CyberWar

Si Vis Pacem, Para Bellum

By

Handbook on Securing Cyber-Physical Critical Infrastructure

Handbook on Securing Cyber-Physical Critical InfrastructureThe worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on both cyber and cyber-physical infrastructure from anywhere in the world. This purpose of this handbook is to introduce the theoretical foundations and practical solution techniques for securing critical cyber and physical infrastructures as well as their underlying computing and communication architectures and systems. Examples of such infrastructures include utility networks (e.g., electrical power grids), ground transportation systems (automotives, roads, bridges and tunnels), airports and air traffic control systems, wired and wireless communication and sensor networks, systems for storing and distributing water and food supplies, medical and healthcare delivery systems, as well as financial, banking and commercial transaction assets. The handbook focus mostly on the scientific foundations and engineering techniques – while also addressing the proper integration of policies and access control mechanisms, for example, how human-developed policies can be properly enforced by an automated system.

*Addresses the technical challenges facing design of secure infrastructures by providing examples of problems and solutions from a wide variety of internal and external attack scenarios

*Includes contributions from leading researchers and practitioners in relevant application areas such as smart power grid, intelligent transportation systems, healthcare industry and so on.

*Loaded with examples of real world problems and pathways to solutions utilizing specific tools and techniques described in detail throughout

Price: $99.95

Click here to buy from Amazon

By

The Database Hacker’s Handbook: Defending Database Servers

The Database Hacker's Handbook: Defending Database ServersDatabases are the nerve center of our economy. Every piece of your personal information is stored there-medical records, bank accounts, employment history, pensions, car registrations, even your children’s grades and what groceries you buy. Database attacks are potentially crippling-and relentless.

In this essential follow-up to The Shellcoder’s Handbook, four of the world’s top security experts teach you to break into and defend the seven most popular database servers. You’ll learn how to identify vulnerabilities, how attacks are carried out, and how to stop the carnage. The bad guys already know all this. You need to know it too.
* Identify and plug the new holes in Oracle and Microsoft(r) SQL Server
* Learn the best defenses for IBM’s DB2(r), PostgreSQL, Sybase ASE, and MySQL(r) servers
* Discover how buffer overflow exploitation, privilege escalation through SQL, stored procedure or trigger abuse, and SQL injection enable hacker access
* Recognize vulnerabilities peculiar to each database
* Find out what the attackers already know

Go to www.wiley.com/go/dbhackershandbook for code samples, security alerts , and programs available for download.

Price: $50.00

Click here to buy from Amazon

By

The Cyber Commander’s eHandbook Version 3

CYBER WARFARE: The Cyber Commander's eHandbook Version 3 (The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3 - 296 Page eBook covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.)

The Weaponry and Strategies of Digital Conflict and Cyber War, Version 3, covering Cyber Warfare, Cyber Terrorism, Cyber Tradecraft, Cyber Activism and offensive, defensive actions and intelligence collection.

Cyber warfare, cyber terrorism, cyber espionage and cyber crime are all growing threats. The 2012 Version 3 of the Cyber Commander’s eHandbook provides the insight needed to understand the new world of cyber warfare, as well as defines the tools and techniques for offensive and defensive cyber action, and provide cyber intelligence needed to understand the strategies behind building a dynamic and relevant cyber warfare capability.

Table of Contents

Chapter 1 – Introduction
Chapter 2 – Setting the Stage
Chapter 3 – Cyber Espionage
Chapter 4 – Cyber Terrorism
Chapter 5 – Cyber Intelligence
Chapter 6 – Cyber Weapons
Chapter 7 – EMP Devices
Chapter 8 – Attack Process
Chapter 9 – Critical Infrastructure
Chapter 10 – Cyber Doctrine
Chapter 11 – Cyber Infrastructure
Chapter 12 – New Cyber Warfare Models
Chapter 13 – Conclusion

Portions of this book have been republished in 36 different countries with over 100,000 readers.

Our cyber warfare distance learning program is a great companion product!

Course Information: http://www.amazon.com/gp/product/B003HD06ZG/ref=nosim/cybe0f8-20

Price:

Click here to buy from Amazon

By

The Oracle Hacker’s Handbook: Hacking and Defending Oracle

The Oracle Hacker's Handbook: Hacking and Defending OracleDavid Litchfield has devoted years to relentlessly searching out the flaws in the Oracle database system and creating defenses against them. Now he offers you his complete arsenal to assess and defend your own Oracle systems. This in-depth guide explores every technique and tool used by black hat hackers to invade and compromise Oracle and then it shows you how to find the weak spots and defend them. Without that knowledge, you have little chance of keeping your databases truly secure.

 

 

 

Price: $44.99

Click here to buy from Amazon

By

Gray Hat Hacking The Ethical Hackers Handbook, 3rd Edition

Gray Hat Hacking The Ethical Hackers Handbook, 3rd EditionFully updated expanded to cover the latest devious hacking methods

Featuring in-depth, advanced coverage of vulnerability discovery and reverse engineering, Gray Hat Hacking, Third Edition provides eight brand-new chapters on the latest ethical hacking techniques. In addition to the new chapters, the rest of the book is updated to address current issues, threats, tools and techniques.

This one-of-a-kind guide offers a comprehensive overview of the hacking landscape and is organized in a progressive manner, first giving an update on the latest developments in hacking-related law, useful to everyone in the security field. Next, the book describes the security testing process and covers useful tools and exploit frameworks. The second section is expanded by explaining social engineering, physical, and insider attacks and the latest trends in hacking (Voice over IP and SCADA attacks). The book then explains, from both a code and machine-level perspective, how exploits work and guides you through writing simple exploits. Finally, the authors provide a comprehensive description of vulnerability research and reverse engineering.

Gray Hat Hacking, Third Edition features eight new chapters, covering:

  • Social engineering
  • Physical attacks
  • Insider attacks
  • VoIP attacks
  • SCADA attacks
  • Dradis framework and information sharing
  • Client content-based attacks
  • Web server attacks

Detailed, authoritative coverage Introduction to Ethical Disclosure; Ethics of Ethical Hacking; Ethical Hacking and the Legal System; Proper and Ethical Disclosure; Penetration Testing and Tools; Social Engineering Attacks; Physical Attacks; Insider Attacks; Using BackTrack LiveCD Linux Distribution; Using Metasploit; Dradis and Managing a Pen Test; Exploiting; Progamming SProgrammingills; Basic Linux Exploits; Advanced Linux Exploits; Shellcode Strategies; Writing Linux Shell Code; Basic Windows Exploits; Client Content Based Attacks; Web Server Attacks; VoIP Attacks; SCADA Attacks; Vulnerability Analysis; Passive Analysis; Advanced Static Analysis with IDA Pro; Advanced Reverse Engineering; Client-Side Browser Exploits; Exploiting Windows Access Control Model; Intelligent Fuzzing with Sulley; From Vulnerability to Exploit; Closing the Holes: Mitigation Techniques; Malware Analysis; Collecting Malware and Initial Analysis; Hacking Malware

Price: $60.00

Click here to buy from Amazon

/* */