Amazon Price: $247.00 $188.10 You save: $58.90 (24%). (as of May 22, 2018 01:10 –
Early adopters of Cyberspace Law: Cases and Materials were particularly pleased by how flexible, coherent, and practical the book is. Now strengthened and scrupulously updated for its Third Edition, this engaging casebook can help your students understand one of the most dynamic areas of law.
Written and structured for maximum effectiveness, the book:
– Can be used successfully in both introductory and advanced courses;
– Uses practical, classroom-tested "real world" problems to help students apply existing rules to cyberspace law;
– Features a flexible, logical organization that allows instructors to emphasize selected perspectives;
– Is designed for currency, with materials organized around competing approaches and theories for any given issue, rather than current leading cases;
– Presents current Internet law as well as related policy concerns that will drive future legal analysis when new issues emerge — the only casebook to address both areas. Offers a balanced presentation of competing approaches and theories for each issue;
– Provides a sophisticated analysis of cutting-edge legal issues through an excellent selection of cases;
– Remains up-to-date with postings of new cases and important developments on the author website.
Continue reading “Cyberspace Law: Cases & Materials, Third Edition”
Amazon Price: N/A (as of May 21, 2018 11:31 –
At last, the first full account of the cypherpunks who aim to free the world’s institutional secrets, by Forbes journalist Andy Greenberg who has traced their shadowy history from the cryptography revolution of the 1970s to Wikileaks founding hacker Julian Assange, Anonymous, and beyond.
WikiLeaks brought to light a new form of whistleblowing, using powerful cryptographic code to hide leakers’ identities while they spill the private data of government agencies and corporations. But that technology has been evolving for decades in the hands of hackers and radical activists, from the libertarian enclaves of Northern California to Berlin to the Balkans. And the secret-killing machine continues to evolve beyond WikiLeaks, as a movement of hacktivists aims to obliterate the world’s institutional secrecy.
Continue reading “This Machine Kills Secrets: Julian Assange, the Cypherpunks, and Their Fight to Empower Whistleblowers”
Amazon Price: N/A (as of May 21, 2018 19:18 –
If your web application’s success depends on how quickly and easily users can make transactions, PayPal APIs provide effective solutions you can’t afford to overlook. This concise book takes you hands-on through several options to help you determine the best choice for your situation, whether you’re collecting money via websites or mobile apps for products and services, donations, or anything else.
In each chapter, you’ll work with a different PayPal API by integrating it into the book’s sample application, using Python and the Google App Engine framework. This expanded edition introduces two new options: Express Checkout for Digital Goods and Instant Payment Notifications, complete with sample project code. By the end of this book, you’ll understand how to take full advantage of PayPal and its powerful features.Learn PayPal API basics, and get an introduction to Google App EngineExplore the Express Checkout option, and understand what distinguishes it from other generic workflowsTailor Express Checkout for electronic documents, videos, and other “in app” digital purchasesApply the Adaptive Payments option for transactions that involve multiple recipientsEmbed the payment process into your site with no mention of PayPal, using Website Payments ProUse the Instant Payment Notifications you receive as triggers to take follow-up action
Amazon Price: $37.99 $37.99 (as of May 21, 2018 19:34 –
Analyze malware using Cuckoo Sandbox
Overview Learn how to analyze malware in a straightforward way with minimum technical skills Understand the risk of the rise of document-based malware Enhance your malware analysis concepts through illustrations, tips and tricks, step-by-step instructions, and practical real-world scenarios
Cuckoo Sandbox is a leading open source automated malware analysis system. This means that you can throw any suspicious file at it and, in a matter of seconds, Cuckoo will provide you with some detailed results outlining what said file did when executed inside an isolated environment.
Cuckoo Malware Analysis is a hands-on guide that will provide you with everything you need to know to use Cuckoo Sandbox with added tools like Volatility, Yara, Cuckooforcanari, Cuckoomx, Radare, and Bokken, which will help you to learn malware analysis in an easier and more efficient way.
Cuckoo Malware Analysis will cover basic theories in sandboxing, automating malware analysis, and how to prepare a safe environment lab for malware analysis. You will get acquainted with Cuckoo Sandbox architecture and learn how to install Cuckoo Sandbox, troubleshoot the problems after installation, submit malware samples, and also analyze PDF files, URLs, and binary files. This book also covers memory forensics – using the memory dump feature, additional memory forensics using Volatility, viewing result analyses using the Cuckoo analysis package, and analyzing APT attacks using Cuckoo Sandbox, Volatility, and Yara.
Finally, you will also learn how to screen Cuckoo Sandbox against VM detection and how to automate the scanning of e-mail attachments with Cuckoo.
What you will learn from this book Get started with automated malware analysis using Cuckoo Sandbox Use Cuckoo Sandbox to analyze sample malware Analyze output from Cuckoo Sandbox Report results with Cuckoo Sandbox in standard form Learn tips and tricks to get the most out of your malware analysis results
This book is a step-by-step, practical tutorial for analyzing and detecting malware and performing digital investigations. This book features clear and concise guidance in an easily accessible format.
Who this book is written for
Cuckoo Malware Analysis is great for anyone who wants to analyze malware through programming, networking, disassembling, forensics, and virtualization. Whether you are new to malware analysis or have some experience, this book will help you get started with Cuckoo Sandbox so you can start analysing malware effectively and efficiently.
Amazon Price: N/A (as of May 21, 2018 19:51 –
All you need to know to succeed in digital forensics: technical and investigative skills, in one book
Complete, practical, and up-to-date
Continue reading “A Practical Guide to Computer Forensics Investigations”