternate cover for this ISBN can be found here

The Garde are finally reunited, but do they have what it takes to win the war against the Mogadorians?

John Smith—Number Four—thought that things would change once the Garde found each other. They would stop running. They would fight the Mogadorians. And they would win.

But he was wrong. After facing off with the Mogadorian ruler and almost being annihilated, the Garde know they are drastically unprepared and hopelessly outgunned. Now they’re hiding out in Nine’s Chicago penthouse, trying to figure out their next move.

The six of them are powerful, but they’re not strong enough yet to take on an entire army—even with the return of an old ally. To defeat their enemy, the Garde must master their Legacies and learn to work together as a team. More importantly, they’ll have to discover the truth about the Elders and their plan for the Loric survivors.

And when the Garde receive a sign from Number Five—a crop circle in the shape of a Loric symbol—they know they are so close to being reunited. But could it be a trap? Time is running out, and the only thing they know for certain is that they have to get to Five before it’s too late.

The Garde may have lost battles, but they will not lose this war.

Lorien will rise again.]]>
355 Pittacus Lore 0061974617 Takedown 5 sci-fi 4.21 2013 The Fall of Five (Lorien Legacies, #4)
author: Pittacus Lore
name: Takedown
average rating: 4.21
book published: 2013
rating: 5
read at: 2016/08/17
date added: 2016/08/17
shelves: sci-fi
review:

]]>
<![CDATA[The Rise of Nine (Lorien Legacies, #3)]]> 12971616
'Number Four is a hero for this generation' Michael Bay, director of Transformers

***
Until I met John Smith, Number Four, I'd been on the run alone, hiding and fighting to stay alive. Together we are much more powerful. But it could only last so long before we had to separate to find the others . . .

I went to Spain to find Seven, and I found even more, including a tenth member of the Garde who escaped from Lorien alive. Ella is younger than the rest of us, but just as brave. Now we're looking for the others - including John.

But so are they.

I am Number Six. To finish what they started, they'll have to fight us first.]]>
372 Pittacus Lore 0061974587 Takedown 5 sci-fi 4.17 2012 The Rise of Nine (Lorien Legacies, #3)
author: Pittacus Lore
name: Takedown
average rating: 4.17
book published: 2012
rating: 5
read at: 2016/08/07
date added: 2016/08/07
shelves: sci-fi
review:

]]>
<![CDATA[Counting from Zero (Mick O'Malley #1)]]> 11257244 308 Alan B. Johnston 1461064880 Takedown 0 to-read 3.46 2011 Counting from Zero (Mick O'Malley #1)
author: Alan B. Johnston
name: Takedown
average rating: 3.46
book published: 2011
rating: 0
read at:
date added: 2016/08/02
shelves: to-read
review:

]]>
Genesis 6171892 150 Bernard Beckett 0547225490 Takedown 0 to-read 3.89 2006 Genesis
author: Bernard Beckett
name: Takedown
average rating: 3.89
book published: 2006
rating: 0
read at:
date added: 2016/08/02
shelves: to-read
review:

]]>
Autumn (Autumn, #1) 8103876
Without ever using the 'Z' word, Autumn offers a new perspective on the traditional zombie story. There's no flesh eating, no fast-moving corpses, no gore for gore's sake. Combining the atmosphere and tone of George Romero's classic living dead films with the attitude and awareness of 28 Days (and Weeks) later, this horrifying and suspenseful novel is filled with relentless cold, dark fear.]]>
308 David Moody 031256998X Takedown 0 to-read 3.68 2001 Autumn (Autumn, #1)
author: David Moody
name: Takedown
average rating: 3.68
book published: 2001
rating: 0
read at:
date added: 2016/08/02
shelves: to-read
review:

]]>
<![CDATA[The Beam: The Complete First Season]]> 18218077
Choose Your Side
In a grim future, choice is all you have

In 2097, the world is as perfect as you want it to be.

Choose Enterprise and the government stays out of your way, leaving you free to sink or swim � no help for the drowning.

Choose Directorate and all are equal, fed, sheltered and entertained by the government, every need provided for, and every man another cog in society's machine.

