Amazon Price: $64.99 $55.52 You save: $9.47 (15%). (as of March 23, 2017 00:10 –
“This book gives thorough, scholarly coverage of an area of growing importance in computer security and is a ‘must have’ for every researcher, student, and practicing professional in software protection.”
—Mikhail Atallah, Distinguished Professor of Computer Science at Purdue University
Theory, Techniques, and Tools for Fighting Software Piracy, Tampering, and Malicious Reverse Engineering
Amazon Price: $28.00 $27.98 You save: $0.02 (%). (as of March 23, 2017 04:05 –
As our economy and our society grow increasingly dependent on cyberspace we are only just beginning to understand how vulnerable that dependency makes us to catastrophic failure. Numerous books and expert studies have defined and detailed the accelerating threat. They are long on alarming description but short on prescribing a real solution, beyond spending billions of dollars on ever more complex technology, inexorably eroding the value of privacy in the name of security. This book clarifies shows how the security methods we have designed for the physical world are futile in cyberspace. If we want effective cybersecurity we need to understand the real and different nature of cyberspace, and the decision makers and security professionals have to understand the laws and rules of cyberspace and why and how they work in cybersecurity. Victor Sheymov’s comprehensive multi-disciplinary approach suggests a fundamentally new approach to security in cyberspace, using methods native to cyberspace, and his book lays out a foundation for an effective, feasible and reliable cybersecurity technology. The book consists of three parts. The first part, Security, is a review of access security in the world of our physical space. This review shows the reasons why our efforts in access security historically have been reasonably effective. The second part, Cyberspace, examines the specific qualities of cyberspace. It explains the fundamental differences between physical and cyberspace, and how these differences are relevant to cybersecurity. The third part, Cybersecurity, shows that methods used in computer security for the last quarter of a century are fundamentally alien to cyberspace. It explains why our efforts to secure cyberspace so far have been completely ineffective. It introduces new approaches to cybersecurity based on methods that are native to cyberspace that can provide real security in cyberspace, as well as protect our critical infrastructure. The Author: Victor Sheymov is a computer security expert, author, scientist, inventor, and holder of multiple patents for methods and systems in cyber security. He was responsible for coordination of all security aspects of Russian cipher communications with its outposts abroad when he was exfiltrated with his wife and daughter by the CIA in 1980. He worked for the National Security Agency for a number of years and is a recipient of several prestigious awards in intelligence and security.
Amazon Price: $24.99 $24.99 (as of March 22, 2017 06:45 –
Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code from prying eyes. This is also a good way to see how good and bad Android apps are constructed and how to learn from them in building your own apps.
This is becoming an increasingly important topic as the Android marketplace grows and developers are unwittingly releasing the apps with lots of back doors allowing people to potentially obtain credit card information and database logins to back-end systems, as they don’t realize how easy it is to decompile their Android code.
Amazon Price: N/A (as of March 22, 2017 17:29 –
The Internet can appear to be elegantly designed, but as The Washington Post’s Craig Timberg demonstrated in his illuminating series “Net of Insecurity,” the network is much more an assemblage of kludges—more Frankenstein than Ferrari—that endure because they work, or at least work well enough.
The defects hackers use often are well-known and ancient in technological terms, surviving only because of an industry-wide penchant for patching over problems rather than replacing the rot – and because Washington largely shrugged. At critical moments in the development of the Internet, some of the country’s smartest minds warned leaders at the Pentagon and in Congress, but were largely ignored.
Amazon Price: $49.99 $37.49 You save: $12.50 (25%). (as of March 22, 2017 07:08 –
Modern organizations rely on Security Operations Center (SOC) teams to vigilantly watch security systems, rapidly detect breaches, and respond quickly and effectively. To succeed in these crucial tasks, SOCs desperately need more qualified cybersecurity professionals. Cisco's new CCNA Cyber Ops certification prepares candidates to begin a career working with associate-level cybersecurity analysts within SOCs. To earn this valuable certification, candidates must pass two exams. CCNA Cyber Ops SECOPS #210-255 Official Cert Guide is Cisco's official, comprehensive self-study resource for the second of these two exams.
Designed for all CCNA Cyber Ops candidates, it covers every SECOPS #210-255 objective concisely and logically, with extensive teaching features designed to promote retention and understanding. You'll find: