Ok, as promised a list of books, publications and things that tend to be on my shelf:
1. Verbal Judo (Thompson)
2. Practical Malware Analysis (Sikorski and Honig)
3. Hacking Exposed (pick a version!) (McClure, Scambray and Kurtz)
4. The Cuckoo's Egg (Stoll)
5. BTFM (While and Clark)
6. RTFM (Clark)
7. Linux iptables (Purdy) Linux Pocket Guide (Barrett)
8. Python In Your Pocket (Lutz)
9. Bash Reference (Robbins)
10. Cryptographic Engineering (The latest one with Kohno added)
11. The Book Of Five Rings (Musashi)
12. Good To Great (Collins)
13. Social Engineering (Hadnagy)
14. The Car Hackers Handbook (Smith)
15. Everyone Communicates, Few Connect (Maxwell)
16. Active Listening 101 (Hardman)
17. Anything by Tom Holt or the Late Terry Pratchett.
18. How to Disappear (Ahearn and Horan)
Subscribe to:
Post Comments (Atom)
Explain the unique risks and threats posed by AI-enabled attacks.
AI-enabled attacks present unique risks primarily due to the speed and scale at which they occur, making standard countermeasures difficult...
-
Summarization of hundreds of comments on Reddit. Ineffective Service: The users explicitly states, "Confirmed that it doesn't w...
-
Based on a review of the provided Privacy Policy , here are some potential legal implications and issues that should be addressed: Scope a...
No comments:
Post a Comment