Angebote zu "Hacker" (35 Treffer)

Hacker´s Delight
40,99 € *
ggf. zzgl. Versand

In Hacker?s Delight, Second Edition , Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren?s hacks are eminently practical, but they?re also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve. Extensive additions in this edition include A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code A new chapter on error correcting codes (ECC), including routines for the Hamming code More coverage of integer division by constants, including methods using only shifts and adds Computing remainders without computing a quotient More coverage of population count and counting leading zeros Array population count New algorithms for compress and expand An LRU algorithm Floating-point to/from integer conversions Approximate floating-point reciprocal square root routine A gallery of graphs of discrete functions Now with exercises and answers Product Description In Hacker?s Delight, Second Edition , Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren?s hacks are eminently practical, but they?re also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve. Extensive additions in this edition include A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code A new chapter on error correcting codes (ECC), including routines for the Hamming code More coverage of integer division by constants, including methods using only shifts and adds Computing remainders without computing a quotient More coverage of population count and counting leading zeros Array population count New algorithms for compress and expand An LRU algorithm Floating-point to/from integer conversions Approximate floating-point reciprocal square root routine A gallery of graphs of discrete functions Now with exercises and answers Foreword xiii Preface xv Chapter 1: Introduction 1 1.1 Notation 1 1.2 Instruction Set and Execution Time Model 5 Chapter 2: Basics 11 2.1 Manipulating Rightmost Bits 11 2.2 Addition Combined with Logical Operations 16 2.3 Inequalities among Logical and Arithmetic Expressions 17 2.4 Absolute Value Function 18 2.5 Average of Two Integers 19 2.6 Sign Extension 19 2.7 Shift Right Signed from Unsigned 20 2.8 Sign Function 20 2.9 Three-Valued Compare Function 21 2.10 Transfer of Sign Function 22 2.11 Decoding a ?Zero Means 2** n ? Field 22 2.12 Comparison Predicates 23 2.13 Overflow Detection 28 2.14 Condition Code Result of Add , Subtract , and Multiply 36 2.15 Rotate Shifts 37 2.16 Double-Length Add/Subtract 38 2.17 Double-Length Shifts 39 2.18 Multibyte Add , Subtract , Absolute Value 40 2.19 Doz, Max, Min 41 2.20 Exchanging Registers 45 2.21 Alternating among Two or More Values 48 2.22 A Boolean Decomposition Formula 51 2.23 Implementing Instructions for all 16 Binary Boolean Operations 53 Chapter 3: Power-of-2 Boundaries 59 3.1 Rounding Up/Down to a Multiple of a Known Power of 2 59 3.2 Rounding Up/Down to the Next Power of 2 60 3.3 Detecting a Power-of-2 Boundary Crossing 63 Chapter 4: Arithmetic Bounds 67 4.1 Checking Bounds of Integers 67 4.2 Propagating Bounds through Add ?s and Subtract ?s 70 4.3 Propagating Bounds through Logical Operations 73 Chapter 5: Counting Bits 81 5.1 Counting 1-Bits 81 5.2 Parity 96 5.3 Counting Leading 0?s 99 5.4 Counting Trailing 0?s 107 Chapter 6: Searching Words 117 6.1 Find First 0-Byte 117 6.2 Find First String of 1-Bits of a Given Length 123 6.3 Find Longest String of 1-Bits 125 6.4 Find Shortest String of 1-Bits 126 Chapter 7: Rearranging Bits And Bytes 129 7.1 Reversing Bits and Bytes 129 7.2 Shuffling Bits 139 7.3 Transposing a Bit Matrix 141 7.4 Compress , or Generalized Extract 150 7.5 Expand , or Generalized Insert 156 7.6 Hardware Algorithms for Compress and Expand 157 7.7 General Permutations, Sheep and Goats Operation 161 7.8 Rearrangements and Index

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
The Car Hacker´s Handbook
29,99 € *
ggf. zzgl. Versand

´´We´re all safer when the systems we depend upon are inspectable, auditable, and documented - and this definitely includes cars.´´ - Chris Evans, hacker and founder of Project Zero Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven´t kept pace with today´s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker´s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle´s communication network, you´ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker´s Handbook will show you how to: - Build an accurate threat model for your vehicle - Reverse engineer the CAN bus to fake engine signals - Exploit vulnerabilities in diagnostic and data-logging systems - Hack the ECU and other firmware and embedded systems - Feed exploits through infotainment and vehicle-to-vehicle communication systems - Override factory settings with performance-tuning techniques - Build physical and virtual test benches to try out exploits safely If you´re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker´s Handbook your first stop.

