Nmap Essentials

Amazon Price: N/A (as of November 22, 2017 22:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Harness the power of Nmap, the most versatile network port scanner on the planet, to secure large scale networks

About This BookGet acquainted with the intricacies of Nmap's powerful software suiteSet up and configure NMAP for different network specifications effectivelySecure and troubleshoot large scale networks using the powerful features of NMAP with this easy-to-follow guide
Continue reading “Nmap Essentials”

Tallinn Manual on the International Law Applicable to Cyber Warfare

Rating: 
Amazon Price: N/A (as of November 23, 2017 12:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The product of a three-year project by twenty renowned international law scholars and practitioners, the Tallinn Manual identifies the international law applicable to cyber warfare and sets out ninety-five 'black-letter rules' governing such conflicts. It addresses topics including sovereignty, State responsibility, the jus ad bellum, international humanitarian law, and the law of neutrality. An extensive commentary accompanies each rule, which sets forth the rule's basis in treaty and customary law, explains how the group of experts interpreted applicable norms in the cyber context, and outlines any disagreements within the group as to each rule's application.

Hiding from the Internet: Eliminating Personal Online Information

Rating: 
Amazon Price: N/A (as of November 23, 2017 13:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

New 2016 Third Edition

Take control of your privacy by removing your personal information from the internet with this second edition.
Continue reading “Hiding from the Internet: Eliminating Personal Online Information”

Computer and Information Security Handbook

Rating: 
Amazon Price: N/A (as of November 23, 2017 09:24 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer security available in one volume. The book offers deep coverage of an extremely wide range of issues in computer and cybersecurity theory, applications, and best practices, offering the latest insights into established and emerging technologies and advancements.

With new parts devoted to such current topics as Cloud Security, Cyber-Physical Security, and Critical Infrastructure Security, the book now has 100 chapters written by leading experts in their fields, as well as 12 updated appendices and an expanded glossary. It continues its successful format of offering problem-solving techniques that use real-life case studies, checklists, hands-on exercises, question and answers, and summaries.
Continue reading “Computer and Information Security Handbook”

Hacking: The Beginner’s Complete Guide To Computer Hacking And Penetration Testing

Rating: 
Amazon Price: N/A (as of November 23, 2017 13:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Have You Always Wondered If Hacking Has Any Benefits?

Are You Interested In Penetration Testing To Examine Security Strength?
Continue reading “Hacking: The Beginner's Complete Guide To Computer Hacking And Penetration Testing”