Amazon Price: N/A (as of February 18, 2018 08:44 –
Honeypots have demonstrated immense value in Internet security, but physical honeypot deployment can be prohibitively complex, time-consuming, and expensive. Now, there’s a breakthrough solution. Virtual honeypots share many attributes of traditional honeypots, but you can run thousands of them on a single system-making them easier and cheaper to build, deploy, and maintain.
In this hands-on, highly accessible book, two leading honeypot pioneers systematically introduce virtual honeypot technology. One step at a time, you’ll learn exactly how to implement, configure, use, and maintain virtual honeypots in your own environment, even if you’ve never deployed a honeypot before.
Continue reading “Virtual Honeypots: From Botnet Tracking to Intrusion Detection”
Amazon Price: N/A (as of February 18, 2018 21:37 –
Learn everything there is to know about Shodan from the founder himself. The book covers all aspects from the website through to the developer API with exercises to help test your understanding.
Amazon Price: N/A (as of February 18, 2018 13:30 –
The World Economic Forum regards the threat of cyber attack as one of the top five global risks confronting nations of the world today. Cyber attacks are increasingly targeting the core functions of the economies in nations throughout the world. The threat to attack critical infrastructures, disrupt critical services, and induce a wide range of damage is becoming more difficult to defend against. Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare examines the current cyber threat landscape and discusses the strategies being used by governments and corporations to protect against these threats.
The book first provides a historical reference, detailing the emergence of viruses, worms, malware, and other cyber threats that created the need for the cybersecurity field. It then discusses the vulnerabilities of our critical infrastructures, the broad arsenal of cyber attack tools, and the various engineering design issues involved in protecting our infrastructures. It goes on to cover cyber intelligence tactics, recent examples of cyber conflict and warfare, and the key issues in formulating a national strategy to defend against cyber warfare.
Continue reading “Cybersecurity: Protecting Critical Infrastructures from Cyber Attack and Cyber Warfare (Zones of Religion)”
Amazon Price: N/A (as of February 18, 2018 11:02 –
Secrets. Lies. Choices.
When a pharmaceutical company hires Brody Taylor, elite hacker and social engineer, to fortify their digital-defences against a Chinese blackhat cyberattack, Brody stumbles across a secret the company strives to keep under wraps.
Continue reading “Social Engineer: The Brody Taylor Series of Cyber Crime and Suspense Thrillers (Deep Web Thriller Series)”
Amazon Price: N/A (as of February 18, 2018 08:19 –
Das E-Mail-System droht durch das zunehmende Aufkommen von Spam, Phishing und Viren zu kollabieren. Phishing zielt auf die Gewinnung von fremden Passwörtern, PIN's und anderen sicherheitsrelevanten Daten ab und bedient sich immer ausgefeilterer Methoden. Inzwischen sind auch deutsche Kreditinstitute von diesen Phishing-Attacken betroffen und Kunden sind im Falle eines Falles für Schäden haftbar. Verschiedene Zusammenschlüsse von gefährdeten Unternehmen und Aktivitäten von auf die Phishing-Abwehr spezialisierten Unternehmen, versuchen, dieses Problem in den Griff zu bekommen.