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
Computer-Forensik Hacks
34,90 € *
ggf. zzgl. Versand

Computer-Forensik Hacks ? 100 Forensik-Hacks ist eine Sammlung von 100 thematisch sortierten Tricks und Tools, die dabei helfen, herausfordernde Probleme der Computer-Forensik zu lösen. Die im Buch vorgestellten Werkzeuge sind durchgängig Open-Source-Tools. Die detailliert beschriebenen Hacks zeigen die State-of-the-Art-Ansätze der modernen Computerforsensik. Die Hacks zeigen, wie Daten juristisch korrekt gesichert, wie gelöschte Daten und Verzeichnisse wieder hergestellt und wie digitale Spuren gesichert werden. Welche Spuren in Browsern hinterlassen werden und wie sie aufgefunden werden können, wird in weiteren Hacks dargestellt, ebenso wie Erläuterung von üblichen Angriffstechniken. Die Autoren Lorenz Kuhlee und Victor Völzow sind bei der hessischen Polizei für die Aus- und Fortbildung von Computer-Forensikern zuständig. Computer-Forensik Hacks ist eine Sammlung von Methoden, Tipps und Tricks - kurz: Hacks - aus allen Bereichen der Computer-Forensik. Die Autoren, die bei der Polizei Forensiker ausbilden, haben praktische Lösungen für echte Problemstellungen aus dem Computer-Forensik-Alltag in kleine, bekömmliche Portionen gepackt, die direkt angewendet werden können. Zu jeder praktischen Lösung gibt es auch das notwendige Hintergrundwissen mit auf den Weg, das benötigt wird, um sowohl das Problem wie auch den Lösungsansatz nachvollziehen zu können. Nicht nur für Forensiker Nicht nur Forensiker müssen heutzutage wissen, wie sie den Zustand eines Computersystems sichern können, damit dies bei späteren Gerichtsverhandlungen juristisch wasserdicht ist. Auch für Systemadministratoren aus der freien Wirtschaft gehört mittlerweile ein computer-forsensisches Grundwissen zum Arbeitsalltag. Und auch Rechtsanwälte benötigen immer wieder Wissen darüber, was bei einer Datensicherung beachtet werden muss.

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
Ghost in the Wires
7,99 € *
ggf. zzgl. Versand

Computer hacker Mitnick reveals all this memoir, after 7 years of government-mandated silence. Mitnick hacked for years, going on the run and creating false identities for himself.

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
Hacking
46,00 € *
ggf. zzgl. Versand

´´Hacking´´ ist die Kunst, kreativ Probleme zu lösen - vom Entwickeln einer unkonventionellen Programmierlösung bis hin zum Aufdecken von Sicherheitslöchern in einem schlampig entworfenen Programm. Viele Menschen bezeichnen sich als Hacker, aber nur wenige besitzen das eigentlich notwendige Hintergrundwissen. Jon Erickson zeigt nicht, wie man sich existierende Exploits beschafft und diese einsetzt, sondern vermittelt detailliert, wie Hacking-Techniken und Exploits tatsächlich funktionieren. Dazu führt er aus einer Hacker-Perspektive in die Grundlagen der Programmiersprache C ein und erklärt die wesentlichen Aspekte der Computersicherheit in den drei eng zusammenhängenden Bereichen Programmierung, Vernetzung und Kryptografie. Mit der beiliegenden Live-CD und den darauf enthaltenen Beispielen können Sie die neu erworbenen Kenntnisse auch gleich praktisch anwenden. Nach der Lektüre werden Sie u.a. verstehen: - wie man in C, Assembler und mit Shell-Skripten programmiert, - wie manden Hauptspeicher durch Buffer Overflows und Format-String-Angriffe korrumpiert, - wie man Prozessor-Register und Hauptspeicher mit einem Debugger untersucht und so die Programmabläufe nachvollzieht, - wie man gängige Sicherheitsbarrieren - z.B. Intrusion-Detection-Systeme - überlistet, - wie man sich mit Port-Binding Zugang zu fremden Servern verschafft, - wie man Netzwerkverkehr umleitet und TCP-Verbindungen übernimmt. Mit der beiliegenden Live-CD und den darauf enthaltenen Beispielen können Sie die neu erworbenen Kenntnisse gleich praktisch anwenden. In der zweiten Auflage wurden alle Kapitel aktualisiert und erweitert, insbesondere die Einführung in die grundlegenden Funktionsweise eines Computers.

