Professional Pen Testing for Web Applications (Programmer to Programmer)

There is no such thing as “perfect security” when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical hacker) in order to circumvent the security features of a Web application so that those features can be accurately evaluated and adequate security precautions can be put in place.

After a review of the basics of web applications, you'll be introduced to web application hacking concepts and techniques such as vulnerability analysis, attack simulation, results analysis, manuals, source code, and circuit diagrams. These web application hacking concepts and techniques will prove useful information for ultimately securing the resources that need your protection.

What you will learn from this book
* Surveillance techniques that an attacker uses when targeting a system for a strike
* Various types of issues that exist within the modern day web application space
* How to audit web services in order to assess areas of risk and exposure
* How to analyze your results and translate them into documentation that is useful for remediation
* Techniques for pen-testing trials to practice before a live project

Who this book is for

This book is for programmers, developers, and information security professionals who want to become familiar with web application security and how to audit it.

Wrox Professional guides are planned and written by working programmers to meet the real-world needs of programmers, developers, and IT professionals. Focused and relevant, they address the issues technology professionals face every day. They provide examples, practical solutions, and expert education in new technologies, all designed to help programmers do a better job.

Price: $39.99

Click here to buy from Amazon

Cyberwar: Die Zukunft der Kriegsführung per Computer (German Edition)

Cyberwar: Die Zukunft der Kriegsführung per Computer (German Edition)Experten sind sich sicher, dass der nächste Krieg über das weltweite Datennetz stattfinden wird: Der Zugriff auf die Zentralbank, die Manipulation der Börse, ein bundesweiter Stromausfall, die Ausschaltung wichtiger Satelliten oder die Irreführung von ferngesteuerten Waffen wären Szenarien, wie ein zukünftiger Cyberwar aussehen könnte. Deshalb rüsten sämtliche Staaten weltweit für die informationstechnologische Kriegführung der Zukunft auf. Dieses Buch liefert einen Überblick über den Begriff Cyberwar, Methoden, Schutzmaßnahmen und wie sich Deutschland darauf vorbereitet.

Price: $48.00

Click here to buy from Amazon

Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance

Rating: 
Amazon Price: $28.00 $18.97 You save: $9.03 (32%). (as of October 23, 2017 23:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

An inside look at who’s watching you, what they know and why it matters. We are being watched.

We see online ads from websites we’ve visited, long after we’ve moved on to other interests. Our smartphones and cars transmit our location, enabling us to know what’s in the neighborhood but also enabling others to track us. And the federal government, we recently learned, has been conducting a massive data-gathering surveillance operation across the Internet and on our phone lines.
Continue reading “Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance”

Building an Intelligence-Led Security Program

Rating: 
Amazon Price: N/A (as of October 23, 2017 10:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As recently as five years ago, securing a network meant putting in a firewall, intrusion detection system, and installing antivirus software on the desktop. Unfortunately, attackers have grown more nimble and effective, meaning that traditional security programs are no longer effective.

Today's effective cyber security programs take these best practices and overlay them with intelligence. Adding cyber threat intelligence can help security teams uncover events not detected by traditional security platforms and correlate seemingly disparate events across the network. Properly-implemented intelligence also makes the life of the security practitioner easier by helping him more effectively prioritize and respond to security incidents.
Continue reading “Building an Intelligence-Led Security Program”

Military Robots and Drones: A Reference Handbook: A Reference Handbook (Contemporary World Issues)

Amazon Price: N/A (as of October 23, 2017 08:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book provides an insightful introduction to the most important field of military innovation for the 21st century—robotic and drone weaponry.

• A chronology of important events in robotic technology
Continue reading “Military Robots and Drones: A Reference Handbook: A Reference Handbook (Contemporary World Issues)”