Every six years during Shift, citizens decide who they are. Enterprise or Directorate, lives are lived inside the North American Union, walled off from the rest of the world and the Wild East beyond the shell, enhanced by incredible A.I., nanobots that monitor and support daily living, and The Beam: the network connecting every human in the NAU.

New powers are rising as emergent technology blooms from an unknown source, and threatens to shatter peace and throw the nation into chaos.

What does the future mean when our present is stretched and reality blurred?

WHO ARE YOU?]]>
493 Sean Platt Takedown 0 to-read 4.12 2013 The Beam: The Complete First Season
author: Sean Platt
name: Takedown
average rating: 4.12
book published: 2013
rating: 0
read at:
date added: 2016/08/02
shelves: to-read
review:

]]>
<![CDATA[The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler]]> 3004460 640 Chris Eagle 1593271786 Takedown 0 to-read 4.31 2008 The IDA Pro Book: The Unofficial Guide to the World's Most Popular Disassembler
author: Chris Eagle
name: Takedown
average rating: 4.31
book published: 2008
rating: 0
read at:
date added: 2016/07/06
shelves: to-read
review:

]]>
<![CDATA[Black Hat Python: Python Programming for Hackers and Pentesters]]> 22299369
In Black Hat Python, the latest from Justin Seitz (author of the best-selling Gray Hat Python), you'll explore the darker side of Python's capabilities writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to:


Create a trojan command-and-control using GitHub
Detect sandboxing and automate common malware tasks, like keylogging and screenshotting
Escalate Windows privileges with creative process control
Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine
Extend the popular Burp Suite web-hacking tool
Abuse Windows COM automation to perform a man-in-the-browser attack
Exfiltrate data from a network most sneakily
Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits.When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Black Hat Python.

"]]>
171 Justin Seitz 1593275900 Takedown 0 to-read 4.14 2014 Black Hat Python: Python Programming for Hackers and Pentesters
author: Justin Seitz
name: Takedown
average rating: 4.14
book published: 2014
rating: 0
read at:
date added: 2016/07/06
shelves: to-read
review:

]]>
<![CDATA[The Gathering Dead (The Gathering Dead, #1)]]> 11048733
The zombie apocalypse has begun, and Major Cordell McDaniels is given the most important mission of his career: lead a Special Forces team into New York City to rescue the one man who can stop the ghastly virus that reanimates the dead.

But as a growing army of flesh-eating corpses takes over the streets and a violent storm renders airborne extraction impossible, McDaniels struggles to find a way out of the Big Apple. The odds of anyone getting out alive plummet further when slaughtered members of his own Special Forces team join the ranks of the gathering dead... with their military skills intact!]]>
276 Stephen Knight Takedown 0 to-read 4.00 2011 The Gathering Dead (The Gathering Dead, #1)
author: Stephen Knight
name: Takedown
average rating: 4.00
book published: 2011
rating: 0
read at:
date added: 2016/07/06
shelves: to-read
review:

]]>
<![CDATA[The Power of Six (Lorien Legacies, #2)]]> 8659601
Nine of us came here, but sometimes I wonder if time has changed us—if we all still believe in our mission. How can I know? There are six of us left. We're hiding, blending in, avoiding contact with one another . . . but our Legacies are developing, and soon we'll be equipped to fight. Is John Number Four, and is his appearance the sign I've been waiting for? And what about Number Five and Six? Could one of them be the raven-haired girl with the stormy eyes from my dreams. The girl with powers that are beyond anything I could ever imagine. The girl who may be strong enough to bring the six of us together?

They caught Number One in Malaysia.
Number Two in England.
And Number Three in Kenya.
They tried to catch Number Four in Ohio—and failed.

I am Number Seven. One of six still alive.

