I began a Chat-Bot: Python3 version (Japanese Edition)

Amazon Price: N/A (as of October 21, 2017 14:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

再帰型ネットを利用した単純な人工無脳(チャット・ボット)を紹介します。
この本に書かれている内容は、著者の「牛と戯れた日々を想って」ブログ(http://acc-holy.cocolog-nifty.com/blog/)から人工無脳関係の記事をピックアップしたものです。
そちらを購入前の検討にご覧になってください。
活動を支持するつもりでポチッていただけると励みになります。

Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World

Rating: 
Amazon Price: N/A (as of October 20, 2017 14:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Praise for Tom Engelhardt's The United States of Fear:

"Tom Engelhardt, as always, focuses his laser-like intelligence on a core problem that the media avoid. . . . A stunning polemic."—Mike Davis
Continue reading “Shadow Government: Surveillance, Secret Wars, and a Global Security State in a Single-Superpower World”

Practical VoIP Security

Rating: 
Amazon Price: N/A (as of October 21, 2017 06:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.

This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive
Continue reading “Practical VoIP Security”

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

Rating: 
Amazon Price: $25.00 $14.87 You save: $10.13 (41%). (as of October 21, 2017 14:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.

Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
Continue reading “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon”

SRS – How to make a Pen Test and Hacking Platform

Amazon Price: N/A (as of October 21, 2017 02:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is a short book describing the specifications and requirements needed to build your own penetration or hacking platform.