Cyber Security Engineering: A Foundation for Operational Security (SEI Series in Software Engineering)

Rating: 
Amazon Price: $39.99 $30.34 You save: $9.65 (24%). (as of November 22, 2017 21:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book brings together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security early and throughout the full lifecycles of both system development and acquisition. Pioneering software assurance experts Nancy R. Mead and Dr. Carol Woody present the latest practical knowledge and case studies, demonstrating strategies and techniques that have been repeatedly proven to reduce operational problems and the need for software patching. Using these methods, any software practitioner or manager can make system and software engineering decisions that are far more likely to achieve appropriate operational results.

Drawing on their pioneering work at the Software Engineering Institute (SEI) and Carnegie Mellon University, the authors introduce seven core principles of software assurance, and demonstrate how to apply them through all four key areas of cybersecurity engineering:
Continue reading “Cyber Security Engineering: A Foundation for Operational Security (SEI Series in Software Engineering)”

Plugable USB Bluetooth 4.0 Low Energy Micro Adapter (Windows 10, 8.1, 8, 7, XP, Raspberry Pi, Linux Compatible; Classic Bluetooth, and Stereo Headset Compatible)

Rating: 
Amazon Price: $24.99 $13.95 You save: $11.04 (44%). (as of November 23, 2017 09:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Designed for maximum compatibility, small size, and low power, this Plugable adapter upgrades Windows and Linux PCs with the latest Bluetooth 4.0 support.

The adapter is a compact USB Class 2 Low Energy Bluetooth Adapter with LED. It works with other Bluetooth devices within approximately 10m (30 foot) radius, depending on environmental factors, with transfer rates up to 3 Mbps. The adapter offers the market leading Broadcom BCM20702 chipset and backwards compatibility with classic Bluetooth (1.x and 2.x) devices. It offers the option of the Broadcom (WIDCOMM) software driver stack, for cases when the built-in Windows drivers do not provide all desired Bluetooth functionality.
Continue reading “Plugable USB Bluetooth 4.0 Low Energy Micro Adapter (Windows 10, 8.1, 8, 7, XP, Raspberry Pi, Linux Compatible; Classic Bluetooth, and Stereo Headset Compatible)”

How to Defeat Advanced Malware: New Tools for Protection and Forensics

Amazon Price: $39.95 $39.95 (as of November 22, 2017 19:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How to Defeat Advanced Malware is a concise introduction to the concept of micro-virtualization. The book provides current facts and figures that prove detection- based security products have become ineffective. A simple strategy is then presented that both leverages the opportunities presented by Bring Your Own Device (BYOD) and protects enterprise end users against advanced malware. The book concludes with case studies demonstrating how hardware- isolated micro-VMs are helping Fortune 500 financial service providers defeat advanced malware.
This book is primarily designed for infosec professionals, consultants, network administrators, CIO’s, CTO’s, CISO’s and senior executives who work within the financial industry and are responsible for their company’s endpoint protection.
How to Defeat Advanced Malware: New Tools for Protection and Forensics is the first book to compare and contrast current endpoint security products, while making a case for encouraging and facilitating the growth of BYOD and social media by adopting micro-virtualization.Learn the basics of protecting your company's online-accessible assetsDiscover strategies that take advantage of micro-virtualization and BYODBecome adept at comparing and utilizing different endpoint security products and strategies

Windows Malware Analysis Essentials

Rating: 
Amazon Price: N/A (as of November 23, 2017 13:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master the fundamentals of malware analysis for the Windows platform and enhance your anti-malware skill set

About This BookSet the baseline towards performing malware analysis on the Windows platform and how to use the tools required to deal with malwareUnderstand how to decipher x86 assembly code from source code inside your favourite development environmentA step-by-step based guide that reveals malware analysis from an industry insider and demystifies the process
Continue reading “Windows Malware Analysis Essentials”

Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare

Rating: 
Amazon Price: N/A (as of November 23, 2017 13:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As the Cyber Attacks heat up and countries like China, Russia and North Korea target the United States, its individuals, banking institutions, military and government agencies become targets on a large scale. A recent ISACA and RSA Conference Survey indicated that 8 out of 10 board of directors are concerned with security. Eighty two (82) percent of organizations predict a cyber attack is likely. It will take a giant army to fight off the new generation of cyber attackers. Encryption, firewalls and authentication may be the first line of defense but you are the first line of defense in your household! The steps you make can affect your family for generations to come. As the first responder in your household, make sure you have the determination, perseverance and basic tools necessary to fight off an attack NOW!