And I'm ready to fight.]]>
406 Pittacus Lore 0061974552 Takedown 5 sci-fi 4.15 2011 The Power of Six (Lorien Legacies, #2)
author: Pittacus Lore
name: Takedown
average rating: 4.15
book published: 2011
rating: 5
read at: 2016/07/06
date added: 2016/07/06
shelves: sci-fi
review:

]]>
<![CDATA[I Am Number Four (Lorien Legacies, #1)]]> 7747374
Our plan was to grow, and train, and become strong, and become one, and fight them. But they found us and started hunting us first. Now all of us are running. Spending our lives in shadows, in places where no one would look, blending in. We have lived among you without you knowing.

But they know.

They caught Number One in Malaysia.
Number Two in England.
And Number Three in Kenya.
They killed them all.

I am Number Four.

I am next.]]>
440 Pittacus Lore 0061969559 Takedown 5 sci-fi 3.94 2010 I Am Number Four (Lorien Legacies, #1)
author: Pittacus Lore
name: Takedown
average rating: 3.94
book published: 2010
rating: 5
read at: 2016/06/21
date added: 2016/06/21
shelves: sci-fi
review:
Surprisingly good, I liked it!
]]>
<![CDATA[Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software]]> 10677461
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.

You'll learn how to:
–Set up a safe virtual environment to analyze malware
–Quickly extract network signatures and host-based indicators
–Use key analysis tools like IDA Pro, OllyDbg, and WinDbg
–Overcome malware tricks like obfuscation, anti-disassembly, anti-debugging, and anti-virtual machine techniques
–Use your newfound knowledge of Windows internals for malware analysis
–Develop a methodology for unpacking malware and get practical experience with five of the most popular packers
–Analyze special cases of malware with shellcode, C++, and 64-bit code

Hands-on labs throughout the book challenge you to practice and synthesize your skills as you dissect real malware samples, and pages of detailed dissections offer an over-the-shoulder look at how the pros do it. You'll learn how to crack open malware to see how it really works, determine what damage it has done, thoroughly clean your network, and ensure that the malware never comes back.

Malware analysis is a cat-and-mouse game with rules that are constantly changing, so make sure you have the fundamentals. Whether you're tasked with securing one network or a thousand networks, or you're making a living as a malware analyst, you'll find what you need to succeed in Practical Malware Analysis .]]>
800 Michael Sikorski 1593272901 Takedown 5 information-security 4.48 2011 Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
author: Michael Sikorski
name: Takedown
average rating: 4.48
book published: 2011
rating: 5
read at: 2016/06/13
date added: 2016/06/13
shelves: information-security
review:
Written by Mandiant experts, this is THE BOOK to read if you interested in malware analysis and reverse engineering. Practical, concise and easy to read, it assumes no prior knowledge and will get you started even if you are a complete beginner.
]]>
<![CDATA[Shattered Hourglass (Day by Day Armageddon, #3)]]> 10825907
Armies of undead have risen up across the U.S. and around the globe;there is no safe haven from the diseased corpses hungering for human flesh. But in the heat of a Texas wasteland, a small band of survivors attempt to counter the millions closing in around them.

