Crimeware: Understanding New Attacks and Defenses

Rating: 
Amazon Price: N/A (as of April 25, 2018 04:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”

—Garth Bruen, Project KnujOn Designer
Continue reading “Crimeware: Understanding New Attacks and Defenses”

Defeating Ransomware: WannaCry and other Challenges

Amazon Price: $19.99 $19.99 (as of April 25, 2018 06:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Ransomware like WannaCry can be defeated through a combination of cyber security planning, policies, procedures, guidelines and standards. This book introduces these key concepts, allowing for real world change to be effected, preventing ransomware and other attacks from crippling your organisation.

Penetration Testing with Raspberry Pi

Rating: 
Amazon Price: N/A (as of April 25, 2018 16:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi

About This BookLearn how to turn a Raspberry Pi into a Kali Linux hacking toolkit for onsite, physical, and remote penetration testingUnderstand the capabilities, limitations, and features of Kali Linux on Raspberry PiBuild and develop methodologies ideal for Raspberry Pi penetration testing using real-world cases
Continue reading “Penetration Testing with Raspberry Pi”

Using Bittorent protocol to launch DDoS attacks

Amazon Price: $7.50 $7.50 (as of April 25, 2018 04:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Essay from the year 2012 in the subject Computer Science – IT-Security, , language: English, abstract: In a nutshell what the researcher hopes to achieve by this project is to develop a practical solution to control Distributed Denial of Service (DDoS) attacks launched using BitTorrent protocol by tweaking the source code of an existing open source BitTorrent client. Even though BitTorrent is a useful protocol, it could be misused to launch DDoS attacks. Since the number who uses BitTorrent protocol is high, by launching a DDoS the victim's machine could be crippled. Hence as a remedy to the issue this report is formulated so that it discusses how the attacks are done and how it could be prevented. For a simple analogical demonstration of what this attack does, take a look at figure 1 where computer A cannot fulfill the requests of a legit user computer B. this is what DDoS attack does. After enhancing the security architecture of BitTorrent client this problem would not occur hence it is improved to control these attacks.

Hacking: Hacking For Beginners Guide On How To Hack, Computer Hacking, And The Basics Of Ethical Hacking (Hacking Books)

Rating: 
Amazon Price: $17.99 $15.38 You save: $2.61 (15%). (as of April 25, 2018 05:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Have You Ever Wanted To Be A Hacker? Do You Want To Take Your Hacking Skills To Next Level?

Yes you can easily learn how to hack a computer, spoofing techniques, mobile & smartphone hacking, website penetration and tips for ethical hacking!
Continue reading “Hacking: Hacking For Beginners Guide On How To Hack, Computer Hacking, And The Basics Of Ethical Hacking (Hacking Books)”