The Death of the Internet

Rating: 
Amazon Price: $78.95 $64.83 You save: $14.12 (18%). (as of June 19, 2019 13:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Fraud poses a significant threat to the Internet. 1.5% of all online advertisements attempt to spread malware. This lowers the willingness to view or handle advertisements, which will severely affect the structure of the web and its viability. It may also destabilize online commerce. In addition, the Internet is increasingly becoming a weapon for political targets by malicious organizations and governments. This book will examine these and related topics, such as smart phone based web security. This book describes the basic threats to the Internet (loss of trust, loss of advertising revenue, loss of security) and how they are related. It also discusses the primary countermeasures and how to implement them.

Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Open Source: Community Experience Distilled)

Rating: 
Amazon Price: N/A (as of June 19, 2019 09:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS and firewallsTake the challenge and perform a virtual penetration test against a fictional corporation from start to finish and then verify your results by walking through step-by-step solutionsDetailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reportsProperly scope your penetration test to avoid catastropheUnderstand in detail how the testing process works from start to finish, not just how to use specific toolsUse advanced techniques to bypass security controls and remain hidden while testingCreate a segmented virtual network with several targets, IDS and firewallGenerate testing reports and statisticsPerform an efficient, organized, and effective penetration test from start to finish

Although the book is intended for someone that has a solid background in information security the step-by-step instructions make it easy to follow for all skill levels. You will learn Linux skills, how to setup your own labs, and much much more.

A Practical Guide to Computer Forensics Investigations

Rating: 
Amazon Price: $65.00 $61.46 You save: $3.54 (5%). (as of June 18, 2019 23:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

All you need to know to succeed in digital forensics: technical and investigative skills, in one book

Complete, practical, and up-to-date
Continue reading “A Practical Guide to Computer Forensics Investigations”

Managerial Guide for Handling Cyber-Terrorism and Information Warfare

Amazon Price: $84.95 $76.02 You save: $8.93 (11%). (as of June 19, 2019 01:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Managerial Guide for Handling Cyber-Terrorism and Information Warfare" presents IT managers with what cyber-terrorism and information warfare is and how to handle the problems associated with them. This book explains the roots of terrorism and how terrorism has planted the seeds of cyber-terrorism. The most probable forms of cyber-terrorism and information warfare attacks are presented, including the definitions of these attacks, describing how they work and presenting the most effective ways to combat these threats from an IT management point-of-view. "Managerial Guide for Handling Cyber-Terrorism and Information Warfare" defines the organizational security measures that will decrease an organization's information system vulnerabilities to all types of attacks.

ModSecurity Handbook, Second Edition

Rating: 
Amazon Price: $49.95 $48.71 You save: $1.24 (2%). (as of June 19, 2019 01:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

ModSecurity Handbook is the definitive guide to ModSecurity, the popular open source web application firewall. Written by Christian Folini and ModSecurity’s original developer, Ivan Ristic, this book will teach you how to monitor activity on your web sites and protect them from attack.

Situated between your web sites and the world, web application firewalls provide an additional security layer, monitoring everything that comes in and everything that goes out in real time. They enable you to perform many advanced activities, such as access control, virtual patching, HTTP traffic logging, continuous passive security assessment, and web application hardening. Web application firewalls can be very effective in preventing application security attacks, such as SQL injection, cross-site scripting, remote file inclusion, and others that plague most web sites today.
Continue reading “ModSecurity Handbook, Second Edition”