CyberWar

Si Vis Pacem, Para Bellum

By

Pro Git

Rating: 
Amazon Price: N/A (as of April 27, 2017 17:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Git is the version control system developed by Linus Torvalds for Linux kernel development. It took the open source world by storm since its inception in 2005, and is used by small development shops and giants like Google, Red Hat, and IBM, and of course many open source projects.

A book by Git experts to turn you into a Git expert
Introduces the world of distributed version control
Shows how to build a Git development workflow
Read More

By

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats (Advances in Information Security)

Amazon Price: $149.00 $149.00 (as of April 27, 2017 17:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats was developed by a group of leading researchers. It describes the fundamental challenges facing the research community and identifies new promising solution paths. Moving Target Defense which is motivated by the asymmetric costs borne by cyber defenders takes an advantage afforded to attackers and reverses it to advantage defenders. Moving Target Defense is enabled by technical trends in recent years, including virtualization and workload migration on commodity systems, widespread and redundant network connectivity, instruction set and address space layout randomization, just-in-time compilers, among other techniques. However, many challenging research problems remain to be solved, such as the security of virtualization infrastructures, secure and resilient techniques to move systems within a virtualized environment, automatic diversification techniques, automated ways to dynamically change and manage the configurations of systems and networks, quantification of security improvement, potential degradation and more. Moving Target Defense: Creating Asymmetric Uncertainty for Cyber Threats is designed for advanced -level students and researchers focused on computer science, and as a secondary text book or reference. Professionals working in this field will also find this book valuable.

By

Cyber Resilience Best Practices

Amazon Price: $170.00 $118.64 You save: $51.36 (30%). (as of April 27, 2017 14:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber Resilience Best Practices provides organizations with a methodology for implementing cyber resilience. It offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.

Key Features
Read More

By

Network Hacks – Intensivkurs: Angriff und Verteidigung mit Python (Xpert.press) (German Edition)

Amazon Price: $79.99 $59.11 You save: $20.88 (26%). (as of April 27, 2017 18:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Das Buch verhilft Lesern dazu, das eigene Netz mit den Augen des Angreifers zu sehen – um seine Techniken zu verstehen und um sich besser schützen zu können. Anhand von Python-Codebeispielen erläutert der Autor Themen wie Passwort Sniffing, ARP Poisoning, DNS Spoofing, SQL Injection, Google Hacking, WEP Cracking und WLAN Hacking. Zu jedem Gebiet stellt er außerdem ein Open-Source-Projekt in Python vor und behandelt darüber hinaus auch klassische Verteidigungsverfahren wie Intrusion-Detection-Systeme, Intrusion Prevention und Logfile-Analyse.

By

Cyber Operations: Building, Defending, and Attacking Modern Computer Networks

Rating: 
Amazon Price: N/A (as of April 27, 2017 18:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn to set up, defend, and attack computer networks. This book focuses on networks and real attacks, offers extensive coverage of offensive and defensive techniques, and is supported by a rich collection of exercises and resources.

You'll learn how to configure your network from the ground up, starting by setting up your virtual test environment with basics like DNS and active directory, through common network services, and ending with complex web applications involving web servers and backend databases.
Read More

/* */