Amazon Price: $80.00 (as of February 25, 2018 09:00 –
Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM)
Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network.
Continue reading “Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance”
Amazon Price: $54.99 $37.73 You save: $17.26 (31%). (as of February 24, 2018 12:30 –
The Chief Information Warfare Officer for the entire United States teaches you how to protect your corporate network. This book is a training aid and reference for intrusion detection analysts. While the authors refer to research and theory, they focus their attention on providing practical information. The authors are literally the most recognized names in this specialized field, with unparalleled experience in defending our country's government and military computer networks. New to this edition is coverage of packet dissection, IP datagram fields, forensics, and snort filters.
Amazon Price: $29.95 $14.49 You save: $15.46 (52%). (as of February 25, 2018 02:48 –
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect storm for beginning hackers. The process set forth in this book introduces not only the theory and practical information related to these vulnerabilities, but also the detailed configuration and usage of widely available tools necessary to exploit these vulnerabilities.
The Basics of Web Hacking provides a simple and clean explanation of how to utilize tools such as Burp Suite, sqlmap, and Zed Attack Proxy (ZAP), as well as basic network scanning tools such as nmap, Nikto, Nessus, Metasploit, John the Ripper, web shells, netcat, and more. Dr. Josh Pauli teaches software security at Dakota State University and has presented on this topic to the U.S. Department of Homeland Security, the NSA, BlackHat Briefings, and Defcon. He will lead you through a focused, three-part approach to Web security, including hacking the server, hacking the Web app, and hacking the Web user.
Continue reading “The Basics of Web Hacking: Tools and Techniques to Attack the Web”
Amazon Price: $159.95 $159.95 (as of February 25, 2018 09:32 –
Today, cyber security, cyber defense, information warfare and cyber warfare issues are among the most relevant topics both at the national and international level. All the major states of the world are facing cyber threats and trying to understand how cyberspace could be used to increase power.
Through an empirical, conceptual and theoretical approach, Cyber Conflict has been written by researchers and experts in the fields of cyber security, cyber defense and information warfare. It aims to analyze the processes of information warfare and cyber warfare through historical, operational and strategic perspectives of cyber attack. It is original in its delivery because of its multidisciplinary approach within an international framework, with studies dedicated to different states – Canada, Cuba, France, Greece, Italy, Japan, Singapore, Slovenia and South Africa – describing the state’s application of information warfare principles both in terms of global development and “local” usage and examples.
Continue reading “Cyber Conflict: Competing National Perspectives (ISTE)”
Amazon Price: N/A (as of February 25, 2018 09:21 –
“Practical Intrusion Analysis provides a solid fundamental overview of the art and science of intrusion analysis.”
–Nate Miller, Cofounder, Stratum Security
Continue reading “Practical Intrusion Analysis: Prevention and Detection for the Twenty-First Century”