Amazon Price: N/A (as of February 22, 2018 17:46 –
Everyone knows that Google lets you search billions of web pages. But few people realize that Google also gives you hundreds of cool ways to organize and play with information.
Since we released the last edition of this bestselling book, Google has added many new features and services to its expanding universe: Google Earth, Google Talk, Google Maps, Google Blog Search, Video Search, Music Search, Google Base, Google Reader, and Google Desktop among them. We've found ways to get these new services to do even more.
Continue reading “Google Hacks: Tips & Tools for Finding and Using the World's Information”
Amazon Price: N/A (as of February 22, 2018 08:28 –
The cyber domain is undergoing extraordinary changes that present both exceptional opportunities to and major challenges for users of cyberspace. The challenges arise from the malevolent actors who use cyberspace and the many security vulnerabilities that plague this sphere. Exploiting opportunities and overcoming challenges will require a balanced body of knowledge on the cyber domain. Cyberpower and National Security assembles a group of experts and discusses pertinent issues in five areas.
The first section provides a broad foundation and overview of the subject by identifying key policy issues, establishing a common vocabulary, and proposing an initial version of a theory of cyberpower. The second section identifies and explores possible changes in cyberspace over the next fifteen years by assessing cyber infrastructure and security challenges. The third section analyzes the potential impact of changes in cyberspace on the military and informational levers of power. The fourth section addresses the extent to which changes in cyberspace serve to empower key entities such as transnational criminals, terrorists, and nation-states. The final section examines key institutional factors, which include issues concerning governance, legal dimensions, critical infrastructure protection, and organization.
Continue reading “Cyberpower and National Security (National Defense University)”
Amazon Price: $64.99 $48.41 You save: $16.58 (26%). (as of February 22, 2018 02:15 –
Praise for Virtual Honeypots
"A power-packed resource of technical, insightful information that unveils the world of honeypots in front of the reader’s eyes."
Continue reading “Virtual Honeypots: From Botnet Tracking to Intrusion Detection”
Amazon Price: N/A (as of August 6, 2017 17:42 –
Rootkits are the ultimate backdoor, giving hackers ongoing and virtually undetectable access to the systems they exploit. Now, two of the world's leading experts have written the first comprehensive guide to rootkits: what they are, how they work, how to build them, and how to detect them. Rootkit.com's Greg Hoglund and James Butler created and teach Black Hat's legendary course in rootkits. In this book, they reveal never-before-told offensive aspects of rootkit technology–learn how attackers can get in and stay in for years, without detection.
Hoglund and Butler show exactly how to subvert the Windows XP and Windows 2000 kernels, teaching concepts that are easily applied to virtually any modern operating system, from Windows Server 2003 to Linux and UNIX. They teach rootkit programming techniques that can be used for a wide range of software, from white hat security tools to operating system drivers and debuggers.
Continue reading “Rootkits: Subverting the Windows Kernel”
Amazon Price: $82.99 $67.36 You save: $15.63 (19%). (as of February 22, 2018 13:50 –
All-in-One Next-Generation Firewall, IPS, and VPN Services, Third Edition
Continue reading “Cisco ASA: All-in-one Next-Generation Firewall, IPS, and VPN Services (3rd Edition)”