INTERCEPT COMPLETE

Survivor,Day by day, the handwritten journal entries of one man caught in a worldwide cataclysm capture the desperation—and the will to survive—as he joins forces with a handful of refugees to battle surviving enemies both human and inhuman from inside an abandoned strategic missile facility.But in the world of the undead, is mere survival enough?]]>
336 J.L. Bourne 1451628811 Takedown 3 post-apocalyptic 3.72 2012 Shattered Hourglass (Day by Day Armageddon, #3)
author: J.L. Bourne
name: Takedown
average rating: 3.72
book published: 2012
rating: 3
read at: 2016/06/04
date added: 2016/06/04
shelves: post-apocalyptic
review:
This part isn't written as journal like previous in series, but just as novel. I think this is turn to the worse, it lost all the charm. The first book was awesome,the second book was ok, but the third is just a disappointment. I also think ending was anticlimactic after all this build up. This book also way more about american military than zombies, zombies just a background, which is not good for a zombie book. I didn't really had a feeling people struggle to survive there. I know author is in military and I enjoy reading about this, but I constantly had a feeling like I'm reading book about Call of Duty rather than zombies with all those black ops, prototype weapons, navy intelligence. Maybe author should write a novel about military instead?
]]>
<![CDATA[Life As We Knew It (Last Survivors, #1)]]> 213753
Told in journal entries, this is the heart-pounding story of Miranda’s struggle to hold on to the most important resource of all--hope--in an increasingly desperate and unfamiliar world.]]>
337 Susan Beth Pfeffer Takedown 3 post-apocalyptic As for the book itself - I found some parts hard to believe, not much rioting and looting as people continue like nothing happened, protagonist family not stocking up on any weapons. It may happen for some time, but unlikely to continue this long, especially when people start to running out of supplies. We known when times is hard - people turn on each other. It's not like they live in the very remote area, but rather close to the city - where those millions of people go? Quite a bit of them should survive and start looking for shelter, food and other supplies outside of city.
Diary format is nice, but overall it was a bit stretched in terms of plot and rather boring a bit due to lack of action. I know it is a book for kids, but still feel this book sugarcoat too much.]]>
3.89 2006 Life As We Knew It (Last Survivors, #1)
author: Susan Beth Pfeffer
name: Takedown
average rating: 3.89
book published: 2006
rating: 3
read at: 2016/05/04
date added: 2016/05/04
shelves: post-apocalyptic
review:
Different view on how post apocalyptic scenario can happen. Unlike traditional books in this area, this one about nature. The scary thing is - it could really happen to any of us. Natural disasters happen all the time and in the affected really life can become post apocalyptic really fast.
As for the book itself - I found some parts hard to believe, not much rioting and looting as people continue like nothing happened, protagonist family not stocking up on any weapons. It may happen for some time, but unlikely to continue this long, especially when people start to running out of supplies. We known when times is hard - people turn on each other. It's not like they live in the very remote area, but rather close to the city - where those millions of people go? Quite a bit of them should survive and start looking for shelter, food and other supplies outside of city.
Diary format is nice, but overall it was a bit stretched in terms of plot and rather boring a bit due to lack of action. I know it is a book for kids, but still feel this book sugarcoat too much.
]]>
Metro 2033 (Metro, #1) 5558786 764 Dmitry Glukhovsky 3453532988 Takedown 5 post-apocalyptic, horror 3.98 2002 Metro 2033 (Metro, #1)
author: Dmitry Glukhovsky
name: Takedown
average rating: 3.98
book published: 2002
rating: 5
read at:
date added: 2016/05/04
shelves: post-apocalyptic, horror
review:

]]>
<![CDATA[The Knife of Never Letting Go (Chaos Walking, #1)]]> 2118745
But how do you escape when your pursuers can hear your every thought?]]>
479 Patrick Ness 1406310255 Takedown 3 3.95 2008 The Knife of Never Letting Go (Chaos Walking, #1)
author: Patrick Ness
name: Takedown
average rating: 3.95
book published: 2008
rating: 3
read at: 2016/04/11
date added: 2016/04/11
shelves:
review:

]]>
The Art of Assembly Language 1063680 928 Randall Hyde 1886411972 Takedown 0 to-read 3.78 2003 The Art of Assembly Language
author: Randall Hyde
name: Takedown
average rating: 3.78
book published: 2003
rating: 0
read at:
date added: 2016/03/27
shelves: to-read
review:

]]>
Red Hill (Red Hill, #1) 17457124
When reports of a widespread, deadly “outbreak� begin to surface, these ordinary people face extraordinary circumstances and suddenly their fates are intertwined. Recognizing they can’t outrun the danger, Scarlet, Nathan, and Miranda desperately seek shelter at the same secluded ranch, Red Hill. Emotions run high while old and new relationships are tested in the face of a terrifying enemy—an enemy who no longer remembers what it’s like to be human.

Set against the backdrop of a brilliantly realized apocalyptic world, love somehow finds a way to survive. But what happens when the one you’d die for becomes the one who could destroy you?

