EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Hacking and Security

    Book Details:
  • Author : Rheinwerk Publishing, Inc
  • Publisher : Packt Publishing Ltd
  • Release : 2024-09-19
  • ISBN : 1836647344
  • Pages : 1144 pages

Download or read book Hacking and Security written by Rheinwerk Publishing, Inc and published by Packt Publishing Ltd. This book was released on 2024-09-19 with total page 1144 pages. Available in PDF, EPUB and Kindle. Book excerpt: Explore hacking methodologies, tools, and defensive measures with this practical guide that covers topics like penetration testing, IT forensics, and security risks. Key Features Extensive hands-on use of Kali Linux and security tools Practical focus on IT forensics, penetration testing, and exploit detection Step-by-step setup of secure environments using Metasploitable Book DescriptionThis book provides a comprehensive guide to cybersecurity, covering hacking techniques, tools, and defenses. It begins by introducing key concepts, distinguishing penetration testing from hacking, and explaining hacking tools and procedures. Early chapters focus on security fundamentals, such as attack vectors, intrusion detection, and forensic methods to secure IT systems. As the book progresses, readers explore topics like exploits, authentication, and the challenges of IPv6 security. It also examines the legal aspects of hacking, detailing laws on unauthorized access and negligent IT security. Readers are guided through installing and using Kali Linux for penetration testing, with practical examples of network scanning and exploiting vulnerabilities. Later sections cover a range of essential hacking tools, including Metasploit, OpenVAS, and Wireshark, with step-by-step instructions. The book also explores offline hacking methods, such as bypassing protections and resetting passwords, along with IT forensics techniques for analyzing digital traces and live data. Practical application is emphasized throughout, equipping readers with the skills needed to address real-world cybersecurity threats.What you will learn Master penetration testing Understand security vulnerabilities Apply forensics techniques Use Kali Linux for ethical hacking Identify zero-day exploits Secure IT systems Who this book is for This book is ideal for cybersecurity professionals, ethical hackers, IT administrators, and penetration testers. A basic understanding of network protocols, operating systems, and security principles is recommended for readers to benefit from this guide fully.

Book Mastering Defensive Security

Download or read book Mastering Defensive Security written by Cesar Bravo and published by Packt Publishing Ltd. This book was released on 2022-01-06 with total page 528 pages. Available in PDF, EPUB and Kindle. Book excerpt: An immersive learning experience enhanced with technical, hands-on labs to understand the concepts, methods, tools, platforms, and systems required to master the art of cybersecurity Key FeaturesGet hold of the best defensive security strategies and toolsDevelop a defensive security strategy at an enterprise levelGet hands-on with advanced cybersecurity threat detection, including XSS, SQL injections, brute forcing web applications, and moreBook Description Every organization has its own data and digital assets that need to be protected against an ever-growing threat landscape that compromises the availability, integrity, and confidentiality of crucial data. Therefore, it is important to train professionals in the latest defensive security skills and tools to secure them. Mastering Defensive Security provides you with in-depth knowledge of the latest cybersecurity threats along with the best tools and techniques needed to keep your infrastructure secure. The book begins by establishing a strong foundation of cybersecurity concepts and advances to explore the latest security technologies such as Wireshark, Damn Vulnerable Web App (DVWA), Burp Suite, OpenVAS, and Nmap, hardware threats such as a weaponized Raspberry Pi, and hardening techniques for Unix, Windows, web applications, and cloud infrastructures. As you make progress through the chapters, you'll get to grips with several advanced techniques such as malware analysis, security automation, computer forensics, and vulnerability assessment, which will help you to leverage pentesting for security. By the end of this book, you'll have become familiar with creating your own defensive security tools using IoT devices and developed advanced defensive security skills. What you will learnBecome well versed with concepts related to defensive securityDiscover strategies and tools to secure the most vulnerable factor – the userGet hands-on experience using and configuring the best security toolsUnderstand how to apply hardening techniques in Windows and Unix environmentsLeverage malware analysis and forensics to enhance your security strategySecure Internet of Things (IoT) implementationsEnhance the security of web applications and cloud deploymentsWho this book is for This book is for all IT professionals who want to take their first steps into the world of defensive security; from system admins and programmers to data analysts and data scientists with an interest in security. Experienced cybersecurity professionals working on broadening their knowledge and keeping up to date with the latest defensive developments will also find plenty of useful information in this book. You'll need a basic understanding of networking, IT, servers, virtualization, and cloud platforms before you get started with this book.

