Amazon Price: N/A (as of May 23, 2019 05:20 –
Criminals using hacking techniques can cost corporations, governments, and individuals millions of dollars each year. While the media focuses on the grand-scale attacks that have been planned for months and executed by teams and countries, there are thousands more that aren't broadcast. Low Tech Hacking focuses on the everyday hacks that, while simple in nature, actually add up to the most significant losses. Attackers are using common techniques like social engineering, wireless hacking, and targeting and surveillance to gain access to valuable data. This book contains detailed descriptions of potential threats and vulnerabilities, many of which the majority of the information systems world may be unaware. Author Jack Wiles spent many years as an inside penetration testing team leader, proving these threats and vulnerabilities exist and their countermeasures work. His contributing authors are among the best in the world in their respective areas of expertise.
Contains insider knowledge of what could be your most likely Low Tech threatIncludes timely advice from some of the top security minds in the worldCovers many detailed countermeasures that you can employ to improve your security posture
Amazon Price: $89.95 $69.58 You save: $20.37 (23%). (as of May 22, 2019 15:19 –
Research Methods for Cyber Security teaches the needed scientific methods for generating impactful theories, adding critical rigor to the cyber security field.
Research Methods for Cyber Security begins by showing how cyber security fits amongst other scientific fields. The book shows how to develop a research plan, beginning with starting research with a question, then offers a detailed description of the five approaches to cyber security research; formal theoretical, study, hypothetico-deductive, predictive modeling, and applied research. Each approach concludes with recommended outlines and suggested templates for submission to peer reviewed venues. The book concludes with addressing solutions to key cross-cutting issues within cyber security research.
Continue reading “Research Methods for Cyber Security”
Amazon Price: N/A (as of May 23, 2019 00:30 –
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”
– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.
Continue reading “Network Forensics: Tracking Hackers through Cyberspace”
Amazon Price: $69.97 (as of May 22, 2019 10:36 –
This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.
The topics covered include bypassing login mechanisms, injecting code, exploiting logic flaws and compromising other users. Because every web application is different, attacking them entails bringing to bear various general principles, techniques and experience in an imaginative way. The most successful hackers go beyond this, and find ways to automate their bespoke attacks. This handbook describes a proven methodology that combines the virtues of human intelligence and computerized brute force, often with devastating results.
Continue reading “The Web Application Hacker’s Handbook: Discovering and Exploiting Security Flaws”
Amazon Price: $49.95 $35.00 You save: $14.95 (30%). (as of May 22, 2019 11:31 –
Nmap Network Scanning is the official guide to the Nmap Security Scanner, a free and open source utility used by millions of people for network discovery, administration, and security auditing. From explaining port scanning basics for novices to detailing low-level packet crafting methods used by advanced hackers, this book by Nmap's original author suits all levels of security and networking professionals. The reference guide documents every Nmap feature and option, while the remainder demonstrates how to apply them to quickly solve real-world tasks. Examples and diagrams show actual communication on the wire. Topics include subverting firewalls and intrusion detection systems, optimizing Nmap performance, and automating common networking tasks with the Nmap Scripting Engine. Visit http://nmap.org/book for more information and sample chapters.