Red Hill grabs you from page one and doesn’t let go until its stunning conclusion. This is #1 New York Times bestselling author Jamie McGuire at her unforgettable best.]]>
368 Jamie McGuire 1476759537 Takedown 4 post-apocalyptic, horror 3.89 2013 Red Hill (Red Hill, #1)
author: Jamie McGuire
name: Takedown
average rating: 3.89
book published: 2013
rating: 4
read at: 2016/03/14
date added: 2016/03/14
shelves: post-apocalyptic, horror
review:

]]>
<![CDATA[C++ Primer Plus (Developer's Library)]]> 18902873
New C++11 Coverage

C++ Primer Plus is a carefully crafted, complete tutorial on one of the most significant and widely used programming languages today. An accessible and easy-to-use self-study guide, this book is appropriate for both serious students of programming as well as developers already proficient in other languages.

The sixth edition of C++ Primer Plus has been updated and expanded to cover the latest developments in C++, including a detailed look at the new C++11 standard.

Author and educator Stephen Prata has created an introduction to C++ that is instructive, clear, and insightful. Fundamental programming concepts are explained along with details of the C++ language. Many short, practical examples illustrate just one or two concepts at a time, encouraging readers to master new topics by immediately putting them to use.

Review questions and programming exercises at the end of each chapter help readers zero in on the most critical information and digest the most difficult concepts.

In C++ Primer Plus, you’ll find depth, breadth, and a variety of teaching techniques and tools to enhance your learning:

A new detailed chapter on the changes and additional capabilities introduced in the C++11 standard
Complete, integrated discussion of both basic C language and additional C++ features
Clear guidance about when and why to use a feature
Hands-on learning with concise and simple examples that develop your understanding a concept or two at a time
Hundreds of practical sample programs
Review questions and programming exercises at the end of each chapter to test your understanding
Coverage of generic C++ gives you the greatest possible flexibility
Teaches the ISO standard, including discussions of templates, the Standard Template Library, the string class, exceptions, RTTI, and namespaces

Table of Contents

1: Getting Started with C++

2: Setting Out to C++

3: Dealing with Data

4: Compound Types

5: Loops and Relational Expressions

6: Branching Statements and Logical Operators

7: Functions: C++’s Programming Modules

8: Adventures in Functions

9: Memory Models and Namespaces

10: Objects and Classes

11: Working with Classes

12: Classes and Dynamic Memory Allocation

13: Class Inheritance

14: Reusing Code in C++

15: Friends, Exceptions, and More

16: The string Class and the Standard Template Library

17: Input, Output, and Files

18: The New C++11 Standard

A Number Bases

B C++ Reserved Words

C The ASCII Character Set

D Operator Precedence

E Other Operators

F The stringTemplate Class

G The Standard Template Library Methods and Functions

H Selected Readings and Internet Resources

I Converting to ISO Standard C++
J Answers to Chapter Reviews]]>
1440 Stephen Prata 0132781174 Takedown 0 to-read 4.21 C++ Primer Plus (Developer's Library)
author: Stephen Prata
name: Takedown
average rating: 4.21
book published:
rating: 0
read at:
date added: 2016/02/15
shelves: to-read
review:

]]>
<![CDATA[The Infinite Sea (The 5th Wave, #2)]]> 16131484 The riveting follow-up to the New York Times bestselling The 5th Wave, hailed by Justin Cronin as "wildly entertaining."

How do you rid the Earth of seven billion humans? Rid the humans of their humanity.

Surviving the first four waves was nearly impossible. Now Cassie Sullivan finds herself in a new world, a world in which the fundamental trust that binds us together is gone. As the 5th Wave rolls across the landscape, Cassie, Ben, and Ringer are forced to confront the Others� ultimate the extermination of the human race.

Cassie and her friends haven’t seen the depths to which the Others will sink, nor have the Others seen the heights to which humanity will rise, in the ultimate battle between life and death, hope and despair, love and hate.]]>
320 Rick Yancey 1101599014 Takedown 4 3.84 2014 The Infinite Sea (The 5th Wave, #2)
author: Rick Yancey
name: Takedown
average rating: 3.84
book published: 2014
rating: 4
read at: 2016/02/10
date added: 2016/02/10
shelves:
review:

]]>
File System Forensic Analysis 692554 600 Brian Carrier 0321268172 Takedown 0 to-read 4.27 2005 File System Forensic Analysis
author: Brian Carrier
name: Takedown
average rating: 4.27
book published: 2005
rating: 0
read at:
date added: 2016/02/03
shelves: to-read
review:

]]>
<![CDATA[The Last Star (The 5th Wave, #3)]]> 16131489 The enemy is Other. The enemy is us.