Book The Ultimate Kali Linux Book

Download or read book The Ultimate Kali Linux Book written by Glen D. Singh and published by Packt Publishing Ltd. This book was released on 2024-04-30 with total page 829 pages. Available in PDF, EPUB and Kindle. Book excerpt: Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratch Purchase of the print or Kindle book includes a free eBook in PDF format. Key Features Learn to think like an adversary to strengthen your cyber defences Execute sophisticated real-life penetration tests, uncovering vulnerabilities in enterprise networks that go beyond the surface level Securely manipulate environments using Kali Linux, ensuring you're fully equipped to safeguard your systems against real-world threats Book DescriptionEmbark on an exciting journey into the world of Kali Linux – the central hub for advanced penetration testing. Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks, Kali Linux empowers cybersecurity professionals. In its latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is designed for newcomers and those curious about penetration testing, this guide is your fast track to learning pentesting with Kali Linux 2024.x. Think of this book as your stepping stone into real-world situations that guides you through lab setups and core penetration testing concepts. As you progress in the book you’ll explore the toolkit of vulnerability assessment tools in Kali Linux, where gathering information takes the spotlight. You'll learn how to find target systems, uncover device security issues, exploit network weaknesses, control operations, and even test web applications. The journey ends with understanding complex web application testing techniques, along with industry best practices. As you finish this captivating exploration of the Kali Linux book, you'll be ready to tackle advanced enterprise network testing – with newfound skills and confidence.What you will learn Establish a firm foundation in ethical hacking Install and configure Kali Linux 2024.1 Build a penetration testing lab environment and perform vulnerability assessments Understand the various approaches a penetration tester can undertake for an assessment Gathering information from Open Source Intelligence (OSINT) data sources Use Nmap to discover security weakness on a target system on a network Implement advanced wireless pentesting techniques Become well-versed with exploiting vulnerable web applications Who this book is for This pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux, then this book is for you.

Book Go H ck Yourself

    Book Details:
  • Author : Bryson Payne
  • Publisher : No Starch Press
  • Release : 2022-01-18
  • ISBN : 171850201X
  • Pages : 185 pages

Download or read book Go H ck Yourself written by Bryson Payne and published by No Starch Press. This book was released on 2022-01-18 with total page 185 pages. Available in PDF, EPUB and Kindle. Book excerpt: Learn firsthand just how easy a cyberattack can be. Go Hack Yourself is an eye-opening, hands-on introduction to the world of hacking, from an award-winning cybersecurity coach. As you perform common attacks against yourself, you’ll be shocked by how easy they are to carry out—and realize just how vulnerable most people really are. You’ll be guided through setting up a virtual hacking lab so you can safely try out attacks without putting yourself or others at risk. Then step-by-step instructions will walk you through executing every major type of attack, including physical access hacks, Google hacking and reconnaissance, social engineering and phishing, malware, password cracking, web hacking, and phone hacking. You’ll even hack a virtual car! You’ll experience each hack from the point of view of both the attacker and the target. Most importantly, every hack is grounded in real-life examples and paired with practical cyber defense tips, so you’ll understand how to guard against the hacks you perform. You’ll learn: How to practice hacking within a safe, virtual environment How to use popular hacking tools the way real hackers do, like Kali Linux, Metasploit, and John the Ripper How to infect devices with malware, steal and crack passwords, phish for sensitive information, and more How to use hacking skills for good, such as to access files on an old laptop when you can’t remember the password Valuable strategies for protecting yourself from cyber attacks You can’t truly understand cyber threats or defend against them until you’ve experienced them firsthand. By hacking yourself before the bad guys do, you’ll gain the knowledge you need to keep you and your loved ones safe.

