Amazon Price: $24.99 $16.11 You save: $8.88 (36%). (as of September 20, 2019 22:01 –
With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a camera or a robot? Set up Linux distributions for media centers or PBX phone systems? That’s just the beginning of what you’ll find inside Raspberry Pi Hacks.
If you’re looking to build either a software or hardware project with more computing power than Arduino alone can provide, Raspberry Pi is just the ticket. And the hacks in this book will give you lots of great ideas.Use configuration hacks to get more out of your PiBuild your own web server or remote print serverTake the Pi outdoors to monitor your garden or control holiday lightsConnect with SETI or construct an awesome Halloween costumeHack the Pi’s Linux OS to support more complex projectsDecode audio/video formats or make your own music playerAchieve a low-weight payload for aerial photographyBuild a Pi computer cluster or a solar-powered lab
Amazon Price: $39.95 (as of September 20, 2019 22:33 –
In this book you'll learn everything you wanted to know about computer viruses, ranging from the simplest 44-byte virus right on up to viruses for 32-bit Windows, Unix and the Internet. You'll learn how anti-virus programs stalk viruses and what viruses do to evade these digital policemen, including stealth techniques and poly-morphism. Next, you'll take a fascinating trip to the frontiers of science and learn about genetic viruses. Will such viruses take over the world, or will they become the tools of choice for the information warriors of the 21st century? Finally, you'll learn about payloads for viruses, not just destructive code, but also how to use a virus to compromise the security of a computer, and the possibility of beneficial viruses.
Amazon Price: $8.99 $8.99 (as of September 21, 2019 01:40 –
Want to surf the web anonymously? This book is the perfect guide for anyone who wants to cloak their online activities. Whether you're on Usenet, Facebook, P2P, or browsing the web with standard browsers like Opera, Firefox and Internet Explorer, I will show you how to become a ghost on the internet, leaving no tracks back to your isp, or anyone else. This book covers every facet of encrypting your private data, securing your pc, masking your online footsteps, and gives you peace of mind with TOTAL 100% ANONYMITY on the internet. – Learn how to mask your online identity with *every* site or protocol you use online – In depth guides on Tor, Freenet, I2P, Proxies, VPNs, Usenet and much, much, more! – Learn about basic mistakes that even advanced hackers make every day that give them away – Learn which programs make you a ghost on the internet, and which shine the spotlight on you! – Get 100% security with online *and* offline computer habits! Regardless of what you do online, you owe it to yourself to make sure you aren't taken advantage of!
Amazon Price: $170.00 $49.64 You save: $120.36 (71%). (as of September 20, 2019 16:26 –
Cyber Resilience Best Practices provides organizations with a methodology for implementing cyber resilience. It offers a practical approach to cyber resilience, reflecting the need to detect and recover from incidents, and not rely on prevention alone. It uses the ITIL® framework, which provides a proven approach to the provision of services that align to business outcomes.
Continue reading “Cyber Resilience Best Practices”
Amazon Price: $12.99 $12.99 (as of September 20, 2019 16:17 –
The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive… and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona – how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor: – Browse the Internet Anonymously – Darkcoins, Darknet Marketplaces & Opsec Requirements – Tor Hidden Servers – How to Not Get Caught – Counter-Forensics the FBI Doesn't Want You to Know About – Windows vs. Linux – Which Offers Stronger Network Security? – Cryptocurrency (Real Bitcoin Anonymity) – Supercookies & Encryption – Preventing Marketers and Debt Collectors From Finding You – How to Protect Your Assets – i.e., How to Be Invisible and even Hide from the Internet itself! – How to Hide Anything Scroll back up and click "Look Inside" and Take Back Your Life Today!