Amazon Price: N/A (as of March 22, 2017 15:46 –
Amazon #1 Hot New Release, Computer Viruses
In this study two distributed denial of service attacks were captured and the characteristics of the attacks were used to detect botnets by identifying egressing distributed denial of service attack packets at the source of the attack. A sample Dark DDoSer botnet was constructed and used to launch a distributed denial of service attack, and a Black Energy DDoS attack was captured. The characteristics of the distributed denial of service attacks were used as the independent variables in a quasi-experiment where network traffic was monitored with Snort to detect DDoS packets. The dependent variable for the experiment was false positive alerts for the DDoS packets. The findings showed that the characteristics of a distributed denial of service attack can be used to pro-actively detect botnets through egress monitoring.
Amazon Price: N/A (as of March 22, 2017 13:22 –
WHATSAPP & INDIAN CYBERLAW
India is already undergoing a huge mobile revolution. The numbers of smartphones that are continuing to be sold in India are an indication of the growing dependence on smartphones by Indians. Consequently, Indians are using various mobile applications. WhatsApp is one of the most popular mobile applications in India. Primarily because WhatsApp is free, it appeals to large number of Indian users who find the said platform very convenient for the purposes of communicating audio, video, image and text. However, the usage of WhatsApp has got distinct legal ramifications in India, thanks to the Indian Cyberlaw being in place.
Amazon Price: $49.95 $40.89 You save: $9.06 (18%). (as of March 23, 2017 01:44 –
DNS Security: Hacking and Defending the Domain Name System provides tactics on how to secure a Domain Name System (DNS) framework by exploring common DNS vulnerabilities using real-world examples of DNS exploits and providing step-by-step guidelines for securing the infrastructure.
The book is a timely reference as DNS is an integral part of the Internet that translates IP addresses into easily remembered domain names. The book focuses entirely on the security aspects of DNS, combining internal and external data to analyze and effectively prioritize network threats. It shows how to build a security infrastructure based around intelligence, demonstrating how theory can work in real-life situations. Presents a multi-platform approach, covering Linux, BSD, and Windows DNS security tipsDemonstrates how to implement DNS Security tools, including numerous screen shots and configuration examplesProvides a timely reference on DNS, an integral part of the Internet that translates IP addresses into easily remembered domain namesIncludes information of interest to those working in 4DNS, authoritative services, BIND files, buffer overflows, DDoS Attacks, firewalls, transaction signatures, and version control, amongst other topics
Amazon Price: $74.98 $74.98 (as of March 22, 2017 18:01 –
Management of cyber security is challenging. Cyber security professionals tend to take a rather skewed approach in dealing with security issues. Clearly there is no right or wrong path to choose. An exclusive reliance on technical measures ignores the governance aspects that are so important. Incorporating governance may result in ignoring the cultural and normative issues. It is usually not about choosing one over the other. It is about defining a holistic perspective to management of cyber security. This book covers an interesting range of topic areas. These include cyber stalking, cyber fraud and abuse; denial of services; cyber espionage; cryptography, security policies; cyber terrorism; cyber detection and forensics. Ethical and intellectual property issues are also discussed. The book culminates with case studies. Cases allow students to apply and contextualize the concepts.