Violent Python: A Cookbook for Hackers, Forensic Analysts, Penetration Testers and Security Engineers

Rating: 
Amazon Price: N/A (as of July 28, 2017 01:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation. Instead of relying on another attacker’s tools, this book will teach you to forge your own weapons using the Python programming language. This book demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts. It also shows how to write code to intercept and analyze network traffic using Python, craft and spoof wireless frames to attack wireless and Bluetooth devices, and how to data-mine popular social media websites and evade modern anti-virus.

– Demonstrates how to write Python scripts to automate large-scale network attacks, extract metadata, and investigate forensic artifacts.
– Write code to intercept and analyze network traffic using Python. Craft and spoof wireless frames to attack wireless and Bluetooth devices.
– Data-mine popular social media websites and evade modern anti-virus.

Cyber Crime Prevention: The Self Help

Amazon Price: $105.00 $91.49 You save: $13.51 (13%). (as of July 28, 2017 02:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber law governs the legal issues of cyberspace and that"cyberspace"is not restricted to the internet,but includes computers and computer networks,the Internet,data,software etc.The information technology is a double edge sword,which can be used for destructive as well as constructive work.Thus the fate of many ventures depends upon the benign or vice intentions,as the case may be,the person dealing with and using the technology.A malicious intention forwarded in the form of hacking,data theft,virus attack,etc.can bring only destructive results.These methods however may also be used for checking the authenticity, safety and security of ones technological device,which has been primarily relied upon and trusted for providing the security to a particular organisation.For instance the creater of the"Sasser Worm"has been hired as a"Security Software Programmer"by a German firm,so that he can make firewalls,which will stop suspected files from entering computer systems.This exercise of hiring those persons who are responsible for causing havoc and nuisance is the recognition of the growing and inevitable need of"Self protection",which is recognized in all the countries of the world.

High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front

Rating: 
Amazon Price: $34.99 $6.93 You save: $28.06 (80%). (as of July 28, 2017 06:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Stories about hacking, stolen credit card numbers, computer viruses, andidentity theft are all around us, but what do they really mean to us? The goal ofthis book, quite simply, is to help educate people on the issues with high-techcrimes, to help answer that question. The goal being not to only talk aboutthese issues, but understand them.There are many books on the market that explain how hackers exploitcomputer and networks. They explain the details of the exploits and methodsto protect against them, and as such are targeted for those with strong technicalknowledge. That is *not* the case here. Readers will not learn the intricacies ofthe latest hacking attack. Readers will learn how hackers use these exploits, whythey use them, and in some cases how they get caught.With Branigan's background as a sworn law-enforcement officer (cop), systemadministrator (geek), computer programmer (geek), Internet security consultant(geek with tie), and network security researcher (geek in shorts), he offers aunique perspective to help people better understand the many issues with hightechcrime and how they might be affected.

We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency

Rating: 
Amazon Price: $26.99 $12.00 You save: $14.99 (56%). (as of July 27, 2017 11:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A thrilling, exclusive expose of the hacker collectives Anonymous and LulzSec.

WE ARE ANONYMOUS is the first full account of how a loosely assembled group of hackers scattered across the globe formed a new kind of insurgency, seized headlines, and tortured the feds-and the ultimate betrayal that would eventually bring them down. Parmy Olson goes behind the headlines and into the world of Anonymous and LulzSec with unprecedented access, drawing upon hundreds of conversations with the hackers themselves, including exclusive interviews with all six core members of LulzSec.
Continue reading “We Are Anonymous: Inside the Hacker World of LulzSec, Anonymous, and the Global Cyber Insurgency”

No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State

Rating: 
Amazon Price: N/A (as of July 27, 2017 13:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

No Place to Hide is a groundbreaking look at the NSA surveillance scandal, from the reporter who broke the story

Investigative reporter for The Guardian and bestselling author Glenn Greenwald, provides an in-depth look into the NSA scandal that has triggered a national debate over national security and information privacy. With further revelations from documents entrusted to Glenn Greenwald by Edward Snowden himself, this book explores the extraordinary cooperation between private industry and the NSA, and the far-reaching consequences of the government’s surveillance program, both domestically and abroad.