New Books @ EnggLib2 as of May 4, 2016


The art of software security assessment : identifying and preventing software vulnerabilities

Donated by: Mr. Johnson Apacible

Authors Mark Dowd, John McDonald, and Justin Schuh
Place of Publication Upper Saddle River, NJ
Date of Publication [2007]
Publisher Addison-Wesley

“There are a number of secure programming books on the market, but none that go as deep as this one. The depth and detail exceeds all books that I know about by an order of magnitude.”

—Halvar Flake, CEO and head of research, SABRE Security GmbH

The Definitive Insider’s Guide to Auditing Software Security

This is one of the most detailed, sophisticated, and useful guides to software security auditing ever written. The authors are leading security consultants and researchers who have personally uncovered vulnerabilities in applications ranging from sendmail to Microsoft Exchange, Check Point VPN to Internet Explorer. Drawing on their extraordinary experience, they introduce a start-to-finish methodology for “ripping apart” applications to reveal even the most subtle and well-hidden security flaws.

The Art of Software Security Assessment covers the full spectrum of software vulnerabilities in both UNIX/Linux and Windows environments. It demonstrates how to audit security in applications of all sizes and functions, including network and Web software. Moreover, it teaches using extensive examples of real code drawn from past flaws in many of the industry’s highest-profile applications.

Coverage includes

  • Code auditing: theory, practice, proven methodologies, and secrets of the trade
  • Bridging the gap between secure software design and post-implementation review
  • Performing architectural assessment: design review, threat modeling, and operational review
  • Identifying vulnerabilities related to memory management, data types, and malformed data
  • UNIX/Linux assessment: privileges, files, and processes
  • Windows-specific issues, including objects and the filesystem
  • Auditing interprocess communication, synchronization, and state
  • Evaluating network software: IP stacks, firewalls, and common application protocols
  • Auditing Web applications and technologies

This book is an unprecedented resource for everyone who must deliver secure software or assure the safety of existing software: consultants, security specialists, developers, QA staff, testers, and administrators alike.

Learning Python, Third edition

Donated by: Mr. Johnson Apacible

Author Mark Lutz
Place of Publication Sebastopol, CA
Date of Publication [2008]
Publisher O’Reilly Media, Inc.

Portable, powerful, and a breeze to use, Python is ideal for both standalone programs and scripting applications. With this hands-on book, you can master the fundamentals of the core Python language quickly and efficiently, whether you’re new to programming or just new to Python. Once you finish, you will know enough about the language to use it in any application domain you choose. Learning Python is based on material from author Mark Lutz’s popular training courses, which he’s taught over the past decade. Each chapter is a self-contained lesson that helps you thoroughly understand a key component of Python before you continue. Along with plenty of annotated examples, illustrations, and chapter summaries, every chapter also contains Brain Builder, a unique section with practical exercises and review quizzes that let you practice new skills and test your understanding as you go. This book covers: Types and Operations — Python’s major built-in object types in depth: numbers, lists, dictionaries, and more Statements and Syntax — the code you type to create and process objects in Python, along with Python’s general syntax model Functions — Python’s basic procedural tool for structuring and reusing code Modules — packages of statements, functions, and other tools organized into larger components Classes and OOP — Python’s optional object-oriented programming tool for structuring code for customization and reuse Exceptions and Tools — exception handling model and statements, plus a look at development tools for writing larger programs. Learning Python gives you a deep and complete understanding of the language that will help you comprehend any application-level examples of Python that you later encounter. If you’re ready to discover what Google and YouTube see in Python, this book is the best way to get started.

Information retrieval : algorithms and heuristics, Second edition

Donated by: Mr. Johnson Apacible

Authors David A. Grossman and Ophir Frieder
Place of Publication Dordrecht, The Netherlands
Date of Publication [2004]
Publisher Springer

Interested in how an efficient search engine works? Want to know what algorithms are used to rank resulting documents in response to user requests? The authors answer these and other key information retrieval design and implementation questions. This book is not yet another high level text. Instead, algorithms are thoroughly described, making this book ideally suited for both computer science students and practitioners who work on search-related applications. As stated in the foreword, this book provides a current, broad, and detailed overview of the field and is the only one that does so. Examples are used throughout to illustrate the algorithms. The authors explain how a query is ranked against a document collection using either a single or a combination of retrieval strategies, and how an assortment of utilities are integrated into the query processing scheme to improve these rankings. Methods for building and compressing text indexes, querying and retrieving documents in multiple languages, and using parallel or distributed processing to expedite the search are likewise described. This edition is a major expansion of the one published in 1998. Besides updating the entire book with current techniques, it includes new sections on language models, cross-language information retrieval, peer-to-peer processing, XML search, mediators, and duplicate document detection.

