Amazon Price:$19.95(as of June 17, 2018 16:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.
Topics covered include:
* Installation on Windows, Mac OS X, Unix/Linux platforms
* Basic and advanced scanning techniques
* Network inventory and security auditing
* Firewall evasion techniques
* Zenmap – A graphical front-end for Nmap
* NSE – The Nmap Scripting Engine
* Ndiff – A Nmap scan comparison utility Continue reading “Nmap Cookbook: The Fat-free Guide to Network Scanning”
“The threat to the Internet from worms, viruses, botnets, and zombie computers is real, and growing. Counting from Zero is a great way to come up to speed on the alarming state of affairs, and Johnston draws you in with his story and believable cast of characters.”
Today, every computer connected to the Internet is under constant attack from viruses, worms, port scans, and spam. Security professionals continually fight to contain newly unleashed cyber attacks, known as ‘zero day’ attacks, only to have new attacks launched. Millions of computers have already succumbed, and, without their owner’s knowledge, have become slave computers – remotely controlled ‘zombies’. Under the control of organized crime and backed by foreign governments, these computers are morphing into collections known in the industry as botnets, short for robot networks.
Internet security expert Mick O’Malley is the only one who recognizes the growing threat of the ultimate zero day attack on the Internet from a massive botnet, and his unique hacker skills and network of colleagues enable him to fight back. More cyber prep than cyber punk, Mick uses real-life tools and techniques to encrypt all his communications, and uses these skills to break the encryption used by the botnet. Mick uses encryption on a personal level, too, having multiple passports and multiple names and identities. While crisscrossing the globe in the air, on land, and at sea investigating the threat, Mick becomes the target of attacks on his reputation, his identity, and ultimately his life.
Along the way, Mick meets Kateryna Petrescu, a beautiful Romanian firewall expert. Mick’s attraction to Kateryna develops as they work closely together and share the excitement and danger. Why is the government following Mick and trying to intercept his communications? Can he stop the zero day attack before it is unleashed? What will be the cost to Mick for his single mindedness?
Unfolding across three continents, the new cybercrime mystery “Counting from Zero” gives a realistic insider’s view of the thrust and parry world of computer security and cryptography, and the very real threat of botnets.
Amazon Price:N/A(as of May 12, 2016 00:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
In Intelligence-Based Security in Private Industry, Thomas A. Trier identifies the inherent need and desire for intelligence-based security that exists throughout the private security industry. He provides a general overview of intelligence-based security and specific implementation guidelines to reduce private businesses’ risk and vulnerability to criminal activities.
This book is practical and informational, demonstrating real applications of the concepts, theories, and methods of gathering and acting upon information that may suggest a threat to a company. It explains the difference between risk assessments, vulnerability assessments, and threat assessments, defines external and internal threats, and outlines how strategies to address either form of threat differ. It also establishes an outline of four key parts to an effective intelligence program: assessment, evaluation, analysis, and mitigation. Continue reading “Intelligence-Based Security in Private Industry”
Amazon Price:$9.99 $9.99 (as of June 17, 2018 18:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
Seasoned Digital Currency entrepreneur, Pablo Lema (Tradcom SA, LPAL, Butter-Bot), takes us on a journey through the signs and signals that he looks for when investing in a new Cryptocurrency. Focused on long term investment, the book is short, concise, and to the point; it's wisdom is easy to absorb. Useful for those starting out in crypto, as well as a refresher course on the basics for seasoned investors.
Amazon Price:$50.00 $25.43 You save: $24.57 (49%). (as of June 17, 2018 03:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.
The first guide to planning and performing a physical penetration test on your computer's security
Most IT security teams concentrate on keeping networks and systems safe from attacks from the outside-but what if your attacker was on the inside? While nearly all IT teams perform a variety of network and application penetration testing procedures, an audit and test of the physical location has not been as prevalent. IT teams are now increasingly requesting physical penetration tests, but there is little available in terms of training. The goal of the test is to demonstrate any deficiencies in operating procedures concerning physical security. Continue reading “Unauthorised Access: Physical Penetration Testing For IT Security Teams”