Off-topic > General Gaming

Books to help RPG player's

(1/6) > >>

Here a few books to help RPG player's get in to roles like police officers, Criminals and so on

If anyone can find any other books that would help players just post it here. If any one can find a book on how hitmen work it would be great.

Body Trauma: A Writer's Guide to Wounds and Injuries
This is a great book to show how Injuries to character would effect them.

HowDunit - The Book of Poisons

Even though shadowrun has different poisons this book could help you understand how poisons effect's people. 

Police Procedure & Investigation: A Guide for Writers
Great book on how police handle investigations. To help GM and players know how they might be found out by seeing how lone star works to find them,

Howdunit Forensics
This book gives you information on how forensics work so you can know how to really erase your tracks.

Missing Persons (Howdunit Writing)
With Missing Persons in hand you'll find the types that commonly become PIs - ex-cops, macho criminal wannabes, reporters; the easiest people to find (men, property owners and professionals) and the hardest (women, scoundrels and those with common names); profiles of the missing and profiles of those searching; how and why people hide

Howdunit: How Crimes Are Committed and Solved
The ultimate reference on the dark world of criminals and those who oppose them! Readers will learn how crimes are plotted, committed, investigated and solved. This hefty reference includes chapters from nine of the books in the "Howdunit" crime series, as well as thirteen new chapters on key topics, such as property crime, gangs and the drug trade. Boertlein also offers a huge glossary of crime words and phrases, plenty of photographs.

Rip-Off: A Writer's Guide to Crimes of Deception (Howdunit Writing)

Some books for Matrix Hackers and Shadowrun teams giving Idea's how to break in to a place.

This books is great for giving matrix hackers idea's how to break in to places or cyber attacks.
Stealing the Network: The Complete Series Collector's Edition
"Stealing the Network: How to Own the Box is a unique book in the fiction department. It combines stories that are fictional, with technology that is real. While none of the stories have happened, there is no reason why they could not. You could argue it provides a road map for criminal hackers, but I say it does something else: it provides a glimpse into the creative minds of some of today's best hackers, and even the best hackers will tell you that the game is a mental one." - from the Foreword to the first Stealing the Network book, How to Own the Box, Jeff Moss, Founder & Director, Black Hat, Inc. and Founder of DEFCON

For the very first time the complete Stealing the Network epic is available in an enormous, over 1000 page volume complete with the final chapter of the saga and a DVD filled with behind the scenes video footage!

These groundbreaking books created a fictional world of hacker superheroes and villains based on real world technology, tools, and tactics. It is almost as if the authors peered into the future as many of the techniques and scenarios in these books have come to pass.

This book gives you more ways to getting in to place tactical idea's for breaking in.
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen testing methods out the window for now and see how thinking and acting like a ninja can actually grant you quicker and more complete access to a company's assets. Get in before the hacker does with these unorthodox techniques. Use all of the tools that the ninja has: disguise, espionage, stealth, and concealment. Learn how to benefit from these tools by laying your plans, impersonating employees, infiltrating via alarm system evasion, discovering weak points and timing, spyware and keylogging software, and log manipulation and logic bombs. And, really, don't you want to be a ninja for a day just because they're cool? Let this book be your excuse!

* Discusses techniques used by malicious attackers in real-world situations

* Details unorthodox penetration testing techniques by getting inside the mind of a ninja

* Expands upon current penetration testing methodologies including new tactics for hardware and physical attacks

Unauthorised Access: Physical Penetration Testing For IT Security Teams
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security.

Featuring a Foreword written by world-renowned hacker Kevin D. Mitnick and lead author of The Art of Intrusion and The Art of Deception, this book is the first guide to planning and performing a physical penetration test. Inside, IT security expert Wil Allsopp guides you through the entire process from gathering intelligence, getting inside, dealing with threats, staying hidden (often in plain sight), and getting access to networks and data.

Low Tech Hacking: Street Smarts for Security Professionals

These are great - thank you.

No problem if you find any other books that would be great :)

Actually, think we could get this pinned? It really is a great reading list.


--- Quote from: JustADude on ---Actually, think we could get this pinned? It really is a great reading list.

--- End quote ---

Concur, FastJack, could you please pin this topic?



[0] Message Index

[#] Next page

Go to full version