Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam

Rating: 
Amazon Price: $49.99 $20.05 You save: $29.94 (60%). (as of February 21, 2018 04:55 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.

Topics include:An in-depth view of routers and routingSwitching, using Cisco Catalyst and Nexus switches as examplesSOHO VoIP and SOHO wireless access point design and configurationIntroduction to IPv6 with configuration examplesTelecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLSSecurity, firewall theory, and configuration, as well as ACL and authenticationQuality of Service (QoS), with an emphasis on low-latency queuing (LLQ)IP address allocation, Network Time Protocol (NTP), and device failures

Cyber-Physical Attacks: A Growing Invisible Threat

Rating: 
Amazon Price: N/A (as of February 21, 2018 05:32 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.

The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.
Continue reading “Cyber-Physical Attacks: A Growing Invisible Threat”

Data-Driven Security: Analysis, Visualization and Dashboards

Rating: 
Amazon Price: N/A (as of February 21, 2018 02:21 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Uncover hidden patterns of data and respond withcountermeasures

Security professionals need all the tools at their disposal toincrease their visibility in order to prevent security breaches andattacks. This careful guide explores two of the most powerful ?data analysis and visualization. You'll soon understand how toharness and wield data, from collection and storage to managementand analysis as well as visualization and presentation. Using ahands-on approach with real-world examples, this book shows you howto gather feedback, measure the effectiveness of your securitymethods, and make better decisions.
Continue reading “Data-Driven Security: Analysis, Visualization and Dashboards”

Exploiting Software: How to Break Code

Rating: 
Amazon Price: $64.99 $45.80 You save: $19.19 (30%). (as of February 20, 2018 21:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Praise for Exploiting Software
“Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large and small depend on software to run their businesses every day. The current approach to software quality and security taken by software companies, system integrators, and internal development organizations is like driving a car on a rainy day with worn-out tires and no air bags. In both cases, the odds are that something bad is going to happen, and there is no protection for the occupant/owner. This book will help the reader understand how to make software quality part of the design—a key change from where we are today!” —Tony Scott
Chief Technology Officer, IS&S
General Motors Corporation

“It’s about time someone wrote a book to teach the good guys what the bad guys already know. As the computer security industry matures, books like Exploiting Software have a critical role to play.” —Bruce Schneier
Chief Technology Officer
Counterpane
Author of Beyond Fear and Secrets and Lies
Continue reading “Exploiting Software: How to Break Code”

Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century

Rating: 
Amazon Price: N/A (as of February 21, 2018 05:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.”

–Nate Miller, Cofounder, Stratum Security
Continue reading “Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century”