CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide

Rating: 
Amazon Price: $60.00 $27.14 You save: $32.86 (55%). (as of April 21, 2018 01:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The only official study guide for the new CCSP exam

CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex study tools that include pre-test assessments that show you what you know, and areas you need further review. Objective maps, exercises, and chapter review questions help you gauge your progress along the way, and the Sybex interactive online learning environment includes access to a PDF glossary, hundreds of flashcards, and two complete practice exams. Covering all CCSP domains, this book walks you through Architectural Concepts and Design Requirements, Cloud Data Security, Cloud Platform and Infrastructure Security, Cloud Application Security, Operations, and Legal and Compliance with real-world scenarios to help you apply your skills along the way.
Continue reading “CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide”

Hack Proof: Protecting your privacy and personal data in the Digital Economy

Rating: 
Amazon Price: N/A (as of April 20, 2018 18:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hack Proof – a guide to protecting your privacy and personal data in the digital economy.

You are under surveillance and being tracked without your knowledge. Your personal data is being collected and traded without your permission. Increasing numbers of cyber criminals are out to steal from you. No one is going to protect you and unless you make changes, it is only going to get worse.
Unlike many books that describe the problem, Hack Proof goes further with clear Action Steps and solution links to protect your data and privacy. Chapters include:
Who is tracking you, how and steps to preserve your privacy.
Understand government surveillance.
How businesses track you both on and offline and what to do about it.
Tricks cyber criminals use to attack you.
Protecting yourself from the most common forms of identity theft and fraud including IRS tax fraud and Social security benefit fraud.
Private, encrypted messaging and email solutions.
Smart phone privacy and security.
Social media privacy and security.
Protecting your data while traveling.
Securing smart home and Internet-of-Things devices.

Assessing the Effects of Honeypots on Cyber- Attackers

Amazon Price: N/A (as of September 25, 2016 04:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A honeypot is a non-production system, design to interact with cyber-attackers to collect intelligence on attack techniques and behaviors. While the security community is reaping fruits of this collection tool, the hacker community is increasingly aware of this technology. In response, they develop anti-honeypot technology to detect and avoid honeypots. Prior to the discovery of newer intelligence collection tools, we need to maintain the relevancy of honeypot. Since the development of anti-honeypot technology indicates the deterrent effect of honeypot, we can capitalize on this deterrent effect to develop fake honeypot. Fake honeypot is real production system with deterring characteristics of honeypot that induces the avoidance behavior of cyber-attackers. Fake honeypots will provide operators with workable production systems under obfuscation of deterring honeypot when deployed in hostile information environment. Deployed in a midst of real honeynets, it will confuse and delay cyber-attackers. To understand the effects of honeypot on cyber-attackers to design fake honeypot, we exposed a tightly secured, self-contained virtual honeypot to the Internet over a period of 28 days. We conclude that it is able to withstand the duration of exposure without compromise. The metrics pertaining to the size of last packet suggested departure of cyber-attackers during reconnaissance.

Google Bomb (Russomanno electoral campaign example)

The terms Google Bomb and Googlewashing refer to the practice of causing a web site to rank highly in web search engine results for unrelated or off-topic search terms by linking heavily. In contrast, search engine optimization (SEO) is the practice of improving the search engine listings of web pages for relevant search terms.
It is done for either business, political, or comedic purposes (or some combination thereof). Google's search-rank algorithm ranks pages higher for a particular search phrase if enough other pages linked to it use similar anchor text (linking text such as “Russomano Bar do Alemão” to Sao Paulo city 2016 electoral campaign leading do Celso Russomanno candidate). By January 2007, however, Google tweaked its search algorithm to counter popular Google bombs such as “miserable failure” leading to George W. Bush and Michael Moore; now, search results list pages about the Google bomb itself. As of January 2016, the first result in a Google search for “miserable failure” is the Wikipedia article defining Google bomb. Used both as a verb and a noun, “Google bombing” was introduced to the New Oxford American Dictionary in May 2005.
Google bombing is related to spamdexing, the practice of deliberately modifying HTML to increase the chance of their website being placed close to the beginning of search engine results, or to influence the category to which the page is assigned in a misleading or dishonest manner. During Sao Paulo city electoral campaign, for example, it was introduced a new kind of Google bombing, using radio and television broadcasting. See news at Russomanno Google Bomb.

Audio Jammer

Rating: 
Amazon Price: N/A (as of April 21, 2018 14:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Keep your private conversations private. The AJ-34 AUDIO JAMMER protects your sensitive room conversations by generating a random masking sound which desensitizes any near-by microphone. Effective against any microphone based eavesdropping device including tape recorders RF transmitters hard-wired microphones – including contact type – and shotgun microphones. It also protects against microwave or laser reflection pickups. Because the sound from the jammer varies randomly in frequency and amplitude it cannot be easily filtered and the only sound the eavesdropper will hear is the jammer noise. The convenient end-mounted control lets you select the level of protection for your situation. One unit will protect up to 150 sq. ft. For protecting rooms larger than this we recommend and additional jammer for each 150 sq. ft. of area. The illustrated instructions show suggested jammer placement for different types of rooms and situations so that you can use the AJ-34 effectively. The AJ-34 is powered by one 9 volt alkaline battery – included. The unit measures 4 x 2.5 x 1.5 inches and weighs 7 oz.