Hacked: The Inside Story of America’s Struggle to Secure Cyberspace

Rating: 
Amazon Price: N/A (as of December 11, 2017 15:47 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The spectacular cyber attack on Sony Pictures and costly hacks of Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of U.S. federal workers have shocked the nation. Despite a new urgency for the president, Congress, law enforcement, and corporate America to address the growing threat, the hacks keep coming—each one more pernicious than the last—from China, Russia, Iran, North Korea, the Middle East, and points unknown. The continuing attacks raise a deeply disturbing question: Is the issue simply beyond the reach of our government, political leaders, business leaders, and technology visionaries to resolve? In Hacked, veteran cybersecurity journalist Charlie Mitchell reveals the innovative, occasionally brilliant, and too-often hapless government and industry responses to growing cybersecurity threats. He examines the internal power struggles in the federal government, the paralysis on Capitol Hill, and the industry's desperate effort to stay ahead of both the bad guys and the government.

Cypherpunks (Portuguese Edition)

Rating: 
Amazon Price: N/A (as of December 6, 2015 01:35 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

"Cypherpunks – liberdade e o futuro da internet" é o primeiro livro de Julian Assange, editor chefe e visionário por trás do Wikileaks, a ser publicado no Brasil com o selo da Boitempo. O livro é resultado de reflexões de Assange com um grupo de pensadores rebeldes e ativistas que atuam nas linhas de frente da batalha em defesa do ciberespaço (Jacob Appelbaum, Andy Müller-Maguhn e Jérémie Zimmermann). Apesar de a internet ter possibilitado verdadeiras revoluções no mundo todo, Assange prevê uma grande onda de repressão, a ponto de considerar a internet como uma possível ameaça à civilização humana devido à transferência do poder de populações inteiras a um complexo de agências de espionagem e seus aliados corporativos transnacionais, que não precisarão prestar contas pelos seus atos. O livro reflete sobre a vigilância em massa, censura e liberdade, mas o principal tema é o movimento cypherpunk, que defendem a utilização da criptografia e métodos similares como meios para provocar mudanças sociais e políticas. Fundado no início dos anos 1990, o movimento atingiu o auge de suas atividades durante as “criptoguerras” e após a censura da Internet em 2011 na Primavera Árabe. Desde junho deste ano, quando conseguiu asilo político na Embaixada do Equador em Londres temendo um revés diplomático que o entregasse às autoridades norte-americanas, Assange tem se dedicado a promover debates sobre a sociedade contemporânea com grandes intelectuais de todo o mundo e foi dentro deste contexto que escreveu Cypherpunks.

How To Hack Email: Email Hacking for Beginners / Newbies / Dummies

Amazon Price: N/A (as of December 11, 2017 19:48 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

E-mail security is very important to safe your e-mail accounts and stop these attacks. That’s the motivation for me to write “How to Hack E-Mail?”. “The Best Defense Is Good Offence” can certainly be applied on the world of Internet Security. If you wants to protect yourself from certain threats/attacks, you have to learn How That System Works and people hack that system. This book provides email hacking techniques especially made for beginners.

Cyber Attacks: How to Protect Yourself NOW in Cyber Warfare

Rating: 
Amazon Price: N/A (as of December 11, 2017 04:25 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

As the Cyber Attacks heat up and countries like China, Russia and North Korea target the United States, its individuals, banking institutions, military and government agencies become targets on a large scale. A recent ISACA and RSA Conference Survey indicated that 8 out of 10 board of directors are concerned with security. Eighty two (82) percent of organizations predict a cyber attack is likely. It will take a giant army to fight off the new generation of cyber attackers. Encryption, firewalls and authentication may be the first line of defense but you are the first line of defense in your household! The steps you make can affect your family for generations to come. As the first responder in your household, make sure you have the determination, perseverance and basic tools necessary to fight off an attack NOW!

The Hacker Playbook 2: Practical Guide To Penetration Testing

Amazon Price: N/A (as of December 11, 2017 19:44 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Just as a professional athlete doesn’t show up without a solid game plan, ethical hackers, IT professionals, and security researchers should not be unprepared, either. The Hacker Playbook provides them their own game plans. Written by a longtime security professional and CEO of Secure Planet, LLC, this step-by-step guide to the “game” of penetration hacking features hands-on examples and helpful advice from the top of the field.

Through a series of football-style “plays,” this straightforward guide gets to the root of many of the roadblocks people may face while penetration testing—including attacking different types of networks, pivoting through security controls, privilege escalation, and evading antivirus software.
Continue reading “The Hacker Playbook 2: Practical Guide To Penetration Testing”