Book Hacker Culture A to Z

    Book Details:
  • Author : Kim Crawley
  • Publisher : "O'Reilly Media, Inc."
  • Release : 2023-11-06
  • ISBN : 1098145631
  • Pages : 291 pages

Download or read book Hacker Culture A to Z written by Kim Crawley and published by "O'Reilly Media, Inc.". This book was released on 2023-11-06 with total page 291 pages. Available in PDF, EPUB and Kindle. Book excerpt: Hacker culture can be esoteric, but this entertaining reference is here to help. Written by longtime cybersecurity researcher and writer Kim Crawley, this fun reference introduces you to key people and companies, fundamental ideas, and milestone films, games, and magazines in the annals of hacking. From airgapping to phreaking to zombie malware, grasping the terminology is crucial to understanding hacker culture and history. If you're just getting started on your hacker journey, you'll find plenty here to guide your learning and help you understand the references and cultural allusions you come across. More experienced hackers will find historical depth, wry humor, and surprising facts about familiar cultural touchstones. Understand the relationship between hacker culture and cybersecurity Get to know the ideas behind the hacker ethos, like "knowledge should be free" Explore topics and publications central to hacker culture, including 2600 Magazine Appreciate the history of cybersecurity Learn about key figures in the history of hacker culture Understand the difference between hackers and cybercriminals

Book Information Security Management

Download or read book Information Security Management written by Michael Workman and published by Jones & Bartlett Learning. This book was released on 2021-10-29 with total page 468 pages. Available in PDF, EPUB and Kindle. Book excerpt: Revised edition of: Information security for managers.

Book Ethical Hacking

    Book Details:
  • Author : Daniel G. Graham
  • Publisher : No Starch Press
  • Release : 2021-11-02
  • ISBN : 1718501870
  • Pages : 378 pages

Download or read book Ethical Hacking written by Daniel G. Graham and published by No Starch Press. This book was released on 2021-11-02 with total page 378 pages. Available in PDF, EPUB and Kindle. Book excerpt: A hands-on guide to hacking computer systems from the ground up, from capturing traffic to crafting sneaky, successful trojans. A crash course in modern hacking techniques, Ethical Hacking is already being used to prepare the next generation of offensive security experts. In its many hands-on labs, you’ll explore crucial skills for any aspiring penetration tester, security researcher, or malware analyst. You’ll begin with the basics: capturing a victim’s network traffic with an ARP spoofing attack and then viewing it in Wireshark. From there, you’ll deploy reverse shells that let you remotely run commands on a victim’s computer, encrypt files by writing your own ransomware in Python, and fake emails like the ones used in phishing attacks. In advanced chapters, you’ll learn how to fuzz for new vulnerabilities, craft trojans and rootkits, exploit websites with SQL injection, and escalate your privileges to extract credentials, which you’ll use to traverse a private network. You’ll work with a wide range of professional penetration testing tools—and learn to write your own tools in Python—as you practice tasks like: Deploying the Metasploit framework’s reverse shells and embedding them in innocent-seeming files Capturing passwords in a corporate Windows network using Mimikatz Scanning (almost) every device on the internet to find potential victims Installing Linux rootkits that modify a victim’s operating system Performing advanced Cross-Site Scripting (XSS) attacks that execute sophisticated JavaScript payloads Along the way, you’ll gain a foundation in the relevant computing technologies. Discover how advanced fuzzers work behind the scenes, learn how internet traffic gets encrypted, explore the inner mechanisms of nation-state malware like Drovorub, and much more. Developed with feedback from cybersecurity students, Ethical Hacking addresses contemporary issues in the field not often covered in other books and will prepare you for a career in penetration testing. Most importantly, you’ll be able to think like an ethical hacker⁠: someone who can carefully analyze systems and creatively gain access to them.

Book House on Fire

    Book Details:
  • Author : Joseph Finder
  • Publisher : Penguin
  • Release : 2020-01-21
  • ISBN : 1101985852
  • Pages : 384 pages

Download or read book House on Fire written by Joseph Finder and published by Penguin. This book was released on 2020-01-21 with total page 384 pages. Available in PDF, EPUB and Kindle. Book excerpt: In New York Times bestselling author Joseph Finder's electrifying new thriller, private investigator Nick Heller infiltrates a powerful wealthy family hiding something sinister. Nick Heller is at the top of his game when he receives some devastating news: his old army buddy Sean has died of an overdose. Sean, who once saved Nick’s life, got addicted to opioids after returning home wounded from war. Then at Sean’s funeral, a stranger approaches Nick with a job, and maybe also a way for Nick to hold someone accountable. The woman is the daughter of a pharmaceutical kingpin worth billions. Now she wants to become a whistleblower, exposing her father and his company for burying evidence that its biggest money-maker was dangerously addictive. It was a lie that killed hundreds of thousands of people, including Sean. All Nick has to do is find the document that proves the family knew the drug’s dangers. But Nick soon realizes that the sins of the patriarch are just the beginning. Beneath the surface are barely concealed cabals and conspiracies: a twisting story of family intrigue and lethal corporate machinations. In a deadly game of chess that pits Nick against a family dynasty, against brothers and sisters with schemes of their own, Nick learns how far his enemy is willing to go to protect its name and its wealth.

