Amazon Price: N/A (as of October 20, 2017 22:09 –
In this ebook we outline a set of practical and pragmatic cyber security considerations for organisations designing, developing and, testing Internet of Things (IoT) devices and solutions. The purpose is to provide practical advice for consideration as part of the product development life-cycle from concept to after market support.
While IoT products by their very nature encompass many forms of traditional embedded devices and supporting systems, we felt that distilling our knowledge and experience in the specific context of IoT would be useful. A lot of the concepts in this eBook could easily be applied to many other related areas of software and hardware product development.
Continue reading “Security of Things: An Implementers' Guide to Cyber-Security for Internet of Things Devices and Beyond”
Amazon Price: N/A (as of October 21, 2017 07:41 –
In the secret world of spies and covert operations, no other intelligence service continues to be as surrounded by myth and mystery as the Mossad. Gordon Thomas reveals that all too often the truth exceeds all the fantasies about the Mossad. Revised and updated for 2015, this new edition includes:
– Mossad's secret meeting in 2013 with Saudi Arabia's intelligence chief to plan for Israel to use Saudi to attack Iran should the Geneva discussion fail to be honored by Iran.
– The attack on Iraq's nuclear reactor that will be the flight path to an attack on Iran's nuclear facilities.
– Mossad's new cyber-war unit preparing to launch its own pre-emptive strike.
– Why Mossad's former director, Meir Dagan, has spoken out against an attack on Iran.
– Mossad agents who operate in the "Dark Side" of the internet to track terrorists.
– Mossad's drone and its first killing.
– Mossad's role in the defense of Israel's Embassy in Cairo during the Arab Spring.
– An introduction to Mossad's new director, Tamir Pardo.
Continue reading “Gideon's Spies: The Secret History of the Mossad”
Amazon Price: N/A (as of April 4, 2017 10:38 –
It's easy to capture packets with Wireshark, the world's most popular network sniffer, whether off the wire or from the air. But how do you use those packets to understand what's happening on your network?
With an expanded discussion of network protocols and 45 completely new scenarios, this extensively revised second edition of the best-selling Practical Packet Analysis will teach you how to make sense of your PCAP data. You'll find new sections on troubleshooting slow networks and packet analysis for security to help you better understand how modern exploits and malware behave at the packet level. Add to this a thorough introduction to the TCP/IP network stack and you're on your way to packet analysis proficiency.
Continue reading “Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems”
Amazon Price: N/A (as of October 21, 2017 01:45 –
Master the Nmap Scripting Engine and the art of developing NSE scripts
About This BookExtend the capabilities of Nmap to perform custom tasks with the Nmap Scripting EngineLearn the fundamentals of Lua programmingDevelop powerful scripts for the Nmap Scripting EngineDiscover all the features and libraries of the Nmap Scripting EngineIn-depth coverage of the Nmap Scripting Engine API and most important libraries with examples
Continue reading “Mastering the Nmap Scripting Engine”
Amazon Price: N/A (as of October 21, 2017 06:25 –
Implement an Effective Security Metrics Project or Program
IT Security Metrics provides a comprehensive approach to measuring risks, threats, operational activities, and the effectiveness of data protection in your organization. The book explains how to choose and design effective measurement strategies and addresses the data requirements of those strategies. The Security Process Management Framework is introduced and analytical strategies for security metrics data are discussed. You'll learn how to take a security metrics program and adapt it to a variety of organizational contexts to achieve continuous security improvement over time. Real-world examples of security measurement projects are included in this definitive guide. Define security metrics as a manageable amount of usable data Design effective security metrics Understand quantitative and qualitative data, data sources, and collection and normalization methods Implement a programmable approach to security using the Security Process Management Framework Analyze security metrics data using quantitative and qualitative methods Design a security measurement project for operational analysis of security metrics Measure security operations, compliance, cost and value, and people, organizations, and culture Manage groups of security measurement projects using the Security Improvement Program Apply organizational learning methods to security metrics