Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware

Rating: 
Amazon Price: N/A (as of February 19, 2018 07:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cyber-crime increasingly impacts both the online and offline world, and targeted attacks play a significant role in disrupting services in both. Targeted attacks are those that are aimed at a particular individual, group, or type of site or service. Unlike worms and viruses that usually attack indiscriminately, targeted attacks involve intelligence-gathering and planning to a degree that drastically changes its profile.

Individuals, corporations, and even governments are facing new threats from targeted attacks. Targeted Cyber Attacks examines real-world examples of directed attacks and provides insight into what techniques and resources are used to stage these attacks so that you can counter them more effectively.
Continue reading “Targeted Cyber Attacks: Multi-staged Attacks Driven by Exploits and Malware”

The Dark Web: The War for Cyberspace

Rating: 
Amazon Price: N/A (as of February 19, 2018 06:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In its earliest days, the Internet seemed to all of us to be an unqualified good: It was a way to share information, increase productivity, and experience new freedoms and diversions. Alexander Klimburg was a member of the idealistic generation that came of age with the Internet. Two decades later, he—and all of us—have been forced to confront the reality that an invention that was once a utopian symbol of connection has evolved into an unprecedented weapon and means of domination.

Cyberspace, Klimburg contends, is already the main stage for global confrontation for this century. In this new arena of conflict, brilliant individuals and informal networks have the capacity to bring ostensibly stable societies to their knees—but also save them from destruction—and nations are reconceiving information as the ultimate weapon and configuring their defenses accordingly. The debate about how individual nations and the global community alike will define this new domain of human interaction is more pressing and divisive than ever.
Continue reading “The Dark Web: The War for Cyberspace”

Penetration Testing and Reverse Engineering Kindle eBook Details: Intrusion Detection Systems and e-Commerce Websites

Rating: 
Amazon Price: $21.99 $21.99 (as of February 19, 2018 15:36 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In 'Penetration Testing and Reverse Engineering: Introsion Detection Systems and e-Commerce Websites', Rob Kowalski provides the reader with thorough insights into the skills and practices that are encompassed in real-life scenarios and tests and serves as a solid baseline for skill set development, as the reader begins (or builds upon) their journey to grow in the field of Cyber Security. The book also gives readers real-life examples and the chance to spend quality, hands-on time practicing and improving their skills. The book is dynamically written and can serve as a definitive reference guide for professionals already in the field, a handbook for those with a passing interest or wanting to learn about the field of Cyber Security and a study guide for those taking both vocational and academic examinations. The book also provides detailed explanations of traditional penetration testing and reverse engineering software techniques and models of approach, the ethics and legalities and moves on to areas such as penetration testing and reverse engineering of Linux environments, mobile protocols (Android, iOS etc), web applications, IDS/IDN, e-Commerce websites, databases and desktop software applications.

Next Generation Red Teaming

Rating: 
Amazon Price: N/A (as of February 19, 2018 06:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Red Teaming is can be described as a type of wargaming.In private business, penetration testers audit and test organization security, often in a secretive setting. The entire point of the Red Team is to see how weak or otherwise the organization’s security posture is. This course is particularly suited to CISO’s and CTO’s that need to learn how to build a successful Red Team, as well as budding cyber security professionals who would like to learn more about the world of information security.

Teaches readers how to dentify systemic security issues based on the analysis of vulnerability and configuration data
Continue reading “Next Generation Red Teaming”

FISMA Compliance Handbook: Second Edition

Rating: 
Amazon Price: $69.95 $63.85 You save: $6.10 (9%). (as of February 20, 2018 00:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This comprehensive book instructs IT managers to adhere to federally mandated compliance requirements. FISMA Compliance Handbook Second Edition explains what the requirements are for FISMA compliance and why FISMA compliance is mandated by federal law. The evolution of Certification and Accreditation is discussed.

This book walks the reader through the entire FISMA compliance process and includes guidance on how to manage a FISMA compliance project from start to finish. The book has chapters for all FISMA compliance deliverables and includes information on how to conduct a FISMA compliant security assessment.
Continue reading “FISMA Compliance Handbook: Second Edition”