The Doom Hacker's Guide


Book Description

Teaching tricks and techniques for customizing the DOOM environment, a definitive guide covers DOOM and DOOM II, explains IWADs and PWADs, explores DEU, DMAUD, DMMUSIC, DMGRAPH, and DeHackEd, and discusses creating levels for one player and multiplayer games. Original. (Beginner).




A Practical Guide to Digital Forensics Investigations


Book Description

THE DEFINITIVE GUIDE TO DIGITAL FORENSICS—NOW THOROUGHLY UPDATED WITH NEW TECHNIQUES, TOOLS, AND SOLUTIONS Complete, practical coverage of both technical and investigative skills Thoroughly covers modern devices, networks, and the Internet Addresses online and lab investigations, documentation, admissibility, and more Aligns closely with the NSA Knowledge Units and the NICE Cybersecurity Workforce Framework As digital crime soars, so does the need for experts who can recover and evaluate evidence for successful prosecution. Now, Dr. Darren Hayes has thoroughly updated his definitive guide to digital forensics investigations, reflecting current best practices for securely seizing, extracting and analyzing digital evidence, protecting the integrity of the chain of custody, effectively documenting investigations, and scrupulously adhering to the law, so that your evidence is admissible in court. Every chapter of this new Second Edition is revised to reflect newer technologies, the latest challenges, technical solutions, and recent court decisions. Hayes has added detailed coverage of wearable technologies, IoT forensics, 5G communications, vehicle forensics, and mobile app examinations; advances in incident response; and new iPhone and Android device examination techniques. Through practical activities, realistic examples, and fascinating case studies, you'll build hands-on mastery—and prepare to succeed in one of today's fastest-growing fields. LEARN HOW TO Understand what digital forensics examiners do, the evidence they work with, and the opportunities available to them Explore how modern device features affect evidence gathering, and use diverse tools to investigate them Establish a certified forensics lab and implement best practices for managing and processing evidence Gather data online to investigate today's complex crimes Uncover indicators of compromise and master best practices for incident response Investigate financial fraud with digital evidence Use digital photographic evidence, including metadata and social media images Investigate wearable technologies and other “Internet of Things” devices Learn new ways to extract a full fi le system image from many iPhones Capture extensive data and real-time intelligence from popular apps Follow strict rules to make evidence admissible, even after recent Supreme Court decisions




The Masters of Deception


Book Description

The bestselling account of a band of kids from New York who fought an electronic turf war that ranged across some of the nation's most powerful computer systems. "An immensely fun and -- one cannot emphasize this enough -- accessible history of the first outlaws in cyberspace."--Glamour




Masters of Doom


Book Description

Masters of Doom is the amazing true story of the Lennon and McCartney of video games: John Carmack and John Romero. Together, they ruled big business. They transformed popular culture. And they provoked a national controversy. More than anything, they lived a unique and rollicking American Dream, escaping the broken homes of their youth to co-create the most notoriously successful game franchises in history—Doom and Quake—until the games they made tore them apart. Americans spend more money on video games than on movie tickets. Masters of Doom is the first book to chronicle this industry’s greatest story, written by one of the medium’s leading observers. David Kushner takes readers inside the rags-to-riches adventure of two rebellious entrepreneurs who came of age to shape a generation. The vivid portrait reveals why their games are so violent and why their immersion in their brilliantly designed fantasy worlds offered them solace. And it shows how they channeled their fury and imagination into products that are a formative influence on our culture, from MTV to the Internet to Columbine. This is a story of friendship and betrayal, commerce and artistry—a powerful and compassionate account of what it’s like to be young, driven, and wildly creative. “To my taste, the greatest American myth of cosmogenesis features the maladjusted, antisocial, genius teenage boy who, in the insular laboratory of his own bedroom, invents the universe from scratch. Masters of Doom is a particularly inspired rendition. Dave Kushner chronicles the saga of video game virtuosi Carmack and Romero with terrific brio. This is a page-turning, mythopoeic cyber-soap opera about two glamorous geek geniuses—and it should be read while scarfing down pepperoni pizza and swilling Diet Coke, with Queens of the Stone Age cranked up all the way.”—Mark Leyner, author of I Smell Esther Williams




A Practical Guide to Computer Forensics Investigations


Book Description

A Practical Guide to Computer Forensics Investigations introduces the newest technologies along with detailed information on how the evidence contained on these devices should be analyzed. Packed with practical, hands-on activities, students will learn unique subjects from chapters including Mac Forensics, Mobile Forensics, Cyberbullying, and Child Endangerment. This well-developed book will prepare students for the rapidly-growing field of computer forensics for a career with law enforcement, accounting firms, banks and credit card companies, private investigation companies, or government agencies.




