Amazon Price: N/A (as of December 13, 2017 15:36 –
Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set
About This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand how to decipher x86 assembly code from source code inside your favourite development environmentA step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process
Continue reading “Windows Malware Analysis Essentials”
Amazon Price: N/A (as of December 13, 2017 20:15 –
The Alfa AWUS036H is the latest version of the most powerful card available. This has a stunning 1000mW output power. So if you are looking for a device to connect to an outdoor 2.4 GHz antenna, such as on a boat or an RV, this is a perfect solution. It outperforms wireless cards that are built in to newer laptops. Adding this to your laptop or desktop computer will enhance range and signal quality at longer distances. And works with Win98SE/200/ME/XP, Windows Vista, Windows 7, Linux (kernel 2.6.6 and later) and Macintosh (OS version 10.4). And the necessary drivers for ALL of these operating systems are included on CD-ROM.
Amazon Price: N/A (as of December 14, 2017 05:10 –
Cyberspace has certainly transformed the world. From media and communications to banking, an increasing number of daily activities is performed online. We are living digital lifestyles. While this transformation has opened up exciting new frontiers, it also opens the door to security threats undreamed of in previous generations. In this eBook, we peer behind the cyber curtain. First, we look at the hackers—Section 1 discusses who they are, how they work, their motivations and methods. The opening article examines hardware—specifically microprocessors and why they are vulnerable to tampering. Then we turn to the internal attacks, the worms and viruses whose resulting damage ranges from merely inconvenient and attention-getting to expensive and dangerous. In the latter category falls the Stuxnet virus, which attacked Iran's nuclear facilities and is discussed in "Hacking the Lights Out." Section 2 takes a broad look at issues of privacy and the technology used to gather and track personal information. The first article, “The End of Privacy?”, analyzes how the definition of privacy has changed, often along generational lines, in the cyber age. With so much personal information volunteered on social networking and other sites, how much privacy can people expect? Most of us leave a trail of data wherever we go, and subsequent articles in this section look at how. On a positive note, Section 3 covers innovative technologies used to secure cyber networks and safeguard information. In particular, “Beyond Fingerprinting” discusses replacing identifiers like user names and passwords with biometrics—behavioral or anatomical markers including but not limited to fingerprints. This, like other technology, is becoming more widespread as inexpensive sensors and microprocessors become available, and the race between the hackers and information security professionals continues.
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
The authors are professional penetration testers who have been involved in web application security for nearly a decade. They have presented training courses at the Black Hat security conferences throughout the world. Under the alias “PortSwigger”, Dafydd developed the popular Burp Suite of web application hack tools.
Click here to buy from Amazon
Amazon Price: N/A (as of December 13, 2017 22:48 –
The Alfa AWUS036H is the latest version of the most powerful card available. This has a stunning 1000mW output power. So if you are looking for a device to connect to an outdoor 2.4 GHz antenna, such as on a boat or an RV, this is a perfect solution. It outperforms wireless cards that are built in to newer laptops. Adding this to your laptop or desktop computer will enhance range and signal quality at longer distances. And works with Win98SE/200/ME/XP, Windows Vista, Windows 7, Linux (kernel 2.6.6 and later) and Macintosh (OS version 10.4). And the necessary drivers for ALL of these operating systems are included on CD-ROM
* Connects at a full 54Mbps via USB 2.0, up to 8 times faster than a USB 1.1 adapter
* High gain upgradeable
* Compact size for greater flexibility
* Also compatible with USB 1.1 desktop and notebook computers
* Plug-and-Play Compatible with windows 98SE, 2000, Millennium, XP and Linux
* High security 64/128/256bit WEP Encryption, TKIP, WPA, 802.11
Continue reading “Alfa AWUS036H Upgraded to 1000mW 1W 802.11b/g High Gain USB Wireless Long-Rang WiFi network Adapter with 5dBi Rubber Antenna and a 7dBi Panel Antenna – for Wardriving & Range Extension *Strongest on the Market*”