Decompiling Android

Rating: 
Amazon Price: $24.99 $24.99 (as of August 17, 2017 10:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps.

This is becoming an increasingly important topic as the Android marketplace grows and developers are unwittingly releasing the apps with lots of back doors allowing people to potentially obtain credit card information and database logins to back-end systems, as they don’t realize how easy it is to decompile their Android code.
Continue reading “Decompiling Android”

Malware Analyst’s Cookbook and DVD

Malware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious CodeMalware Analyst's Cookbook and DVD: Tools and Techniques for Fighting Malicious Code:  a computer forensics “how-to” for fighting malicious code and analyzing incidents

With our ever-increasing reliance on computers comes an ever-growing risk of malware. Security professionals will find plenty of solutions in this book to the problems posed by viruses, Trojan horses, worms, spyware, rootkits, adware, and other invasive software. Written by well-known malware experts, this guide reveals solutions to numerous problems and includes a DVD of custom programs and tools that illustrate the concepts, enhancing your skills.

  • Security professionals face a constant battle against malicious software; this practical manual will improve your analytical capabilities and provide dozens of valuable and innovative solutions
  • Covers classifying malware, packing and unpacking, dynamic malware analysis, decoding and decrypting, rootkit detection, memory forensics, open source malware research, and much more
  • Includes generous amounts of source code in C, Python, and Perl to extend your favorite tools or build new ones, and custom programs on the DVD to demonstrate the solutions

Malware Analyst's Cookbook is indispensible to IT security administrators, incident responders, forensic analysts, and malware researchers.

Price: $59.99

Click here to buy from Amazon

The Hundred-Year Marathon: China’s Secret Strategy to Replace America as the Global Superpower

Rating: 
Amazon Price: N/A (as of August 16, 2017 22:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

One of the U.S. government's leading China experts reveals the hidden strategy fueling that country's rise – and how Americans have been seduced into helping China overtake us as the world's leading superpower.

For more than forty years, the United States has played an indispensable role helping the Chinese government build a booming economy, develop its scientific and military capabilities, and take its place on the world stage, in the belief that China's rise will bring us cooperation, diplomacy, and free trade. But what if the "China Dream" is to replace us, just as America replaced the British Empire, without firing a shot?
Continue reading “The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower”

#PandemIT (Italian Edition)

Amazon Price: N/A (as of December 26, 2015 00:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In un mondo sempre più veloce e interconnesso, anche le malattie virali si trasmettono con una aggressività maggiore che nei secoli precedenti. Alcuni esempi? L’epidemia di “Spagnola” agli inizi del ‘900, l’H1N1, l’HIV, la SARS e la più recente Ebola. #PandemIT racconta di una diversa ma non meno pericolosa pandemia che parte da un virus informatico, si diffonde attraverso i social media e si trasmette all’uomo. Fantascienza? No. La storia di Ned, don Carlo, Tommaso, Myriam, Natan e Diana è la trasposizione in forma romanzata di quello che è già possibile o che forse è già successo. Il libro contiene anche una serie di appendici di approfondimento, realizzate insieme all’Associazione “Icaro ce l’ha fatta! ONLUS”. I temi trattati sono rivolti a chiunque utilizzi Internet, ma in particolare a genitori e ragazzi, per usare più consapevolmente quella risorsa meravigliosa ed esplosiva che è il World Wide Web e il mondo dei Social Media. NOTA: i proventi derivanti dai diritti d’autore di questo libro saranno interamente devoluti all’Associazione “Icaro ce l’ha fatta! ONLUS” (www.associazioneicaro.org).

Computer Forensics For Dummies

Rating: 
Amazon Price: N/A (as of August 16, 2017 20:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies.

You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents’ methods Handle passwords and encrypted data Work with the courts and win the case
Continue reading “Computer Forensics For Dummies”