Amazon Price: N/A (as of June 20, 2018 18:42 –
Anonymous got lucky. When five of its hackers attacked security company HBGary Federal on February 6, 2011, they were doing so in order to defend the group’s privacy. It wasn’t because they hoped to reveal plans to attack WikiLeaks, create surveillance cells targeting pro-union organizations, and sell sophisticated rootkits to the US government for use as offensive cyber weapons—but that’s what they found.
In the weeks after the attack, the hackers released tens of thousands of e-mail messages and made headlines around the world. Aaron Bar, the CEO of HBGary Federal, eventually resigned; 12 Congressman called for an investigation; an ethics complaint was lodged against a major DC law firm involved with some of the more dubious plans.
Continue reading “Unmasked”
Amazon Price: $26.00 $15.93 You save: $10.07 (39%). (as of June 21, 2018 03:32 –
Follow-up to the New York Times bestseller Spy Secrets That Can Save Your Life–revealing high-stakes techniques and survival secrets from real intelligence officers in life-or-death situations around the world
Everyone loves a good spy story, but most of the ones we hear are fictional. That's because the most dangerous and important spycraft is done in secret, often hidden in plain sight.
Continue reading “Survive Like a Spy: Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too”
Amazon Price: $24.95 $16.49 You save: $8.46 (34%). (as of June 20, 2018 22:00 –
IOGear GCS22U 2-Port USB KVM Switch, 2-Port USB Cable KVM allows users to share a VGA monitor, a USB mouse, and a USB keyboard between two computers. Users can switch between computers using a manual switch located on a wired remote controller that can be placed on your desk for ease of reach. It offers an out-of-box solution with no additional cables needed. It supports multiple operating systems including Windows, Sun, and Mac. It is entirely plug-n-play and requires no software to run. It is also powered through the USB bus and thus does not require a power supply to run. It is the ideal KVM for those who want a competitively priced, entry level KVM that will allow them to multitask with two computers at their disposal.
Amazon Price: $195.99 $195.99 (as of October 6, 2015 22:11 –
Testing web security is best done through simulating an attack. Kali Linux lets you do this to professional standards and this is the book you need to be fully up-to-speed with this powerful open-source toolkit. Overview Learn key reconnaissance concepts needed as a penetration tester Attack and exploit key features, authentication, and sessions on web applications Learn how to protect systems, write reports, and sell web penetration testing services In Detail Kali Linux is built for professional penetration testing and security auditing. It is the next-generation of BackTrack, the most popular open-source penetration toolkit in the world. Readers will learn how to think like real attackers, exploit systems, and expose vulnerabilities. Even though web applications are developed in a very secure environment and have an intrusion detection system and firewall in place to detect and prevent any malicious activity, open ports are a pre-requisite for conducting online business. These ports serve as an open door for attackers to attack these applications. As a result, penetration testing becomes essential to test the integrity of web-applications. Web Penetration Testing with Kali Linux is a hands-on guide that will give you step-by-step methods on finding vulnerabilities and exploiting web applications. "Penetration Testing with Kali Linux" looks at the aspects of web penetration testing from the mind of an attacker. It provides real-world, practical step-by-step instructions on how to perform web penetration testing exercises. You will learn how to use network reconnaissance to pick your targets and gather information. Then, you will use server-side attacks to expose vulnerabilities in web servers and their applications. Client attacks will exploit the way end users use web applications and their workstations. You will also learn how to use open source tools to write reports and get tips on how to sell penetration tests and look out for common pitfalls. On the completion of this book, you will have the skills needed to use Kali Linux for web penetration tests and expose vulnerabilities on web applications and clients that access them. What you will learn from this book Perform vulnerability reconnaissance to gather information on your targets Expose server vulnerabilities and take advantage of them to gain privileged access Exploit client-based systems using web application protocols Learn how to use SQL and cross-site scripting (XSS) attacks Steal authentications through session hijacking techniques Harden systems so other attackers do not exploit them easily Generate reports for penetration testers Learn tips and trade secrets from real world penetration testers Approach "Penetration Testing with Kali Linux" contains various penetration testing methods using BackTrack that will be used by the reader. It contains clear step-by-step instructions with lot of screenshots. It is written in an easy to understand language which will further simplify the understanding for the user.
Amazon Price: $78.95 $65.52 You save: $13.43 (17%). (as of June 21, 2018 09:19 –
Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them.