Gray Hat Hacking The Ethical Hacker s Handbook Fifth Edition

Gray Hat Hacking  The Ethical Hacker s Handbook  Fifth Edition
Author: Daniel Regalado,Shon Harris,Allen Harper,Chris Eagle,Jonathan Ness,Branko Spasojevic,Ryan Linn,Stephen Sims
Publsiher: McGraw Hill Professional
Total Pages: 135
Release: 2018-04-05
ISBN: 1260108422
Category: Computers
Language: EN, FR, DE, ES & NL

Gray Hat Hacking The Ethical Hacker s Handbook Fifth Edition Book Excerpt:

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to exploit Windows and Linux software •Bypass Windows Access Control and memory protection schemes •Exploit web applications with Padding Oracle Attacks •Learn the use-after-free technique used in recent zero days •Hijack web browsers with advanced XSS attacks •Understand ransomware and how it takes control of your desktop •Dissect Android malware with JEB and DAD decompilers •Find one-day vulnerabilities with binary diffing •Exploit wireless systems with Software Defined Radios (SDR) •Exploit Internet of things devices •Dissect and exploit embedded devices •Understand bug bounty programs •Deploy next-generation honeypots •Dissect ATM malware and analyze common ATM attacks •Learn the business side of ethical hacking

The Official ISC 2 SSCP CBK Reference

The Official  ISC 2 SSCP CBK Reference
Author: Mike Wills
Publsiher: John Wiley & Sons
Total Pages: 784
Release: 2019-11-01
ISBN: 1119601967
Category: Computers
Language: EN, FR, DE, ES & NL

The Official ISC 2 SSCP CBK Reference Book Excerpt:

The only official body of knowledge for SSCP—(ISC)2’s popular credential for hands-on security professionals—fully revised and updated. Systems Security Certified Practitioner (SSCP) is an elite, hands-on cybersecurity certification that validates the technical skills to implement, monitor, and administer IT infrastructure using information security policies and procedures. SSCP certification—fully compliant with U.S. Department of Defense Directive 8140 and 8570 requirements—is valued throughout the IT security industry. The Official (ISC)2 SSCP CBK Reference is the only official Common Body of Knowledge (CBK) available for SSCP-level practitioners, exclusively from (ISC)2, the global leader in cybersecurity certification and training. This authoritative volume contains essential knowledge practitioners require on a regular basis. Accurate, up-to-date chapters provide in-depth coverage of the seven SSCP domains: Access Controls; Security Operations and Administration; Risk Identification, Monitoring and Analysis; Incident Response and Recovery; Cryptography; Network and Communications Security; and Systems and Application Security. Designed to serve as a reference for information security professionals throughout their careers, this indispensable (ISC)2guide: Provides comprehensive coverage of the latest domains and objectives of the SSCP Helps better secure critical assets in their organizations Serves as a complement to the SSCP Study Guide for certification candidates The Official (ISC)2 SSCP CBK Reference is an essential resource for SSCP-level professionals, SSCP candidates and other practitioners involved in cybersecurity.

Cyber Security

Cyber Security
Author: R. Meenakshi
Publsiher: Shanlax Publications
Total Pages: 182
Release: 2022
ISBN: 939137316X
Category: Computers
Language: EN, FR, DE, ES & NL

Cyber Security Book Excerpt:

Technological advancement saves time, ease of mobility, providing better communication means, cost efficiency, improved banking, better learning techniques, though safety and security are still questionable in aspects mentioned above. Cyber-attacks, crime, fraudulent are still increasing in recent years. Today, cyber security is widely viewed as a matter of pressing national importance. Many elements of cyberspace are notoriously vulnerable to an expanding range of attacks by a spectrum of hackers, criminals and terrorists. This book aims to collect the information both thematic as well as research-oriented from various personnel working in the various fields having different experiences to provide the essentials regarding what Cyber security is really about and not the perception of it being related purely to hacking activity. It will provide the fundamental considerations for those who are interested in or thinking of changing career into the field of Cyber Security. It will also improve a reader’s understanding of key terminology commonly used, nowadays, surrounding internet issues as they arise. The focus of the authors of various chapters in this book is on cyber security, cyber attacks, cyber crime, cloud security, cyber law, protection of women and children in cyber world & cyber space, analysis of cyber feminist campaign, data privacy and security issues in cloud computing, Mobile or Media addiction, Ransomewares, social networking, threats and impacts of cyber security.

