CyberWar

Si Vis Pacem, Para Bellum

By

Hacking the Code: Auditor’s Guide to Writing Secure Code for the Web

Rating: 
Amazon Price: N/A (as of April 30, 2017 13:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book.

The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
Read More

By

Building Internet Firewalls

Rating: 
Amazon Price: N/A (as of April 30, 2017 01:33 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks–and the need to protect both business and personal data–have never been greater. We've updated Building Internet Firewalls to address these newer risks.

What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines.
Read More

By

Computing Networks: From Cluster to Cloud Computing (ISTE)

Amazon Price: N/A (as of April 30, 2017 08:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

“Computing Networks” explores the core of the new distributed computing infrastructures we are using today: the networking systems of clusters, grids and clouds. It helps network designers and distributed-application developers and users to better understand the technologies, specificities, constraints and benefits of these different infrastructures’ communication systems.

Cloud Computing will give the possibility for millions of users to process data anytime, anywhere, while being eco-friendly. In order to deliver this emerging traffic in a timely, cost-efficient, energy-efficient, and reliable manner over long-distance networks, several issues such as quality of service, security, metrology, network-resource scheduling and virtualization are being investigated since 15 years. “Computing Networks” explores the core of clusters, grids and clouds networks, giving designers, application developers and users the keys to better construct and use these powerful infrastructures.

By

Computação Distribuída de Alto Desempenho: Redes, Clusters e Grids Computacionais (Portuguese Edition)

Amazon Price: N/A (as of April 29, 2017 19:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Com o aumento do provimento de serviços digitais, nunca antes imaginados, surge a necessidade da utilização de ambientes computacionais distribuídos com maior desempenho. Neste livro tratamos de diversos conceitos e ambientes que auxiliam o entendimento desse novo cenário computacional do século XXI.

By

Using Bittorent protocol to launch DDoS attacks

Amazon Price: $7.50 $7.50 (as of April 29, 2017 22:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Essay from the year 2012 in the subject Computer Science – IT-Security, , language: English, abstract: In a nutshell what the researcher hopes to achieve by this project is to develop a practical solution to control Distributed Denial of Service (DDoS) attacks launched using BitTorrent protocol by tweaking the source code of an existing open source BitTorrent client. Even though BitTorrent is a useful protocol, it could be misused to launch DDoS attacks. Since the number who uses BitTorrent protocol is high, by launching a DDoS the victim's machine could be crippled. Hence as a remedy to the issue this report is formulated so that it discusses how the attacks are done and how it could be prevented. For a simple analogical demonstration of what this attack does, take a look at figure 1 where computer A cannot fulfill the requests of a legit user computer B. this is what DDoS attack does. After enhancing the security architecture of BitTorrent client this problem would not occur hence it is improved to control these attacks.

/* */