YOU HAVE TO OWN THIS BOOK! Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code takes an unflinching, no bulls$ look at behavioral problems in the software engineering industry, shedding much-needed light on the social forces that make it difficult for programmers to do their job[...]
While forensic analysis has proven to be a valuable investigative tool in the field of computer security, utilizing anti-forensic technology makes it possible to maintain a covert operational foothold for extended periods, even in a high-security environment. Adopting an approach that favors full di[...]
Software Exorcism: A Handbook for Debugging and Optimizing Legacy Code discusses sociological forces that make it difficult for a programmer to do their job. There are plenty of books that discuss how to debug, but these books fall short by mistaking a symptom for the illness.
This b[...]
While most readers chuckle at Dilbert, there are fiefdoms in the software industry that deviate only slightly from the madness of a comic strip. Truth is stranger than fiction, especially when it comes to the workplace. In Cube Farm, Bill Blunden describes his three years in Minnesota, performing re[...]
With The Growing Prevalence Of The Internet, Rootkit Technology Has Taken Center Stage In The Battle Between White Hats And Black Hats. Adopting An Approach That Favors Full Disclosure, The Rootkit Arsenal Presents The Most Accessible, Timely, And Complete Coverage Of Rootkit Technology. This Book C[...]
This book presents a data-driven message that exposes the cyberwar media campaign currently being disseminated by the Pentagon and its vast system of patronage networks. Noting that the American public is being coerced by a threat that has been blown out of proportion--much like the run-up to the Gu[...]