Book AI Driven Digital Twin and Industry 4 0

Download or read book AI Driven Digital Twin and Industry 4 0 written by Sita Rani and published by CRC Press. This book was released on 2024-06-19 with total page 339 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book presents the role of AI-Driven Digital Twin in the Industry 4.0 ecosystem by focusing on Smart Manufacturing, sustainable development, and many other applications. It also discusses different case studies and presents an in-depth understanding of the benefits and limitations of using AI and Digital Twin for industrial developments. AI-Driven Digital Twin and Industry 4.0: A Conceptual Framework with Applications introduces the role of Digital Twin in Smart Manufacturing and focuses on the Digital Twin framework throughout. It provides a summary of the various AI applications in the Industry 4.0 environment and emphasizes the role of advanced computational and communication technologies. The book offers demonstrative examples of AI-Driven Digital Twin in various application domains and includes AI techniques used to analyze the environmental impact of industrial operations along with examples. The book reviews the major challenges in the deployment of AI-Driven Digital Twin in the Industry 4.0 ecosystem and presents an understanding of how AI is used in the designing of Digital Twin for various applications. The book also enables familiarity with various industrial applications of computational and communication technologies and summarizes the ongoing research and innovations in the areas of AI, Digital Twin, and Smart Manufacturing while also tracking the various research challenges along with future advances. This reference book is a must-read and is very beneficial to students, researchers, academicians, industry experts, and professionals working in related fields.

Book Hacking with Kali Linux   When you don t know sh t

Download or read book Hacking with Kali Linux When you don t know sh t written by Lyron Foster and published by Career Kick Start Books, LLC. This book was released on 2023-03-02 with total page 146 pages. Available in PDF, EPUB and Kindle. Book excerpt: Hacking with Kali Linux - When you don't know sh#t is a comprehensive guide to ethical hacking using the Kali Linux operating system. The book provides a detailed introduction to the basics of hacking and covers the tools and techniques used in ethical hacking. The book is written for individuals who are interested in learning about ethical hacking and have little to no experience with Kali Linux. It is also suitable for individuals who have experience with other operating systems and are interested in learning about Kali Linux. The book is divided into eight chapters, with each chapter focusing on a specific aspect of ethical hacking. The first chapter provides an introduction to hacking, its types, ethics, and legal implications, as well as an overview of Kali Linux tools for ethical hacking. The second chapter covers the downloading and installation of Kali Linux, as well as setting up virtual environments for hacking and basic configuration of Kali Linux. Chapters three and four cover information gathering, scanning for open ports and services, vulnerability scanning and exploitation using Kali Linux tools. Chapter five focuses on password cracking and wireless network hacking, including techniques for wireless network penetration testing. Chapter six covers advanced hacking techniques, including exploiting web applications, social engineering, evading detection, and staying anonymous. Chapter seven delves into forensics and analysis, including techniques for forensic analysis, using Kali Linux tools for forensic analysis, recovering data from a compromised system, and analysis of logs and event data. Finally, chapter eight covers building a secure network using Kali Linux tools, monitoring and protecting a network from attacks, and techniques for securing web applications and databases. Throughout the book, readers are provided with examples and hypothetical scenarios to help them understand and apply the concepts covered. By the end of the book, readers will have gained a comprehensive understanding of ethical hacking using Kali Linux and will be able to apply their knowledge in real-world situations.

Book Advances on Broad Band Wireless Computing  Communication and Applications

Download or read book Advances on Broad Band Wireless Computing Communication and Applications written by Leonard Barolli and published by Springer Nature. This book was released on 2019-10-18 with total page 905 pages. Available in PDF, EPUB and Kindle. Book excerpt: This proceedings book presents the latest research findings, innovative research results, methods and development techniques related to the emerging areas of broadband and wireless computing, from both theoretical and practical perspectives. Today’s information networks are going through a rapid evolution. Different kinds of networks with different characteristics are emerging, and are being integrated into heterogeneous networks. As a result, there are numerous interconnection problems that can occur at different levels of the hardware and software design of communicating entities and communication networks. Such networks need to manage an increasing usage demand, provide support for a significant number of services, guarantee their QoS, and optimize the network resources. The success of all-IP networking and wireless technology has changed the way of living for people around the globe. Advances in electronic integration and wireless communications will pave the way to offering access to wireless networks on the fly, which in turn will allow electronic devices to share information with each other wherever and whenever necessary.

