Amazon Price: N/A (as of April 26, 2017 20:14 –
This doc covers the basics of anonymity, hactivism, & hidden parts of the Internet underground, along with some of the things you may find there. Disclaimer: Do NOT break the law. This was written to explain what the Darknet / Tor hidden service) is and what kind of things you may find. It is not an invitation to break the law without recourse. Just like any network, this one has both good and bad guys. If you break the law, you will get caught. Bad guys have to be lucky EVERY time. The Good guys only have to be lucky once.
Disclaimer: Do NOT break the law. This was written to explain what the Darknet / Tor hidden service) is and what kind of things you may find. It is not an invitation to break the law without recourse. Just like any network, this one has both good and bad guys. If you break the law, you will get caught. Bad guys have to be lucky EVERY time. The Good guys only have to be lucky once.
Amazon Price: $50.00 $50.00 (as of April 26, 2017 16:01 –
Please note that additional user setup is required to turn on U2F functionality. For more details, please head to yubi.co/unlockU2F.
The YubiKey NEO has all the functionality of a standard YubiKey with the addition of NFC communication for access to mobile devices, Yubico SmartCard applets and Mifare Classic support.
Amazon Price: N/A (as of April 27, 2017 07:07 –
CYBER SECURITY LAW
Cyber security is an increasingly important domain today. Countries across the world are concerned about breaches of cyber security which could prejudicially impact their sovereignty and their national security. Consequently, cyber security law as a discipline has emerged. This eBook will aim to look at what exactly is this emerging discipline of cyber security law. How the said discipline has been defined? What is the significance of cyber security and connected legal, policy and regulatory issues? How significant is this new discipline of cyber security law likely to be in the coming times? This eBook has been written in the simple layman language to analyze complicated technical issues connected with legalities concerning breaches of computer networks and computer systems.
Amazon Price: N/A (as of April 26, 2017 18:56 –
Secrets. Lies. Choices.
When a pharmaceutical company hires Brody Taylor, elite hacker and social engineer, to fortify their digital-defences against a Chinese blackhat cyberattack, Brody stumbles across a secret the company strives to keep under wraps.
Writing Security Tools and Exploits will be the foremost authority on vulnerability and security code and will serve as the premier educational reference for security professionals and software developers. The book will have over 600 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, this book will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques will be included in both the Local and Remote Code sections of the book.
The book will be accompanied with a companion Web site containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
* Provides readers with working code to develop and modify the most common security tools including Nmap and Nessus
* Learn to reverse engineer and write exploits for various operating systems, databases, and applications
* Automate reporting and analysis of security log files
Click here to buy from Amazon