Stealing the Network: How to Own an Identity: How to Own an Identity

Rating: 
Amazon Price: N/A (as of August 22, 2017 23:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The first two books in this series “Stealing the Network: How to Own the Box and “Stealing the Network: How to Own a Continent have become classics in the Hacker and Infosec communities because of their chillingly realistic depictions of criminal hacking techniques.

In this third installment, the all-star cast of authors tackle one of the fastest growing crimes in the world: Identity Theft. Now, the criminal hackers readers have grown to both love and hate try to cover their tracks and vanish into thin air… "Stealing the Network: How to Own an Identity" is the 3rd book in the "Stealing" series, and continues in the tradition created by its predecessors by delivering real-world network attack methodologies and hacking techniques within a context of unique and original fictional accounts created by some of the world's leading security professionals and computer technologists. The seminal works in TechnoFiction, this "STN" collection yet again breaks new ground by casting light upon the mechanics and methods used by those lurking on the darker side of the Internet, engaging in the fastest growing crime in the world: Identity theft.
Continue reading “Stealing the Network: How to Own an Identity: How to Own an Identity”

Mastering the Nmap Scripting Engine

Rating: 
Amazon Price: N/A (as of August 22, 2017 08:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Master the Nmap Scripting Engine and the art of developing NSE scripts

About This BookExtend the capabilities of Nmap to perform custom tasks with the Nmap Scripting EngineLearn the fundamentals of Lua programmingDevelop powerful scripts for the Nmap Scripting EngineDiscover all the features and libraries of the Nmap Scripting EngineIn-depth coverage of the Nmap Scripting Engine API and most important libraries with examples
Continue reading “Mastering the Nmap Scripting Engine”

Hacking: Basic Security, Penetration Testing and How to Hack

Rating: 
Amazon Price: $13.38 $10.73 You save: $2.65 (20%). (as of August 22, 2017 03:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Do You Want To Learn How to Hack? Have you always wanted to hack? Do you want to learn more about hacking? Are you interested in the basics of hacking and successful at it? This easy guide will help transform and increase your hacking skill set. You'll be excited to see your skills improve drastically and effectively whenever your hacking. Hurry! Scroll to the top and "BUY" your copy today!

Essential Cybersecurity Science: Build, Test, and Evaluate Secure Systems

Rating: 
Amazon Price: $49.99 $36.11 You save: $13.88 (28%). (as of August 22, 2017 05:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Applying the scientific method to security is about using techniques to carefully observe, measure, experiment, form explanations, test, and evaluate security processes in software and products. This practical book shows how incorporating these techniques will provide developers with the knowledge to produce more secure, more useful, and more valuable products and services. You'll learn how to:Apply the scientific method to evaluate projects in digital forensics, software assurance, and intrusion detectionDevelop your own security methods using this process to build and sell more secure productsDiscover how to spot bogus security claims and processes

Inside the Enemy’s Computer: Identifying Cyber Attackers

Amazon Price: $34.95 $34.95 (as of August 22, 2017 23:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Attribution – tracing those responsible for a cyber attack – is of primary importance when classifying it as a criminal act, an act of war, or an act of terrorism. Three assumptions dominate current thinking: attribution is a technical problem; it is unsolvable; and it is unique. Approaching attribution as a problem forces us to consider it either as solved or unsolved. Yet attribution is far more nuanced, and is best approached as a process in constant flux, driven by judicial and political pressures. In the criminal context, courts must assess the guilt of criminals, mainly based on technical evidence. In the national security context, decision-makers must analyse unreliable and mainly non-technical information in order to identify an enemy of the state. Attribution in both contexts is political: in criminal cases, laws reflect society's prevailing norms and powers; in national security cases, attribution reflects a state's will to maintain, increase or assert its power. However, both processes differ on many levels. The constraints, which reflect common aspects of many other political issues, constitute the structure of the book: the need for judgement calls, the role of private companies, the standards of evidence, the role of time, and the plausible deniability of attacks.