Amazon Price: $19.74 (as of September 21, 2019 10:06 –
DISCOVER EVERYTHING YOU NEED TO KNOW ABOUT THE TWO MOST POPULAR CRYPTOCURRENCIES IN THE WORLD
Note – This is a two book BUNDLE PACK containing the 2 following books:
BITCOIN: THE INSIDER GUIDE TO BLOCKCHAIN TECHNOLOGY, CRYPTOCURRENCY, AND MINING BITCOIN
Leading the cryptocurrency industry in terms of transaction volume, Bitcoin yields a seemingly infinite amount of untapped potential as both a digital currency, and even as a form of private investment.
ETHEREUM: THE INSIDER GUIDE TO BLOCKCHAIN TECHNOLOGY, CRYPTOCURRENCY, AND MINING BITCOIN Only second to Bitcoin in terms of transaction volume as a digital currency, Ethereum is the fastest growing cryptocurrency with people learning more of its use as not only a blockchain, but a potential digital asset that can be used as an investment.
This bundle pack will teach you everything you need to know about Ethereum & Bitcoin and will get you up to date on the latest uses and benefits of the blockchain.
Just as how you may have been left in the dust with investing in Bitcoin during the short market a couple years ago, DO NOT MISS OUT on buying this book before investing in Ethereum & Bitcoin. Find out exactly what you need to know and BUY NOW!
Amazon Price: $49.95 $38.85 You save: $11.10 (22%). (as of September 21, 2019 09:30 –
Attacking Network Protocols is a deep-dive into network vulnerability discovery from James Forshaw, Microsoft's top bug hunter. This comprehensive guide looks at networking from an attacker's perspective to help you find, exploit, and ultimately protect vulnerabilities.
Part I starts with a rundown of networking basics and traffic capture, as it builds a foundation for analyzing a network. Part II moves on to protocol analysis, both static and dynamic; you'll learn about common protocol structures, cryptography, and protocol security, and how to reverse engineer code with IDA Pro, ILSpy, and Javasnoop. Part III focuses on finding and exploiting vulnerabilities, including an overview of common bug classes, fuzzing, debugging, exhaustion attacks, and how to develop custom tools. Forshaw ends with an overview of the best tools for analyzing and exploiting networks. By the book's end, you'll have a deep understanding of how to analyze network communication and where to look for vulnerabilities. You'll learn how to:Capture, manipulate, and spoof packets both passively and on the wireCreate your own capture frameworkReverse engineer code, brute force passwords, and decrypt traffic Exploit vulnerabilities with denial-of-service attacks, SQL injections, and memory corruptionsUse protocol capture tools like IDA Pro, Wireshark, and CANAPEStrengthen your exploits by rerouting network traffic, exploiting compression, and controlling data flowAttacking Network Protocols is a must-have for any penetration tester, bug hunter, or developer looking to exploit and secure network vulnerabilities.
Amazon Price: $24.99 $16.11 You save: $8.88 (36%). (as of September 20, 2019 22:01 –
With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a camera or a robot? Set up Linux distributions for media centers or PBX phone systems? That’s just the beginning of what you’ll find inside Raspberry Pi Hacks.
If you’re looking to build either a software or hardware project with more computing power than Arduino alone can provide, Raspberry Pi is just the ticket. And the hacks in this book will give you lots of great ideas.Use configuration hacks to get more out of your PiBuild your own web server or remote print serverTake the Pi outdoors to monitor your garden or control holiday lightsConnect with SETI or construct an awesome Halloween costumeHack the Pi’s Linux OS to support more complex projectsDecode audio/video formats or make your own music playerAchieve a low-weight payload for aerial photographyBuild a Pi computer cluster or a solar-powered lab
Amazon Price: $39.95 (as of September 20, 2019 22:33 –
In this book you'll learn everything you wanted to know about computer viruses, ranging from the simplest 44-byte virus right on up to viruses for 32-bit Windows, Unix and the Internet. You'll learn how anti-virus programs stalk viruses and what viruses do to evade these digital policemen, including stealth techniques and poly-morphism. Next, you'll take a fascinating trip to the frontiers of science and learn about genetic viruses. Will such viruses take over the world, or will they become the tools of choice for the information warriors of the 21st century? Finally, you'll learn about payloads for viruses, not just destructive code, but also how to use a virus to compromise the security of a computer, and the possibility of beneficial viruses.
Amazon Price: $170.00 $49.64 You save: $120.36 (71%). (as of September 20, 2019 16:26 –
Cyber Resilience Best Practices provides organizations with a methodology for implementing cyber resilience. It offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.
Continue reading “Cyber Resilience Best Practices”