The Art of Deception: Controlling the Human Element of Security

Rating: 
Amazon Price: N/A (as of July 20, 2019 16:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security
Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief."
Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

Ransomware: Defending Against Digital Extortion

Rating: 
Amazon Price: $39.99 $23.27 You save: $16.72 (42%). (as of July 19, 2019 19:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the network.

Security experts Allan Liska and Timothy Gallo explain how the success of these attacks not only has spawned several variants of ransomware, but also a litany of ever-changing ways they’re delivered to targets. You’ll learn pragmatic methods for responding quickly to a ransomware attack, as well as how to protect yourself from becoming infected in the first place.Learn how ransomware enters your system and encrypts your filesUnderstand why ransomware use has grown, especially in recent yearsExamine the organizations behind ransomware and the victims they targetLearn how wannabe hackers use Ransomware as a Service (RaaS) to launch campaignsUnderstand how ransom is paid—and the pros and cons of payingUse methods to protect your organization’s workstations and servers

Mastering Wireless Penetration Testing for Highly Secured Environments

Rating: 
Amazon Price: N/A (as of July 19, 2019 17:39 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Scan, exploit, and crack wireless networks by using the most advanced techniques from security professionals

About This BookConduct a full wireless penetration test and implement defensive techniques that can be used to protect wireless systemsCrack WEP, WPA, and even WPA2 wireless networksA hands-on guide teaching how to expose wireless security threats through the eyes of an attacker
Continue reading “Mastering Wireless Penetration Testing for Highly Secured Environments”

Research Methods for Cyber Security

Rating: 
Amazon Price: $89.95 $68.42 You save: $21.53 (24%). (as of July 20, 2019 02:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Research Methods for Cyber Security teaches the needed scientific methods for generating impactful theories, adding critical rigor to the cyber security field.

Research Methods for Cyber Security begins by showing how cyber security fits amongst other scientific fields. The book shows how to develop a research plan, beginning with starting research with a question, then offers a detailed description of the five approaches to cyber security research; formal theoretical, study, hypothetico-deductive, predictive modeling, and applied research. Each approach concludes with recommended outlines and suggested templates for submission to peer reviewed venues. The book concludes with addressing solutions to key cross-cutting issues within cyber security research.
Continue reading “Research Methods for Cyber Security”

Cloud Storage Security: A Practical Guide (Computer Science Reviews and Trends)

Rating: 
Amazon Price: $39.95 $34.15 You save: $5.80 (15%). (as of July 20, 2019 06:52 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cloud Storage Security: A Practical Guide introduces and discusses the risks associated with cloud-based data storage from a security and privacy perspective. Gain an in-depth understanding of the risks and benefits of cloud storage illustrated using a Use-Case methodology. The authors also provide a checklist that enables the user, as well as the enterprise practitioner to evaluate what security and privacy issues need to be considered when using the cloud to store personal and sensitive information.Describes the history and the evolving nature of cloud storage and securityExplores the threats to privacy and security when using free social media applications that use cloud storageCovers legal issues and laws that govern privacy, compliance, and legal responsibility for enterprise usersProvides guidelines and a security checklist for selecting a cloud-storage service providerIncludes case studies and best practices for securing data in the cloudDiscusses the future of cloud computing