Puzzles for Hackers

Puzzles for Hackers
Author: Ivan Sklyarov
Publisher: БХВ-Петербург
Total Pages: 337
Release: 2005
Genre: Computers
ISBN: 1931769451

These puzzles and mind-benders serve as a way to train logic and help developers, hackers, and system administrators discover unconventional solutions to common IT problems. Users will learn to find bugs in source code, write exploits, and solve nonstandard coding tasks and hacker puzzles. Cryptographic puzzles, puzzles for Linux and Windows hackers, coding puzzles, and puzzles for web designers are included.

Hacker's Challenge 2: Test Your Network Security & Forensic Skills

Hacker's Challenge 2: Test Your Network Security & Forensic Skills
Author: Mike Schiffman
Publisher: McGraw Hill Professional
Total Pages: 356
Release: 2003
Genre: Computers
ISBN: 9780072226300

For readers who want to keep the bad guys out of their network, the latest edition of this bestselling book features over 20 all-new hacking challenges to solve. Plus, the book includes in-depth solutions for each, all written by experienced security consultants.

Hackish C++ Games & Demos

Hackish C++ Games & Demos
Author: Michael Flenov
Publisher: БХВ-Петербург
Total Pages: 310
Release: 2006
Genre: Computers
ISBN: 1931769583

This guide to maximizing visual effects and optimizing graphics for game programming with C++ and DirectX is a practical introduction to the latest C++ technologies and techniques. The new concept of demo coding—a program whose purpose is to present the technical and artistic skills of programmers—is provided, as is help for programmers demonstrating their new skills in creating 2-D and 3-D games and demo scenes. An accompanying CD-ROM includes demo scenes, game-development projects, and examples from the book.

Hacker's Delight

Hacker's Delight
Author: Henry S. Warren
Publisher: Pearson Education
Total Pages: 512
Release: 2013
Genre: Computers
ISBN: 0321842685

Compiles programming hacks intended to help computer programmers build more efficient software, in an updated edition that covers cyclic redundancy checking and new algorithms and that includes exercises with answers.

The Hacker's Key

The Hacker's Key
Author: Jon Skovron
Publisher: Scholastic Inc.
Total Pages: 158
Release: 2020-09-01
Genre: Juvenile Fiction
ISBN: 1338633996

A thrilling cyber-doomsday action/adventure novel that's Ally Carter meets GAMER ARMY. Ada Genet's father, Remy Genet, was one of the most infamous criminals in the world, specializing in infiltration, theft, and cybercrime. As far back as she can remember, Ada had been his accomplice. She helped him steal secrets from governments, weapons from terrorists, and money from just about everyone. But when the law finally caught up with them, Remy ended up in prison -- and Ada at a military boarding school, as a ward of the US Government. Now something called the Hacker's Key has been stolen from a secret UN installation. The Key could supposedly shut down every computer, smartphone, and internet-connected device simultaneously, causing mass chaos around the world. A Techno-Doomsday. A clue left behind at the scene points to Ada's father, but he's been in prison the whole time. Then Remy springs one last surprise. He'll speak, but only to one person -- his daughter, Ada.

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits

Programming Linux Hacker Tools Uncovered: Exploits, Backdoors, Scanners, Sniffers, Brute-Forcers, Rootkits
Author: Ivan Sklyarov
Publisher: БХВ-Петербург
Total Pages: 322
Release: 2006
Genre: Computers
ISBN: 1931769613

Uncovering the development of the hacking toolset under Linux, this book teaches programmers the methodology behind hacker programming techniques so that they can think like an attacker when developing a defense. Analyses and cutting-edge programming are provided of aspects of each hacking item and its source code—including ping and traceroute utilities, viruses, worms, Trojans, backdoors, exploits (locals and remotes), scanners (CGI and port), smurf and fraggle attacks, and brute-force attacks. In addition to information on how to exploit buffer overflow errors in the stack, heap and BSS, and how to exploit format-string errors and other less common errors, this guide includes the source code of all the described utilities on the accompanying CD-ROM.

