Crimeware: Understanding New Attacks and Defenses

Rating: 
Amazon Price: N/A (as of February 19, 2019 00:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“This book is the most current and comprehensive analysis of the state of Internet security threats right now. The review of current issues and predictions about problems years away are critical for truly understanding crimeware. Every concerned person should have a copy and use it for reference.”

—Garth Bruen, Project KnujOn Designer
Continue reading “Crimeware: Understanding New Attacks and Defenses”

Rootkits: Subverting the Windows Kernel

Rating: 
Amazon Price: N/A (as of August 6, 2017 17:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology–learn how attackers can get in and stay in for years, without detection.

Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers.
Continue reading “Rootkits: Subverting the Windows Kernel”

Mastering the Nmap Scripting Engine

Rating: 
Amazon Price: N/A (as of February 18, 2019 18:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master the Nmap Scripting Engine and the art of developing NSE scripts

About This BookExtend the capabilities of Nmap to perform custom tasks with the Nmap Scripting EngineLearn the fundamentals of Lua programmingDevelop powerful scripts for the Nmap Scripting EngineDiscover all the features and libraries of the Nmap Scripting EngineIn-depth coverage of the Nmap Scripting Engine API and most important libraries with examples
Continue reading “Mastering the Nmap Scripting Engine”

Building Internet Firewalls

Rating: 
Amazon Price: N/A (as of February 19, 2019 01:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks–and the need to protect both business and personal data–have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Continue reading “Building Internet Firewalls”