Amazon Price: N/A (as of March 24, 2018 05:30 –
In Cory Doctorow's wildly successful Little Brother, young Marcus Yallow was arbitrarily detained and brutalized by the government in the wake of a terrorist attack on San Francisco–an experience that led him to become a leader of the whole movement of technologically clued-in teenagers, fighting back against the tyrannical security state.
A few years later, California's economy collapses, but Marcus's hacktivist past lands him a job as webmaster for a crusading politician who promises reform. Soon his former nemesis Masha emerges from the political underground to gift him with a thumbdrive containing a Wikileaks-style cable-dump of hard evidence of corporate and governmental perfidy. It's incendiary stuff–and if Masha goes missing, Marcus is supposed to release it to the world. Then Marcus sees Masha being kidnapped by the same government agents who detained and tortured Marcus years earlier.
Continue reading “Homeland”
Amazon Price: $131.63 (as of March 24, 2018 00:28 –
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, Hacker Techniques, Tools, and Incident Handling provides readers with a clear, comprehensive introduction to the many threats on our Internet environment and security and what can be done to combat them.
Amazon Price: $76.99 $55.77 You save: $21.22 (28%). (as of March 24, 2018 04:59 –
“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”
– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.
“It’s like a symphony meeting an encyclopedia meeting a spy novel.”
–Michael Ford, Corero Network Security
Continue reading “Network Forensics: Tracking Hackers through Cyberspace”
Amazon Price: N/A (as of March 24, 2018 02:34 –
This book introduces and explains hacking in all its manifestations: crackers, open source, hacktivists and the digital proletariat. The way all hackers contest the nature of digital media which increasingly dominate our social worlds is explored and analysed.
Amazon Price: $44.99 $33.50 You save: $11.49 (26%). (as of March 23, 2018 20:24 –
Honeypots are highly sophisticated technologies used to observe and learn about hackers. Practical and commercial interest in these new forms of hacker defense is now hitting the mainstream. There are many successful commercial honeypots, including ManTrap and Specter. Security expert Marcus Ranum notes in his Foreword, "Right now there are about a half-dozen commercial honeypot products on the market. Within a year, I predict there will be dozens. Within two years, there will be a hundred." Spitzner also covers legal issues, one of the most controversial subjects concerning honeypots, receiving extensive guidance from the Department of Justice in writing the legal material. The book, Know Your Enemy was written by a team of authors, and focuses on a special type of honeypot via a research project called The Honeynet Project. This new book is written by the acknowledged honeypot expert and discusses many different types of honeypot technologies. They are perfect companion books. Get a strong foundation with "Honeypots" and explore more details of honeypot deployment with Know Your Enemy.