Amazon Price: N/A (as of July 23, 2017 19:58 –
Learn to identify the social engineer by non-verbal behavior
Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming. Clearly combines both the practical and technical aspects of social engineering security Reveals the various dirty tricks that scammers use Pinpoints what to look for on the nonverbal side to detect the social engineer
Continue reading “Unmasking the Social Engineer: The Human Element of Security”
Learn how to conduct thorough security examinations via illustrations and virtual simulations
A network security breach (a hack, crack, or other invasion) occurs when unauthorized access to the network is achieved and havoc results. The best possible defense is an offensive strategy that allows you to regularly test your network to reveal the vulnerabilities and close the holes before someone gets in. Written by veteran author and security expert John Chirillo, Hack Attacks Testing explains how to perform your own security audits.
Step by step, the book covers how-to drilldowns for installing and configuring your Tiger Box operating systems, installations, and configurations for some of the most popular auditing software suites. In addition, it includes both common and custom usages, scanning methods, and reporting routines of each. Finally, Chirillo inspects the individual vulnerability scanner results and compares them in an evaluation matrix against a select group of intentional security holes on a target network. Chirillo tackles such topics as:
* Building a multisystem Tiger Box
* Basic Windows 2000 Server installation and configuration for auditing
* Basic Linux and Solaris installation and configuration
* Basic Mac OS X installation and configuration for auditing
* ISS, CyberCop, Nessus, SAINT, and STAT scanners
* Using security analysis tools for Mac OS X
* Vulnerability assessment
The CD contains virtual simulations of scanners, ISS Internet Scanner evaluation version, and more.
Click here to buy from Amazon
Amazon Price: N/A (as of July 24, 2017 12:05 –
For decades, privacy took a back seat to the public’s right to know. But as the Internet and changing journalism have made it harder to distinguish news from titillation, U.S. courts are showing new resolve in protecting individuals from invasive media scrutiny. As Amy Gajda shows, this judicial backlash is now impinging on mainstream journalists.
Amazon Price: N/A (as of July 23, 2017 20:52 –
This combination IM Solo-4 (SAS Extender RAID and Expansion-Ready) unit and a 12TB SAS/SATA Data Storage System is a forensic acquisition and digital data storage solution ideal for the Forensic Lab because of its unlimited storage expandability. The 12TB SAS/SATA Data Storage System connects seamlessly to the IMSolo-4 via the built-in SAS Extender RAID Controller Card. The IM Solo-4 + 12TB SAS/SATA Data Storage System combination is ideal for new users who are looking for unlimited storage expandability by combining multiple systems together.
Amazon Price: $20.72 $15.95 (as of July 24, 2017 16:40 –
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security. Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent.
Continue reading “The Art of Deception: Controlling the Human Element of Security”