Zero Day: The Threat In Cyberspace

Rating: 
Amazon Price: N/A (as of May 27, 2017 21:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Will the world’s next war be fought in cyberspace?

"It's going to happen," said former National Defense University Professor Dan Kuehl.
Continue reading “Zero Day: The Threat In Cyberspace”

Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks

Rating: 
Amazon Price: N/A (as of May 28, 2017 12:08 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

There are many ways that a potential attacker can intercept information, or learnmore about the sender, as the information travels over a network. Silence on the Wireuncovers these silent attacks so that system administrators can defend against them,as well as better understand and monitor their systems.

Silence on the Wire dissects several unique and fascinating security andprivacy problems associated with the technologies and protocols used in everydaycomputing, and shows how to use this knowledge to learn more about others or tobetter defend systems. By taking an indepth look at modern computing, from hardwareon up, the book helps the system administrator to better understand security issues,and to approach networking from a new, more creative perspective. The sys admin canapply this knowledge to network monitoring, policy enforcement, evidence analysis,IDS, honeypots, firewalls, and forensics.

The n00b Warriors (Book One)

Rating: 
Amazon Price: N/A (as of May 28, 2017 10:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A blog started the forever war–a global war set in the not so distant future between two groups (the Rebels and the Coco's).

Dylan Austin has grown up with the war being a constant background to his life; his dad has just returned from war missing a leg; his older sister is missing and presumed dead from the war; and all through school war has been embedded into everything they teach. Teens have been raised on educational war video games, and their minds are polluted with the idea that war is just a game.
Continue reading “The n00b Warriors (Book One)”

Security of Things: An Implementers’ Guide to Cyber-Security for Internet of Things Devices and Beyond

Amazon Price: N/A (as of May 27, 2017 22:17 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

In this ebook we outline a set of practical and pragmatic cyber security considerations for organisations designing, developing and, testing Internet of Things (IoT) devices and solutions. The purpose is to provide practical advice for consideration as part of the product development life-cycle from concept to after market support.

While IoT products by their very nature encompass many forms of traditional embedded devices and supporting systems, we felt that distilling our knowledge and experience in the specific context of IoT would be useful. A lot of the concepts in this eBook could easily be applied to many other related areas of software and hardware product development.
Continue reading “Security of Things: An Implementers' Guide to Cyber-Security for Internet of Things Devices and Beyond”

Distributed Denial of Service Attack and Defense (SpringerBriefs in Computer Science)

Amazon Price: N/A (as of May 27, 2017 20:53 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This brief provides readers a complete and self-contained resource for information about DDoS attacks and how to defend against them. It presents the latest developments in this increasingly crucial field along with background context and survey material. The book also supplies an overview of DDoS attack issues, DDoS attack detection methods, DDoS attack source traceback, and details on how hackers organize DDoS attacks. The author concludes with future directions of the field, including the impact of DDoS attacks on cloud computing and cloud technology. The concise yet comprehensive nature of this brief makes it an ideal reference for researchers and professionals studying DDoS attacks. It is also a useful resource for graduate students interested in cyberterrorism and networking.