Gray Hat Hacking The Ethical Hackers Handbook 3rd Edition

Gray Hat Hacking The Ethical Hackers Handbook  3rd Edition
Author: Allen Harper,Shon Harris,Jonathan Ness,Chris Eagle,Gideon Lenkey,Terron Williams
Publsiher: McGraw Hill Professional
Total Pages: 720
Release: 2011-02-05
ISBN: 0071742565
Category: Computers
Language: EN, FR, DE, ES & NL

Gray Hat Hacking The Ethical Hackers Handbook 3rd Edition Book Excerpt:

THE LATEST STRATEGIES FOR UNCOVERING TODAY'S MOST DEVASTATING ATTACKS Thwart malicious network intrusion by using cutting-edge techniques for finding and fixing security flaws. Fully updated and expanded with nine new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Third Edition details the most recent vulnerabilities and remedies along with legal disclosure methods. Learn from the experts how hackers target systems, defeat production schemes, write malicious code, and exploit flaws in Windows and Linux systems. Malware analysis, penetration testing, SCADA, VoIP, and Web security are also covered in this comprehensive resource. Develop and launch exploits using BackTrack and Metasploit Employ physical, social engineering, and insider attack techniques Build Perl, Python, and Ruby scripts that initiate stack buffer overflows Understand and prevent malicious content in Adobe, Office, and multimedia files Detect and block client-side, Web server, VoIP, and SCADA attacks Reverse engineer, fuzz, and decompile Windows and Linux software Develop SQL injection, cross-site scripting, and forgery exploits Trap malware and rootkits using honeypots and SandBoxes

Inside the NSA

Inside the NSA
Author: Chris Townsend
Publsiher: Enslow Publishing, LLC
Total Pages: 48
Release: 2019-07-15
ISBN: 1978508581
Category: Juvenile Nonfiction
Language: EN, FR, DE, ES & NL

Inside the NSA Book Excerpt:

The National Security Agency was founded in secrecy after World War II. Sometimes it is even jokingly called "No Such Agency" because nearly everything the agency does is kept secret. The NSA's real work came to light after Edward Snowden exposed some of its biggest secrets in 2013. This book explores the secrets of the NSA, from how it keeps Americans safe from hackers to how it collects information about us and what it does with all that data. Students will learn about the puzzles and codes that make up the biggest and least-understood agency in the American intelligence community.

Gray Hat Hacking The Ethical Hacker s Handbook Fourth Edition

Gray Hat Hacking The Ethical Hacker s Handbook  Fourth Edition
Author: Daniel Regalado,Shon Harris,Allen Harper,Chris Eagle,Jonathan Ness,Branko Spasojevic,Ryan Linn,Stephen Sims
Publsiher: McGraw Hill Professional
Total Pages: 656
Release: 2015-01-09
ISBN: 0071838503
Category: Computers
Language: EN, FR, DE, ES & NL

Gray Hat Hacking The Ethical Hacker s Handbook Fourth Edition Book Excerpt:

Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 12 new chapters, Gray Hat Hacking: The Ethical Hacker's Handbook, Fourth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-deploy testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. Build and launch spoofing exploits with Ettercap and Evilgrade Induce error conditions and crash software using fuzzers Hack Cisco routers, switches, and network hardware Use advanced reverse engineering to exploit Windows and Linux software Bypass Windows Access Control and memory protection schemes Scan for flaws in Web applications using Fiddler and the x5 plugin Learn the use-after-free technique used in recent zero days Bypass Web authentication via MySQL type conversion and MD5 injection attacks Inject your shellcode into a browser's memory using the latest Heap Spray techniques Hijack Web browsers with Metasploit and the BeEF Injection Framework Neutralize ransomware before it takes control of your desktop Dissect Android malware with JEB and DAD decompilers Find one-day vulnerabilities with binary diffing

Network Security Firewalls and VPNs

Network Security  Firewalls and VPNs
Author: J. Michael Stewart
Publsiher: Jones & Bartlett Publishers
Total Pages: 500
Release: 2013-07-15
ISBN: 1284031683
Category: Computers
Language: EN, FR, DE, ES & NL

Network Security Firewalls and VPNs Book Excerpt:

PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES Fully revised and updated with the latest data from the field, Network Security, Firewalls, and VPNs, Second Edition provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks. Key Features: -Introduces the basics of network security exploring the details of firewall security and how VPNs operate -Illustrates how to plan proper network security to combat hackers and outside threats -Discusses firewall configuration and deployment and managing firewall security -Identifies how to secure local and internet communications with a VPN Instructor Materials for Network Security, Firewalls, VPNs include: PowerPoint Lecture Slides Exam Questions Case Scenarios/Handouts About the Series This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well."

