The Penetration Tester’s Handbook: The First Steps to CEH Certification

Amazon Price: $60.00 (as of February 22, 2018 06:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

This practical guide to penetration testing teaches would-be ethical hackers to scan for, identify, and analyze security vulnerabilities―readying readers for the Certified Ethical Hacker (CEH) exam
The Penetration Tester's Handbook: The First Steps to CEH Certification is designed to advance the knowledge, skills, and techniques of the ethical hacker. The book begins with a review of information security theory and goes on to fully cover the tools and techniques of penetration and vulnerability testing. Hands-on exercises are included throughout the handbook to reinforce the information presented and to develop your skills.
Upon finishing this handbook, you will be ready to practice independently to hone your penetration testing skills―and to work toward obtaining the Certified Ethical Hacker designation. The personal penetration testing lab, for which set-up instructions are included, will aid you beyond the book and serve as a resource for additional practice and study. Bridges the knowledge and experience gap that exists between the CompTIA Security+ certification and the more advanced CEH certification Features more than 30 realistic step-by-step practice exercises

Nmap 6 Cookbook: The Fat Free Guide to Network Security Scanning

Rating: 
Amazon Price: $19.98 $19.98 (as of February 22, 2018 04:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Nmap 6 Cookbook provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results. Topics covered include: * Installation on Windows, Mac OS X, and Unix/Linux platforms * Basic and advanced scanning techniques * Network inventory and auditing * Firewall evasion techniques * Zenmap – A graphical front-end for Nmap * NSE – The Nmap Scripting Engine * Ndiff – The Nmap scan comparison utility * Ncat – A flexible networking utility * Nping – Ping on steroids

Battlefield of the Future: 21st Century Warfare Issues – Air Theory for the 21st Century, Cyberwar, Biological Weapons and Germ Warfare, New-Era Warfare

Rating: 
Amazon Price: $9.99 $9.99 (as of February 22, 2018 05:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is a book about strategy and war fighting in the midst of a revolution in military affairs as the world moves into the twenty-first century. Its 11 essays examine topics such as military operations against a well-armed rogue state or NASTT (NBC-arming sponsor of terrorism and intervention) state; the potential of parallel warfare strategy for different kinds of states; the revolutionary potential of information warfare; the lethal possibilities of biological warfare; and the elements of an ongoing revolution in military affairs (RMA). The book's purpose is to focus attention on the operational problems, enemy strategies, and threats that will confront US national security decision makers in the twenty-first century. The participating authors are either professional military officers or civilian professionals who specialize in national security issues. Two of the architects of the US air campaign in the 1991 Gulf War have contributed essays that discuss the evolving utility of airpower to achieve decisive results and the lessons that might portend for the future of warfare. In "Principles of War on the Battlefield of the Future," which sets the tone for the book, Dr. Barry Schneider examines how traditional principles of war may have to be reassessed in light of a proliferation of weapons of mass destruction (WMD) among third world states. Regarding the principle of "mass," traditional theory dictated that forces be massed for an offensive breakthrough. But Schneider argues that, against an enemy armed with WMD, dispersed of one's forces may, in fact, be more prudent, and fighting by means of "disengaged combat" prior to a decisive strike may be necessary. This requires high coordination and "superior targeting and damage assessment intelligence, combined with superior high-tech weapons." Still, the United States and its allies would not likely be able to dominate a future battlefield even with advanced conventional arms if they did not have close-in air bases to operate from and thereby to achieve air dominance over the battle space. Therefore, while it sounds good, striking from outside the enemy's range is not a real option for long if the enemy is mounting a ground campaign that is closing in on vital areas. Local air, sea, and ground power will be needed to contain the adversary forces and roll them back. This means local air bases and seaports must be available and protected. Contents * Introduction * 1 Principles of War for the Battlefield of the Future * Barry R. Schneider * Overview: New Era Warfare? A Revolution In Military Affairs? * 2 New-Era Warfare * Gen Charles A. Horner, USAF, (Ret.) * 3 The Revolution in Military Affairs * Jeffrey McKitrick, James Blackwell, Fred Littlepage, George Kraus, Richard Blanchfield and Dale Hill * Overview: Future Airpower and Strategy Issues * 4 Air Theory for the Twenty-First Century * Col John A. Warden III, USAF * 5 Parallel War and Hyperwar: Is Every Want a Weakness? * Col Richard Szafranski, USAF * Overview: Information Warfare Issues * 6 Information War – Cyberwar – Netwar * George Stein * 7 Information Warfare: Impacts and Concerns * Col James W. McLendon, USAF * Overview: Biological Warfare Issues * 8 The Biological Weapon: A Poor Nation's Weapon of Mass Destruction * Lt Col Terry N. Mayer, USAF * 9 Twenty-First Century Germ Warfare * Lt Col Robert P. Kadlec, MD, USAF * 10 Biological Weapons for Waging Economic Warfare * Lt Col Robert P. Kadlec, MD, USAF * 11 On Twenty-First Century Warfare * Lawrence E. Grinter and Dr. Barry R. Schneider

Cyberlaw: The Law of the Internet and Information Technology

Rating: 
Amazon Price: $174.60 $152.77 You save: $21.83 (13%). (as of February 22, 2018 03:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Featuring the most current exploration of cyberlaw, CYBERLAW helps students understand the legal and policy issues associated with the Internet. Tackling a full range of legal topics, it includes discussion of jurisdiction, intellectual property, contracts, taxation, torts, computer crimes, online speech, defamation and privacy. Chapters include recent, relevant cases, discussion questions and exercises at the end of each chapter. Using a consistent voice and clear explanations, the author covers the latest developments in cyberlaw–from cases to legislation to regulations.

Hacking protection: sockets, exploits, shell-code: identification of vulnerabilities in operating systems and applications to attacks by hackers (Russian Edition)

Amazon Price: $34.95 $34.95 (as of February 21, 2018 18:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In his new book, James Foster, author of several best-selling books for the first time describes the methods used by hackers to attack operating systems and applications. He cites examples of working code in C / C ++, Java, Perl and NASL.