Amazon Price: $39.99 $36.28 You save: $3.71 (9%). (as of August 15, 2018 11:26 –
There have been distinct turning point moments in human history, such as when “germ theory” explained how to control many diseases, or how cholesterol levels helped to predict heart disease. The list goes on. All of these moments have one thing in common: the risk of radiation, germs, and cholesterol cannot be seen or felt. They are difficult to understand from a visceral standpoint. Businesses today are at a new turning point. Cybersecurity issues are making headlines around the world, impacting company reputations for years (such as Sony), changing the value and direction of businesses (Yahoo), and possibly influencing elections around the world.
This book covers none of those things. This book is about you.
Continue reading “Secure Enough?: 20 Questions on Cybersecurity for Business Owners and Executives”
Amazon Price: $75.00 $75.00 (as of August 15, 2018 06:07 –
Explaining cybercrime in a highly networked world, this book provides a comprehensive yet accessible summary of the history, modern developments, and efforts to combat cybercrime in various forms at all levels of government-international, national, state, and local. * Provides accessible, comprehensive coverage of a complex topic that encompasses identity theft to copyright infringement written for non-technical readers * Pays due attention to important elements of cybercrime that have been largely ignored in the field, especially politics * Supplies examinations of both the domestic and international efforts to combat cybercrime * Serves an ideal text for first-year undergraduate students in criminal justice programs
Amazon Price: N/A (as of August 15, 2018 06:36 –
Cyber war and cyber-attack is an engaging review of the basic knowledge all up to date readers should have about cyber war and cyber-attacks before diving into more complex texts, as well as extra information for those already familiar with the topic. This work takes a look at general issues involving cyber vulnerability and our growing dependency on computers systems and networks. It goes beyond simple concepts such as hackers, hacktivism and espionage without neglecting them. It exposes the relevance of cyberdefence to both companies and ordinary users, giving especial attention to e-commerce platforms. At a time that many countries are employing strategies and money to prevent or minimize attacks as well as defend themselves against cyber threats this work pinpoints the key factors around the intentions behind attacks without minimizing their scale and variety. The jargon-free language and the current examples included help to set the discussion in the present day, while stressing important historical connections and pointing to how our strong network is at risk of becoming our weakest link.
Amazon Price: N/A (as of April 4, 2018 14:42 –
This book will provide you with exceptional information of how to hack into a wifi or a wireless network. It will show you, step by step, how to gain access to the passwords that are encrypted.
This book can also help you to expose the security leaks your own wireless network may have.
The book is full with the actual links to the programs you will be using when you will be doing your hacking.
Get started today with my book, it will not disappoint you.
Amazon Price: $49.95 $49.95 (as of August 15, 2018 21:16 –
ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book will teach you how to monitor activity on your web sites and protect them from attack.
Situated between your web sites and the world, web application firewalls provide an additional security layer, monitoring everything that comes in and everything that goes out in real time. They enable you to perform many advanced activities, such as access control, virtual patching, HTTP traffic logging, continuous passive security assessment, and web application hardening. Web application firewalls can be very effective in preventing application security attacks, such as SQL injection, cross-site scripting, remote file inclusion, and others that plague most web sites today.
Continue reading “ModSecurity Handbook, Second Edition”