Amazon Price: N/A (as of July 27, 2017 15:04 –
If you’re interested in using social media as an investigative tool, Introduction to Social Media Investigation will show you how! Social networks and social media, like Facebook, Twitter, and Foursquare, are some of the most popular services on the Web, with hundreds of millions of users. The public information that people share on these sites can be valuable for anyone interested in investigating people of interest through open, public sources.
Social media as an investigative device is in its infancy and not well understood. This book presents an overview of social media and discusses special skills and techniques to use when conducting investigations. The book features hands-on tutorials and case studies and offers additional data-gathering techniques.
Continue reading “Introduction to Social Media Investigation: A Hands-on Approach”
Amazon Price: $34.00 $33.06 You save: $0.94 (3%). (as of July 26, 2017 23:39 –
Cybercrime Handbook: An Overview of Cybercriminal Strategy and Tactics presents strategies and tactics employed by contemporary cybercriminals
Amazon Price: N/A (as of July 26, 2017 19:05 –
A cluster is a type of parallel/distributed processing system which consists of a collection of interconnected stand-alone computers cooperatively working together. Using Raspberry Pi computers, you can build a two-node parallel computing cluster which enhances performance and availability.
Continue reading “Raspberry Pi Super Cluster”
Amazon Price: $41.00 $39.17 You save: $1.83 (4%). (as of July 27, 2017 03:21 –
Na protyazhenii neskol'kikh poslednikh let shirokoe rasprostranenie v global'noy seti poluchili raspredelënnye setevye ataki. Vopros bor'by s atakami takogo tipa ostayetsya nereshyennym i po sey den'. Problema zaklyuchaetsya takzhe i v tom, chto zloumyshlenniki modifitsiruyut i uluchshayut strategii provedeniya ataki, a menyayushchiesya podkhody k predostavleniyu servisov v global'noy seti pozvolyayut nakhodit' novye napravleniya dlya takikh atak. Vopros o zashchite ot etikh atak — slozhnaya i ob"yemnaya zadacha i dlya eye resheniya trebuetsya opredelyennaya podgotovka, tsel'yu kotoroy budet izuchit' i sistematizirovat' imeyushcheyusya informatsiyu o setevykh atakakh, a takzhe predostavit' obosnovaniya sposobov analiza i strategiy povedeniya atakuemykh sistem. Iskhodya iz etogo, tsel'yu dannoy raboty bylo vybrano sozdanie sposoba analiza setevogo trafika dlya povysheniya zashchishchyennosti informatsionnykh sistem. Dlya dostizheniya postavlennoy tseli v rabote opredelyaetsya i reshaetsya ryad konkretnykh zadach. Rabota predstavlyaet interes dlya setevykh i sistemnykh administratorov servisov global'noy seti.
Amazon Price: $29.95 (as of July 27, 2017 16:55 –
The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate.Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases.Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University.Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.