Hacking the Code: Auditor’s Guide to Writing Secure Code for the Web

Rating: 
Amazon Price: N/A (as of December 11, 2017 03:06 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hacker Code will have over 400 pages of dedicated exploit, vulnerability, and tool code with corresponding instruction. Unlike other security and programming books that dedicate hundreds of pages to architecture and theory based flaws and exploits, HC1 will dive right into deep code analysis. Previously undisclosed security research in combination with superior programming techniques from Foundstone and other respected organizations will be included in both the Local and Remote Code sections of the book.

The book will be accompanied with a FREE COMPANION CD containing both commented and uncommented versions of the source code examples presented throughout the book. In addition to the book source code, the CD will also contain a copy of the author-developed Hacker Code Library v1.0. The Hacker Code Library will include multiple attack classes and functions that can be utilized to quickly create security programs and scripts. These classes and functions will simplify exploit and vulnerability tool development to an extent never before possible with publicly available software.
Continue reading “Hacking the Code: Auditor's Guide to Writing Secure Code for the Web”

HPC@Green IT: Green High Performance Computing Methods

Amazon Price: N/A (as of December 11, 2017 13:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Making the most ef?cient use of computer systems has rapidly become a leading topic of interest for the computer industry and its customers alike. However, the focus of these discussions is often on single, isolated, and speci?c architectural and technological improvements for power reduction and conservation, while ignoring the fact that power ef?ciency as a ratio of performance to power consumption is equally in?uenced by performance improvements and architectural power red- tion. Furthermore, ef?ciency can be in?uenced on all levels of today’s system hi- archies from single cores all the way to distributed Grid environments. To improve execution and power ef?ciency requires progress in such diverse ?elds as program optimization, optimization of program scheduling, and power reduction of idling system components for all levels of the system hierarchy. Improving computer system ef?ciency requires improving system performance and reducing system power consumption. To research and reach reasonable conc- sions about system performance we need to not only understand the architectures of our computer systems and the available array of code transformations for p- formance optimizations, but we also need to be able to express this understanding in performance models good enough to guide decisions about code optimizations for speci?c systems. This understanding is necessary on all levels of the system hierarchy from single cores to nodes to full high performance computing (HPC) systems, and eventually to Grid environments with multiple systems and resources.

Bitcoin and Cryptocurrency: A guide to Blockchain, Bitcoin and other Cryptocurrencies (Bitcoin mining, Ripple, Ethereum, Blockchain,)

Rating: 
Amazon Price: N/A (as of December 11, 2017 14:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A guide to Bitcoin and Cyprocurrency!

The main aim of this book will be to teach you the basics of cryptocurrencies and introduce you to the world of Bitcoins. Cryptocurrencies have been in existence since 2008, and continue to remain lucrative prospects for both first-time investors and seasoned investors.
Continue reading “Bitcoin and Cryptocurrency: A guide to Blockchain, Bitcoin and other Cryptocurrencies (Bitcoin mining, Ripple, Ethereum, Blockchain,)”

Hacker’s Challenge : Test Your Incident Response Skills Using 20 Scenarios

Rating: 
Amazon Price: $37.00 $20.78 You save: $16.22 (44%). (as of December 11, 2017 21:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Mike Schiffman has hit upon a great formula for Hacker's Challenge. Rather than try to research, fully understand, and adequately explain attacks that have taken place on other people's networks–the approach taken by too many writers of books about computer security–Schiffman lets network administrators and security experts tell their stories first-hand. This is good. What's better is that Schiffman has edited each of their war stories into two sections: one that presents the observations the sysadmin or security consultant made at the time of the attack, and another (in a separate part of the book) that ties the clues together and explains exactly what was going on. The challenge in the title is for you to figure out what the bad guys were doing–and how best to stop them–before looking at the printed solution. Let's call this book what it is: an Encyclopedia Brown book for people with an interest in network security.

It doesn't really matter, from a value-for-money standpoint, whether your skills are up to the challenge or not. The accounts of intrusions–these are no-kidding, real-life attacks that you can probably learn from, by the way–are written like chapters from a novel (though log file listings, network diagrams, and performance graphs appear alongside the narrative text). Recall every time you've seen a movie or read a book with computer scenes so technically inaccurate they made you wish for a writer with a clue. Schiffman and Hacker's Challenge is what you wished for. –David Wall
Continue reading “Hacker's Challenge : Test Your Incident Response Skills Using 20 Scenarios”

Network Security with Netflow and IPFIX: Big Data Analytics for Information Security (Networking Technology: Security)

Rating: 
Amazon Price: N/A (as of December 11, 2017 11:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A comprehensive guide for deploying, configuring, and troubleshooting NetFlow and learning big data analytics technologies for cyber security

Today’s world of network security is full of cyber security vulnerabilities, incidents, breaches, and many headaches. Visibility into the network is an indispensable tool for network and security professionals and Cisco NetFlow creates an environment where network administrators and security professionals have the tools to understand who, what, when, where, and how network traffic is flowing.
Continue reading “Network Security with Netflow and IPFIX: Big Data Analytics for Information Security (Networking Technology: Security)”