Akamai 22.0 Inch (Diagonally Measured) Privacy Screen for Widescreen Computer Monitors (AP22.0W)

Rating: 
Amazon Price: $53.99 $53.99 (as of March 23, 2019 16:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Keep Your Screen Confidential and Private

Many things in life are better when shared. Your laptop screen is not among them. This Akamai Office Products' desktop monitor privacy filter keeps your confidential and private information just that — private. This filter mounts to your computer monitor screen and utilizes privacy technology so only people in front of your computer (or directly behind you) can see your display. Nosy coworkers, competitors, and strangers will only see a black screen.
Continue reading “Akamai 22.0 Inch (Diagonally Measured) Privacy Screen for Widescreen Computer Monitors (AP22.0W)”

Distributed Denial of Service Attack and Defense (SpringerBriefs in Computer Science)

Amazon Price: N/A (as of March 23, 2019 09:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.

How to Defeat Advanced Malware: New Tools for Protection and Forensics

Amazon Price: N/A (as of March 23, 2019 05:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.

This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.
Continue reading “How to Defeat Advanced Malware: New Tools for Protection and Forensics”

The Hacker Playbook: Practical Guide To Penetration Testing

Rating: 
Amazon Price: $24.99 $24.99 (as of March 23, 2019 00:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.
From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.
Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Password Incorrect (Geek Fiction Stories Vol. 1/2)

Rating: 
Amazon Price: N/A (as of March 23, 2019 03:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

First volume of a collection of tech-fiction short stories. Designed to be a perfect mobile reading for geeks, who from time to time desperately need to recover from tech-related stress, the one which says hello when you don't remember the password to your Gmail account. Or Twitter account. Or both.

– – –
Continue reading “Password Incorrect (Geek Fiction Stories Vol. 1/2)”