Amazon Price: N/A (as of July 28, 2017 08:02 –
Today is the age of mobile applications. Various mobile applications of different nature and character are being used by mobile users across the world. One of the most important and popular mobile application is WhatsApp messenger. The advent and the increase growth of WhatsApp messenger has shown not just the popularity of the mobile app but has also given rise to various legal policy and regulatory issues pertaining to use of WhatsApp. A lot of people use WhatsApp in a for granted manner, without understanding the legal ramifications of the use of WhatsApp. However the increase usage of WhatsApp, in different parts of the world, has given rise to various legal and policy considerations and issues which require further discussion as time passes by.
Continue reading “WHATSAPP LAW”
Amazon Price: N/A (as of July 27, 2017 14:21 –
Hackers are paying attention, and they're matching today's technology innovations with maddening creativity of their own. Protect your network!
Amazon Price: N/A (as of July 27, 2017 11:26 –
Cyber-Physical Attacks: A Growing Invisible Threat presents the growing list of harmful uses of computers and their ability to disable cameras, turn off a building’s lights, make a car veer off the road, or a drone land in enemy hands. In essence, it details the ways cyber-physical attacks are replacing physical attacks in crime, warfare, and terrorism.
The book explores how attacks using computers affect the physical world in ways that were previously only possible through physical means. Perpetrators can now cause damage without the same risk, and without the political, social, or moral outrage that would follow a more overt physical attack.
Continue reading “Cyber-Physical Attacks: A Growing Invisible Threat”
Amazon Price: $71.00 $50.25 You save: $20.75 (29%). (as of July 27, 2017 11:08 –
The problem of modeling and detecting polymorphic engines shellcode is adressed in this book. By polymorphic engines, we mean programs having the ability to transform any piece of malware into many instances consisting of different code but having the same functionality as the original malware. Typically, polymorphic engines work by encrypting the target malware using various encryption techniques and providing a decryption module in order to execute the newly encrypted instance. Moreover, those engines have the ability to mutate their decryption routine making them unique from one instance to another and hard to detect. We propose a new concept of signatures, shape signatures, which cope with the highly mutated nature of those engines. The shape signatures try to identify the constant part as well as the mutated part of the deciphering routines. This combination is able to cope with the highly mutated nature of those engines in a much more efficient way compared to traditional signatures used in most intrusion detection systems. We also aim at modeling those polymorphic engines by showing that they exhibit a specific byte composition.
Amazon Price: $39.95 $31.24 You save: $8.71 (22%). (as of July 28, 2017 07:59 –
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.
Following a crash course in C# and some of its advanced features, you'll learn how to:Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injectionGenerate shellcode in Metasploit to create cross-platform and cross-architecture payloadsAutomate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injectionsWrite a .NET decompiler for Mac and LinuxParse and read offline registry hives to dump system informationAutomate the security tools Arachni and Metasploit using their MSGPACK RPCs
Continue reading “Gray Hat C#: Creating and Automating Security Tools”