High-Tech Crimes Revealed: Cyberwar Stories from the Digital Front

Rating: 
Amazon Price: $34.99 $34.99 (as of June 25, 2018 02:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Stories about hacking, stolen credit card numbers, computer viruses, andidentity theft are all around us, but what do they really mean to us? The goal ofthis book, quite simply, is to help educate people on the issues with high-techcrimes, to help answer that question. The goal being not to only talk aboutthese issues, but understand them.There are many books on the market that explain how hackers exploitcomputer and networks. They explain the details of the exploits and methodsto protect against them, and as such are targeted for those with strong technicalknowledge. That is *not* the case here. Readers will not learn the intricacies ofthe latest hacking attack. Readers will learn how hackers use these exploits, whythey use them, and in some cases how they get caught.With Branigan's background as a sworn law-enforcement officer (cop), systemadministrator (geek), computer programmer (geek), Internet security consultant(geek with tie), and network security researcher (geek in shorts), he offers aunique perspective to help people better understand the many issues with hightechcrime and how they might be affected.

Cryptography Decrypted

Rating: 
Amazon Price: $54.99 $44.81 You save: $10.18 (19%). (as of June 25, 2018 10:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Shows you how to safeguard digital possessions. This book is a practical guide to the essentials of computer cryptography. It explains secret keys and secret key methods like DES, public and private keys, and public key methods like RSA; how keys are distributed through digital certificates; and three real-world systems.

Fuzzing: Brute Force Vulnerability Discovery

Rating: 
Amazon Price: N/A (as of June 24, 2018 22:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version.

FUZZING
Continue reading “Fuzzing: Brute Force Vulnerability Discovery”

Security Metrics: Replacing Fear, Uncertainty, and Doubt

Rating: 
Amazon Price: $69.99 $51.53 You save: $18.46 (26%). (as of June 24, 2018 15:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Definitive Guide to Quantifying, Classifying, and Measuring Enterprise IT Security Operations

Security Metrics is the first comprehensive best-practice guide to defining, creating, and utilizing security metrics in the enterprise.
Continue reading “Security Metrics: Replacing Fear, Uncertainty, and Doubt”

Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)

Rating: 
Amazon Price: $39.99 (as of June 24, 2018 15:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

You already know the endless list of security "do's and don'ts": run AV software and firewalls, lock everything down, encrypt everything, watch all your network traffic, follow checklists… But even if you're spending a fortune doing all that, you're at greater risk than ever: even the world's most security-focused organizations are being victimized by massive attacks. Something is terribly wrong. We're protecting the wrong things, damaging productivity, and making it way too hard for our people to help us.

Today, getting security right requires more than checklists; it requires careful thinking about your actual threats and technologies. That's what this book is about: how to think about security. Most security books just give you "do's and don'ts." Thinking Security tells you why, and helps you design a security architecture that truly fits your organization.
Continue reading “Thinking Security: Stopping Next Year’s Hackers (Addison-Wesley Professional Computing Series)”