CISSP All in One Exam Guide Fifth Edition

CISSP All in One Exam Guide  Fifth Edition
Author: Shon Harris
Publsiher: McGraw Hill Professional
Total Pages: 1216
Release: 2010-01-31
ISBN: 0071602186
Category: Computers
Language: EN, FR, DE, ES & NL

CISSP All in One Exam Guide Fifth Edition Book Excerpt:

Get complete coverage of the latest release of the Certified Information Systems Security Professional (CISSP) exam inside this comprehensive, fully updated resource. Written by the leading expert in IT security certification and training, this authoritative guide covers all 10 CISSP exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CISSP exam with ease, this definitive volume also serves as an essential on-the-job reference. COVERS ALL 10 CISSP DOMAINS: Information security and risk management Access control Security architecture and design Physical and environmental security Telecommunications and network security Cryptography Business continuity and disaster recovery planning Legal regulations, compliance, and investigations Application security Operations security Electronic content includes: Hundreds of practice exam questions Video training excerpt from the author Shon Harris, CISSP, is a security consultant, a former member of the Information Warfare unit in the Air Force, and a contributing writer to Information Security Magazine and Windows 2000 Magazine. She is the author of the previous editions of this book.

CISSP Practice Exams Fifth Edition

CISSP Practice Exams  Fifth Edition
Author: Shon Harris,Jonathan Ham
Publsiher: McGraw Hill Professional
Total Pages: 135
Release: 2018-11-30
ISBN: 1260142663
Category: Computers
Language: EN, FR, DE, ES & NL

CISSP Practice Exams Fifth Edition Book Excerpt:

Don’t Let the Real Test Be Your First Test! This fully updated self-study guide offers complete coverage of all eight Certified Information Systems Security Professional exam domains developed by the International Information Systems Security Certification Consortium (ISC)2®. To reinforce important skills and facilitate retention, every question is accompanied by in-depth explanations for both correct and incorrect answers. Designed to help you pass the test with ease, this book is the ideal companion to the bestselling CISSP All-in-One Exam Guide. Covers all 8 CISSP® domains: Security and risk management Asset security Security architecture and engineering Communication and network security Identity and access management Security assessment and testing Security operations Software development security DIGITAL CONTENT INCLUDES: 1000+ multiple-choice practice exam questions Hotspot and drag-and-drop practice exam questions

CISSP All in One Exam Guide Third Edition

CISSP All in One Exam Guide  Third Edition
Author: Shon Harris
Publsiher: McGraw Hill Professional
Total Pages: 1001
Release: 2005-09-15
ISBN: 9780072257120
Category: Computers
Language: EN, FR, DE, ES & NL

CISSP All in One Exam Guide Third Edition Book Excerpt:

The Third Edition of this proven All-in-One exam guide provides total coverage of the CISSP certification exam, which has again been voted one of the Top 10 IT certifications in 2005 by CertCities. Revised and updated using feedback from Instructors and students, learn security operations in the areas of telecommunications, cryptography, management practices, and more. Plan for continuity and disaster recovery. Update your knowledge of laws, investigations, and ethics. Plus, run the CD-ROM and practice with more than 500 all new simulated exam questions. Browse the all new electronic book for studying on the go. Let security consultant and author Shon Harris lead you to successful completion of the CISSP.

CEH Certified Ethical Hacker All in One Exam Guide Fifth Edition

CEH Certified Ethical Hacker All in One Exam Guide  Fifth Edition
Author: Matt Walker
Publsiher: McGraw Hill Professional
Total Pages: 135
Release: 2021-11-05
ISBN: 1264269951
Category: Computers
Language: EN, FR, DE, ES & NL

CEH Certified Ethical Hacker All in One Exam Guide Fifth Edition Book Excerpt:

Up-to-date coverage of every topic on the CEH v11 exam Thoroughly updated for CEH v11 exam objectives, this integrated self-study system offers complete coverage of the EC-Council’s Certified Ethical Hacker exam. In this new edition, IT security expert Matt Walker discusses the latest tools, techniques, and exploits relevant to the exam. You’ll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the exam with ease, this comprehensive resource also serves as an essential on-the-job reference. Covers all exam topics, including: Ethical hacking fundamentals Reconnaissance and footprinting Scanning and enumeration Sniffing and evasion Attacking a system Hacking web servers and applications Wireless network hacking Mobile, IoT, and OT Security in cloud computing Trojans and other attacks, including malware analysis Cryptography Social engineering and physical security Penetration testing Online content includes: 300 practice exam questions Test engine that provides full-length practice exams and customized quizzes by chapter or exam domain