Book Cybersecurity Attacks     Red Team Strategies

Download or read book Cybersecurity Attacks Red Team Strategies written by Johann Rehberger and published by Packt Publishing Ltd. This book was released on 2020-03-31 with total page 525 pages. Available in PDF, EPUB and Kindle. Book excerpt: Develop your red team skills by learning essential foundational tactics, techniques, and procedures, and boost the overall security posture of your organization by leveraging the homefield advantage Key FeaturesBuild, manage, and measure an offensive red team programLeverage the homefield advantage to stay ahead of your adversariesUnderstand core adversarial tactics and techniques, and protect pentesters and pentesting assetsBook Description It's now more important than ever for organizations to be ready to detect and respond to security events and breaches. Preventive measures alone are not enough for dealing with adversaries. A well-rounded prevention, detection, and response program is required. This book will guide you through the stages of building a red team program, including strategies and homefield advantage opportunities to boost security. The book starts by guiding you through establishing, managing, and measuring a red team program, including effective ways for sharing results and findings to raise awareness. Gradually, you'll learn about progressive operations such as cryptocurrency mining, focused privacy testing, targeting telemetry, and even blue team tooling. Later, you'll discover knowledge graphs and how to build them, then become well-versed with basic to advanced techniques related to hunting for credentials, and learn to automate Microsoft Office and browsers to your advantage. Finally, you'll get to grips with protecting assets using decoys, auditing, and alerting with examples for major operating systems. By the end of this book, you'll have learned how to build, manage, and measure a red team program effectively and be well-versed with the fundamental operational techniques required to enhance your existing skills. What you will learnUnderstand the risks associated with security breachesImplement strategies for building an effective penetration testing teamMap out the homefield using knowledge graphsHunt credentials using indexing and other practical techniquesGain blue team tooling insights to enhance your red team skillsCommunicate results and influence decision makers with appropriate dataWho this book is for This is one of the few detailed cybersecurity books for penetration testers, cybersecurity analysts, security leaders and strategists, as well as red team members and chief information security officers (CISOs) looking to secure their organizations from adversaries. The program management part of this book will also be useful for beginners in the cybersecurity domain. To get the most out of this book, some penetration testing experience, and software engineering and debugging skills are necessary.

Book The Multiversity Deluxe Edition

Download or read book The Multiversity Deluxe Edition written by Grant Morrison and published by DC Comics. This book was released on 2015-10-27 with total page 484 pages. Available in PDF, EPUB and Kindle. Book excerpt: The biggest adventure in DC's history is here! Join visionary writer Grant Morrison, today's most talented artists, and a cast of unforgettable heroes from 52 alternative Earths of the DC Multiverse! Prepare to meet the Vampire League of Earth-43, the Justice Riders of Earth-18, Superdemon, Doc Fate, the super-sons of Superman and Batman, the rampaging Retaliators of Earth-8, the Atomic Knights of Justice, Dino-Cop, Sister Miracle, Lady Quark and the latest, greatest Super Hero of Earth-Prime: YOU! THE MULTIVERSITY is more than a multipart comic book series. It's a cosmos spanning, soul-shaking experience that puts YOU on the frontline in the battle for all creation against the demonic destroyers known as the Gentry! Featuring artwork by Ivan Reis (JUSTICE LEAGUE), Frank Quitely (ALL-STAR SUPERMAN), Cameron Stewart (BATGIRL) and many others, THE MULTIVERSITY tells an epic tale that span 52 Earths. Collects THE MULTIVERSITY #1 and 2, THE MULTIVERSITY GUIDEBOOK #1 and MULTIVERSITY issues: THE SOCIETY OF SUPER-HEROES #1, THE JUST #1, PAX AMERICANA #1, THUNDERWORLD #1, MASTERMEN #1 and ULTRA COMICS #1.

