HACKEN: Werden Sie ein richtiger Hacker – Computerviren, Cracking, Malware, IT-Sicherheit (Cybercrime, Computer hacken, How to Hack, Hacker, Computerkriminalität, … Hacking) (German Edition)

Amazon Price: N/A (as of December 11, 2017 12:14 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Ihre kompakte Anleitung zum fundamentalem Computer hacken

★ ★ ★ Dieses Buch ist für Abonnenten von Kindle Unlimited KOSTENFREI ★ ★ ★
Continue reading “HACKEN: Werden Sie ein richtiger Hacker – Computerviren, Cracking, Malware, IT-Sicherheit (Cybercrime, Computer hacken, How to Hack, Hacker, Computerkriminalität, … Hacking) (German Edition)”

Abacus Brief – Moonlit Knight’s cyberwar and peace (cyberhug.me)

Amazon Price: N/A (as of December 11, 2017 02:31 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Act Three of Cyberhug.me.

Moonlit Knight's Cyberwar and Peace: Billy's protege risks annihilation in a high tech battle. He strives to solve a dangerous cyberwar maze on a beautiful Pacific island before he too is murdered. Moon finds love as he tries to unite a community in a battle for peace and human rights.
Continue reading “Abacus Brief – Moonlit Knight's cyberwar and peace (cyberhug.me)”

How to Attack and Defend Your Website

Amazon Price: N/A (as of December 11, 2017 07:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

How to Attack and Defend Your Website is a concise introduction to web security that includes hands-on web hacking tutorials. The book has three primary objectives: to help readers develop a deep understanding of what is happening behind the scenes in a web application, with a focus on the HTTP protocol and other underlying web technologies; to teach readers how to use the industry standard in free web application vulnerability discovery and exploitation tools – most notably Burp Suite, a fully featured web application testing tool; and finally, to gain knowledge of finding and exploiting the most common web security vulnerabilities.

This book is for information security professionals and those looking to learn general penetration testing methodology and how to use the various phases of penetration testing to identify and exploit common web protocols.
Continue reading “How to Attack and Defend Your Website”

Cybercrime and Espionage: An Analysis of Subversive Multi-Vector Threats

Rating: 
Amazon Price: N/A (as of December 11, 2017 00:50 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Cybercrime and Espionage provides a wealth of knowledge related to the realities seen in the execution of advanced attacks, their success from the perspective of exploitation and their presence within all industry. This book will educate you on realities of advanced, next generation threats, which take form in a variety ways. The authors, working in conjunction with strategic technology partners have key insights into the realm of what these new threats, dubbed “Subversive Multi-Vector Threats or ‘SMT’s. Whether the goal is to acquire and subsequently sell intellectual property from one organization to a competitor or the international black markets, to compromise financial data and systems, or undermine the security posture of a nation state by another nation state or sub-national entity, these threats are real and growing at an alarming pace.

Includes detailed analysis and examples of the threats in addition to related anecdotal informationAuthors’ combined backgrounds of security, military, and intelligence, give you distinct and timely insightsPresents never-before-published information: identification and analysis of cybercrime and the psychological profiles that accompany them