Healthy Passwords

Rating: 
Amazon Price: N/A (as of June 21, 2018 16:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn To Make Strong Passwords You Can Remember

– Learn how to make strong, memorable passwords using the password sandwich.
Continue reading “Healthy Passwords”

Deep Dive: The Development of an Exploit (Win32)

Rating: 
Amazon Price: $25.90 $24.25 You save: $1.65 (6%). (as of June 21, 2018 11:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber crime is on everyone's lips. It's in the daily news, and every week society gets overwhelmed with information about hacking attacks, industrial espionage, unavailable IT services, and imprisonment of IT criminals. Not least the NSA affair has widely contributed to the "popularity" of headlines about spying out other nations' administrations, companies and citizens. But scarcely anybody understands what a hacker is doing at all. What the heck is hacking actually? This book is a story about exploit development. It demonstrates how a hacker exploits a browser vulnerability, step-by-step. Starting with the crash time analysis of a vulnerable program, the author develops an exploit and shows blow-by-blow how a hacker thinks; what problems come up, and how an attacker can bypass the security protection mechanisms of the operating system. This book is highly technical! The reader is required to have a slightly perverse inclination to read debug messages, memory addresses and assembler instructions. If you're interested in hacking, you will get a quite good understanding about what hacking is in practice. If you're a newbie to Win32 hacking, roll up your sleeves and become a hacker! Learn about shellcode, and how to bypass ASLR and DEP! If you're part of the InfoSec community, have a good reading. This is no theory, this is deep dive!

Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid (Wiley – IEEE)

Rating: 
Amazon Price: N/A (as of June 22, 2018 05:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book bridges the divide between the fields of power systems engineering and computer communication through the new field of power system information theory.

Written by an expert with vast experience in the field, this book explores the smart grid from generation to consumption, both as it is planned today and how it will evolve tomorrow. The book focuses upon what differentiates the smart grid from the "traditional" power grid as it has been known for the last century. Furthermore, the author provides the reader with a fundamental understanding of both power systems and communication networking. It shows the complexity and operational requirements of the evolving power grid, the so-called "smart grid," to the communication networking engineer; and similarly, it shows the complexity and operational requirements for communications to the power systems engineer.
Continue reading “Smart Grid: Communication-Enabled Intelligence for the Electric Power Grid (Wiley – IEEE)”

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Rating: 
Amazon Price: N/A (as of June 21, 2018 21:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Continue reading “Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS”

ASUS B250 MINING EXPERT LGA1151 DDR4 HDMI B250 ATX Motherboard for Cryptocurrency Mining (BTC) with 19 PCIe Slots and USB 3.1 Gen1

Rating: 
Amazon Price: $199.99 $139.99 You save: $60.00 (30%). (as of June 21, 2018 21:43 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Built for superior cryptocurrency mining performance, the ASUS B250 MINING EXPERT features Triple-ATX12V Power Delivery and Mining Mode BIOS Optimization. PCIe Slot State Detection provides instant GPU feedback for 19 PCIe slots while 5X Protection III with Safe Slot Core protects your investment, delivering higher hash rates and better mining ROI.