A Practical Guide to Computer Forensics Investigations

Amazon Price: N/A (as of December 14, 2017 14:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

All you need to know to succeed in digital forensics: technical and investigative skills, in one book

Complete, practical, and up-to-date
Continue reading “A Practical Guide to Computer Forensics Investigations”

PayPal APIs: Up and Running

Rating: 
Amazon Price: N/A (as of December 14, 2017 08:57 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If your web application’s success depends on how quickly and easily users can make transactions, PayPal APIs provide effective solutions you can’t afford to overlook. This concise book takes you hands-on through several options to help you determine the best choice for your situation, whether you’re collecting money via websites or mobile apps for products and services, donations, or anything else.

In each chapter, you’ll work with a different PayPal API by integrating it into the book’s sample application, using Python and the Google App Engine framework. This expanded edition introduces two new options: Express Checkout for Digital Goods and Instant Payment Notifications, complete with sample project code. By the end of this book, you’ll understand how to take full advantage of PayPal and its powerful features.Learn PayPal API basics, and get an introduction to Google App EngineExplore the Express Checkout option, and understand what distinguishes it from other generic workflowsTailor Express Checkout for electronic documents, videos, and other “in app” digital purchasesApply the Adaptive Payments option for transactions that involve multiple recipientsEmbed the payment process into your site with no mention of PayPal, using Website Payments ProUse the Instant Payment Notifications you receive as triggers to take follow-up action

Mitigating DoS and DDoS: with Special Emphasis on Application Layer Attacks

Amazon Price: $30.00 $29.02 You save: $0.98 (3%). (as of December 15, 2017 07:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Denial of Service (DoS) and Distributed Denial of Service (DDoS) are among the most common threats to IT security. As it does not require advanced resources, such attacks can be carried out by private individuals as well as organized groups, so-called “hacktivists”. This book gives an overview and detailed description of the different kinds of attacks commonly used by hackers and it shows the challenges for IT security experts. In a practical application exercise, a DoS attack simulation is created by running the tool Low Orbit Ion Canon (LOIC) on the attacker side and a victim running an Apache 2 server. A Wireshark network utility tool is used to capture and analyze the difference between the traffic sent from the LOIC client and the normal user. In addition, to simulate a DDoS attack, a MeTuS Delphi 2.8 tool is used to create the botnet. The configurations required to run the MeTuS Delphi tool such as PortForwarding and setting up a Dynamic DNS Update Client are shown in detail. A SSYN attack is also carried out by using the tool itself. Finally, the different mitigation techniques such as Iptables, ModSecurity, and Mod Evasive are discussed and shown in practice.

Network Forensics: Tracking Hackers through Cyberspace

Amazon Price: $76.99 $55.77 You save: $21.22 (28%). (as of December 15, 2017 04:18 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“This is a must-have work for anybody in information security, digital forensics, or involved with incident handling. As we move away from traditional disk-based analysis into the interconnectivity of the cloud, Sherri and Jonathan have created a framework and roadmap that will act as a seminal work in this developing field.”
– Dr. Craig S. Wright (GSE), Asia Pacific Director at Global Institute for Cyber Security + Research.

“It’s like a symphony meeting an encyclopedia meeting a spy novel.”
–Michael Ford, Corero Network Security
Continue reading “Network Forensics: Tracking Hackers through Cyberspace”