Tableau TK9 FireWire Forensic Bridge Kit

Amazon Price: $399.00 $399.00 (as of October 12, 2017 04:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Tableau's Forensic FireWire Bridge offers secure, hardware write-blocking for FireWire storage devices. The T9 supports FireWire800 (1394B) and FireWire400 (1394A) storage devices which use the SBP-2 (Serial Bus Protocol-2) storage protocol. The T9 works universally with external FireWire hard disks, FireWire RAIDs, older Apple iPods with FireWire interfaces, and other FireWire storage devices.

Survive Like a Spy: Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too

Rating: 
Amazon Price: $26.00 $17.68 You save: $8.32 (32%). (as of September 25, 2018 02:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Follow-up to the New York Times bestseller Spy Secrets That Can Save Your Life–revealing high-stakes techniques and survival secrets from real intelligence officers in life-or-death situations around the world

Everyone loves a good spy story, but most of the ones we hear are fictional. That's because the most dangerous and important spycraft is done in secret, often hidden in plain sight.
Continue reading “Survive Like a Spy: Real CIA Operatives Reveal How They Stay Safe in a Dangerous World and How You Can Too”

DNSSEC Mastery: Securing the Domain Name System with BIND (IT Mastery Book 2)

Rating: 
Amazon Price: N/A (as of September 25, 2018 01:27 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

DNS is one of the oldest protocols on the Internet, and was designed for a network without hostile users. Anyone who wants to break into a network starts by investigating the target's Domain Name Service. DNS Security Extensions, or DNSSEC, hardens DNS and brings it into the 21st century. But learning DNSSEC requires wading through years of obsolete tutorials, dead ends, and inscrutable standards.

Until now.
Continue reading “DNSSEC Mastery: Securing the Domain Name System with BIND (IT Mastery Book 2)”

Stealing the Network: How to Own a Shadow

Rating: 
Amazon Price: N/A (as of September 25, 2018 07:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The best-selling Stealing the Network series reaches its climactic conclusion as law enforcement and organized crime form a high-tech web in an attempt to bring down the shadowy hacker-villain known as Knuth in the most technically sophisticated Stealing book yet.

Stealing the Network: How to Own a Shadow is the final book in Syngress’ ground breaking, best-selling, Stealing the Network series. As with previous title, How to Own a Shadow is a fictional story that demonstrates accurate, highly detailed scenarios of computer intrusions and counter-strikes. In How to Own a Thief, Knuth, the master-mind, shadowy figure from previous books, is tracked across the world and the Web by cyber adversaries with skill to match his own. Readers will be amazed at how Knuth, Law Enforcement, and Organized crime twist and torque everything from game stations, printers and fax machines to service provider class switches and routers steal, deceive, and obfuscate. From physical security to open source information gathering, Stealing the Network: How to Own a Shadow will entertain and educate the reader on every page. The book’s companion Web site will also provide special, behind-the-scenes details and hacks for the reader to join in the chase for Knuth.
Continue reading “Stealing the Network: How to Own a Shadow”