Introduction to automata theory, languages, and computation

Donated by: Mr. Johnson Apacible

Authors John E. Hopcroft, Jeffrey D. Ullman
Place of Publication Reading, Mass.
Date of Publication [1979]
Publisher Addison-Wesley Publishing Company

This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity. The authors present the theory in a concise and straightforward manner, with an eye out for the practical applications. Exercises at the end of each chapter, including some that have been solved, help readers confirm and enhance their understanding of the material. This book is appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments. (amazon review)

Tensor calculus and analytical dynamics

Donated by: Mr. Johnson Apacible

Author John G. Papastavridis
Place of Publication Boca Raton, Fla.
Date of Publication [1999]
Publisher CRC Press

Tensor Calculus and Analytical Dynamics provides a concise, comprehensive, and readable introduction to classical tensor calculus – in both holonomic and nonholonomic coordinates – as well as to its principal applications to the Lagrangean dynamics of discrete systems under positional or velocity constraints. The thrust of the book focuses on formal structure and basic geometrical/physical ideas underlying most general equations of motion of mechanical systems under linear velocity constraints.
Written for the theoretically minded engineer, Tensor Calculus and Analytical Dynamics contains uniquely accessbile treatments of such intricate topics as:

  • tensor calculus in nonholonomic variables
  • Pfaffian nonholonomic constraints
  • related integrability theory of Frobenius

The book enables readers to move quickly and confidently in any particular geometry-based area of theoretical or applied mechanics in either classical or modern form.

Customer intelligence : from data to dialogue

Donated by: Mr. Johnson Apacible

Author Sean Kelly
Place of Publication Chichester, West Sussex, England
Date of Publication [2006]
Publisher John Wiley & Sons Ltd

Developed from the authors’ experience working with firms seeking to build better business intelligence, Customer Intelligence is concerned with who will own and control information about customers and who will develop the best skills and capabilities to exploit it for competitive advantage. At its core, it attempts to explain why the “age of information” has failed to live up to its own hype of specialization, personalization over homogenization, and consistently satisfying customers.

Graphics gems II

Donated by: Mr. Johnson Apacible

Editor James Arvo
Place of Publication Boston
Date of Publication c1991
Publisher AP Professional

Graphics Gems II is a collection of articles shared by a diverse group of people that reflect ideas and approaches in graphics programming which can benefit other computer graphics programmers.

This volume presents techniques for doing well-known graphics operations faster or easier. The book contains chapters devoted to topics on two-dimensional and three-dimensional geometry and algorithms, image processing, frame buffer techniques, and ray tracing techniques. The radiosity approach, matrix techniques, and numerical and programming techniques are likewise discussed.

Graphics artists and computer programmers will find the book invaluable.

Leadership on the line : staying alive through the dangers of leading

Donated by: Mr. Johnson Apacible

Authors Ronald A. Heifetz, Marty Linsky
Place of Publication Boston
Date of Publication 2002
Publisher Harvard Business School Press

Named one of 100 Leadership & Success Books to Read in a Lifetime by Amazon Editors

To lead is to live dangerously. It’s romantic and exciting to think of leadership as all inspiration, decisive action, and rich rewards, but leading requires taking risks that can jeopardize your career and your personal life. It requires putting yourself on the line, disturbing the status quo, and surfacing hidden conflict. And when people resist and push back, there’s a strong temptation to play it safe. Those who choose to lead plunge in, take the risks, and sometimes get burned. But it doesn’t have to be that way say renowned leadership authorities Ronald Heifetz and Marty Linsky. In Leadership on the Line, they show how it’s possible to make a difference without getting “taken out” or pushed aside. They present everyday tools that give equal weight to the dangerous work of leading change and the critical importance of personal survival. Through vivid stories from all walks of life, the authors present straightforward strategies for navigating the perilous straits of leadership. Whether parent or politician, CEO or community activist, this practical book shows how you can exercise leadership and survive and thrive to enjoy the fruits of your labor.

