Amazon Price: $19.99 $19.99 (as of December 14, 2017 05:38 –
This book provides an easy insight into the essentials of cybersecurity, even if you have a non-technical background. You may be a business person keen to understand this important subject area or an information security specialist looking to update your knowledge.
'The world has changed more in the past 10 years than in any 10 year period in human history… Technology is no longer a peripheral servant, it shapes our daily lives.
Continue reading “Cybersecurity for Beginners”
Amazon Price: $49.95 $49.93 You save: $0.02 (%). (as of December 14, 2017 04:36 –
ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book will teach you how to monitor activity on your web sites and protect them from attack.
Situated between your web sites and the world, web application firewalls provide an additional security layer, monitoring everything that comes in and everything that goes out in real time. They enable you to perform many advanced activities, such as access control, virtual patching, HTTP traffic logging, continuous passive security assessment, and web application hardening. Web application firewalls can be very effective in preventing application security attacks, such as SQL injection, cross-site scripting, remote file inclusion, and others that plague most web sites today.
Continue reading “ModSecurity Handbook, Second Edition”
Amazon Price: N/A (as of December 13, 2017 16:21 –
For more than three hundred years, the world wrestled with conflicts that arose between nation-states. Nation-states wielded military force, financial pressure, and diplomatic persuasion to create world order.” Even after the end of the Cold War, the elements comprising world order remained essentially unchanged.
But 2012 marked a transformation in geopolitics and the tactics of both the established powers and smaller entities looking to challenge the international community. That year, the US government revealed its involvement in Operation Olympic Games,” a mission aimed at disrupting the Iranian nuclear program through cyberattacks; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.
Cyber conflict is hard to track, often delivered by proxies, and has outcomes that are hard to gauge. It demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, cybersecurity expert Adam Segal reveals, power has been well and truly hacked.
Amazon Price: N/A (as of December 13, 2017 14:51 –
Well written code contains no flourishes.
Billy Goodman: Ethical Hacker, Privacy Technician
Three students and an experienced teenage hacktivist fight to escape the
destruction of Hacker School. Human rights demand these teenagers
challenge a malevolent dictatorship.
Continue reading “*hacktivist* (cyberwar explodes over a despotism's genocide) (cyberhug.me)”
Amazon Price: N/A (as of December 13, 2017 09:02 –
Cyber war and cyber-attack is an engaging review of the basic knowledge all up to date readers should have about cyber war and cyber-attacks before diving into more complex texts, as well as extra information for those already familiar with the topic. This work takes a look at general issues involving cyber vulnerability and our growing dependency on computers systems and networks. It goes beyond simple concepts such as hackers, hacktivism and espionage without neglecting them. It exposes the relevance of cyberdefence to both companies and ordinary users, giving especial attention to e-commerce platforms. At a time that many countries are employing strategies and money to prevent or minimize attacks as well as defend themselves against cyber threats this work pinpoints the key factors around the intentions behind attacks without minimizing their scale and variety. The jargon-free language and the current examples included help to set the discussion in the present day, while stressing important historical connections and pointing to how our strong network is at risk of becoming our weakest link.