Amazon Price: N/A (as of March 22, 2018 03:57 –
Google is the most popular search engine ever created, but Google’s search capabilities are so powerful, they sometimes discover content that no one ever intended to be publicly available on the Web, including social security numbers, credit card numbers, trade secrets, and federally classified documents. Google Hacking for Penetration Testers, Third Edition, shows you how security professionals and system administratord manipulate Google to find this sensitive information and "self-police" their own organizations.
You will learn how Google Maps and Google Earth provide pinpoint military accuracy, see how bad guys can manipulate Google to create super worms, and see how they can "mash up" Google with Facebook, LinkedIn, and more for passive reconnaissance.
Continue reading “Google Hacking for Penetration Testers, Third Edition”
Amazon Price: $24.50 $24.50 (as of March 22, 2018 04:36 –
Criminal activities in cyberspace are increasingly facilitated by burgeoning black markets. This report characterizes these markets and how they have grown into their current state to provide insight into how their existence can harm the information security environment. Understanding these markets lays the groundwork for exploring options to minimize their potentially harmful influence.
Amazon Price: $45.00 $45.00 (as of March 22, 2018 04:22 –
Web sites are dynamic, static, and most of the time a combination of both. Web sites needs to protect their databases to assure security. An SQL injection attacks interactive web applications that provide database services. These applications take user inputs and use them to create an SQL query at run time. In an SQL injection attack, an attacker might insert a malicious crafted SQL query as input to perform an unauthorized database operation. Using SQL injection attacks, an attacker can retrieve, modify or can delete confidential sensitive information from the database. It may jeopardize the confidentiality, trust and security of Web sites which totally depends on databases. This report presents a “code reengineering” that implicitly protects the web applications from SQL injection attacks. It uses an original approach that combines static as well as dynamic analysis. In this report, I mentioned an automated technique for moving out SQL injection vulnerabilities from Java code by converting plain text inputs received from users into prepared statements.
Amazon Price: $15.95 $10.84 You save: $5.11 (32%). (as of March 22, 2018 14:01 –
"Chilling . . . Extraordinary and urgent." — Washington Post
“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
Continue reading “@War: The Rise of the Military-Internet Complex”
Amazon Price: $65.00 $61.86 You save: $3.14 (5%). (as of March 22, 2018 14:01 –
All you need to know to succeed in digital forensics: technical and investigative skills, in one book
Complete, practical, and up-to-date
Continue reading “A Practical Guide to Computer Forensics Investigations”