Raspberry Pi Hardware Reference

Rating: 
Amazon Price: N/A (as of October 21, 2017 05:42 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Raspberry Pi is deceptively simple. Plug it in, boot it up, and use it as a personal computer, or attach a million gizmos and modules and invent something new and amazing. Either way, what it can actually do is not simple, and you should know exactly what the Raspberry Pi hardware is all about. Raspberry Pi Hardware Reference, from Mastering the Raspberry Pi, is the hardware guide you need on your desk or workbench.

Every detail is covered: from power to memory, from the CPU to working with USB. You'll find all the details about working with both wired and wireless Ethernet, SD cards, and the UART interface. The GPIO chapter is invaluable, covering power budgeting, access, and even small but important details like the correct usage of sudo when working with GPIO pins. You'll also find details about the 1-Wire driver, the I2C bus, and the SPI bus. If you need to know anything about your Raspberry Pi's hardware, you will find it here, in Raspberry Pi Hardware Reference.
Continue reading “Raspberry Pi Hardware Reference”

Cyber-warfare: Jus Post Bellum

Amazon Price: N/A (as of March 18, 2017 13:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

There is a lack of attention to the aftermath of a deployed cyber weapon: There is no mechanism for the assignment of accountability for the restoration of affected infrastructure and remediation of violation of established laws of war after cyberattacks occur. This study analyzes International Humanitarian Law and international treaties as they apply to the cyber post-conflict period and explores current jus post bellum frameworks, which can be used to design a cyber-warfare jus post bellum framework. It also analyzes analogies to traditional warfare in the damage assessment and aid provided during the recovery period of the 1998 Kosovo and the 2003 Iraq Wars. It also discusses the available international cyber organizations. As an example, the study analyzes responses to cyberattacks in a case study involving South Korea and North Korea.

Additionally, this study examines the related issues of the effects of deploying a cyber-weapon, the ways to establish acceptable levels of attribution, the challenges of cyber-damage assessments, and the ability to contain and reverse cyberattacks. This thesis proposes a cyber-warfare jus post bellum framework, with emphasis on prevention and cyber weapons control, proposes cyberattack relief-effort actions, and offers a post-cyberattack cost checklist.

Buffer Overflow Attacks: Detect, Exploit, Prevent

Rating: 
Amazon Price: N/A (as of October 21, 2017 03:23 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The SANS Institute maintains a list of the "Top 10 Software Vulnerabilities." At the current time, over half of these vulnerabilities are exploitable by Buffer Overflow attacks, making this class of attack one of the most common and most dangerous weapon used by malicious attackers. This is the first book specifically aimed at detecting, exploiting, and preventing the most common and dangerous attacks.

Buffer overflows make up one of the largest collections of vulnerabilities in existence; And a large percentage of possible remote exploits are of the overflow variety. Almost all of the most devastating computer attacks to hit the Internet in recent years including SQL Slammer, Blaster, and I Love You attacks. If executed properly, an overflow vulnerability will allow an attacker to run arbitrary code on the victim’s machine with the equivalent rights of whichever process was overflowed. This is often used to provide a remote shell onto the victim machine, which can be used for further exploitation.
Continue reading “Buffer Overflow Attacks: Detect, Exploit, Prevent”

Cybersecurity for Everyone: Securing your home or small business network

Rating: 
Amazon Price: N/A (as of October 21, 2017 07:46 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Specifically for home users and small business owners, cybersecurity expert Terry Sadler lays out the easy-to-learn methods and tips that will make using the Internet more safe and secure and protect the family as well as the business.Identity Theft. According to the Symantec Internet Security Report (2014), mega breaches are data breaches that result in at least 10 million identities exposed in an individual incident. There were eight mega breaches in 2013, compared with only one in 2012.Viruses and Malware. Some security experts estimate there are more than 250,000 new malware variants detected daily and more than 30,000 websites exploited daily. These numbers are staggering.Email Security. Learn how to reduce the amount of SPAM that makes it to your inbox. Improve your email security habits and discover better ways to communicate safely and with privacy.Internet and Browsing Security. You cannot afford to leave the security of your sensitive information up to your ISP. It is actually easy to apply a layered approach to security and minimize your risk. Learn about your options; then pick and choose what works for you and your situation.

Managing Cybersecurity Risk: Cases Studies and Solutions

Rating: 
Amazon Price: N/A (as of October 20, 2017 16:13 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The first edition, published November 2016, was targeted at the directors and senior managers of SMEs and larger organisations that have not yet paid sufficient attention to cybersecurity and possibly did not appreciate the scale or severity of permanent risk to their businesses.

The book was an important wake-up call and primer and proved a significant success, including wide global reach and diverse additional use of the chapter content through media outlets.
Continue reading “Managing Cybersecurity Risk: Cases Studies and Solutions”