Amazon Price: N/A (as of June 24, 2017 23:51 –
Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.
For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
Continue reading “Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software”
Amazon Price: $27.95 $27.95 (as of June 25, 2017 00:16 –
An Independent and New Statesman Book of the Year
Beyond the familiar online world that most of us inhabit—a world of Google, Facebook, and Twitter—lies a vast and often hidden network of sites, communities, and cultures where freedom is pushed to its limits, and where people can be anyone, or do anything, they want. This is the world of Bitcoin and Silk Road, of radicalism and pornography. This is the Dark Net.
Continue reading “The Dark Net: Inside the Digital Underworld”
Amazon Price: N/A (as of June 24, 2017 06:22 –
Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses.
In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine-based lab that includes Kali Linux and vulnerable operating systems, you'll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you'll experience the key stages of an actual assessment – including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more.
Continue reading “Penetration Testing: A Hands-On Introduction to Hacking”
Amazon Price: N/A (as of June 24, 2017 22:07 –
The highly successful security book returns with a new edition, completely updated
Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks
Continue reading “The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws”
Amazon Price: $30.00 $29.94 You save: $0.06 (%). (as of June 24, 2017 21:54 –
“Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency” is one of the few books that covers destructive Computer Network Attacks in the Internet and in CyberSpace. It is an in-depth reference that covers DDOS from motivation, identification, analysis and mitigation.
By the author of the consistently top-selling in class "How to Cheat at Managing Information Security" and like that book, proceeds go to charity. Osborne starts with Network/Internet provider business practices and existing monitoring & detection systems. It shows the current focus on other forms of attacks including traditional electronic espionage, counter-terrorism and malware. It then describes various mechanisms for estimation of Cyberattack impact covering direct cost, indirect cost, and customer churn.
Continue reading “Cyber Attack, CyberCrime, CyberWarfare – CyberComplacency: Is Hollywood's blueprint for Chaos coming true”