Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)

Rating: 
Amazon Price: N/A (as of February 19, 2018 05:16 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"A fascinating look at the new direction fuzzing technology is taking — useful for both QA engineers and bug hunters alike!"

–Dave Aitel, CTO, Immunity Inc.
Continue reading “Fuzzing for Software Security Testing and Quality Assurance (Artech House Information Security and Privacy)”

An Introduction to DDoS Attacks and Defense Mechanisms: An Analyst’s Handbook

Rating: 
Amazon Price: $103.00 $103.00 (as of February 18, 2018 21:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Suddenly your Web server becomes unavailable. When you investigate, you realize that a flood of packets is surging into your network. You have just become one of the hundreds of thousands of victims of a denial-of-service attack, a pervasive and growing threat to the Internet. What do you do? Internet Denial of Service sheds light on a complex and fascinating form of computer attack that impacts the confidentiality, integrity, and availability of millions of computers worldwide. It tells the network administrator, corporate CTO, incident responder, and student how DDoS attacks are prepared and executed, how to think about DDoS, and how to arrange computer and network defenses. It also provides a suite of actions that can be taken before, during, and after an attack. The authors' extensive experience in handling denial-of-service attacks and researching defense approaches is laid out clearly in practical, detailed terms.

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Rating: 
Amazon Price: N/A (as of February 18, 2018 14:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Continue reading “Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World”

A Practical Guide to Computer Forensics Investigations

Rating: 
Amazon Price: N/A (as of February 19, 2018 09:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

All you need to know to succeed in digital forensics: technical and investigative skills, in one book

Complete, practical, and up-to-date
Continue reading “A Practical Guide to Computer Forensics Investigations”

PoC or GTFO

Rating: 
Amazon Price: $40.00 $25.47 You save: $14.53 (36%). (as of February 18, 2018 17:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.

PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide.
Continue reading “PoC or GTFO”