Cryptography & Malware

Rating: 
Amazon Price: $19.88 $19.88 (as of April 21, 2018 08:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Is Cryptography what you want to learn? Always wondered about its history from Modern to Traditional Cryptography? Does it interest you how Cryptosystems work?

Purchase Cryptography to discover everything you need to know about it!
Continue reading “Cryptography & Malware”

Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World

Rating: 
Amazon Price: N/A (as of April 20, 2018 21:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A chilling and revelatory appraisal of the new faces of espionage and warfare on the digital battleground

Shortly after 9/11, Joel Brenner entered the inner sanctum of American espionage, first as the inspector general of the National Security Agency, then as the head of counterintelligence for the director of National Intelligence. He saw at close range the battleground on which adversaries are attacking us: cyberspace.
Continue reading “Glass Houses: Privacy, Secrecy, and Cyber Insecurity in a Transparent World”

Hacking Back: Offensive Cyber Counterintelligence

Amazon Price: $60.00 $39.00 You save: $21.00 (35%). (as of unknown date – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn the concepts, methods, and implications of offensive cyber counterintelligence
Hacking Back: Offensive Cyber Counterintelligence is a look at cyber counterintelligence theory in a WikiLeaks world. The authors detail techniques—from phishing to sniffing and from attribution to takedown—all bolstered by case examples and rooted in the authors’ many years of in-the-trenches experience in trap-setting and detecting breaches. The book’s field notes—some from identified hackers, and some from anonymous hackers—consist of exciting, never-before-told case examples. Details technically simple hacks, complex attacks, and famous network intrusions Organized by methods so security practitioners can quickly find specific tactics and techniques Dissects security breach scenarios, providing analyses of real-life operations from the authors’ many years of experience Explains the US and EU cyber laws every savvy security practitioner defending against cybercrime should know

The Hacker Playbook: Practical Guide To Penetration Testing

Rating: 
Amazon Price: $24.99 $24.99 (as of April 20, 2018 13:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.
Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.
From “Pregame” research to “The Drive” and “The Lateral Pass,” the practical plays listed can be read in order or referenced as needed. Either way, the valuable advice within will put you in the mindset of a penetration tester of a Fortune 500 company, regardless of your career or level of experience.
Whether you’re downing energy drinks while desperately looking for an exploit, or preparing for an exciting new job in IT security, this guide is an essential part of any ethical hacker’s library—so there’s no reason not to get in the game.

Buffer Overflow Attacks: Detect, Exploit, Prevent

Rating: 
Amazon Price: N/A (as of April 21, 2018 03:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.

Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
Continue reading “Buffer Overflow Attacks: Detect, Exploit, Prevent”