File System Forensic Analysis

Rating: 
Amazon Price: $84.99 $41.86 You save: $43.13 (51%). (as of October 19, 2017 11:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Definitive Guide to File System Analysis: Key Concepts and Hands-on Techniques

Most digital evidence is stored within the computer's file system, but understanding how file systems work is one of the most technically challenging concepts for a digital investigator because there exists little documentation. Now, security expert Brian Carrier has written the definitive reference for everyone who wants to understand and be able to testify about how file system analysis is performed.
Continue reading “File System Forensic Analysis”

Mobile and Web Messaging: Messaging Protocols for Web and Mobile Devices

Rating: 
Amazon Price: N/A (as of October 19, 2017 01:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn how to use messaging technologies to build responsive and resilient applications for mobile devices and web browsers. With this hands-on guide, you’ll use the STOMP and MQTT messaging protocols to write iOS and web applications capable of sending and receiving GPS and device sensor data, text messages, and alerts.

Messaging protocols are not only simple to use, but also conserve network bandwidth, device memory, and batteries. Using this book’s step-by-step format, author Jeff Mesnil helps you work with Objective-C and JavaScript libraries, as well as the protocols. All you need to get started are basic programming skills.Understand basic messaging concepts and compositionLearn two common messaging models: point-to-point and publish/subscribeUse STOMP to write an iOS application that sends GPS data, and a web app that consumes the dataBuild an iOS app with MQTT that tracks and broadcasts device motion data, and a web app that displays the data and sends alertsExtend STOMP to filter, prioritize, persist, and expire messagesTake a complete tour of STOMP and MQTT, including features not used in the book’s sample apps

Mitigating DoS and DDoS: with Special Emphasis on Application Layer Attacks

Amazon Price: $30.00 $29.02 You save: $0.98 (3%). (as of October 19, 2017 12:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Denial of Service (DoS) and Distributed Denial of Service (DDoS) are among the most common threats to IT security. As it does not require advanced resources, such attacks can be carried out by private individuals as well as organized groups, so-called “hacktivists”. This book gives an overview and detailed description of the different kinds of attacks commonly used by hackers and it shows the challenges for IT security experts. In a practical application exercise, a DoS attack simulation is created by running the tool Low Orbit Ion Canon (LOIC) on the attacker side and a victim running an Apache 2 server. A Wireshark network utility tool is used to capture and analyze the difference between the traffic sent from the LOIC client and the normal user. In addition, to simulate a DDoS attack, a MeTuS Delphi 2.8 tool is used to create the botnet. The configurations required to run the MeTuS Delphi tool such as PortForwarding and setting up a Dynamic DNS Update Client are shown in detail. A SSYN attack is also carried out by using the tool itself. Finally, the different mitigation techniques such as Iptables, ModSecurity, and Mod Evasive are discussed and shown in practice.

Legal Guide to Botnet Research

Amazon Price: $99.95 $57.95 You save: $42.00 (42%). (as of October 18, 2017 17:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Legal Guide to Botnet Research serves as a central resource and tool to advance understanding of legal and policy issues associated with cybersecurity research on botnets. This valuable resource will help determine whether proposed cybersecurity research projects could violate laws or organizational policies. Included in the guide is the Botnet Research Legal Template, which helps clarify which laws are relevant to a particular project and simplifies the analysis required. Additionally, it highlights potential ethical issues and how researchers have been approaching them.

@War: The Rise of the Military-Internet Complex

Rating: 
Amazon Price: N/A (as of October 19, 2017 09:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Chilling . . . Extraordinary and urgent." — Washington Post

“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
Continue reading “@War: The Rise of the Military-Internet Complex”