Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book.
The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
* Provides readers with working code to develop and modify the most common security tools including Nmap and Nessus
* Learn to reverse engineer and write exploits for various operating systems, databases, and applications
* Automate reporting and analysis of security log files
Click here to buy from Amazon
Amazon Price: $49.95 $31.94 You save: $18.01 (36%). (as of November 24, 2017 22:56 –
Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a comprehensive understanding of applied cryptography.
After an introduction to cryptography and data security, the authors explain the main techniques in modern cryptography, with chapters addressing stream ciphers, the Data Encryption Standard (DES) and 3DES, the Advanced Encryption Standard (AES), block ciphers, the RSA cryptosystem, public-key cryptosystems based on the discrete logarithm problem, elliptic-curve cryptography (ECC), digital signatures, hash functions, Message Authentication Codes (MACs), and methods for key establishment, including certificates and public-key infrastructure (PKI). Throughout the book, the authors focus on communicating the essentials and keeping the mathematics to a minimum, and they move quickly from explaining the foundations to describing practical implementations, including recent topics such as lightweight ciphers for RFIDs and mobile devices, and current key-length recommendations.
Continue reading “Understanding Cryptography: A Textbook for Students and Practitioners”
Amazon Price: N/A (as of November 25, 2017 07:56 –
Cyber War Conspiracy sketches a frightening conspiracy in the framework of a worldwide cyber war. A scenario that could become reality. In brutal detail the author describes how the superpowers try to control and rule the world. Murder and intrigue in the world of chip technology!
Marc Jansen has just prepared a market analysis on network chips at his desk in Hamburg. This specialist on semiconductor technology suddenly finds himself in an opaque maelstrom of murder, corruption, and intrigue. After the mysterious death in Thailand of a well-known American quantum IT specialist Marc and his partner Lana de Vries are supposed to find out, assigned by an international consortium, what the truth is concerning a new generation of chips. The murdered scientist was allegedly working on producing them. Jansen still has no idea what he is letting himself in for.
Continue reading “The Cyber War Conspiracy: A true techno sci-fi thriller”
Amazon Price: $29.95 $29.95 (as of November 25, 2017 09:59 –
Este libro ofrece una solución real para todos aquellos amantes de la ciberseguridad y el hacking sobre tecnologías Wi-Fi / 802.11, que desean aprender a programar de forma sencilla sus propias herramientas para pentesting o auditoría de redes inalámbricas. En los últimos años Python ha alcanzado un puesto destacado como lenguaje de programación para pentesting gracias a su sencillez y capacidades. La gran cantidad de módulos, librerías y ejemplos disponibles permiten programar fácilmente cualquier tipo de aplicación. Scapy es el módulo más completo de red para Python, y permite analizar, diseccionar o crear cualquier paquete sobre cualquier protocolo de red existente. La escasez de documentación sobre Scapy Dot11 hace de este libro una herramienta única para todos los profesionales, hackers, pentesters, analistas de seguridad y ciberforenses que deseen crear su propio arsenal de herramientas de penetración Wi-Fi El formato de este libro ofrece una primera sección que sirve como introducción teórica sobre las redes Wi-Fi y su estructura de funcionamiento y. La segunda parte, eminentemente práctica, presenta una selección de más de 40 ejemplos de scripts programados en lenguaje Python que utilizan la librería Scapy para realizar operaciones de Hacking y Pentesting Wi-Fi.
Amazon Price: $18.95 $14.84 You save: $4.11 (22%). (as of November 25, 2017 08:35 –
Edward Snowden, Julian Assange, and Chelsea Manning are key figures in the struggles playing out in our democracies over internet use, state secrets, and mass surveillance in the age of terror. When not decried as traitors, they are seen as whistleblowers whose crucial revelations are meant to denounce a problem or correct an injustice. Yet, for Geoffroy de Lagasnerie, they are much more than that. Snowden, Assange, and Manning are exemplars who have reinvented an art of revolt. Consciously or no, they have inaugurated a new form of political action and a new identity for the political subject. Anonymity as practiced by WikiLeaks and the flight and requests for asylum of Snowden and Assange break with traditional forms of democratic protest. Yet we can hardly dismiss them as acts of cowardice. Rather, as Lagasnerie suggests, such solitary choices challenge us to question classic modes of collective action, calling old conceptions of the state and citizenship into question and inviting us to reformulate the language of critical philosophy. In the process, he pays homage to the actions and lives of these three figures.