Amazon Price: N/A (as of April 20, 2018 17:25 –
User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
Continue reading “Perfect Password: Selection, Protection, Authentication”
Amazon Price: N/A (as of April 21, 2018 02:55 –
Cyber Security for CEOs and Managment is a concise overview of the security threats posed to organizations and networks by the ubiquity of USB Flash Drives used as storage devices. The book will provide an overview of the cyber threat to you, your business, your livelihood, and discuss what you need to do, especially as CEOs and Management, to lower risk, reduce or eliminate liability, and protect reputation all related to information security, data protection and data breaches.
The purpose of this book is to discuss the risk and threats to company information, customer information, as well as the company itself; how to lower the risk of a breach, reduce the associated liability, react quickly, protect customer information and the company’s reputation, as well as discuss your ethical, fiduciary and legal obligations.
Continue reading “Cyber Security Awareness for CEOs and Management”
Amazon Price: N/A (as of April 20, 2018 16:39 –
A practical guide to learning penetration testing for Android devices and applications
About This Book
Explore the security vulnerabilities in Android applications and exploit them
Venture into the world of Android forensics and get control of devices using exploits
Hands-on approach covers security vulnerabilities in Android using methods such as Traffic Analysis, SQLite vulnerabilities, and Content Providers Leakage
Continue reading “Learning Pentesting for Android Devices”
Amazon Price: $30.00 (as of April 20, 2018 21:17 –
With computer hacking attacks making headline news on a frequent occasion, it is time for companies and individuals to take a more active stance in securing their computer systems.
Kali Linux is an Ethical Hacking platform that allows good guys to use the same tools and techniques that a hacker would use so they can find issues with their security before the bad guys do.
In “Basic Security Testing with Kali Linux”, you will learn basic examples of how hackers find out information about your company, locate weaknesses in your security and how they gain access to your system.
This hands-on, step by step learning book covers topics like: Kali Linux Introduction and Overview Metasploit & Metasploitable 2 Tutorials Information Gathering A section on Shodan (the “Hacker’s Google”) Exploiting Windows and Linux Systems Escalating Privileges in Windows Wireless (WiFi) Attacks Social Engineering Attacks Password Attacks Kali on a Raspberry Pi Securing your Network Though no network can be completely “Hacker Proof”, knowing how an attacker works will help put you on the right track of better securing your network.
Amazon Price: $54.99 $30.40 You save: $24.59 (45%). (as of April 20, 2018 09:42 –
A groundbreaking exploration of how to identify and fight security threats at every level
This revolutionary book combines real-world security scenarios with actual tools to predict and prevent incidents of terrorism, network hacking, individual criminal behavior, and more. Written by an expert with intelligence officer experience who invented the technology, it explores the keys to understanding the dark side of human nature, various types of security threats (current and potential), and how to construct a methodology to predict and combat malicious behavior. The companion CD demonstrates available detection and prediction systems and presents a walkthrough on how to conduct a predictive analysis that highlights proactive security measures.Guides you through the process of predicting malicious behavior, using real world examples and how malicious behavior may be prevented in the futureIllustrates ways to understand malicious intent, dissect behavior, and apply the available tools and methods for enhancing securityCovers the methodology for predicting malicious behavior, how to apply a predictive methodology, and tools for predicting the likelihood of domestic and global threats CD includes a series of walkthroughs demonstrating how to obtain a predictive analysis and how to use various available tools, including Automated Behavior Analysis
Continue reading “Predicting Malicious Behavior: Tools and Techniques for Ensuring Global Security”