Amazon Price: $49.95 $49.95 (as of November 20, 2017 20:44 –
Whether you are a Wireshark newbie or an experienced Wireshark user, this book streamlines troubleshooting techniques used by Laura Chappell in her 20+ years of network analysis experience. Learn insider tips and tricks to quickly detect the cause of poor network performance. This book consists of troubleshooting labs to walk you through the process of measuring client/server/network delays, detecting application error responses, catching delayed responses, locating the point of packet loss, spotting TCP receiver congestion, and more.
Key topics include: path delays, client delays, server delays, connection refusals, service refusals, receive buffer overload, rate throttling, packet loss, redirections, queueing along a path, resolution failures, small MTU sizes, port number reuse, missing support for TCP SACK/Window Scaling, misbehaving infrastructure devices, weak signals (WLAN), and more.
Continue reading “Troubleshooting with Wireshark: Locate the Source of Performance Problems”
Amazon Price: N/A (as of November 20, 2017 20:07 –
Digital Forensics with Open Source Tools is the definitive book on investigating and analyzing computer systems and media using open source tools. The book is a technical procedural guide, and explains the use of these tools on Linux and Windows systems as a platform for performing computer forensics. Both well known and novel forensic methods are demonstrated using command-line and graphical open source computer forensic tools for examining a wide range of target systems and artifacts.
Written by world-renowned forensic practitioners Details core concepts and techniques of forensic file system analysisCovers analysis of artifacts from the Windows, Mac, and Linux operating systems
Amazon Price: N/A (as of November 20, 2017 13:59 –
Just as American and European critical infrastructure executives were beginning to wrap their minds around the devastation of the Office of Personnel Management breach, ransomware erupted onto the scene, followed by concentrated DDoS attacks such as the Mirai botnet attack on Dyn, which enabled a quantum leap for cyber criminals. Now, all techno-forensic indicators suggest that an under-discussed cyber-kinetic attack vector will ubiquitously permeate all critical infrastructure sectors due to a dearth of layered bleeding-edge military grade cybersecurity solutions. Unless organizations act immediately, in 2017 The Insider Threat Epidemic Begins.
In this brief, entitled "In 2017, The Insider Threat Epidemic Begins" the Institute for Critical Infrastructure Technology offers a comprehensive analysis of the Insider Threat Epidemic, including research on:
Characterizing Insider Threats (the insider threat cyber 'kill chain,' non-malicious insider threats, malicious insider threats) The Insider Threat Debate Policies, Procedures, and Guidelines to Combat Insider Threats Non-Technical Controls Technical Controls
Amazon Price: $39.95 $27.16 You save: $12.79 (32%). (as of November 21, 2017 08:01 –
Learn to use C#'s powerful set of core libraries to automate tedious yet important tasks like performing vulnerability scans, malware analysis, and incident response. With some help from Mono, you can write your own practical security tools that will run on Mac, Linux, and even mobile devices.
Following a crash course in C# and some of its advanced features, you'll learn how to:Write fuzzers that use the HTTP and XML libraries to scan for SQL and XSS injectionGenerate shellcode in Metasploit to create cross-platform and cross-architecture payloadsAutomate Nessus, OpenVAS, and sqlmap to scan for vulnerabilities and exploit SQL injectionsWrite a .NET decompiler for Mac and LinuxParse and read offline registry hives to dump system informationAutomate the security tools Arachni and Metasploit using their MSGPACK RPCs
Continue reading “Gray Hat C#: Creating and Automating Security Tools”
Amazon Price: N/A (as of November 21, 2017 08:25 –
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies and militaries, both pervaded by computers, are supposedly at risk. As Conquest in Cyberspace explains, however, information systems and information itself are too easily conflated, and persistent mastery over the former is difficult to achieve. The author also investigates how far 'friendly conquest' in cyberspace extends, such as the power to persuade users to adopt new points of view. He discusses the role of public policy in managing cyberspace conquests and shows how the Internet is becoming more ubiquitous and complex, such as in the use of artificial intelligence.