Hackers

Hackers
Author: Paul Taylor
Publisher: Routledge
Total Pages: 218
Release: 2012-11-12
Genre: Social Science
ISBN: 1134678266

The practice of computer hacking is increasingly being viewed as a major security dilemma in Western societies, by governments and security experts alike. Using a wealth of material taken from interviews with a wide range of interested parties such as computer scientists, security experts and hackers themselves, Paul Taylor provides a uniquely revealing and richly sourced account of the debates that surround this controversial practice. By doing so, he reveals the dangers inherent in the extremes of conciliation and antagonism with which society reacts to hacking and argues that a new middle way must be found if we are to make the most of society's high-tech meddlers.

The Birthday of Hacking

The Birthday of Hacking
Author: Sfraye Tilaye Teshome
Publisher: Sfraye Tilaye
Total Pages: 110
Release:
Genre: Business & Economics
ISBN:

"The birthday of hacking" is an Information Security book written by Sfraye Tilaye Teshome. This book teaches you about all kinds of things on how a hacker does things. Moreover, It teaches you about tools that hackers use to compromise computer systems. Additionally, "The birthday of hacking" introduces you to how to hack a system and play with it on a virtual machine. In short, This book contains all kinds of information that you can use in real-life situations, whether it is for fun or trying to learn new things.

Professional Computer Hackers

Professional Computer Hackers
Author: Martha Hubbard
Publisher: Mitchell Lane Publishers
Total Pages: 48
Release: 2024-08-05
Genre: Juvenile Nonfiction
ISBN: 1545759499

Information is one of the biggest businesses in the world today, even among criminals. People called hackers have been around for decades. They break into computer systems to steal private information. They then use it for their own financial gain. Other people also make their living by hacking. But they do it legally. Professional computer hackers use their skills to keep others from becoming the victims of criminal hackers. Part of the series, They Do That for a Living?, Professional Computer Hackers explores the history of this unusual career, what it takes to join it, and where professional hacking is headed in the future.

The New Hacker's Dictionary, third edition

The New Hacker's Dictionary, third edition
Author: Eric S. Raymond
Publisher: MIT Press
Total Pages: 588
Release: 1996-10-11
Genre: Computers
ISBN: 9780262680929

This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. This new edition of the hacker's own phenomenally successful lexicon includes more than 100 new entries and updates or revises 200 more. Historically and etymologically richer than its predecessor, it supplies additional background on existing entries and clarifies the murky origins of several important jargon terms (overturning a few long-standing folk etymologies) while still retaining its high giggle value. Sample definition hacker n. [originally, someone who makes furniture with an axe] 1. A person who enjoys exploring the details of programmable systems and how to stretch their capabilities, as opposed to most users, who prefer to learn only the minimum necessary. 2. One who programs enthusiastically (even obsessively) or who enjoys programming rather than just theorizing about programming. 3. A person capable of appreciating {hack value}. 4. A person who is good at programming quickly. 5. An expert at a particular program, or one who frequently does work using it or on it; as in `a UNIX hacker'. (Definitions 1 through 5 are correlated, and people who fit them congregate.) 6. An expert or enthusiast of any kind. One might be an astronomy hacker, for example. 7. One who enjoys the intellectual challenge of creatively overcoming or circumventing limitations. 8. [deprecated] A malicious meddler who tries to discover sensitive information by poking around. Hence `password hacker', `network hacker'. The correct term is {cracker}. The term 'hacker' also tends to connote membership in the global community defined by the net (see {network, the} and {Internet address}). It also implies that the person described is seen to subscribe to some version of the hacker ethic (see {hacker ethic, the}). It is better to be described as a hacker by others than to describe oneself that way. Hackers consider themselves something of an elite (a meritocracy based on ability), though one to which new members are gladly welcome. There is thus a certain ego satisfaction to be had in identifying yourself as a hacker (but if you claim to be one and are not, you'll quickly be labeled {bogus}). See also {wannabee}.