The Basics of Cyber Warfare: Understanding the Fundamentals of Cyber Warfare in Theory and Practice

Rating: 
Amazon Price: N/A (as of June 19, 2018 00:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As part of the Syngress Basics series, The Basics of Cyber Warfare provides readers with fundamental knowledge of cyber warfare in both theoretical and practical aspects. This book explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The Basics of Cyber Warfare teaches readers the principles of cyber warfare, including military doctrine, cyber doctrine, and both offensive and defensive tactics and procedures. Readers learn the basics of how to defend against:
• Espionage
• Hactivism
• Insider threats
• State-sponsored attacks
• Non-state actors such as organized criminals and terrorists
The Basics of Cyber Warfare gives readers a concise overview of these threats, and outlines the ethics, laws and consequences of cyber war. This book is designed as an introductory book to give readers insight into the concepts and techniques of cyber warfare. The authors’ other title, Cyber Warfare, published by Syngress in 2011, will be mentioned in the Introduction of this book for readers who are interested in diving in to these topics and techniques in more depth.

• Provides a sound understanding of the tools and tactics used in cyber warfare.
• Describes both offensive and defensive tactics from an insider’s point of view.
• Presents doctrine and hands-on techniques you need to understand as cyber warfare evolves with technology.

A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security

Rating: 
Amazon Price: N/A (as of June 18, 2018 02:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"This is one of the most interesting infosec books to come out in the last several years."
–Dino Dai Zovi, Information Security Professional

"Give a man an exploit and you make him a hacker for a day; teach a man to exploit bugs and you make him a hacker for a lifetime."
–Felix 'FX' Lindner
Continue reading “A Bug Hunter’s Diary: A Guided Tour Through the Wilds of Software Security”

Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software

Rating: 
Amazon Price: N/A (as of June 19, 2018 01:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Malware analysis is big business, and attacks can cost a company dearly. When malware breaches your defenses, you need to act quickly to cure current infections and prevent future ones from occurring.

For those who want to stay ahead of the latest malware, Practical Malware Analysis will teach you the tools and techniques used by professional analysts. With this book as your guide, you'll be able to safely analyze, debug, and disassemble any malicious software that comes your way.
Continue reading “Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software”

Linux Firewalls (3rd Edition)

Rating: 
Amazon Price: $54.99 (as of June 18, 2018 02:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

An Internet-connected Linux machine is in a high-risk situation. Linux Firewalls, Third Edition details security steps that any sized implementation–from home use to enterprise level–might take to protect itself from potential remote attackers. As with the first two editions, this book is especially useful for its explanations of iptables, packet filtering, and firewall optimization along with some advanced concepts including customizing the Linux kernel to enhance security.The third edition, while distribution neutral, has been updated for the current Linux Kernel and provides code examples for Red Hat, SUSE, and Debian implementations. Don't miss out on the third edition of the critically acclaimed Linux Firewalls.

Hacker’s Challenge : Test Your Incident Response Skills Using 20 Scenarios

Rating: 
Amazon Price: $37.00 $22.57 You save: $14.43 (39%). (as of June 19, 2018 00:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Mike Schiffman has hit upon a great formula for Hacker's Challenge. Rather than try to research, fully understand, and adequately explain attacks that have taken place on other people's networks–the approach taken by too many writers of books about computer security–Schiffman lets network administrators and security experts tell their stories first-hand. This is good. What's better is that Schiffman has edited each of their war stories into two sections: one that presents the observations the sysadmin or security consultant made at the time of the attack, and another (in a separate part of the book) that ties the clues together and explains exactly what was going on. The challenge in the title is for you to figure out what the bad guys were doing–and how best to stop them–before looking at the printed solution. Let's call this book what it is: an Encyclopedia Brown book for people with an interest in network security.

It doesn't really matter, from a value-for-money standpoint, whether your skills are up to the challenge or not. The accounts of intrusions–these are no-kidding, real-life attacks that you can probably learn from, by the way–are written like chapters from a novel (though log file listings, network diagrams, and performance graphs appear alongside the narrative text). Recall every time you've seen a movie or read a book with computer scenes so technically inaccurate they made you wish for a writer with a clue. Schiffman and Hacker's Challenge is what you wished for. –David Wall
Continue reading “Hacker’s Challenge : Test Your Incident Response Skills Using 20 Scenarios”