Amazon Price: N/A (as of February 22, 2018 08:32 –
Python Passive Network Mapping: P2NMAP is the first book to reveal a revolutionary and open source method for exposing nefarious network activity.
The "Heartbleed" vulnerability has revealed significant weaknesses within enterprise environments related to the lack of a definitive mapping of network assets. In Python Passive Network Mapping, Chet Hosmer shows you how to effectively and definitively passively map networks. Active or probing methods to network mapping have traditionally been used, but they have many drawbacks – they can disrupt operations, crash systems, and – most importantly – miss critical nefarious activity. You require an accurate picture of the environments you protect and operate in order to rapidly investigate, mitigate, and then recover from these new attack vectors. This book gives you a deep understanding of new innovations to passive network mapping, while delivering open source Python-based tools that can be put into practice immediately.
Continue reading “Python Passive Network Mapping: P2NMAP”
Amazon Price: $194.00 (as of February 22, 2018 06:07 –
Cyber attacks disturb business operations, leak confidential information, and disrupt organizations, government agencies, and individuals on a daily basis. In this revealing work, experienced policymakers, security practitioners, and academic experts explain ways to combat current and future cyber attacks through technology. The inclusion of recent cybercrime case studies in the book serves to showcase current crime methodologies, incident response, investigative procedures, and forensic analysis and techniques.
The first volume of the set focuses on cybersecurity issues that impact government as well as the government's role in managing the nation's digital security. The second volume addresses the security issues that affect the private sector, particularly businesses engaged in technology endeavors. The third volume considers issues that impact consumers as well as users of social media and other communication tools. This comprehensive resource provides strategies for early identification and prevention of future attacks, and proposes workable solutions for maintaining a secure data environment.
Amazon Price: $49.95 $41.95 You save: $8.00 (16%). (as of February 22, 2018 08:56 –
As data hiding detection and forensic techniques have matured, people are creating more advanced stealth methods for spying, corporate espionage, terrorism, and cyber warfare all to avoid detection. Data Hiding provides an exploration into the present day and next generation of tools and techniques used in covert communications, advanced malware methods and data concealment tactics. The hiding techniques outlined include the latest technologies including mobile devices, multimedia, virtualization and others. These concepts provide corporate, goverment and military personnel with the knowledge to investigate and defend against insider threats, spy techniques, espionage, advanced malware and secret communications. By understanding the plethora of threats, you will gain an understanding of the methods to defend oneself from these threats through detection, investigation, mitigation and prevention.Provides many real-world examples of data concealment on the latest technologies including iOS, Android, VMware, MacOS X, Linux and Windows 7Dives deep into the less known approaches to data hiding, covert communications, and advanced malwareIncludes never before published information about next generation methods of data hidingOutlines a well-defined methodology for countering threatsLooks ahead at future predictions for data hiding