Book Call Me Mummy

    Book Details:
  • Author : Tina Baker
  • Publisher : Serpent's Tail
  • Release : 2021-02-25
  • ISBN : 1782837035
  • Pages : 339 pages

Download or read book Call Me Mummy written by Tina Baker and published by Serpent's Tail. This book was released on 2021-02-25 with total page 339 pages. Available in PDF, EPUB and Kindle. Book excerpt: 'Dark, heartbreaking and totally absorbing' - LORRAINE KELLY 'Brilliantly written and emotionally compulsive' - HARRIET TYCE 'A powerful and thought-provoking page turner' - KATERINA DIAMOND CALL ME MUMMY. IT'LL BE BETTER IF YOU DO. Glamorous, beautiful Mummy has everything a woman could want. Except for a daughter of her very own. So when she sees Kim - heavily pregnant, glued to her phone and ignoring her eldest child in a busy shop - she does what anyone would do. She takes her. But foul-mouthed little Tonya is not the daughter that Mummy was hoping for. As Tonya fiercely resists Mummy's attempts to make her into the perfect child, Kim is demonised by the media as a 'scummy mummy', who deserves to have her other children taken too. Haunted by memories of her own childhood and refusing to play by the media's rules, Kim begins to spiral, turning on those who love her. Though they are worlds apart, Mummy and Kim have more in common than they could possibly imagine. But it is five-year-old Tonya who is caught in the middle... ________________________________________ *** A NETGALLEY BOOK OF THE MONTH *** 'Disturbing and distinctive, this is a book I couldn't put down' - AMANDA JENNINGS 'Tense and gripping, these characters will stay with me' - ALICE CLARK-PLATTS 'Psychologically twisty and utterly gripping' - LISA HALL

Book Bash Bunny

    Book Details:
  • Author : Darren Kitchen
  • Publisher :
  • Release : 2017-11-23
  • ISBN : 9780998373232
  • Pages : pages

Download or read book Bash Bunny written by Darren Kitchen and published by . This book was released on 2017-11-23 with total page pages. Available in PDF, EPUB and Kindle. Book excerpt:

Book Crossroads

    Book Details:
  • Author : Louise Carus Mahdi
  • Publisher : Open Court Publishing
  • Release : 1996
  • ISBN : 9780812691900
  • Pages : 494 pages

Download or read book Crossroads written by Louise Carus Mahdi and published by Open Court Publishing. This book was released on 1996 with total page 494 pages. Available in PDF, EPUB and Kindle. Book excerpt: Thinkers and activists from many orientations and traditions are now coming together to explore ways to reconstitute rites of passage as a form of community healing for our public and personal ills. Crossroads is a comprehensive collection of over fifty cutting-edge writings on diverse aspects of the transition to adulthood. "In no uncertain terms, Crossroads opens our eyes to our responsibility to the adolescents who are now growing up without sacred rituals and hence without knowledge of spiritual roots in their culture. Many of the writers have first-hand experience and first-rate ideas of how to transform this cultural crisis. Crossroads also challenges us to integrate our own inner adolescent. Piercing insight with realistic hope " -- Marlon Woodman The Ravaged Bridegroom

Book Overexposed

    Book Details:
  • Author : Susan Shapiro
  • Publisher : Macmillan
  • Release : 2010-08-03
  • ISBN : 1429937998
  • Pages : 318 pages

Download or read book Overexposed written by Susan Shapiro and published by Macmillan. This book was released on 2010-08-03 with total page 318 pages. Available in PDF, EPUB and Kindle. Book excerpt: Edgy Manhattan shutterbug Rachel Solomon can't wait to escape her difficult Midwestern Jewish family of doctors—and her crazy, condescending WASP friend and photography mentor, Elizabeth Mann. Not so easy when Elizabeth marries Rachel's surgeon-brother, moves to the Midwest, and becomes the daughter Rachel's mother always wanted—one who pops out four babies in a row, who are named after Rachel's dead Yiddish-speaking relatives. Although Rachel long ago rejected the suburban female role, she's shocked to find she's been replaced. With unsparing candor, sparkling emotional insights, and hilarity, the girl who cut herself out of old photographs now has to fight her way back into the Solomons' photo albums, homes, and hearts. From the author of the hilarious fictional debut Speed Shrinking—which became an international phenomenon—and the acclaimed memoir of past passion Five Men Who Broke My Heart comes a new book that blows the lid off of the secrets of female friendship. Based on a true story, Susan Shapiro's darkly comic novel Overexposed chronicles the brilliantly twisted tale of two strong women who wind up switching lives.