Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Rating: 
Amazon Price: $49.99 $34.01 You save: $15.98 (32%). (as of September 26, 2018 14:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Applying the scientific method to security is about using techniques to carefully observe, measure, experiment, form explanations, test, and evaluate security processes in software and products. This practical book shows how incorporating these techniques will provide developers with the knowledge to produce more secure, more useful, and more valuable products and services. You'll learn how to:Apply the scientific method to evaluate projects in digital forensics, software assurance, and intrusion detectionDevelop your own security methods using this process to build and sell more secure productsDiscover how to spot bogus security claims and processes

@War: The Rise of the Military-Internet Complex

Rating: 
Amazon Price: $15.95 $10.84 You save: $5.11 (32%). (as of September 26, 2018 02:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Chilling . . . Extraordinary and urgent." — Washington Post

“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
Continue reading “@War: The Rise of the Military-Internet Complex”

Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices

Rating: 
Amazon Price: N/A (as of September 26, 2018 13:41 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn how to use messaging technologies to build responsive and resilient applications for mobile devices and web browsers. With this hands-on guide, you’ll use the STOMP and MQTT messaging protocols to write iOS and web applications capable of sending and receiving GPS and device sensor data, text messages, and alerts.

Messaging protocols are not only simple to use, but also conserve network bandwidth, device memory, and batteries. Using this book’s step-by-step format, author Jeff Mesnil helps you work with Objective-C and JavaScript libraries, as well as the protocols. All you need to get started are basic programming skills.Understand basic messaging concepts and compositionLearn two common messaging models: point-to-point and publish/subscribeUse STOMP to write an iOS application that sends GPS data, and a web app that consumes the dataBuild an iOS app with MQTT that tracks and broadcasts device motion data, and a web app that displays the data and sends alertsExtend STOMP to filter, prioritize, persist, and expire messagesTake a complete tour of STOMP and MQTT, including features not used in the book’s sample apps

Cyber Warfare: How Conflicts in Cyberspace Are Challenging America and Changing the World (The Changing Face of War)

Rating: 
Amazon Price: $52.00 $36.00 You save: $16.00 (31%). (as of September 25, 2018 22:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber Warfare: How Conflicts In Cyberspace Are Challenging America and Changing The World is a comprehensive and highly topical one-stop source for cyber conflict issues that provides scholarly treatment of the subject in a readable format. The book provides a level-headed, concrete analytical foundation for thinking about cybersecurity law and policy questions, covering the entire range of cyber issues in the 21st century, including topics such as malicious software, encryption, hardware intrusions, privacy and civil liberties concerns, and other interesting aspects of the problem.

In Part I, the author describes the nature of cyber threats, including the threat of cyber warfare. Part II describes the policies and practices currently in place, while Part III proposes optimal responses to the challenges we face. The work should be considered essential reading for national and homeland security professionals as well as students and lay readers wanting to understand of the scope of our shared cybersecurity problem.

Google Hacking for Penetration Testers, Third Edition

Rating: 
Amazon Price: N/A (as of September 26, 2018 06:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations.

You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance.
Continue reading “Google Hacking for Penetration Testers, Third Edition”