Cuckoo Malware Analysis

Rating: 
Amazon Price: N/A (as of June 27, 2017 17:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In Detail

Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Continue reading “Cuckoo Malware Analysis”

Professional Hadoop Solutions

Rating: 
Amazon Price: N/A (as of June 28, 2017 03:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The go-to guidebook for deploying Big Data solutions with Hadoop

Today's enterprise architects need to understand how the Hadoop frameworks and APIs fit together, and how they can be integrated to deliver real-world solutions. This book is a practical, detailed guide to building and implementing those solutions, with code-level instruction in the popular Wrox tradition. It covers storing data with HDFS and Hbase, processing data with MapReduce, and automating data processing with Oozie. Hadoop security, running Hadoop with Amazon Web Services, best practices, and automating Hadoop processes in real time are also covered in depth.
Continue reading “Professional Hadoop Solutions”

Mastering Wireless Penetration Testing for Highly Secured Environments

Rating: 
Amazon Price: N/A (as of June 28, 2017 03:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This BookConduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systemsCrack WEP, WPA, and even WPA2 wireless networksA hands-on guide teaching how to expose wireless security threats through the eyes of an attacker
Continue reading “Mastering Wireless Penetration Testing for Highly Secured Environments”

Cybersecurity: The Pivotal Role of Communications Networks

Amazon Price: $14.99 $14.99 (as of June 27, 2017 16:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This hearing will continue our examination of cybersecurity and our communications infrastructure with a focus on what Internet Service Providers (ISPs) are doing to address cybersecurity, whether there are statutory or regulatory obstacles hampering their efforts, how we can encourage public-private partnerships, and how we can facilitate information sharing among private industry and between the private and public sectors.

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon

Rating: 
Amazon Price: $25.00 $14.76 You save: $10.24 (41%). (as of June 27, 2017 09:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mystery—apparently as much to the technicians replacing the centrifuges as to the inspectors observing them.

Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
Continue reading “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon”