SAVE when you buy the CISSP® Boxed Set, plus bonus DVD!
Bonus DVD contains audio and video instruction featuring Shon Harris and other cybersecurity experts from Human Element Security, LLC
Continue reading “CISSP Boxed Set 2015 Common Body of Knowledge Edition (All-in-One)”
The Cold War paved the way for computers to be used as weapons. Jake Downing was there from the beginning. He was America’s first cyber spy.
Jake grew up in rural America during the 50’s, went to war for America and was wounded. He returned home, attended college and did pioneering research in computer science.
Continue reading “Cold War Cyber Spy”
The rapid development in information technology during the last few decades has not only given us greater opportunities to freely search for information and contacts. The growth of the Internet has also created new opportunities for criminal organisations, political activists and terrorists to threaten individuals, companies and countries. Individuals and organisations are also increasingly the targets of attacks and espionage via the web. There are various kinds of illegitimate and criminal activities. Every modern state thus has to create strategies and courses of action in order to protect information, networks and computers that are vital to society from malicious cyber activities. Creating secure systems and minimising risks of information being leaked or tampered with should be a prioritised task. It is also important to understand what threats arise from the information technological revolution. The purpose of this book is to give a broad background to the development of the dark side of the internet and its consequences. It is not about scaremongering, but about creating understanding and knowledge and thus preparedness in order to handle detrimental activities. It describes the changes in progress and what they may mean to society, companies and individuals as well as to the military and police.
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Continue reading “Cuckoo Malware Analysis”