Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Open Source: Community Experience Distilled)

Rating: 
Amazon Price: N/A (as of September 25, 2017 04:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS and firewallsTake the challenge and perform a virtual penetration test against a fictional corporation from start to finish and then verify your results by walking through step-by-step solutionsDetailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reportsProperly scope your penetration test to avoid catastropheUnderstand in detail how the testing process works from start to finish, not just how to use specific toolsUse advanced techniques to bypass security controls and remain hidden while testingCreate a segmented virtual network with several targets, IDS and firewallGenerate testing reports and statisticsPerform an efficient, organized, and effective penetration test from start to finish

Although the book is intended for someone that has a solid background in information security the step-by-step instructions make it easy to follow for all skill levels. You will learn Linux skills, how to setup your own labs, and much much more.

The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws

Rating: 
Amazon Price: $50.00 $30.37 You save: $19.63 (39%). (as of September 25, 2017 06:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The highly successful security book returns with a new edition, completely updatedWeb applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side.
Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous editionDiscusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and moreFeatures a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasksFocusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws..

Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

Rating: 
Amazon Price: $29.95 $18.43 You save: $11.52 (38%). (as of September 25, 2017 20:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.
Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively. A well-structured introduction into the world of targeted cyber-attacksIncludes analysis of real-world attacksWritten by cyber-security researchers and experts

Unmasking the Social Engineer: The Human Element of Security

Rating: 
Amazon Price: $34.99 $21.52 You save: $13.47 (38%). (as of September 25, 2017 00:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn to identify the social engineer by non-verbal behavior

Unmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men use these skills to build feelings of trust and rapport in their targets. The author helps readers understand how to identify and detect social engineers and scammers by analyzing their non-verbal behavior. Unmasking the Social Engineer shows how attacks work, explains nonverbal communications, and demonstrates with visuals the connection of non-verbal behavior to social engineering and scamming. Clearly combines both the practical and technical aspects of social engineering security Reveals the various dirty tricks that scammers use Pinpoints what to look for on the nonverbal side to detect the social engineer
Continue reading “Unmasking the Social Engineer: The Human Element of Security”

Learning Android Forensics

Rating: 
Amazon Price: N/A (as of September 25, 2017 11:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts

About This BookA professional, step-by-step approach to forensic analysis complete with key strategies and techniquesAnalyze the most popular Android applications using free and open source toolsLearn forensically-sound core data extraction and recovery techniques
Continue reading “Learning Android Forensics”