Principios de Ciberguerra: Una Guía para Oficiales Militares (Spanish Edition)

Rating: 
Amazon Price: $12.95 $12.95 (as of May 20, 2018 17:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

La ciberguerra se define como la manipulación de información en el ciberespacio, con el objetivo de crear disrupciones en los procesos del contrincante. Esta manipulación de la información se logra de tres maneras: por medio de la extracción, modificación, y denegación. El objetivo de este libro es darle al oficial militar una metodología clara que le permita diseñar una doctrina de ciberguerra, con sus elementos estratégicos, tácticos, y operacionales, así como su diseño organizacional. SOBRE EL AUTOR Sergio Castro Reynoso es director del Instituto Catenari (www.catenari.org), presidente de la Alianza de Seguridad Informática (www.asilatam.org), y tiene 18 años de experiencia en consultoría de tecnología y seguridad informática.

Netcat Power Tools

Rating: 
Amazon Price: N/A (as of May 20, 2018 12:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Originally released in 1996, Netcat is a netowrking program designed to read and write data across both Transmission Control Protocol TCP and User Datagram Protocol (UDP) connections using the TCP/Internet Protocol (IP) protocol suite. Netcat is often referred to as a "Swiss Army knife" utility, and for good reason. Just like the multi-function usefullness of the venerable Swiss Army pocket knife, Netcat's functionality is helpful as both a standalone program and a backe-end tool in a wide range of applications. Some of the many uses of Netcat include port scanning, transferring files, grabbing banners, port listening and redirection, and more nefariously, a backdoor. This is the only book dedicated to comprehensive coverage of the tool's many features, and by the end of this book, you'll discover how Netcat can be one of the most valuable tools in your arsenal.

* Get Up and Running with Netcat Simple yet powerful…Don't let the trouble-free installation and the easy command line belie the fact that Netcat is indeed a potent and powerful program.
* Go PenTesting with Netcat Master Netcat's port scanning and service identification capabilities as well as obtaining Web server application information. Test and verify outbound firewall rules and avoid detection by using antivirus software and the Window Firewall. Also, create a backdoor using Netcat.
* Conduct Enumeration and Scanning with Netcat, Nmap, and More! Netcat's not the only game in town…Learn the process of network of enumeration and scanning, and see how Netcat along with other tools such as Nmap and Scanrand can be used to thoroughly identify all of the assets on your network.
* Banner Grabbing with Netcat Banner grabbing is a simple yet highly effective method of gathering information about a remote target, and can be performed with relative ease with the Netcat utility.
* Explore the Dark Side of Netcat See the various ways Netcat has been used to provide malicious, unauthorized access to their targets. By walking through these methods used to set up backdoor access and circumvent protection mechanisms through the use of Netcat, we can understand how malicious hackers obtain and maintain illegal access. Embrace the dark side of Netcat, so that you may do good deeds later.
* Transfer Files Using Netcat The flexability and simple operation allows Netcat to fill a niche when it comes to moving a file or files in a quick and easy fashion. Encryption is provided via several different avenues including integrated support on some of the more modern Netcat variants, tunneling via third-party tools, or operating system integrated IPsec policies.
* Troubleshoot Your Network with Netcat Examine remote systems using Netat's scanning ability. Test open ports to see if they really are active and see what protocls are on those ports. Communicate with different applications to determine what problems might exist, and gain insight into how to solve these problems.
* Sniff Traffic within a System Use Netcat as a sniffer within a system to collect incoming and outgoing data. Set up Netcat to listen at ports higher than 1023 (the well-known ports), so you can use Netcat even as a normal user.
Continue reading “Netcat Power Tools”

Hacked Again

Rating: 
Amazon Price: N/A (as of May 20, 2018 22:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hacked Again details the ins and outs of cybersecurity expert and CEO of a top wireless security tech firm, Scott Schober, as he struggles to understand the motives and mayhem behind his being hacked. As a small business owner, family man, and tech pundit, Scott finds himself leading a compromised life. By day, he runs a successful security company and reports on the latest cyber breaches in the hopes of offering solace and security tips to millions of viewers. But, when a mysterious hacker begins to steal thousands from his bank account, go through his trash, and take over his social media identity, Scott stands to lose everything he has worked so hard for.

Amidst the backdrop of major breaches, Scott shares tips and best practices for all consumers. Most importantly, he shares his own story of being hacked repeatedly and how he has come to realize that the only thing as important as his own cybersecurity is that of his readers and viewers.

Red Hat Certified System Administrator – Exam EX200 – Training DVD

Rating: 
Amazon Price: $49.95 $49.95 (as of May 20, 2018 11:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Number of Videos: 6.5 hours – 96 lessons
Ships on: DVD-ROM
User Level: Beginner
Works On: Windows 7,Vista,XP- Mac OS X

In this Red Hat Certified Systems Administrator Exam EX200 training course, expert author Ric Messier will teach you everything you need to know to become a Red Hat Certified System Administrator (RHCSA). This course is designed for users that are familiar with Red Hat Enterprise Linux environments. You will start by learning the fundamentals, such as basic shell commands, creating and modifying users, and changing passwords. Rick will then teach you about the shell, explaining how to manage files, use the stream editor, and locate files. This video tutorial will also cover system management, including booting and rebooting, network services, and installing packages. Other topics that are covered include storage management, server management, virtual machines, and security. Once you have completed this computer based training course, you will be fully capable of taking the RHCSA EX200 exam and becoming a Red Hat Certified System Administrator.

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Networking & Comm – OMG)

Rating: 
Amazon Price: $60.00 $37.62 You save: $22.38 (37%). (as of May 21, 2018 10:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Best practices for protecting critical data and systems

Information Assurance Handbook: Effective Computer Security and Risk Management Strategies discusses the tools and techniques required to prevent, detect, contain, correct, and recover from security breaches and other information assurance failures. This practical resource explains how to integrate information assurance into your enterprise planning in a non-technical manner. It leads you through building an IT strategy and offers an organizational approach to identifying, implementing, and controlling information assurance initiatives for small businesses and global enterprises alike.
Continue reading “Information Assurance Handbook: Effective Computer Security and Risk Management Strategies (Networking & Comm – OMG)”