CyberWar

Si Vis Pacem, Para Bellum

By

Global Internet Law in a Nutshell, 2d

Rating: 
Amazon Price: N/A (as of May 29, 2016 02:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Global Internet in a Nutshell begins with a review of the history, technology, and competing theories of the Internet that enables a deeper understanding of case law and statutory developments discussed in the substantive chapters. It briefly covers the history of the Internet through the rapidly evolving Web 3.0, competing theories of Internet governance, cyber jurisdiction and enforcement of judgments, choice and conflicts of law, cybertorts, online contracting and licensing, the protection of online intellectual property assets, the protection of online privacy, criminal liability for Internet activity, and European Community directives such as the E-Commerce Directive, Brussels Regulation, and Rome I Regulation. The second edition presents a comprehensive review of cybertort and cybercrime developments including foreign cases. Each chapter of this revised edition reviews statutory and caselaw developments from the European Union as well as other foreign countries.

By

Distributed Password Cracking

Amazon Price: N/A (as of May 29, 2016 00:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Password cracking requires significant processing power which in today’s world is located at a workstation or home in the form of a desktop computer. Berkeley Open Infrastructure for Network Computing (BOINC) is the
conduit to this significant source of processing power and John the Ripper is the key. BOINC is a distributed data processing system that incorporates client-server relationships to generically process data. The BOINC structure supports any system that requires large amounts of data to be processed
without changing significant portions of the structure. John the Ripper is a password cracking program that takes a password file and attempts to determine the password by a guess and check method.
The merger of these two programs enables companies and diverse groups to verify the strength of their password security policy. This thesis goes into detail on the inner workings of BOINC, John the Ripper, and the merger of the two programs. It also details the work required to test the system to its full capability.

By

Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

Rating: 
Amazon Price: $60.00 $48.16 You save: $11.84 (20%). (as of May 29, 2016 10:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This essential book addresses cybersecurity strategies that include identity management, risk management, and incident management, and also serves as a detailed guide for anyone looking to enter the security profession. Doubling as the text for a cybersecurity course, it is also a useful reference for cybersecurity testing, IT test/development, and system/network administration. Covers everything from basic network administration security skills through advanced command line scripting, tool customization, and log analysis skillsDives deeper into such intense topics as wireshark/tcpdump filtering, Google hacks, Windows/Linux scripting, Metasploit command line, and tool customizationsDelves into network administration for Windows, Linux, and VMwareExamines penetration testing, cyber investigations, firewall configuration, and security tool customizationShares techniques for cybersecurity testing, planning, and reporting
Read More

By

Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction)

Zero-Day Exploit:: Countdown to Darkness (Cyber-Fiction)The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious “Zero-Day” attack will appeal to every corner of the IT community. Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community. This book will also satisfy those not on the “inside” of this community, who are fascinated by the real tactics and motives of criminal, malicous hackers and those who defent the Internet from them.

* The realistic portrayals of researching, developing, and ultimately defending the Internet from a malicious “Zero-Day” attack will appeal to every corner of the IT community.

* This book will entertain, educate, and enlighten the security and IT community about the world of elite security professionals who safeguard the Internet from the most dangerous cyber criminals and terrorists.

* Although finctional, the numerous accounts of real events and references to real people will ring true with every member of the security community.

Price: $51.95

Click here to buy from Amazon

By

The Art of Assembly Language

Rating: 
Amazon Price: $59.95 $44.45 You save: $15.50 (26%). (as of May 29, 2016 03:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Assembly is a low-level programming language that's one step above a computer's native machine language. Although assembly language is commonly used for writing device drivers, emulators, and video games, many programmers find its somewhat unfriendly syntax intimidating to learn and use.
Since 1996, Randall Hyde's The Art of Assembly Language has provided a comprehensive, plain-English, and patient introduction to assembly for non-assembly programmers. Hyde's primary teaching tool, High Level Assembler (or HLA), incorporates many of the features found in high-level languages (like C, C++, and Java) to help you quickly grasp basic assembly concepts. HLA lets you write true low-level code while enjoying the benefits of high-level language programming.
As you read The Art of Assembly Language, you'll learn the low-level theory fundamental to computer science and turn that understanding into real, functional code. You'll learn how to: Edit, compile, and run an HLA program Declare and use constants, scalar variables, pointers, arrays, structures, unions, and namespaces Translate arithmetic expressions (integer and floating point) Convert high-level control structures
This much anticipated second edition of The Art of Assembly Language has been updated to reflect recent changes to HLA and to support Linux, Mac OS X, and FreeBSD. Whether you're new to programming or you have experience with high-level languages, The Art of Assembly Language, 2nd Edition is your essential guide to learning this complex, low-level language.

/* */