Amazon Price: N/A (as of September 25, 2018 11:56 –
This book is a step-by-step guide on building a Raspberry Pi VPN Server using Open Source software under Windows 7 and Raspbian OS. As a fully plug-n-play device, you will be able to connect it into virtually any Internet router and it will auto-configure itself to that environment. There is no need for DDNS (Dynamic DNS) as the server will send you emails if/when its IP address changes, so you can make quick/easy changes to your local Client Certificates. For less than $60, you'll have your own VPN Server which you can monitor and maintain from almost anywhere without paying service fees or risk having your data recorded.
***NEW*** The rpi-vpn.zip file referenced in my book contains a link to a new supporting web site that includes a User Forum, and additional FAQs, Troubleshooting, Maintenance, and Errata pages not found in the book.
** Updated to Rev 2.0 on May 1, 2015 – Added WiFi setup instructions, Troubleshooting and FAQ Appendices, and corrections.
Amazon Price: $18.90 $18.90 (as of September 25, 2018 05:26 –
Essay from the year 2015 in the subject Computer Science – Internet, New Technologies, Webster University, course: ITM 5000 07, language: English, abstract: The Internet has brought the world closer than ever, especially, with the ease in sharing information. A post online from Alpine, Texas can be accessible almost immediately by someone in Accra, Ghana and at the same time with the person in Bangalore, India. As much as there is access to the Internet, authorized users can access information/data irrespective of their location. Business activities are now performed globally and efficiently in comfort; buyers and sellers do business without any constraints. Business supporting activities such as paying and receiving of cash, shipping of goods, and other related activities have now been automated in the cyberspace. The most reliable resource vault or knowledge center accessible by all is the Internet; it could even be referred to as one of mankind's greatest achievement. However, it has also made all users including governments, corporate institutions and business entities exposed and vulnerable to numerous cyber crimes. The risk of losing personal data or theft of an important data like customer data from an organization by cyber criminals has become very high. Cyber security remains the biggest challenge faced by all especially governments and organizations.
Amazon Price: N/A (as of September 24, 2018 17:16 –
Internet of Things aka IOT is disrupting our world with wearables, connected cars, connected home, connected cities and industrial IOT with a projected 20Billion IOT devices in the world by 2020.
IOT is re-introducing our fridge, toaster, washing machine, toothbrush, watch, bed, locks, garage, thermostat and even baby diapers as intelligent devices with sensors and creating a world of new convenience for us.
Continue reading “IoT Disruptions: The Internet of Things – Innovations & Jobs”
Amazon Price: $57.63 (as of October 2, 2015 17:16 –
When it comes to creating powerful and effective hacking tools, Python is the language of choice for most security analysts. But just how does the magic happen? In Black Hat Python, the latest from Ajay Kumar Tiwari (author of the best-sellingMastering kali linux), you'll explore the darker side of Python's capabilities—writing network sniffers, manipulating packets, infecting virtual machines, creating stealthy trojans, and more. You'll learn how to: Create a trojan command-and-control using GitHub Detect sandboxing and automate common malware tasks, like keylogging and screenshotting Escalate Windows privileges with creative process control Use offensive memory forensics tricks to retrieve password hashes and inject shellcode into a virtual machine Extend the popular Burp Suite web-hacking tool Abuse Windows COM automation to perform a man-in-the-browser attack Exfiltrate data from a network most sneakily Insider techniques and creative challenges throughout show you how to extend the hacks and how to write your own exploits. When it comes to offensive security, your ability to create powerful tools on the fly is indispensable. Learn how in Python for hackers.
Amazon Price: N/A (as of September 24, 2018 23:59 –
Es un libro que le permitirá comprender los aspectos metodológicos asociados a un Ethical Hacking y los diferentes tipos de análisis de seguridad existentes, bajo una óptica orientada a ayudarlos a presentar los resultados en forma clara y entendible para las gerencias de Negocio. VENTAJAS COMPETITIVAS El libro va más allá de las herramientas utilizadas, para enfocarse sobre los objetivos asociados a cada etapa de un análisis de seguridad, permitiéndose de esta forma ser un material de consulta que perdurara en el tiempo. SEPA CÓMO Identificar el tipo de análisis de seguridad que su organización necesita. Gestionar de manera efectiva los resultados identificados en el análisis de seguridad. Comunicar de forma adecuada las necesidades y los resultados a la alta dirección. CONOZCA Las técnicas de identificación y explotación de vulnerabilidades más utilizadas hoy en día. Los diferentes tipos de perfiles de potenciales atacantes, y aprenda a pensar como uno de ellos.