They’re down here, they’re up there, they’re nowhere. They want the Earth, they want us to have it. They came to wipe us out, they came to save us.

But beneath these riddles lies one truth: Cassie has been betrayed. So has Ringer. Zombie. Nugget. And all 7.5 billion people who used to live on our planet. Betrayed first by the Others, and now by ourselves.

In these last days, Earth’s remaining survivors will need to decide what’s more important: saving themselves…or saving what makes us human.]]>
338 Rick Yancey 0399162437 Takedown 0 to-read 3.59 2016 The Last Star (The 5th Wave, #3)
author: Rick Yancey
name: Takedown
average rating: 3.59
book published: 2016
rating: 0
read at:
date added: 2016/01/20
shelves: to-read
review:

]]>
<![CDATA[The 5th Wave (The 5th Wave, #1)]]> 16101128 unlucky survive. After the 4th wave, only one rule applies: trust no one.

Now, it's the dawn of the 5th wave, and on a lonely stretch of highway, Cassie runs from Them. The beings who only look human, who roam the countryside killing anyone they see. Who have scattered Earth's last survivors. To stay alone is to stay alive, Cassie believes, until she meets Evan Walker. Beguiling and mysterious, Evan Walker may be Cassie's only hope for rescuing her brother—or even saving herself. But Cassie must choose: between trust and despair, between defiance and surrender, between life and death. To give up or to get up.]]>
457 Rick Yancey 0399162410 Takedown 4 sci-fi 4.01 2013 The 5th Wave (The 5th Wave, #1)
author: Rick Yancey
name: Takedown
average rating: 4.01
book published: 2013
rating: 4
read at: 2016/01/20
date added: 2016/01/20
shelves: sci-fi
review:

]]>
The Blue Nowhere 343995
To stop him, the authorities free imprisoned former hacker Wyatt Gillette to aid the investigation. Teamed with old-school homicide detective Frank Bishop, Gillette must combine their disparate talents to catch a brilliant and merciless killer.]]>
430 Jeffery Deaver 0340767510 Takedown 5 thriller 3.98 2001 The Blue Nowhere
author: Jeffery Deaver
name: Takedown
average rating: 3.98
book published: 2001
rating: 5
read at: 2015/12/20
date added: 2015/12/20
shelves: thriller
review:
Cool technology thriller, I really enjoyed it!
]]>
<![CDATA[Doctor Sleep (The Shining, #2)]]> 16130549 The Shining, in this instantly riveting novel about the now middle-aged Dan Torrance (the boy protagonist of The Shining) and the very special 12-year-old girl he must save from a tribe of murderous paranormals.

On highways across America, a tribe of people called The True Knot travel in search of sustenance. They look harmless � mostly old, lots of polyester, and married to their RVs. But as Dan Torrance knows, and spunky 12-year-old Abra Stone learns, The True Knot are quasi-immortal, living off the "steam" that children with the "shining" produce when they are slowly tortured to death.

Haunted by the inhabitants of the Overlook Hotel where he spent one horrific childhood year, Dan has been drifting for decades, desperate to shed his father's legacy of despair, alcoholism, and violence. Finally, he settles in a New Hampshire town, an AA community that sustains him, and a job at a nursing home where his remnant "shining" power provides the crucial final comfort to the dying. Aided by a prescient cat, he becomes "Doctor Sleep."

