Amazon Price: N/A (as of February 20, 2018 00:22 –
How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities.
This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols.
Continue reading “How to Attack and Defend Your Website”
Amazon Price: $49.95 $41.95 You save: $8.00 (16%). (as of February 20, 2018 04:29 –
This book serves as a security practitioner’s guide to today’s most crucial issues in cyber security and IT infrastructure. It offers in-depth coverage of theory, technology, and practice as they relate to established technologies as well as recent advancements. It explores practical solutions to a wide range of cyber-physical and IT infrastructure protection issues.
Composed of 11 chapters contributed by leading experts in their fields, this highly useful book covers disaster recovery, biometrics, homeland security, cyber warfare, cyber security, national infrastructure security, access controls, vulnerability assessments and audits, cryptography, and operational and organizational security, as well as an extensive glossary of security terms and acronyms.
Continue reading “Cyber Security and IT Infrastructure Protection”
Amazon Price: $30.00 $30.00 (as of February 20, 2018 02:30 –
Denial of Service (DoS) and Distributed Denial of Service (DDoS) are among the most common threats to IT security. As it does not require advanced resources, such attacks can be carried out by private individuals as well as organized groups, so-called “hacktivists”. This book gives an overview and detailed description of the different kinds of attacks commonly used by hackers and it shows the challenges for IT security experts. In a practical application exercise, a DoS attack simulation is created by running the tool Low Orbit Ion Canon (LOIC) on the attacker side and a victim running an Apache 2 server. A Wireshark network utility tool is used to capture and analyze the difference between the traffic sent from the LOIC client and the normal user. In addition, to simulate a DDoS attack, a MeTuS Delphi 2.8 tool is used to create the botnet. The configurations required to run the MeTuS Delphi tool such as PortForwarding and setting up a Dynamic DNS Update Client are shown in detail. A SSYN attack is also carried out by using the tool itself. Finally, the different mitigation techniques such as Iptables, ModSecurity, and Mod Evasive are discussed and shown in practice.
Amazon Price: $49.99 $39.34 You save: $10.65 (21%). (as of February 20, 2018 03:48 –
Amazon Web Services in Action introduces you to computing, storing, and networking in the AWS cloud. The book will teach you about the most important services on AWS. You will also learn about best practices regarding automation, security, high availability, and scalability.
Continue reading “Amazon Web Services in Action”
Amazon Price: $33.32 $33.32 (as of February 19, 2018 22:45 –
In 2013, the FBI started posting a new most wanted list—not for kidnappers, murderers, or armed robbers, but for online crooks. These "Cyber's Most Wanted" criminals have committed serious offenses ranging from hijacking Internet traffic to spying on businesses and governments. They steal online passwords and financial information, break into online bank accounts, install malicious software on computers, and hack into computers via spam and phishing e-mails.
Cyber crime is serious business. Internet security companies report that worldwide cyber crimes cost consumers about $113 billion per year. Cyber crimes cost businesses around the world even more, up to $500 billion each year.
Continue reading “Cyber Attack (Nonfiction – Young Adult)”