Hacking Exposed Web Applications Second Edition

Hacking Exposed Web Applications  Second Edition
Author: Joel Scambray,Mike Shema,Caleb Sima
Publsiher: McGraw-Hill Osborne Media
Total Pages: 520
Release: 2006-06-05
ISBN: 1928374650XXX
Category: Computers
Language: EN, FR, DE, ES & NL

Hacking Exposed Web Applications Second Edition Book Excerpt:

A guide to Web site security looks at the ways hackers target and attack vulnerable sites and provides information and case studies on countermeasures and security techniques.

Hacking Exposed Cisco Networks

Hacking Exposed Cisco Networks
Author: Andrew Vladimirov,Konstantin Gavrilenko,Andrei Mikhailovsky
Publsiher: McGraw Hill Professional
Total Pages: 613
Release: 2006-01-06
ISBN: 1928374650XXX
Category: Computers
Language: EN, FR, DE, ES & NL

Hacking Exposed Cisco Networks Book Excerpt:

Provides information on how hackers target exposed computer networks and gain access and ways to stop these intrusions, covering such topics as routers, firewalls, and VPN vulnerabilities.

Hacking Exposed 5th Edition

Hacking Exposed 5th Edition
Author: Stuart McClure,Joel Scambray,George Kurtz
Publsiher: McGraw-Hill Osborne Media
Total Pages: 692
Release: 2005-04-19
ISBN: 1928374650XXX
Category: Computers
Language: EN, FR, DE, ES & NL

Hacking Exposed 5th Edition Book Excerpt:

Analyzes attacks on computer networks, discusses security, auditing, and intrusion detection procedures, and covers hacking on the Internet, attacks against Windows, e-commerce hacking methodologies, and new discovery tools.

The Art of Network Penetration Testing

The Art of Network Penetration Testing
Author: Royce Davis
Publsiher: Manning Publications
Total Pages: 304
Release: 2020-12-29
ISBN: 1617296821
Category: Computers
Language: EN, FR, DE, ES & NL

The Art of Network Penetration Testing Book Excerpt:

The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. Summary Penetration testing is about more than just getting through a perimeter firewall. The biggest security threats are inside the network, where attackers can rampage through sensitive data by exploiting weak access controls and poorly patched software. Designed for up-and-coming security professionals, The Art of Network Penetration Testing teaches you how to take over an enterprise network from the inside. It lays out every stage of an internal security assessment step-by-step, showing you how to identify weaknesses before a malicious invader can do real damage. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications. About the technology Penetration testers uncover security gaps by attacking networks exactly like malicious intruders do. To become a world-class pentester, you need to master offensive security concepts, leverage a proven methodology, and practice, practice, practice. Th is book delivers insights from security expert Royce Davis, along with a virtual testing environment you can use to hone your skills. About the book The Art of Network Penetration Testing is a guide to simulating an internal security breach. You’ll take on the role of the attacker and work through every stage of a professional pentest, from information gathering to seizing control of a system and owning the network. As you brute force passwords, exploit unpatched services, and elevate network level privileges, you’ll learn where the weaknesses are—and how to take advantage of them. What's inside Set up a virtual pentest lab Exploit Windows and Linux network vulnerabilities Establish persistent re-entry to compromised targets Detail your findings in an engagement report About the reader For tech professionals. No security experience required. About the author Royce Davis has orchestrated hundreds of penetration tests, helping to secure many of the largest companies in the world. Table of Contents 1 Network Penetration Testing PHASE 1 - INFORMATION GATHERING 2 Discovering network hosts 3 Discovering network services 4 Discovering network vulnerabilities PHASE 2 - FOCUSED PENETRATION 5 Attacking vulnerable web services 6 Attacking vulnerable database services 7 Attacking unpatched services PHASE 3 - POST-EXPLOITATION AND PRIVILEGE ESCALATION 8 Windows post-exploitation 9 Linux or UNIX post-exploitation 10 Controlling the entire network PHASE 4 - DOCUMENTATION 11 Post-engagement cleanup 12 Writing a solid pentest deliverable

CISSP Bundle Fourth Edition

CISSP Bundle  Fourth Edition
Author: Shon Harris,Fernando Maymi,Jonathan Ham
Publsiher: McGraw Hill Professional
Total Pages: 135
Release: 2018-12-24
ISBN: 1260440826
Category: Computers
Language: EN, FR, DE, ES & NL

