Social Engineering: Training You Can Relate To

Rating: 
Amazon Price: N/A (as of June 21, 2017 22:37 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This handbook serves as a quick-reference training solution that educates employees on the most common social engineering attacks.

HACKING: “Hacking Book 2” The Perfect Hacking Guide for Beginners (HACKING FOR BEGINNERS)

Rating: 
Amazon Price: N/A (as of September 10, 2016 22:34 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

HACKING FOR BEGINNERS
Read this hacking book for FREE on Kindle Unlimited – DOWNLOAD IT NOW!

With "The Perfect Guide to Hacking for Beginners" you'll learn everything you need to understand in order to enter the world of hacking. It provides a complete description of hacking, and their consequences on the internet users.
Continue reading “HACKING: “Hacking Book 2” The Perfect Hacking Guide for Beginners (HACKING FOR BEGINNERS)”

Principles of Cybercrime

Amazon Price: N/A (as of August 18, 2017 16:19 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Digital technology has transformed the way in which we socialise and do business. Proving the maxim that crime follows opportunity, virtually every advance has been accompanied by a corresponding niche to be exploited for criminal purposes; so-called 'cybercrimes'. Whether it be fraud, child pornography, stalking, criminal copyright infringement or attacks on computers themselves, criminals will find ways to exploit new technology. The challenge for all countries is to ensure their criminal laws keep pace. The challenge is a global one, and much can be learned from the experience of other jurisdictions. Focusing on Australia, Canada, the UK and the USA, this book provides a comprehensive analysis of the legal principles that apply to the prosecution of cybercrimes. This new edition has been fully revised to take into account changes in online offending, as well as new case law and legislation in this rapidly developing area of the law.

Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS

Rating: 
Amazon Price: N/A (as of August 17, 2017 22:40 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As industrial control systems (ICS), including SCADA, DCS, and other process control networks, become Internet-facing, they expose crucial services to attack. Threats like Duqu, a sophisticated worm found in the wild that appeared to share portions of its code with the Stuxnet worm, emerge with increasing frequency.

Explaining how to develop and implement an effective cybersecurity program for ICS, Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS provides you with the tools to ensure network security without sacrificing the efficiency and functionality of ICS.
Continue reading “Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS”