Automated Data Collection with R: A Practical Guide to Web Scraping and Text Mining

Rating: 
Amazon Price: N/A (as of August 18, 2017 00:10 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A hands on guide to web scraping and text mining for both beginners and experienced users of R Introduces fundamental concepts of the main architecture of the web and databases and covers HTTP, HTML, XML, JSON, SQL. Provides basic techniques to query web documents and data sets (XPath and regular expressions). An extensive set of exercises are presented to guide the reader through each technique. Explores both supervised and unsupervised techniques as well as advanced techniques such as data scraping and text management. Case studies are featured throughout along with examples for each technique presented. R code and solutions to exercises featured in the book are provided on a supporting website.

The Hacker Playbook: Practical Guide To Penetration Testing

Rating: 
Amazon Price: N/A (as of August 17, 2017 20:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, and evading antivirus software.
Continue reading “The Hacker Playbook: Practical Guide To Penetration Testing”

The Dark Side of the Hacking World: What You Need to Know to Guard Your Precious Assets and Remain Safe

Rating: 
Amazon Price: N/A (as of August 18, 2017 03:01 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

A Guide to the Hacking Underworld You’ve Never Seen Before!
Hackers have always been a closed, secretive circle, wary of infiltrators and keeping their secrets completely hidden from the public eye….until now!
This book blows the lid open on the dark side of the hacking world, bringing all of the shadowy secrets, tools of the trade, malicious methods, and high-stakes multi-millionaire lifestyles of hackers out into the open!
Each chapter gives you unprecedented access to the cunning tricks, psychological manipulation, and malware that hackers could be using against you RIGHT NOW!
In this eye-opening guide, I bring you:
• An introduction to the secretive world of hacking.
• The types of hackers that pose a threat to you, and their various motivations.
• The different tools, methods, and tricks these hackers could use against you.
• How a hacker could be literally watching your every move and listening to your every breath through your computer!
• How anyone could be the hacker next door!
• The cunning techniques dangerous hackers use to access your private information and step-by-step explanations of their hacks.
• Hacker tips and tutorials that take YOU inside the hack and put the power in your hands!
• How to avoid, prevent, and fight back against potential hacking campaigns.
• And much more!
Don’t stay in the dark about the menacing methods of malicious black hat hackers.
Act NOW to learn inside knowledge about their hacks AND how to use their own tricks against them to protect your precious assets and stay safe!

The Basics of Digital Forensics: The Primer for Getting Started in Digital Forensics

Rating: 
Amazon Price: N/A (as of August 18, 2017 02:15 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Basics of Digital Forensics provides a foundation for people new to the digital forensics field. This book teaches you how to conduct examinations by discussing what digital forensics is, the methodologies used, key technical concepts and the tools needed to perform examinations. Details on digital forensics for computers, networks, cell phones, GPS, the cloud, and Internet are discussed. Also learn how to collect evidence, document the scene, and how deleted data is recovered.

Learn all about what Digital Forensics entailsBuild a toolkit and prepare an investigative planUnderstand the common artifacts to look for during an exam

Cybersecurity: A Practical Guide to the Law of Cyber Risk: 1

Amazon Price: N/A (as of August 18, 2017 11:54 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The rise of sophisticated cyber threats means that the task of managing cyber risks, once the near-exclusive realm of IT professionals, is now also borne by attorneys, senior executives, and directors. Cybersecurity: A Practical Guide to the Law of Cyber Risk provides the practical steps that can be taken to help your clients understand and mitigate today’s cyber risk and to build the most resilient response capabilities possible.

Cybersecurity: A Practical Guide to the Law of Cyber Risk provides a comprehensive discussion of the complex quilt of federal and state statutes, Executive Orders, regulations, contractual norms, and ambiguous tort duties that can apply to this crucial new area of the law. For example, it describes in detail:The leading regulatory role the Federal Trade Commission has played, acting on its authority to regulate unfair or deceptive trade practices;The guidance issued by the SEC interpreting existing disclosure rules to require registrants to disclose cybersecurity risks under certain circumstances;The varying roles of other regulators in sector-specific regulation, such as healthcare, energy, and transportation; andThe impact of preexisting statutes, such as the Computer Fraud and Abuse Act and the Electronic Communications Privacy Act, on current cybersecurity issues.
Continue reading “Cybersecurity: A Practical Guide to the Law of Cyber Risk: 1”