Nmap Cookbook: The Fat-free Guide to Network Scanning

Rating: 
Amazon Price: $19.95 (as of October 21, 2017 23:11 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Nmap(r) Cookbook: The fat-free guide to network scanning provides simplified coverage of network scanning features available in the Nmap suite of utilities. Every Nmap feature is covered with visual examples to help you quickly understand and identify proper usage for practical results.

Topics covered include:
* Installation on Windows, Mac OS X, Unix/Linux platforms
* Basic and advanced scanning techniques
* Network inventory and security auditing
* Firewall evasion techniques
* Zenmap – A graphical front-end for Nmap
* NSE – The Nmap Scripting Engine
* Ndiff – A Nmap scan comparison utility
Continue reading “Nmap Cookbook: The Fat-free Guide to Network Scanning”

Active Cyber Defense Cycle

Amazon Price: $60.00 (as of October 21, 2017 10:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Currently unavailable

Countering flexible and persistent adversaries requires empowered defenders

The Active Cyber Defense Cycle empowers cyber defenders to unify their cyber security efforts into a single holistic strategy. Written by a renowned cyber defense expert, this book draws on the author's military and intelligence career complemented with his time in private industry and teaching at the SANS Institute, to provide a technology-agnostic model for countering advanced adversaries. By linking identification, response, and analysis, organizations of any size can better utilize their personnel to stay several steps ahead of increasingly determined adversaries. The Active Cyber Defense Cycle details a cohesive security operations approach that pulls together threat intelligence, network security monitoring, incident response, and threat and environmental manipulation. Analysis of each incident is incorporated into the next cycle, to help you build an ever-stronger system of prevention and defense. The author provides hands-on labs with packet captures, malware samples, and incident response data—enabling readers to train and test their skills with real-world tools.
Continue reading “Active Cyber Defense Cycle”

Git Pocket Guide

Rating: 
Amazon Price: N/A (as of October 21, 2017 23:04 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This pocket guide is the perfect on-the-job companion to Git, the distributed version control system. It provides a compact, readable introduction to Git for new users, as well as a reference to common commands and procedures for those of you with Git experience.

Written for Git version 1.8.2, this handy task-oriented guide is organized around the basic version control functions you need, such as making commits, fixing mistakes, merging, and searching history.Examine the state of your project at earlier points in timeLearn the basics of creating and making changes to a repositoryCreate branches so many people can work on a project simultaneouslyMerge branches and reconcile the changes among themClone an existing repository and share changes with push/pull commandsExamine and change your repository’s commit historyAccess remote repositories, using different network protocolsGet recipes for accomplishing a variety of common tasks

Cybercrime and Cyber Warfare (FOCUS Series)

Amazon Price: N/A (as of October 22, 2017 02:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In order to enable general understanding and to foster the implementation of necessary support measures in organizations, this book describes the fundamental and conceptual aspects of cyberspace abuse. These aspects are logically and reasonably discussed in the fields related to cybercrime and cyberwarfare. The book illustrates differences between the two fields, perpetrators’ activities, as well as the methods of investigating and fighting against attacks committed by perpetrators operating in cyberspace.
The first chapter focuses on the understanding of cybercrime, i.e. the perpetrators, their motives and their organizations. Tools for implementing attacks are also briefly mentioned, however this book is not technical and does not intend to instruct readers about the technical aspects of cybercrime, but rather focuses on managerial views of cybercrime. Other sections of this chapter deal with the protection against attacks, fear, investigation and the cost of cybercrime. Relevant legislation and legal bodies, which are used in cybercrime, are briefly described at the end of the chapter.
The second chapter deals with cyberwarfare and explains the difference between classic cybercrime and operations taking place in the modern inter-connected world. It tackles the following questions: who is committing cyberwarfare; who are the victims and who are the perpetrators? Countries which have an important role in cyberwarfare around the world, and the significant efforts being made to combat cyberwarfare on national and international levels, are mentioned.
The common points of cybercrime and cyberwarfare, the methods used to protect against them and the vision of the future of cybercrime and cyberwarfare are briefly described at the end of the book.

Contents
Continue reading “Cybercrime and Cyber Warfare (FOCUS Series)”

The Antivirus Hacker’s Handbook

Rating: 
Amazon Price: $50.00 $35.48 You save: $14.52 (29%). (as of October 21, 2017 16:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Hack your antivirus software to stamp out future vulnerabilities
The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into the reverse engineering process, which details how to start from a finished antivirus software program and work your way back through its development using the functions and other key elements of the software. Next, you leverage your new knowledge about software development to evade, attack, and exploit antivirus software—all of which can help you strengthen your network and protect your data.
While not all viruses are damaging, understanding how to better protect your computer against them can help you maintain the integrity of your network. Discover how to reverse engineer your antivirus software Explore methods of antivirus software evasion Consider different ways to attack and exploit antivirus software Understand the current state of the antivirus software market, and get recommendations for users and vendors who are leveraging this software
The Antivirus Hacker's Handbook is the essential reference for software reverse engineers, penetration testers, security researchers, exploit writers, antivirus vendors, and software engineers who want to understand how to leverage current antivirus software to improve future applications.