Amazon Price: N/A (as of November 22, 2017 22:01 –
Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks
About This BookGet acquainted with the intricacies of Nmap's powerful software suiteSet up and configure NMAP for different network specifications effectivelySecure and troubleshoot large scale networks using the powerful features of NMAP with this easy-to-follow guide
Continue reading “Nmap Essentials”
Amazon Price: N/A (as of November 23, 2017 12:37 –
The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.
Amazon Price: N/A (as of November 23, 2017 13:14 –
New 2016 Third Edition
Take control of your privacy by removing your personal information from the internet with this second edition.
Continue reading “Hiding from the Internet: Eliminating Personal Online Information”
Amazon Price: N/A (as of November 23, 2017 09:24 –
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.
With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.
Continue reading “Computer and Information Security Handbook”
Amazon Price: N/A (as of November 23, 2017 13:07 –
Have You Always Wondered If Hacking Has Any Benefits?
Are You Interested In Penetration Testing To Examine Security Strength?
Continue reading “Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing”