CEH Certified Ethical Hacker Study Guide

Rating: 
Amazon Price: $49.99 $12.45 You save: $37.54 (75%). (as of July 21, 2019 08:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Full Coverage of All Exam Objectives for the CEH Exams 312-50 and EC0-350

Thoroughly prepare for the challenging CEH Certified Ethical Hackers exam with this comprehensive study guide. The book provides full coverage of exam topics, real-world examples, and includes a CD with chapter review questions, two full-length practice exams, electronic flashcards, a glossary of key terms, and the entire book in a searchable pdf e-book.
Continue reading “CEH Certified Ethical Hacker Study Guide”

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace

Access Controlled: The Shaping of Power, Rights, and Rule in Cyberspace (Information Revolution and Global Politics)Internet filtering, censorship of Web content, and online surveillance are increasing in scale, scope, and sophistication around the world, in democratic countries as well as in authoritarian states. The first generation of Internet controls consisted largely of building firewalls at key Internet gateways; China’s famous Great Firewall of China is one of the first national Internet filtering systems. Today the new tools for Internet controls that are emerging go beyond mere denial of information. These new techniques, which aim to normalize (or even legalize) Internet control, include targeted viruses and the strategically timed deployment of distributed denial-of-service (DDoS) attacks, surveillance at key points of the Internet’s infrastructure, take-down notices, stringent terms of usage policies, and national information shaping strategies. Access Controlled reports on this new normative terrain.

The book, a project from the OpenNet Initiative (ONI), a collaboration of the Citizen Lab at the University of Toronto’s Munk Centre for International Studies, Harvard’s Berkman Center for Internet and Society, and the SecDev Group, offers six substantial chapters that analyze Internet control in both Western and Eastern Europe and a section of shorter regional reports and country profiles drawn from material gathered by the ONI around the world through a combination of technical interrogation and field research methods.

Chapter authors: Ronald Deibert, Colin Maclay, John Palfrey, Hal Roberts, Rafal Rohozinski, Nart Villeneuve, Ethan Zuckerman

Information Revolution and Global Politics series

Price: $25.00

Click here to buy from Amazon

Information Security and Cybersecurity at the Federal Aviation Administration: Challenges and Control Efforts

Amazon Price: $120.00 $112.11 You save: $7.89 (7%). (as of July 21, 2019 17:12 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

MQTT im IoT: Einstieg in die M2M-Kommunikation (shortcuts 123) (German Edition)

Amazon Price: N/A (as of July 21, 2019 11:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Die Kommunikation zwischen Geräten über das Internet ist längst keine Zukunftsmusik mehr. Kapitel 1 dieses shortcuts zeigt, wie mithilfe des MQTT-Protokolls und der Eclipse-Paho-Bibliothek eine Kommunikation unter Geräten möglich wird; als Beispiel wird ein Temperatursensor betrachtet. Im zweiten Kapitel geht der shortcut auf die Aufbereitung und Visualisierung der Daten ein, die eine Modifizierung des Controlcenters erfordert. Das dritte Kapitel widmet sich einem Eclipse-M2M-Projekt, in dem es um die Steuerung fliegender Haifische geht. Im abschließenden Kapitel wird ein Ausblick auf die EclipseCon Europe 2014 geliefert und das Projekt Eclipse SCADA mit seinen wichtigen Komponenten und deren Funktionsweisen vorgestellt.

Low Tech Hacking: Street Smarts for Security Professionals

Rating: 
Amazon Price: $49.95 $28.75 You save: $21.20 (42%). (as of July 21, 2019 11:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Low Tech Hacking teaches your students how to avoid and defend against some of the simplest and most common hacks. Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. This book focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. It provides detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. It contains insider knowledge of what could be your most likely low-tech threat, with timely advice from some of the top security minds in the world.

Author Jack Wiles spent many years as an inside penetration testing team leader, proving that these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise. The book is organized into 8 chapters covering social engineering; locks and ways to low tech hack them; low tech wireless hacking; low tech targeting and surveillance; low tech hacking for the penetration tester; the law on low tech hacking; and information security awareness training as a countermeasure to employee risk.
Continue reading “Low Tech Hacking: Street Smarts for Security Professionals”