CyberWar

Si Vis Pacem, Para Bellum

By

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Rating: 
Amazon Price: $59.95 $43.01 You save: $16.94 (28%). (as of April 30, 2017 10:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals, hackers, and penetration testers. Often, the information openly present is as critical as the confidential data.
Hacking Web Intelligence shows you how to dig into the Web and uncover the information many don't even know exists. The book takes a holistic approach that is not only about using tools to find information online but also how to link all the information and transform it into presentable and actionable intelligence. You will also learn how to secure your information online to prevent it being discovered by these reconnaissance methods.
Hacking Web Intelligence is an in-depth technical reference covering the methods and techniques you need to unearth open source information from the Internet and utilize it for the purpose of targeted attack during a security assessment. This book will introduce you to many new and leading-edge reconnaissance, information gathering, and open source intelligence methods and techniques, including metadata extraction tools, advanced search engines, advanced browsers, power searching methods, online anonymity tools such as TOR and i2p, OSINT tools such as Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, Social Network Analysis (SNA), Darkweb/Deepweb, data visualization, and much more.Provides a holistic approach to OSINT and Web recon, showing you how to fit all the data together into actionable intelligenceFocuses on hands-on tools such as TOR, i2p, Maltego, Shodan, Creepy, SearchDiggity, Recon-ng, FOCA, EXIF, Metagoofil, MAT, and many moreCovers key technical topics such as metadata searching, advanced browsers and power searching, online anonymity, Darkweb / Deepweb, Social Network Analysis (SNA), and how to manage, analyze, and visualize the data you gatherIncludes hands-on technical examples and case studies, as well as a Python chapter that shows you how to create your own information-gathering tools and modify existing APIs

By

Cyber Security: Ein Einblick für Wirtschaftswissenschaftler (essentials) (German Edition)

Amazon Price: $19.99 $10.53 You save: $9.46 (47%). (as of April 30, 2017 09:28 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In diesem Buch erfahren Wirtschaftswissenschaftler, wie Firmen nach Hackerangriffen vom Markt verschwinden und wie Hacker Aktienkurse beeinflussen können. Lernen Sie, wie Homo oeconomicus beim Thema Cyber Security zum Homo carens securitate wird und wie es gelingt, mithilfe der wirtschaftswissenschaftlichen „Brille“ (oder: Perspektive/Sicht) ganz neue Lösungsansätze und Sichtweisen im Kampf gegen Wirtschaftsspione, Hacker und Cyber-Kriminelle zu erkennen. Cyber Security bzw. IT-Sicherheit ist ein Zukunftsthema, an dem kaum jemand vorbeikommt. Dieses Buch beschreibt anhand aktueller Vorfälle – ohne technisches Grundwissen vorauszusetzen –, was Ökonomen wissen müssen, um sich am Gespräch über eines der wichtigsten Zukunftsthemen unserer Zeit beteiligen zu können.

By

Learning Android Forensics

Rating: 
Amazon Price: N/A (as of April 30, 2017 11:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A hands-on guide to Android forensics, from setting up the forensic workstation to analyzing key forensic artifacts

About This BookA professional, step-by-step approach to forensic analysis complete with key strategies and techniquesAnalyze the most popular Android applications using free and open source toolsLearn forensically-sound core data extraction and recovery techniques
Read More

By

Hiding from the Internet: Eliminating Personal Online Information

Rating: 
Amazon Price: $29.99 (as of April 30, 2017 10:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

2015 Revision!

Take control of your privacy by removing your personal information from the internet with this second edition.
Read More

By

The Penetration Tester’s Handbook: The First Steps to CEH Certification

Amazon Price: $60.00 $52.98 You save: $7.02 (12%). (as of April 30, 2017 11:29 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This practical guide to penetration testing teaches would-be ethical hackers to scan for, identify, and analyze security vulnerabilities―readying readers for the Certified Ethical Hacker (CEH) exam
The Penetration Tester's Handbook: The First Steps to CEH Certification is designed to advance the knowledge, skills, and techniques of the ethical hacker. The book begins with a review of information security theory and goes on to fully cover the tools and techniques of penetration and vulnerability testing. Hands-on exercises are included throughout the handbook to reinforce the information presented and to develop your skills.
Upon finishing this handbook, you will be ready to practice independently to hone your penetration testing skills―and to work toward obtaining the Certified Ethical Hacker designation. The personal penetration testing lab, for which set-up instructions are included, will aid you beyond the book and serve as a resource for additional practice and study. Bridges the knowledge and experience gap that exists between the CompTIA Security+ certification and the more advanced CEH certification Features more than 30 realistic step-by-step practice exercises

/* */