Selinux: NSA’s Open Source Security Enhanced Linux

Rating: 
Amazon Price: $39.95 $10.09 You save: $29.86 (75%). (as of June 20, 2018 18:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-related extension to Linux embodies the key advances of the security field. Better yet, SELinux is available in widespread and popular distributions of the Linux operating system–including for Debian, Fedora, Gentoo, Red Hat Enterprise Linux, and SUSE–all of it free and open source.

SELinux emerged from research by the National Security Agency and implements classic strong-security measures such as role-based access controls, mandatory access controls, and fine-grained transitions and privilege escalation following the principle of least privilege. It compensates for the inevitable buffer overflows and other weaknesses in applications by isolating them and preventing flaws in one application from spreading to others. The scenarios that cause the most cyber-damage these days–when someone gets a toe-hold on a computer through a vulnerability in a local networked application, such as a Web server, and parlays that toe-hold into pervasive control over the computer system–are prevented on a properly administered SELinux system.
Continue reading “Selinux: NSA’s Open Source Security Enhanced Linux”

Penetration Testing for Business: SMB’s & Ethical hacking

Amazon Price: $6.19 $6.19 (as of June 20, 2018 23:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber crime is on the increase, and with small to medium business (SMB’S) very much in the focus of attackers, competing companies, disgruntled employees, script kiddies and anonymous hackers can all pose a danger to a company’s computer systems, penetration testing is a good tried and tested method of solving security problems before they can occur and can be part of a strong security policy and a good security audit methodology.but what exactly is a penetration test? and what does it involve? this short book attempts to explain to Business owners or managers and those with an interest in the subject what is involved and how a typical penetration test is done.

Troubleshooting with Wireshark: Locate the Source of Performance Problems

Rating: 
Amazon Price: $49.95 $49.95 (as of June 21, 2018 13:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Whether you are a Wireshark newbie or an experienced Wireshark user, this book streamlines troubleshooting techniques used by Laura Chappell in her 20+ years of network analysis experience. Learn insider tips and tricks to quickly detect the cause of poor network performance. This book consists of troubleshooting labs to walk you through the process of measuring client/server/network delays, detecting application error responses, catching delayed responses, locating the point of packet loss, spotting TCP receiver congestion, and more.

Key topics include: path delays, client delays, server delays, connection refusals, service refusals, receive buffer overload, rate throttling, packet loss, redirections, queueing along a path, resolution failures, small MTU sizes, port number reuse, missing support for TCP SACK/Window Scaling, misbehaving infrastructure devices, weak signals (WLAN), and more.
Continue reading “Troubleshooting with Wireshark: Locate the Source of Performance Problems”

Age of Context: Mobile, Sensors, Data and the Future of Privacy

Rating: 
Amazon Price: N/A (as of June 20, 2018 16:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In 2006, co-authors Robert Scoble and Shel Israel wrote Naked Conversations, a book that persuaded businesses to embrace what we now call social media. Six years later they have teamed up again to report that social media is but one of five converging forces that promise to change virtually every aspect of our lives. You know these other forces already: mobile, data, sensors and location-based technology. Combined with social media they form a new generation of personalized technology that knows us better than our closest friends. Armed with that knowledge our personal devices can anticipate what we’ll need next and serve us better than a butler or an executive assistant. The resulting convergent superforce is so powerful that it is ushering in a era the authors call the Age of Context. In this new era, our devices know when to wake us up early because it snowed last night; they contact the people we are supposed to meet with to warn them we’re running late. They even find content worth watching on television. They also promise to cure cancer and make it harder for terrorists to do their damage. Astoundingly, in the coming age you may only receive ads you want to see. Scoble and Israel have spent more than a year researching this book. They report what they have learned from interviewing more than a hundred pioneers of the new technology and by examining hundreds of contextual products. What does it all mean? How will it change society in the future? The authors are unabashed tech enthusiasts, but as they write, an elephant sits in the living room of our book and it is called privacy. We are entering a time when our technology serves us best because it watches us; collecting data on what we do, who we speak with, what we look at. There is no doubt about it: Big Data is watching you. The time to lament the loss of privacy is over. The authors argue that the time is right to demand options that enable people to reclaim some portions of that privacy.

DARKNET & LAW

Amazon Price: N/A (as of June 21, 2018 09:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

DARKNET & LAW

Darknet or Dark Web is a concrete reality today, a new paradigm which promises to irreversibly change the game of the Internet. Darknet brings alongwith it various complicated legal, policy and regulatory challenges. Lot of these legal challenges are beginning to emerge, at the time of writing.
Continue reading “DARKNET & LAW”