Advanced Penetration Testing for Highly-Secured Environments: The Ultimate Security Guide (Open Source: Community Experience Distilled)

Rating: 
Amazon Price: N/A (as of June 21, 2018 21:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Learn how to perform an efficient, organized, and effective penetration test from start to finishGain hands-on penetration testing experience by building and testing a virtual lab environment that includes commonly found security measures such as IDS and firewallsTake the challenge and perform a virtual penetration test against a fictional corporation from start to finish and then verify your results by walking through step-by-step solutionsDetailed step-by-step guidance on managing testing results and writing clearly organized and effective penetration testing reportsProperly scope your penetration test to avoid catastropheUnderstand in detail how the testing process works from start to finish, not just how to use specific toolsUse advanced techniques to bypass security controls and remain hidden while testingCreate a segmented virtual network with several targets, IDS and firewallGenerate testing reports and statisticsPerform an efficient, organized, and effective penetration test from start to finish

Although the book is intended for someone that has a solid background in information security the step-by-step instructions make it easy to follow for all skill levels. You will learn Linux skills, how to setup your own labs, and much much more.

Cybercrime and the Darknet: Revealing the hidden underworld of the internet

Rating: 
Amazon Price: N/A (as of June 22, 2018 05:26 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

With the emergence of the internet new forms of crime became possible. From harassment and grooming to fraud and identity theft the anonymity provided by the internet has created a new world of crime of which we all must be aware. The threat of hackers reaches beyond the individual, threatening businesses and even states, and holds worrying implications for the world we live in.

In this enlightening account, Cath Senker unmasks the many guises that cybercrime takes and the efforts of law enforcement to keep pace with the hackers. She reveals the mysterious world of hackers and cybersecurity professionals and reveals a story that is both shocking and surprising. With chapters on political activism and human rights, Senker shows a brighter side of the darknet. For anyone interested in learning more of the world of cyber-criminals and their opponents, this is the perfect starting point.

Practical VoIP Security

Rating: 
Amazon Price: N/A (as of June 22, 2018 02:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Voice Over IP (VoIP) phone lines now represent over 50% of all new phone line installations. Every one of these new VoIP phone lines and handsets must now be protected from malicious hackers because these devices now reside on the network and are accessible from the Internet just like any server or workstation.

This book will cover a wide variety of the publicly available exploit tools and how they can be used specifically against VoIP (Voice over IP) Telephony systems. The book will cover the attack methodologies that are used against the SIP and H.323 protocols as well as VoIP network infrastructure. Significant emphasis will be placed on both attack and defense techniques. This book is designed to be very hands on and scenario intensive
Continue reading “Practical VoIP Security”

Corporate Cyberwar

Rating: 
Amazon Price: $20.00 $20.00 (as of June 21, 2018 09:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Corporate Cyberwar chronicles the daily battle between technical criminals and law enforcement. As new and advanced ways to cheat and financially ruin companies are discovered, many authorities not only have to figure out ways to stop it, but they also have to create new laws in order to prosecute the perpetrators. This book addresses how businesses/corporations can protect themselves against this increasingly vicious attack. To help convey the importance of protection and awareness, Cyberwar explores two very important cases, WikiLeaks and Stuxnet. Businesses/corporations are given a better understanding of such similar attacks in the future. Corporate Cyberwar does not only focus on problems, it also provides solutions. There is a point by point explanation of how Crimeware, Bot Networks and DDoS (Distributed Denial of Service) take place, which helps businesses/corporations understand exactly what needs to be done in order to prevent the attacks. Cyberwar is not only for those with a moderate understanding of technology, it is also for those with limited understanding of this threat and its devastating effects.

Steal This Computer Book 4.0: What They Won’t Tell You About the Internet

Rating: 
Amazon Price: N/A (as of June 21, 2018 17:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

National bestseller with over 175,000 copies sold!

If you thought hacking was just about mischief-makers hunched over computers in the basement, think again. As seasoned author Wallace Wang explains, hacking can also mean questioning the status quo, looking for your own truths, and never accepting at face value anything authorities say or do.
Continue reading “Steal This Computer Book 4.0: What They Won’t Tell You About the Internet”