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
Arduino For Dummies
23,99 € *
ggf. zzgl. Versand

Bring your ideas to life with the latest Arduino hardware and software Arduino is an affordable and readily available hardware development platform based around an open source, programmable circuit board. You can combine this programmable chip with a variety of sensors and actuators to sense your environment around you and control lights, motors, and sound. This flexible and easy-to-use combination of hardware and software can be used to create interactive robots, product prototypes and electronic artwork, whether you´re an artist, designer or tinkerer. Arduino For Dummies is a great place to start if you want to find out about Arduino and make the most of its incredible capabilities. It helps you become familiar with Arduino and what it involves, and offers inspiration for completing new and exciting projects. * Covers the latest software and hardware currently on the market * Includes updated examples and circuit board diagrams in addition to new resource chapters * Offers simple examples to teach fundamentals needed to move onto more advanced topics * Helps you grasp what´s possible with this fantastic little board Whether you´re a teacher, student, programmer, hobbyist, hacker, engineer, designer, or scientist, get ready to learn the latest this new technology has to offer!

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
Create Stunning HTML Email That Just Works: Cre...
24,99 € *
ggf. zzgl. Versand

Create Stunning HTML Email That Just Works is a step-by-step guide to creating beautiful HTML emails that consistently work. It begins with an introduction to email covering topics such as: how email design differs from web design; permission based marketing, and the anatomy of an email. What You Will Learn: * How to design HTML emails that look great * Simple methods to design & test email newsletters * Best practice, permission based email marketing tips & techniques * Proven strategies for selling email design services to your clients The book shows the reader how to plan, design, and build gorgeous HTML email designs that look great in every email program: Outlook, Gmail, Apple Mail, etc. All-important tasks like legal requirements, testing, spam compliance and known hacks and workarounds are covered.

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
Open Source Intelligence Methods and Tools
23,99 € *
ggf. zzgl. Versand

Apply Open Source Intelligence (OSINT) techniques, methods, and tools to acquire information from publicly available online sources to support your intelligence analysis. Use the harvested data in different scenarios such as financial, crime, and terrorism investigations as well as performing business competition analysis and acquiring intelligence about individuals and other entities. This book will also improve your skills to acquire information online from both the regular Internet as well as the hidden web through its two sub-layers: the deep web and the dark web. The author includes many OSINT resources that can be used by intelligence agencies as well as by enterprises to monitor trends on a global level, identify risks, and gather competitor intelligence so more effective decisions can be made. You will discover techniques, methods, and tools that are equally used by hackers and penetration testers to gather intelligence about a specific target online. And you will be aware of how OSINT resources can be used in conducting social engineering attacks. Open Source Intelligence Methods and Tools takes a practical approach and lists hundreds of OSINT resources that can be used to gather intelligence from online public sources. The book also covers how to anonymize your digital identity online so you can conduct your searching activities without revealing your identity. What You´ll Learn Identify intelligence needs and leverage a broad range of tools and sources to improve data collection, analysis, and decision making in your organization Use OSINT resources to protect individuals and enterprises by discovering data that is online, exposed, and sensitive and hide the data before it is revealed by outside attackers Gather corporate intelligence about business competitors and predict future market directions Conduct advanced searches to gather intelligence from social media sites such as Facebook and Twitter Understand the different layers that make up the Internet and how to search within the invisible web which contains both the deep and the dark webs Who This Book Is For Penetration testers, digital forensics investigators, intelligence services, military, law enforcement, UN agencies, and for-profit/non-profit enterprises

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
IoT Security Issues
26,99 € *
ggf. zzgl. Versand

IoT Security Issues looks at the burgeoning growth of devices of all kinds controlled over the Internet of all varieties, where product comes first and security second. In this case, security trails badly. This book examines the issues surrounding these problems, vulnerabilities, what can be done to solve the problem, investigating the stack for the roots of the problems and how programming and attention to good security practice can combat the problems today that are a result of lax security processes on the Internet of Things. This book is for people interested in understanding the vulnerabilities on the Internet of Things, such as programmers who have not yet been focusing on the IoT, security professionals and a wide array of interested hackers and makers. This book assumes little experience or knowledge of the Internet of Things. To fully appreciate the book, limited programming background would be helpful for some of the chapters later in the book, though the basic content is explained. The author, Alasdair Gilchrist, has spent 25 years as a company director in the fields of IT, Data Communications, Mobile Telecoms and latterly Cloud/SDN/NFV technologies, as a professional technician, support manager, network and security architect. He has project-managed both agile SDLC software development as well as technical network architecture design. He has experience in the deployment and integration of systems in enterprise, cloud, fixed/mobile telecoms, and service provider networks. He is therefore knowledgeable in a wide range of technologies and has written a number of books in related fields.

Anbieter: buecher.de
Stand: 14.08.2018
Zum Angebot
Hacken Open Air Hoodie
35,95 € *
zzgl. 4,95 € Versand

Dieser Hoodie zeigt in Anlehnung an das Wacken Open Air Metalfestival jede Menge Mashups aus Bandnamen und Elementen der Informatik. Alle Bandlogos sind im Stil ihrer Vorbilder gehalten.

Anbieter: getDigital
Stand: 13.07.2018
Zum Angebot