Amazon Price: $49.95 $39.96 You save: $9.99 (20%). (as of January 21, 2018 01:17 –
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used by security professionals everywhere, the tool can be hard to grasp for first-time users. Metasploit: The Penetration Tester's Guide fills this gap by teaching you how to harness the Framework and interact with the vibrant community of Metasploit contributors.
Once you've built your foundation for penetration testing, you’ll learn the Framework's conventions, interfaces, and module system as you launch simulated attacks. You’ll move on to advanced penetration testing techniques, including network reconnaissance and enumeration, client-side attacks, wireless attacks, and targeted social-engineering attacks.
Continue reading “Metasploit: The Penetration Tester's Guide”
Amazon Price: $72.08 (as of January 21, 2018 07:44 –
Computer Virus Books We are witnessing on escalating computer-virus arms race – virus, vaccine, counter-virus – that has created a whole anti-virus industry.. software programs, consultants, and many books. The most reliable intelligence from this conflict has been collected in Computer Viruses, Worms, Data Diddlers, Killer Programs, and Other Threats to Your System, by John McAfee. When corporations in Silicon Valley discover a virus, they call McAfee, who arrives in a specially outfitted virus-buster van. " His book, written for the computer-security trade, gives a comprehensive dossier of all known viral strains, post and present (up to fall 1989), and much insider scuttlebutt that is very readable for the lay user. On the other hand, Virus! by Allan Lundell is a wild, irresponsible, and highly speculative book that dramatically exaggerates the subtle attributes of computer viruses, and therefore is the more revealing one, in a vaudeville way. It tackles the question, "What does a computer virus moon?" Treat what is said as well- founded rumor. There's probably more in these two books than most want to know, but for both computer crime- and computer life-watchers, the trail begins here.
Amazon Price: N/A (as of January 20, 2018 23:56 –
The Bitmain AntMiner S5 is the most power-efficient Bitcoin miner currently on the market. While other manufacturers ask you to wait indefinitely for preorders which may never come, Bitmain has been delivering consistently for months. The AntMiner S5 offers users a simple and straightforward setup process. Just plug it in, configure its IP address, enter your mining pool information, and it will do the rest. You can have your S5 units up and running within minutes of receiving them.
Amazon Price: N/A (as of January 21, 2018 01:25 –
An international security expert shows how competitive organizations can get—and stay—ahead by thinking like their adversaries
Amazon Price: N/A (as of January 21, 2018 00:04 –
This excellent report has been professionally converted for accurate flowing-text e-book format reproduction. This research paper develops the foundation for a new military operating concept to "fight the net" in support of 8th Air Force requirements and stand-up as the new Cyber Command. It applies the Air Force Concept Development framework to examine cyberspace as a newly designated warfare domain, and proposes cyber capabilities and effects that the Air Force should develop and apply as it seeks to execute its mission in cyberspace. Before the Air Force can effectively lead in the cyber domain, it must first fully characterize cyber conditions, threats, and vulnerabilities, and clearly define how and where it can contribute to the national cyberspace strategy. Once the Air Force accomplishes these tasks, it can then focus on the nature of war in the cyber domain and consider the implications for military doctrine and operations. In order to successfully build capability and capacity for operating in cyberspace, the Air Force needs to institutionalize "cyber-mindedness" to underpin organizational, research and development, and human capital investments that the Air Force needs "to fly and fight" effectively in cyberspace.
THE CYBER DILEMMA * Bounding the Cyberspace Domain * Requirement for a New Framework * Physical Attributes * Domain Differentiation: Cyber versus Information Operations in Cyberspace * Broad Implications for Joint Military Operating Concepts * Effects in Cyberspace * Implications for Command and Control, Network Operations, and ISR * A New Military Problem and New Solutions * Missions that Assure Operations in Cyberspace * Time Horizon, Assumptions, and Risks * Relevance and Concluding Thoughts * THE U.S. CYBER SITUATION – THE PERFECT STORM? * Current Conditions in the Cyber Domain * Information Infrastructure and Critical Infrastructure * Existing "Weather Fronts" – Cyber Threat Agents * Threat and Threat Agent Defined * Threat Agent Profiles * Strong Tropical Disturbance Feeding Energy to the Weather Fronts a.k.a. Cyber Vulnerabilities * Battling the Simultaneously Challenging Winds of Change * U.S. National Strategic Way Ahead * National Strategy * Government Report Card * The Air Force and the Cyber Domain * THE CYBERSPACE DOMAIN OF WAR * Conduct of War in Cyberspace * The Classics * The American Way of War * Military Operational Design * The Role of Technology * Principles and Functions of War * OPERATING IN CYBERSPACE * Intrinsic Characteristics as a Unique Combat Domain * Broader Span of Effects * Surgical Precision * Stealthy/Low Probability of Detection * Non-attribution/Untraceable * Cyber Capabilities * Cyber ISR * Target System Identification and Profiling * Access and Installation of a Persistent Presence * Mapping of Enemy Systems and Data * Analyzing Adversary Capabilities * Determining Adversary Intentions * Attack/Retaliatory Strike Planning * Cyber Defense * Protection from Attack * Attack Detection and Attribution * Automated Attack Responses and Operator Alerts * Self-healing of Systems and Networks * Rapid Recovery after Attack * Cyber Attack * Cyber Attack Authorization * Disruption of Adversary C2 Systems, Processes, and Data * Denying Access to Adversary Systems and Data * Degrading Adversary System Performance * Destruction of Adversary Data, Computers, Networks * Cyberspace Effects * Cyber ISR * Cyber Defense * Cyber Attack * RECOMMENDATIONS ON THE WAY AHEAD * Methodology * Cyberspace and the Revolution in Military Affairs Debate * Revolution in Military Affairs Defined * So What? * Cyberspace Operations as a Mission Capability Package * Critical Factors * Constituting a Cyber Warfare Corps * Training for Cyber Combat * Organizing Cyber Forces * Cyber Weapon Funding * CONCLUDING THOUGHTS * BIBLIOGRAPHY