Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide

Rating: 
Amazon Price: $99.95 $77.99 You save: $21.96 (22%). (as of July 20, 2019 01:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

[Note: This Second Edition is also available in Kindle format!]

Wireshark is the world's most popular network analyzer tool with over 500,000 downloads per month. This book provides insider tips and tricks to spot performance issues fast – no more finger pointing because the packets never lie! From "Death by Database" to "Troubleshooting Time Syncing," 49 case studies offer insight into performance and security situations solved with Wireshark.
Continue reading “Wireshark Network Analysis (Second Edition): The Official Wireshark Certified Network Analyst Study Guide”

Honeypots: Tracking Hackers

Rating: 
Amazon Price: $44.99 $25.37 You save: $19.62 (44%). (as of July 20, 2019 02:33 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Honeypots are highly sophisticated technologies used to observe and learn about hackers. Practical and commercial interest in these new forms of hacker defense is now hitting the mainstream. There are many successful commercial honeypots, including ManTrap and Specter. Security expert Marcus Ranum notes in his Foreword, "Right now there are about a half-dozen commercial honeypot products on the market. Within a year, I predict there will be dozens. Within two years, there will be a hundred." Spitzner also covers legal issues, one of the most controversial subjects concerning honeypots, receiving extensive guidance from the Department of Justice in writing the legal material. The book, Know Your Enemy was written by a team of authors, and focuses on a special type of honeypot via a research project called The Honeynet Project. This new book is written by the acknowledged honeypot expert and discusses many different types of honeypot technologies. They are perfect companion books. Get a strong foundation with "Honeypots" and explore more details of honeypot deployment with Know Your Enemy.

Instant Netcat Starter

Rating: 
Amazon Price: $24.99 $21.85 You save: $3.14 (13%). (as of July 20, 2019 09:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn to harness the power and versatility of Netcat, and understand why it remains an integral part of IT and Security Toolkits to this day
Overview Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Downloading, compiling, and installing Netcat on Windows and Linux platforms. Establish a raw network connection so you can understand how Netcat processes information using a simplistic chat interface. Establish and maintain a remote shell / back door on various operating systems.
In Detail
As a featured networking utility, Netcat uses TCP/IP protocols to read and write data across network connections. Netcat is a feature rich backend network debugging and exploration tool with the ability to create almost any type of connection you would need.
"Instant Netcat Starter Guide" is a practical, hands-on guide that provides you with a simple and straightforward roadmap to proceed from newbie to seasoned professional with the Netcat utility. By progressing from simple to more complex uses, this book will inform and explain many of the primary use cases that are only limited by your imagination.
This book explores the classic Netcat utility, and breaks down the common ways in which it can be utilized in the field. Beginning with compilation and installation, this book quickly has you utilizing the core features of the utility to perform file transfers regardless of commonly blocked firewall ports, perform real-world interrogation of services and listening ports to discover the true intention of an application or service, and tunnelling remotely into systems to produce remote command shells.
What you will learn from this book Locate the various distributions of Netcat, including the original "Hobbit" version, GNU Netcat, and Ncat. Install the utility on Windows and Linux distributions. Understand the differences between the listening mode and the client mode and when you should use one over the other. Establish a simplistic chat interface between two computers. Use Netcat to establish a remote shell on Windows systems. How to Portscan with Netcat. Learn about file transfers within Netcat. Perform banner grabbing of services.
Approach
Get to grips with a new technology, understand what it is and what it can do for you, and then get to work with the most important features and tasks.
Who this book is written for
This book is for IT professionals who have no previous experience with Netcat but need to understand it quickly and easily.

Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

Rating: 
Amazon Price: $59.95 $50.35 You save: $9.60 (16%). (as of July 20, 2019 17:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

*A condensed hand-held guide complete with on-the-job tasks and checklists
*Specific for Linux-based systems where new malware is developed everday
*Authors are world-renowned leaders in investigating and analyzing malicious code

The Network Security Essentials: Study Guide & Workbook – Volume 1 (Security Essentials Study Guides & Workbooks)

Rating: 
Amazon Price: $29.95 (as of July 20, 2019 01:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Young people today are expected to use technology safely but don't have the knowledge or skills to really do that. This compact guide is the first step to giving them the cybersecurity awareness and know-how they really need. Learn and reinforce essential security skills quickly with this straight-forward guide designed to speed learning and information retention. With clear explanations, stories, and interesting exercises from hacking to security analysis you will quickly grasp and use important security techniques. As a textbook, workbook, and study guide for both directed and self-learning, this is the ultimate textbook for cybersecurity awareness and skill-building designed for all high school and college students. More than just cybersecurity, each chapter contains lessons to strengthen resourcefulness, creativity, and empathy in the student. Ideal for any classroom or home-schooling. It is based on the open source Hacker Highschool project and expanded to provide for a wide range of technology skill levels. The guide uses research from the Open Source Security Testing Methodology (OSSTMM) to assure this is the newest security research and concepts.