CyberWar

Si Vis Pacem, Para Bellum

By

Building a BeagleBone Black Super Cluster

Rating: 
Amazon Price: N/A (as of April 27, 2017 06:49 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Build and configure your own parallel computing Beowulf cluster using BeagleBone Black ARM systems

About This BookConfigure your own cluster for high speed parallel computingBenefit from your personally configured super computer which is a power efficient, low-cost, and highly scalable super computerWrite your own cluster software with the help of practical examples using powerful computational libraries specifically designed for distributed memory machines
Read More

By

Module 8: Ethical hacking

Amazon Price: N/A (as of April 26, 2017 22:03 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Based on ethical hacking

By

Snort Cookbook

Rating: 
Amazon Price: N/A (as of April 26, 2017 17:20 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

If you are a network administrator, you're under a lot of pressure to ensure that mission-critical systems are completely safe from malicious code, buffer overflows, stealth port scans, SMB probes, OS fingerprinting attempts, CGI attacks, and other network intruders. Designing a reliable way to detect intruders before they get in is an essential–but often overwhelming–challenge. Snort, the defacto open source standard of intrusion detection tools, is capable of performing real-time traffic analysis and packet logging on IP network. It can perform protocol analysis, content searching, and matching. Snort can save countless headaches; the new Snort Cookbook will save countless hours of sifting through dubious online advice or wordy tutorials in order to leverage the full power of SNORT.Each recipe in the popular and practical problem-solution-discussion O'Reilly cookbook format contains a clear and thorough description of the problem, a concise but complete discussion of a solution, and real-world examples that illustrate that solution. The Snort Cookbook covers important issues that sys admins and security pros will us everyday, such as:installationoptimizationloggingalertingrules and signaturesdetecting virusescountermeasuresdetecting common attacksadministrationhoneypotslog analysisBut the Snort Cookbook offers far more than quick cut-and-paste solutions to frustrating security issues. Those who learn best in the trenches–and don't have the hours to spare to pore over tutorials or troll online for best-practice snippets of advice–will find that the solutions offered in this ultimate Snort sourcebook not only solve immediate problems quickly, but also showcase the best tips and tricks they need to master be security gurus–and still have a life.

By

Weapons Under International Human Rights Law

Rating: 
Amazon Price: N/A (as of April 26, 2017 11:59 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

International human rights law offers an overarching international legal framework to help determine the legality of the use of any weapon, as well as its lawful supply. It governs acts of States and non-State actors alike. In doing so, human rights law embraces international humanitarian law regulation of the use of weapons in armed conflict and disarmament law, as well as international criminal justice standards. In situations of law enforcement (such as counterpiracy, prisons, ordinary policing, riot control, and many peace operations), human rights law is the primary legal frame of reference above domestic criminal law. This important and timely book draws on all aspects of international weapons law and proposes a new view on international law governing weapons. Also included is a specific discussion on armed drones and cyberattacks, two highly topical issues in international law and international relations.

By

Prevention and Control of Cybercrimes: Problems and Solutions

Amazon Price: N/A (as of April 26, 2017 21:22 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

This book provides for a comparative position of the laws, from varying jurisdictions like US, UK and India in regard to the laws for combating the myriad kinds of the cyber crimes. This book gives a comprehensive treatment to the major kinds of the cybercrimes prevalent in the modern digital age. This book also provides for constructive suggestions in order to combat and tackle the cybercrimes and the computer crimes.

The Book has been written by Mr. Bhavya Nain, Assistant Professor of Law, Amity Law School, Amity University, UP, India.

/* */