Sloppy Tiger Bedtime


Book Description




My Sloppy Tiger


Book Description




Sloppy Tiger School/SSN/J


Book Description




Tales from the Pit


Book Description

Dealing in a casino presents challenges and rewards not seen in many workplaces. With hundreds of thousands of dollars at stake every minute, table games pits are high-stress workplaces. Managing a workforce of dealers and attending to the needs of players brings stresses of its own. In 2015, the University of Nevada, Las Vegas's Center for Gaming Research received a grant from the UNLV University Libraries Advisory Board that enabled it to undertake an oral history project intended to capture the stories of table games managers, including both those currently working in the field and those who have retired. Drawn from these interviews, Tales from the Pit provides an overview of how the interviewees felt about a variety of topics, ranging from their experiences breaking in as new dealers to their transitions to management and the changes the industry has seen over their careers. The current and former managers speak candidly about the owners, bosses, dealers, and players who made each day challenging. This book illuminates the past several decades of casino history through the words of those who lived and made it.




The Spy's Son


Book Description

The true account of the Nicholsons, the father and son who sold national secrets to Russia. “One of the strangest spy stories in American history” (Robert Lindsey, author of The Falcon and the Snowman). Investigative reporter and Pulitzer Prize finalist Bryan Denson tells the riveting story of the father and son co-conspirators who betrayed the United States. Jim Nicholson was one of the CIA’s top veteran case officers. By day, he taught spycraft at the CIA’s clandestine training center, The Farm. By night, he was a minivan-driving single father racing home to have dinner with his kids. But Nicholson led a double life. For more than two years, he had met covertly with agents of Russia’s foreign intelligence service and turned over troves of classified documents. In 1997, Nicholson became the highest-ranking CIA officer ever convicted of espionage. But his duplicity didn’t stop there. While behind the bars of a federal prison, the former mole systematically groomed the one person he trusted most to serve as his stand-in: his youngest son, Nathan. When asked to smuggle messages out of prison to Russian contacts, Nathan saw an opportunity to be heroic and to make his father proud. “Filled with fascinating details of the cloak-and-dagger techniques of KGB and CIA operatives, double agents, and spy catchers . . . A poignant and painful tale of family love, loyalty, manipulation and betrayal.” —The Oregonian




Gray Hat Hacking: The Ethical Hacker's Handbook, Fifth Edition


Book Description

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to exploit Windows and Linux software •Bypass Windows Access Control and memory protection schemes •Exploit web applications with Padding Oracle Attacks •Learn the use-after-free technique used in recent zero days •Hijack web browsers with advanced XSS attacks •Understand ransomware and how it takes control of your desktop •Dissect Android malware with JEB and DAD decompilers •Find one-day vulnerabilities with binary diffing •Exploit wireless systems with Software Defined Radios (SDR) •Exploit Internet of things devices •Dissect and exploit embedded devices •Understand bug bounty programs •Deploy next-generation honeypots •Dissect ATM malware and analyze common ATM attacks •Learn the business side of ethical hacking




The Book of Lilith


Book Description

"The book of Lilith tells the real story of creation. Lilith is the first human to be given a soul by God following a thirteen billion year process of mechanical, soulless evolution. Her job is to give souls to all things and awaken them to the Watcher that watches the watcher, watching the world. The first person she grants a soul to is Adam, who is given a job of his own: to invent the definition of sin, create a moral sense in a world that utterly lacks one, and hence bring about the rule of law in a compassionate society. Unfortunately, Adam has a hard time accepting the fact that he was given his soul second, instead of first, and by Lilith, not God. The conflict this engenders leads to the destruction of Eden, the creation of Eve, and a voyage of self-discovery that spans a world"--P. [4] of cover.




Gray Hat Hacking, Second Edition


Book Description

"A fantastic book for anyone looking to learn the tools and techniques needed to break in and stay in." --Bruce Potter, Founder, The Shmoo Group "Very highly recommended whether you are a seasoned professional or just starting out in the security business." --Simple Nomad, Hacker