Nmap Cookbook: The Fat-free Guide to Network Scanning

Rating: 
Amazon Price: $19.95 (as of August 18, 2017 06:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.

Topics covered include:
* Installation on Windows, Mac OS X, Unix/Linux platforms
* Basic and advanced scanning techniques
* Network inventory and security auditing
* Firewall evasion techniques
* Zenmap – A graphical front-end for Nmap
* NSE – The Nmap Scripting Engine
* Ndiff – A Nmap scan comparison utility
Continue reading “Nmap Cookbook: The Fat-free Guide to Network Scanning”

Hacker Defense Manual

Amazon Price: $39.99 $39.81 You save: $0.18 (%). (as of August 18, 2017 08:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Comprehensive tips and analytical approach to providing defense in depth for networks and components. This will help protect the network.

Tor and the Dark Art of Anonymity: How to Be Invisible from NSA Spying

Rating: 
Amazon Price: $10.99 $10.99 (as of August 17, 2017 23:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The NSA hates Tor. So does the FBI. Even Google wants it gone, as do Facebook and Yahoo and every other soul-draining, identity-tracking vampiric media cartel that scans your emails and spies on your private browsing sessions to better target you. But there's hope. This manual will give you the incognito tools that will make you a master of anonymity! Other books tell you to install Tor and then encrypt your hard drive… and leave it at that. I go much deeper, delving into the very engine of ultimate network security, taking it to an art form where you'll receive a new darknet persona – how to be anonymous online without looking like you're trying to be anonymous online. Covered in Tor: – Browse the Internet Anonymously – Darkcoins, Darknet Marketplaces & Opsec Requirements – Tor Hidden Servers – How to Not Get Caught – Counter-Forensics the FBI Doesn't Want You to Know About – Windows vs. Linux – Which Offers Stronger Network Security? – Cryptocurrency (Real Bitcoin Anonymity) – Supercookies & Encryption – Preventing Marketers and Debt Collectors From Finding You – How to Protect Your Assets – i.e., How to Be Invisible and even Hide from the Internet itself! – How to Hide Anything Scroll back up and click "Look Inside" and Take Back Your Life Today!

Cybersecurity: Cyberwar: What Everyone Must Know

Amazon Price: $35.00 $35.00 (as of August 18, 2017 06:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. The key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do?

Perfect Password: Selection, Protection, Authentication

Rating: 
Amazon Price: N/A (as of August 18, 2017 13:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

User passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.

Every computer user must face the problems of password security. According to a recent British study, passwords are usually obvious: around 50 percent of computer users select passwords based on names of a family member, spouse, partner, or a pet. Many users face the problem of selecting strong passwords that meet corporate security requirements. Too often, systems reject user-selected passwords because they are not long enough or otherwise do not meet complexity requirements. This book teaches users how to select passwords that always meet complexity requirements.
Continue reading “Perfect Password: Selection, Protection, Authentication”