CISSP Bundle Fourth Edition Book Excerpt:

Prepare for the 2018 CISSP exam with this up-to-date, money-saving study package Designed as a complete self-study program, this collection offers a wide variety of proven, exam-focused resources to use in preparation for the current edition of the CISSP exam. The set bundles the eighth edition of Shon Harris’ bestselling CISSP All-in-One Exam Guide and CISSP Practice Exams, Fifth Edition—. You will gain access to a variety of comprehensive resources to get ready for the challenging exam. CISSP Bundle, Fourthe Edition fully covers all eight exam domains and offers real-world insights from the authors’ professional experiences. More than 2500 accurate practice exam questions are provided, along with in-depth explanations of both the correct and incorrect answers. The included Total Tester test engine provides full-length, timed simulated exams or customized quizzes that target selected chapters or exam objectives. •Presents 100% coverage of the 2018 CISSP Exam•Includes special discount to Shon Harris Brand CISSP video training from Human Element Security•Written by leading experts in IT security certification and training

Metasploit

Metasploit
Author: David Kennedy,Jim O'Gorman,Devon Kearns,Mati Aharoni
Publsiher: No Starch Press
Total Pages: 328
Release: 2011-07-15
ISBN: 159327288X
Category: Computers
Language: EN, FR, DE, ES & NL

Metasploit Book Excerpt:

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors. Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks. Learn how to: –Find and exploit unmaintained, misconfigured, and unpatched systems –Perform reconnaissance and find valuable information about your target –Bypass anti-virus technologies and circumvent security controls –Integrate Nmap, NeXpose, and Nessus with Metasploit to automate discovery –Use the Meterpreter shell to launch further attacks from inside the network –Harness standalone Metasploit utilities, third-party tools, and plug-ins –Learn how to write your own Meterpreter post exploitation modules and scripts You'll even touch on exploit discovery for zero-day research, write a fuzzer, port existing exploits into the Framework, and learn how to cover your tracks. Whether your goal is to secure your own networks or to put someone else's to the test, Metasploit: The Penetration Tester's Guide will take you there and beyond.

Internet Security

Internet Security
Author: Kenneth Einar Himma
Publsiher: Jones & Bartlett Learning
Total Pages: 292
Release: 2007
ISBN: 9780763735364
Category: Computers
Language: EN, FR, DE, ES & NL

Internet Security Book Excerpt:

This collection of papers, articles, and monographs details the ethical landscape as it exists for the distinct areas of Internet and network security, including moral justification of hacker attacks, the ethics behind the freedom of information which contributes to hacking, and the role of the law in policing cyberspace.

The Hacking of America

The Hacking of America
Author: Bernadette Hlubik Schell,John L. Dodge,Steve S. Moutsatsos
Publsiher: Praeger
Total Pages: 308
Release: 2002
ISBN: 1928374650XXX
Category: Social Science
Language: EN, FR, DE, ES & NL

The Hacking of America Book Excerpt:

Table of contents

The Legacy of Socrates

The Legacy of Socrates
Author: Stuart Rachels
Publsiher: Columbia University Press
Total Pages: 248
Release: 2007
ISBN: 9780231138444
Category: Social Science
Language: EN, FR, DE, ES & NL

The Legacy of Socrates Book Excerpt:

James Rachels's philosophical writings address key questions of contemporary life and the classic dilemmas of moral philosophy. A leading figure in the development of applied ethics, James Rachels became an influential and sometimes controversial thinker on issues concerning animal rights, euthanasia, bioethics, and moral objectivity. This final collection of James Rachels's work brings together fourteen essays that best summarize Rachels's philosophical positions. The essays also shed new light on the depth and breadth of Rachels's work and its importance for contemporary philosophy. Written in Rachels's characteristically lucid, literary prose, these essays address the relationship between morality and reason, the duty to relieve both human and animal suffering, the independence of morality from religion, the rejection of relativism and egoism, and the role of ethics in a democratic society. Rachels offers an argument for vegetarianism, examines a controversial case involving a surrogate mother, and speculates on the ethics of political killing. Other essays range from Rachels's interpretation of Nietzsche's philosophy to his appreciation of movies. Rachels was a strong believer in the ability of moral philosophy to improve our lives. This collection, which brings these important works together for the first time, is a testament to both the value of moral philosophy in understanding our world and the richness of Rachels's contributions to this understanding.