Hiding from the Internet: Eliminating Personal Online Information

Rating: 
Amazon Price: N/A (as of November 23, 2017 13:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

New 2016 Third Edition

Take control of your privacy by removing your personal information from the internet with this second edition.
Continue reading “Hiding from the Internet: Eliminating Personal Online Information”

Hacking: The Beginner’s Complete Guide To Computer Hacking And Penetration Testing

Rating: 
Amazon Price: N/A (as of November 23, 2017 13:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Have You Always Wondered If Hacking Has Any Benefits?

Are You Interested In Penetration Testing To Examine Security Strength?
Continue reading “Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing”

DNS Security: In-depth Vulnerability Analysis and Mitigation Solutions

Rating: 
Amazon Price: N/A (as of November 22, 2017 13:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Domain Name System (DNS) is arguably one of the most important network infrastructure services. As the enabler of almost every web, email, instant messaging, and e-commerce transaction, it is the central nervous system of the Internet. DNS is also a critical component for new and emerging applications such as Voice over LTE (VoLTE) in cellular networks, Voice over IP (VoIP) Telephony, Radio Frequency IDs (RFID), and Content Distribution Networks (CDN).

Now in IEEE ComSoc's Best Readings, this book gives the reader an in-depth understanding of how DNS works, its security vulnerabilities, how to monitor and detect security related events and how to prevent and mitigate attacks. After reading the book, the reader will be able to recognize and explain the major issues around DNS security, and know the best practices to setup, operate, and protect DNS service.
Continue reading “DNS Security: In-depth Vulnerability Analysis and Mitigation Solutions”

Hacking: Hacking Now Trilogy! 3-in-1 Book Trilogy including: Book I. Ultimate Beginners Guide, Book II. Grey Hat Hacking, Book III. Penetration Testing Now!

Rating: 
Amazon Price: N/A (as of November 23, 2017 00:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hacking Now Trilogy! Is the the Best of the Best of my 3 Hacking books rolled into 1.

This Trilogy teaches you literally everything you need to know to understand its foundation and begin hacking now.It includes:
Continue reading “Hacking: Hacking Now Trilogy! 3-in-1 Book Trilogy including: Book I. Ultimate Beginners Guide, Book II. Grey Hat Hacking, Book III. Penetration Testing Now!”

Corporate Cyberwar

Rating: 
Amazon Price: $20.00 $20.00 (as of November 23, 2017 02:30 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.