Masters of Doom


Book Description

Masters of Doom is the amazing true story of the Lennon and McCartney of video games: John Carmack and John Romero. Together, they ruled big business. They transformed popular culture. And they provoked a national controversy. More than anything, they lived a unique and rollicking American Dream, escaping the broken homes of their youth to co-create the most notoriously successful game franchises in history—Doom and Quake—until the games they made tore them apart. Americans spend more money on video games than on movie tickets. Masters of Doom is the first book to chronicle this industry’s greatest story, written by one of the medium’s leading observers. David Kushner takes readers inside the rags-to-riches adventure of two rebellious entrepreneurs who came of age to shape a generation. The vivid portrait reveals why their games are so violent and why their immersion in their brilliantly designed fantasy worlds offered them solace. And it shows how they channeled their fury and imagination into products that are a formative influence on our culture, from MTV to the Internet to Columbine. This is a story of friendship and betrayal, commerce and artistry—a powerful and compassionate account of what it’s like to be young, driven, and wildly creative. “To my taste, the greatest American myth of cosmogenesis features the maladjusted, antisocial, genius teenage boy who, in the insular laboratory of his own bedroom, invents the universe from scratch. Masters of Doom is a particularly inspired rendition. Dave Kushner chronicles the saga of video game virtuosi Carmack and Romero with terrific brio. This is a page-turning, mythopoeic cyber-soap opera about two glamorous geek geniuses—and it should be read while scarfing down pepperoni pizza and swilling Diet Coke, with Queens of the Stone Age cranked up all the way.”—Mark Leyner, author of I Smell Esther Williams




Messing with the Enemy


Book Description

A former FBI Special Agent and leading cyber-security expert offers a devastating and essential look at the misinformation campaigns, fake news, and electronic espionage operations that have become the cutting edge of modern warfare—and how we can protect ourselves and our country against them. Clint Watts electrified the nation when he testified in front of the House Intelligence Committee regarding Russian interference in the 2016 election. In Messing with the Enemy, the cyber and homeland security expert introduces us to a frightening world in which terrorists and cyber criminals don’t hack your computer, they hack your mind. Watts reveals how these malefactors use your information and that of your friends and family to work for them through social media, which they use to map your social networks, scour your world affiliations, and master your fears and preferences. Thanks to the schemes engineered by social media manipulators using you and your information, business executives have coughed up millions in fraudulent wire transfers, seemingly good kids have joined the Islamic State, and staunch anti-communist Reagan Republicans have cheered the Russian government’s hacking of a Democratic presidential candidate’s e-mails. Watts knows how they do it because he’s mirrored their methods to understand their intentions, combat their actions, and coopt their efforts. Watts examines a particular social media platform—from Twitter to internet Forums to Facebook to LinkedIn—and a specific bad actor—from al Qaeda to the Islamic State to the Russian and Syrian governments—to illuminate exactly how social media tracking is used for nefarious purposes. He explains how he’s learned, through his successes and his failures, to engage with hackers, terrorists, and even the Russians—and how these interactions have generated methods of fighting back. Shocking, funny, and eye-opening, Messing with the Enemy is a deeply urgent guide for living safe and smart in a super-connected world.




Tricks of the Doom Programming Gurus


Book Description

This all-inclusive source for creating WAD, PWAD, and other files for use with DOOM covers the most popular utilities available. It also serves as a tutorial for creating a new world to play in DOOM. The CD contains all the utilities and programs necessary to customize and create new worlds for DOOM.




CISO's Guide to Penetration Testing


Book Description

CISO's Guide to Penetration Testing: A Framework to Plan, Manage, and Maximize Benefits details the methodologies, framework, and unwritten conventions penetration tests should cover to provide the most value to your organization and your customers. Discussing the process from both a consultative and technical perspective, it provides an overview o




The Car Hacker's Handbook


Book Description

Modern cars are more computerized than ever. Infotainment and navigation systems, Wi-Fi, automatic software updates, and other innovations aim to make driving more convenient. But vehicle technologies haven’t kept pace with today’s more hostile security environment, leaving millions vulnerable to attack. The Car Hacker’s Handbook will give you a deeper understanding of the computer systems and embedded software in modern vehicles. It begins by examining vulnerabilities and providing detailed explanations of communications over the CAN bus and between devices and systems. Then, once you have an understanding of a vehicle’s communication network, you’ll learn how to intercept data and perform specific hacks to track vehicles, unlock doors, glitch engines, flood communication, and more. With a focus on low-cost, open source hacking tools such as Metasploit, Wireshark, Kayak, can-utils, and ChipWhisperer, The Car Hacker’s Handbook will show you how to: –Build an accurate threat model for your vehicle –Reverse engineer the CAN bus to fake engine signals –Exploit vulnerabilities in diagnostic and data-logging systems –Hack the ECU and other firmware and embedded systems –Feed exploits through infotainment and vehicle-to-vehicle communication systems –Override factory settings with performance-tuning techniques –Build physical and virtual test benches to try out exploits safely If you’re curious about automotive security and have the urge to hack a two-ton computer, make The Car Hacker’s Handbook your first stop.