Hacking: Digital Media and Technological Determinism (DMS – Digital Media and Society)

Amazon Price: N/A (as of October 23, 2017 23:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book introduces and explains hacking in all its manifestations: crackers, open source, hacktivists and the digital proletariat. The way all hackers contest the nature of digital media which increasingly dominate our social worlds is explored and analysed.

Honeypots for Windows (Books for Professionals by Professionals)

Rating: 
Amazon Price: $39.99 $39.99 (as of October 23, 2017 09:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

* Talks about hardening a Windows host before deploying Honeypot

* Covers how to create your own emulated services to fool hackers
Continue reading “Honeypots for Windows (Books for Professionals by Professionals)”

The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy

Rating: 
Amazon Price: N/A (as of October 23, 2017 23:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.

Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Kali Linux distribution and focuses on the seminal tools required to complete a penetration test.

Neuromancer

Rating: 
Amazon Price: N/A (as of October 24, 2017 05:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

SPECIAL 20TH ANNIVERSARY EDITION —THE MOST IMPORTANT AND INFLUENTIAL SCIENCE FICTION NOVEL OF THE PAST TWO DECADES

Twenty years ago, it was as if someone turned on a light. The future blazed into existence with each deliberate word that William Gibson laid down. The winner of Hugo, Nebula, and Philip K. Dick Awards, Neuromancer didn't just explode onto the science fiction scene—it permeated into the collective consciousness, culture, science, and technology.
Continue reading “Neuromancer”

Social Engineering: The Art of Human Hacking

Rating: 
Amazon Price: $34.99 $22.18 You save: $12.81 (37%). (as of October 23, 2017 14:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering.
Continue reading “Social Engineering: The Art of Human Hacking”