Amazon Price: N/A (as of October 17, 2017 02:45 –
AS CYBER SECURITY LAW DEVELOPS
Cyber security slowly is beginning to achieve centre stage attention. Various cyber security breaches in different parts of the world have convinced almost all stakeholders that there is a need for having in place legal frameworks to address the growing menace of cyber security breaches. It is in this regard that cyber security law as a jurisprudential subject is beginning to evolve. The said subject is coming up as a distinct discipline within the overall umbrella of Cyberlaw jurisprudence.
Continue reading “AS CYBER SECURITY LAW DEVELOPS”
Amazon Price: N/A (as of October 16, 2017 10:22 –
Unix-like operating systems have a primitive access control system. The root account can do anything. Other users are peasants with only minimal system access. This worked fine in UNIX’s youth, but today, system administration responsibilities are spread among many people and applications. Each person needs a tiny slice of root’s power.
Sudo lets you divide root’s monolithic power between the people who need it, with accountability and auditability.
Continue reading “Sudo Mastery: User Access Control for Real People (IT Mastery Book 3)”
Amazon Price: N/A (as of October 17, 2017 06:09 –
We live in a current internet age where long and random passwords made up of letters, digits and symbols, that are changed on a semi-regular basis, are the only way to keep you safe from cyber-criminals. (Sadly, your pet's name no longer cuts it as a secure password!) Constantly thinking of new passwords every few months can be a real nuisance – especially if you consider the current security advice that you should have a different password for every important account. What a headache!
This book is here to help – it is rammed full with a 1000 random passwords for you to use, passwords that would be almost impossible to crack. When you combine two password segments together, the combinations are so numerous, the number so big, you would not be able to make sense of it! ( Over 10,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000,000 ) Safe to say, the passwords in this book are very secure!
Continue reading “Book of Super Secure Online Passwords That You Can Use: Well over a hundred trillion password combinations”
In this book, we aim to describe how to make a computer bend to your will by finding and exploiting vulnerabilities specifically in Web applications. We will describe common security issues in Web applications, tell you how to find them, describe how to exploit them, and then tell you how to fix them. We will also cover how and why some hackers (the bad guys) will try to exploit these vulnerabilities to achieve their own end. We will also try to explain how to detect if hackers are actively trying to exploit vulnerabilities in your own Web applications.
· Learn to defend Web-based applications developed with AJAX, SOAP, XMLPRC, and more.
· See why Cross Site Scripting attacks can be so devastating.
· Download working code from the companion Web site.
Click here to buy from Amazon
Amazon Price: $74.99 $60.01 You save: $14.98 (20%). (as of October 17, 2017 07:22 –
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”
– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.
“It’s like a symphony meeting an encyclopedia meeting a spy novel.”
–Michael Ford, Corero Network Security
Continue reading “Network Forensics: Tracking Hackers through Cyberspace”