Then Dan meets the evanescent Abra Stone, and it is her spectacular gift, the brightest shining ever seen, that reignites Dan's own demons and summons him to a battle for Abra's soul and survival. This is an epic war between good and evil, a gory, glorious story that will thrill the millions of hyper-devoted fans of The Shining and wildly satisfy anyone new to the territory of this icon in the King canon.]]>
531 Stephen King 1476727651 Takedown 1 4.11 2013 Doctor Sleep (The Shining, #2)
author: Stephen King
name: Takedown
average rating: 4.11
book published: 2013
rating: 1
read at: 2015/12/04
date added: 2015/12/04
shelves:
review:

]]>
<![CDATA[The Last Town (Wayward Pines, #3)]]> 20423680
Secret Service agent Ethan Burke arrived in Wayward Pines, Idaho, three weeks ago. In this town, people are told who to marry, where to live, where to work. Their children are taught that David Pilcher, the town’s creator, is god. No one is allowed to leave; even asking questions can get you killed.

But Ethan has discovered the astonishing secret of what lies beyond the electrified fence that surrounds Wayward Pines and protects it from the terrifying world beyond. It is a secret that has the entire population completely under the control of a madman and his army of followers, a secret that is about to come storming through the fence to wipe out this last, fragile remnant of humanity.]]>
294 Blake Crouch 1477872582 Takedown 5 post-apocalyptic 4.09 2014 The Last Town (Wayward Pines, #3)
author: Blake Crouch
name: Takedown
average rating: 4.09
book published: 2014
rating: 5
read at: 2015/11/06
date added: 2015/11/06
shelves: post-apocalyptic
review:

]]>
<![CDATA[Yesterday's Gone: Episode 1 (Yesterday's Gone, #1)]]> 13231241
Well, almost everyone.

A scattered few woke alone in a world where there are no rules other than survival... at any cost.

A journalist wanders the horrible reality of an empty New York in search of his wife and son.

A serial killer must hunt in a land where prey is now an endangered species.

A mother shields her young daughter from danger, though every breath fills her with terror.

A bullied teen is thrilled to find everyone gone. Until the knock at the door.

A fugitive survives a fiery plane crash. Will he be redeemed, or return to what he's best at: the kill?

An eight year old boy sets out on a journey to find his missing family. What he finds will change him forever.

These survivors aren’t alone...
Someone or something is watching them.
And waiting...

Strangers unite.
Sides are chosen.
Will humanity survive what it never saw coming?
The only certainty is that Yesterday’s Gone.

You’ve never read anything like Yesterday’s Gone � the epic, groundbreaking, thrilling new series. Look for a new 100 page episode each month.]]>
116 Sean Platt 0984338195 Takedown 0 to-read 3.65 2011 Yesterday's Gone: Episode 1 (Yesterday's Gone, #1)
author: Sean Platt
name: Takedown
average rating: 3.65
book published: 2011
rating: 0
read at:
date added: 2015/11/01
shelves: to-read
review:

]]>
<![CDATA[The Purge of Babylon (Purge of Babylon, #1)]]> 19485109
Creatures that once lived in the shadows, hidden from humankind, have risen, spreading like a plague across the globe over the course of a single night. Their numbers growing exponentially through infection, these seemingly unkillable creatures have swallowed up whole cities and collapsed unprepared governments.

Survivors call it The Purge.

Against all odds, a disparate group of survivors has emerged from that blood-soaked night that devastated the planet and reduced humanity to an endangered species. Among the survivors are two ex-Army Rangers, a businesswoman, and a third-year medical student. But surviving The Purge was one thing � staying alive is another matter entirely.

Hope exists in the countryside, in the form of a self-sustaining underground facility designed to withstand any calamity. But in order to reach its safety, the survivors must travel hundreds of treacherous miles, with the night � and the creatures that dwell within it � always at their backs.

The rules are simple: stay out of the dark, load up on silver bullets, and whatever you do, stay alive.

The road to salvation has begun …]]>
483 Sam Sisavath 0615922376 Takedown 0 to-read 4.00 2013 The Purge of Babylon (Purge of Babylon, #1)
author: Sam Sisavath
name: Takedown
average rating: 4.00
book published: 2013
rating: 0
read at:
date added: 2015/11/01
shelves: to-read
review:

]]>
Wayward (Wayward Pines, #2) 17920175 None of the residents know how they got here. They are told where to work, how to live, and who to marry. Some believe they are dead. Others think they’re trapped in an unfathomable experiment. Everyone secretly dreams of leaving, but those who dare face a terrifying surprise.

