Learn PowerShell Toolmaking in a Month of Lunches

Rating: 
Amazon Price: $44.99 $31.46 You save: $13.53 (30%). (as of December 13, 2017 15:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Summary

Packed with hands-on labs to reinforce what you're learning, Learn PowerShell Toolmaking in a Month of Lunches is the best way to learn PowerShell scripting and toolmaking. Just set aside one hour a day—lunchtime would be perfect—for each self-contained lesson. You'll move quickly through core scripting concepts and start working on four real-world, practical tools. Each chapter adds more functionality, including custom formatting, error handling, parameterized input, input validation, help files and documentation, and more.
Continue reading “Learn PowerShell Toolmaking in a Month of Lunches”

Web Application Defender’s Cookbook: Battling Hackers and Protecting Users

Rating: 
Amazon Price: N/A (as of December 13, 2017 17:51 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Defending your web applications against hackers and attackers

The top-selling book Web Application Hacker's Handbook showed how attackers and hackers identify and attack vulnerable live web applications. This new Web Application Defender's Cookbook is the perfect counterpoint to that book: it shows you how to defend. Authored by a highly credentialed defensive security expert, this new book details defensive security methods and can be used as courseware for training network security personnel, web server administrators, and security consultants.
Continue reading “Web Application Defender's Cookbook: Battling Hackers and Protecting Users”

The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice

Rating: 
Amazon Price: N/A (as of December 13, 2017 19:45 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Basics of Information Security provides fundamental knowledge of information security in both theoretical and practical aspects. This book is packed with key concepts of information security, such as confidentiality, integrity, and availability, as well as tips and additional resources for further advanced study. It also includes practical applications in the areas of operations, physical, network, operating system, and application security. Complete with exercises at the end of each chapter, this book is well-suited for classroom or instructional use.

The book consists of 10 chapters covering such topics as identification and authentication; authorization and access control; auditing and accountability; cryptography; operations security; physical security; network security; operating system security; and application security. Useful implementations for each concept are demonstrated using real world examples. PowerPoint lecture slides are available for use in the classroom.
Continue reading “The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice”

Regular Expressions Cookbook

Amazon Price: N/A (as of December 13, 2017 18:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Take the guesswork out of using regular expressions. With more than 140 practical recipes, this cookbook provides everything you need to solve a wide range of real-world problems. Novices will learn basic skills and tools, and programmers and experienced users will find a wealth of detail. Each recipe provides samples you can use right away.

This revised edition covers the regular expression flavors used by C#, Java, JavaScript, Perl, PHP, Python, Ruby, and VB.NET. You’ll learn powerful new tricks, avoid flavor-specific gotchas, and save valuable time with this huge library of practical solutions.Learn regular expressions basics through a detailed tutorialUse code listings to implement regular expressions with your language of choiceUnderstand how regular expressions differ from language to languageHandle common user input with recipes for validation and formattingFind and manipulate words, special characters, and lines of textDetect integers, floating-point numbers, and other numerical formatsParse source code and process log filesUse regular expressions in URLs, paths, and IP addressesManipulate HTML, XML, and data exchange formatsDiscover little-known regular expression tricks and techniques

Darknet, Bitcoin, Fraud

Amazon Price: $12.99 $12.99 (as of December 13, 2017 03:38 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Have you been hacked yet? You're next! The chances are you will be attacked, soon. This book shows you how you'll be targeted, and what you will hopefully do to prevent it. One in five people have already been hacked, and 25 million more are defrauded every year. You read about it in the news; emails from your bank, "Change your password! Use a VPN! Verify your account details!" These tiny cyber-attacks are typically interstate or international, and never prosecuted. Identities, credit cards, titles, even actual lives are stolen and traded online. Victims rarely find out until it's far too late, and then they are faced with a long, uphill battle. These people never fully recover from the assault. Cybercrime is rampant and just getting worse- the nation just doesn't have the resources to combat it. The federal hiring focus is on cyber-agents: they need more whitehat hackers to investigate and prevent these attacks. Meanwhile, every second another helpless victim is snared in the US alone. How does this happen? Who can do this? You can. Anybody can! It's easy, but we're lured into believing otherwise. This concise manual describes the simplicity of committing digital fraud. Knowledge is power; the last thing the FBI needs is more pressure to fix something they can't. Our ignorance and complacency is the underlying problem. The author seeks to change that. Take a few minutes and try on the black hat! Find out for yourself what it feels like, and learn how to protect yourself from online villains. Each chapter is designed to illustrate ease, simplicity, and security. A wide swath of topics introduce the reader to the hacker tools and methods of attack. Bitcoin transactions are described from start to finish, which is an essential component of Darknet purchases and money laundering. Secure communications and online privacy tactics are highlighted to enable further research (if desired). Many of the weaknesses in our online structures exploited by today's cyber-criminals are revealed within, and various means to defend yourself are spelled out. Links and references are included throughout to hold the reader's hand and expand their opportunities (should you feel the desire). Warning: hard truths within. This may shake you up (at least) a little.