Perl 5 desktop reference

Donated by: Mr. Johnson Apacible

Author Johan Vromans
Place of Publication Cambridge
Date of Publication [1996]
Publisher O’Reilly & Associates Inc.

This “official” quick-reference guide to the Perl programming language has been enlarged to provide a summary of Perl syntax rules, a complete list of standard library modules with brief descriptions, and a precedence table for Perl operators. The guide is current with Perl version 5.003.Perl, having previously established itself as the UNIX scripting tool of choice, is establishing itself as the tool of choice in numerous programming spheres, ranging from the World Wide Web to general-purpose programming. Perl combines in one language virtually all the functionality of the C, sed, and awk programming languages, as well as many functions of a shell.The Perl 5 Desktop Reference provides a complete overview of Perl, from variables to input and output, from flow control to regular expressions — all packaged into a convenient, carry-around guide that can easily be inserted into your favorite Perl programming manual.

Anti-hacker tool kit

Donated by: Mr. Johnson Apacible

Authors Keith J. Jones, Mike Shema, Bradley C. Johnson
Place of Publication Berkeley, California
Date of Publication [2002]
Publisher McGraw-Hill/Osborne

Get in–depth details on the most effective security tools and learn how to use them with this hands-on resource. A must-have companion to the best-selling security book Hacking Exposed, this toolkit includes tips and configuration advice for getting the best results from the creators of the top hacking tools in use today.

Effective Perl programming : writing better programs with Perl

Donated by: Mr. Johnson Apacible

Authors Joseph N. Hall, with Randal L. Schwartz
Place of Publication Reading, Massachusetts
Date of Publication [1998]
Publisher Addison Wesley Longman, Inc.

Perl experts Joseph Hall and Randal Schwartz share sixty concise lessons, focusing on programming techniques, pointers, rules of thumb, and the pitfalls to avoid, enabling students to make the most of Perl’s power and capabilities. Through their advice, they help students develop a knack for the right ways to do things. They show how to solve problems with Perl, and how to debug and improve Perl programs. Through examples, they help you learn good Perl style. Geared for students who have already acquired Perl basics, the book will extend students’ skill range, giving them the tactics and deeper understanding they need to create Perl programs that are more elegant, effective, and succinct. The book also speaks to those who want to become more fluent, expressive, and individualistic Perl programmers. The author maintains a substantial companion website at


Donated by: Mr. Johnson Apacible

Author Iljitsch van Beijnum
Place of Publication Sebastopol, CA
Date of Publication [2002]
Publisher O’Reilly & Associates, Inc.

Border Gateway Protocol (BGP) is the routing protocol used to exchange routing information across the Internet. It makes it possible for ISPs to connect to each other and for end-users to connect to more than one ISP. BGP is the only protocol that is designed to deal with a network of the Internet’s size, and the only protocol that can deal well with having multiple connections to unrelated routing domains.This book is a guide to all aspects of BGP: the protocol, its configuration and operation in an Internet environment, and how to troubleshooting it. The book also describes how to secure BGP, and how BGP can be used as a tool in combating Distributed Denial of Service (DDoS) attacks. Although the examples throughout this book are for Cisco routers, the techniques discussed can be applied to any BGP-capable router.The topics include:

  • Requesting an AS number and IP addresses
  • Route filtering by remote ISPs and how to avoid this
  • Configuring the initial BGP setup
  • Balancing the available incoming or outgoing traffic over the available connections
  • Securing and troubleshooting BGP
  • BGP in larger networks: interaction with internal routing protocols, scalability issues
  • BGP in Internet Service Provider networks

The book is filled with numerous configuration examples with more complex case studies at the end of the book to strengthen your understanding. BGP is for anyone interested in creating reliable connectivity to the Internet.

Comments are closed.