Ethan Burke has seen the world beyond. He’s sheriff, and one of the few who knows the truth—Wayward Pines isn’t just a town. And what lies on the other side of the fence is a nightmare beyond anyone’s imagining.]]>
298 Blake Crouch 1477808701 Takedown 5 dyspotian, post-apocalyptic 4.12 2013 Wayward (Wayward Pines, #2)
author: Blake Crouch
name: Takedown
average rating: 4.12
book published: 2013
rating: 5
read at: 2015/10/29
date added: 2015/10/29
shelves: dyspotian, post-apocalyptic
review:

]]>
<![CDATA[Systems Performance: Enterprise and the Cloud]]> 18058001 Large-scale enterprise, cloud, and virtualized computing systems have introduced serious performance challenges. Now, internationally renowned performance expert Brendan Gregg has brought together proven methodologies, tools, and metrics for analyzing and tuning even the most complex environments. Systems Enterprise and the Cloud focuses on Linux® and Unix® performance, while illuminating performance issues that are relevant to all operating systems. You&;ll gain deep insight into how systems work and perform, and learn methodologies for analyzing and improving system and application performance. Gregg presents examples from bare-metal systems and virtualized cloud tenants running Linux-based Ubuntu®, Fedora®, CentOS, and the illumos-based Joyent® SmartOS&; and OmniTI OmniOS®. He systematically covers modern systems performance, including the &;traditional&; analysis of CPUs, memory, disks, and networks, and new areas including cloud computing and dynamic tracing. This book also helps you identify and fix the &;unknown unknowns&; of complex bottlenecks that emerge from elements and interactions you were not aware of. The text concludes with a detailed case study, showing how a real cloud customer issue was analyzed from start to finish. Ěý Coverage includes &; Modern performance analysis and terminology, concepts, models, methods, and techniques &; Dynamic tracing techniques and tools, including examples of DTrace, SystemTap, and perf &; Kernel uncovering what the OS is doing &; Using system observability tools, interfaces, and frameworks &; Understanding and monitoring application performance &; Optimizing processors, cores, hardware threads, caches, interconnects, and kernel scheduling &; Memory virtual memory, paging, swapping, memory architectures, busses, address spaces, and allocators &; File system I/O, including caching &; Storage devices/controllers, disk I/O workloads, RAID, and kernel I/O &; Network-related performance protocols, sockets, interfaces, and physical connections &; Performance implications of OS and hardware-based virtualization, and new issues encountered with cloud computing &; getting accurate results and avoiding common mistakes Ěý This guide is indispensable for anyone who operates enterprise or cloud system, network, database, and web admins; developers; and other professionals. For students and others new to optimization, it also provides exercises reflecting Gregg&;s extensive instructional experience. Ěý]]> 772 Brendan Gregg 0133390098 Takedown 0 to-read 4.46 2013 Systems Performance: Enterprise and the Cloud
author: Brendan Gregg
name: Takedown
average rating: 4.46
book published: 2013
rating: 0
read at:
date added: 2015/10/14
shelves: to-read
review:

]]>
Pines (Wayward Pines, #1) 15034320
2013 International Thriller Award Nominee

The international runaway bestseller is now a Major Television Event from executive producer M. Night Shyamalan, starring Matt Dillon and premiering May 14th on FOX.]]>
11 Blake Crouch 1469216000 Takedown 5 dyspotian, post-apocalyptic Reminds me a lot of Under the Dome by King.
TV show wasn't that bad either, but way more sugarcoated, soft and some parts just didn't make any sense.]]>
3.85 2012 Pines (Wayward Pines, #1)
author: Blake Crouch
name: Takedown
average rating: 3.85
book published: 2012
rating: 5
read at: 2015/10/14
date added: 2015/10/14
shelves: dyspotian, post-apocalyptic
review:
Perfect mix of post-apocalypses and dyspotian 1984 like society - love it!
Reminds me a lot of Under the Dome by King.
TV show wasn't that bad either, but way more sugarcoated, soft and some parts just didn't make any sense.
]]>