Amazon Price: $42.74 (as of July 28, 2017 06:12 –
Practice the Computer Security Skills You Need to Succeed! 40+ lab exercises challenge you to solve problems based on realistic case studies Step-by-step scenarios require you to think critically Lab analysis tests measure your understanding of lab results Lab analysis tests measure your understanding of lab results Key term quizzes help build your vocabulary
In this Lab Manual, you'll practice Configuring workstation network connectivity Analyzing network communication Establishing secure network application communication using TCP/IP protocols Penetration testing with Nmap, metasploit, password cracking, Cobalt Strike, and other tools Defending against network application attacks, including SQL injection, web browser exploits, and email attacks Combatting Trojans, man-in-the-middle attacks, and steganography Hardening a host computer, using antivirus applications, and configuring firewalls Securing network communications with encryption, secure shell (SSH), secure copy (SCP), certificates, SSL, and IPsec Preparing for and detecting attacks Backing up and restoring data Handling digital forensics and incident response
Amazon Price: N/A (as of July 28, 2017 08:05 –
Featuring complete details on an unparalleled number of hacking exploits, this bestselling computer security book is fully updated to cover the latest attack types—and how to proactively defend against them.
Anti-Hacker Toolkit, Fourth Edition is an essential aspect of any security professional's anti-hacking arsenal. It helps you to successfully troubleshoot the newest, toughest hacks yet seen. The book is grounded in real-world methodologies, technical rigor, and reflects the author's in-the-trenches experience in making computer technology usage and deployments safer and more secure for both businesses and consumers. The new edition covers all-new attacks and countermeasures for advanced persistent threats (APTs), infrastructure hacks, industrial automation and embedded devices, wireless security, the new SCADA protocol hacks, malware, web app security, social engineering, forensics tools, and more.
Continue reading “Anti-Hacker Tool Kit, Fourth Edition”
Amazon Price: $27.00 $7.44 You save: $19.56 (72%). (as of July 28, 2017 05:40 –
From the publishers of BattleBots: The Official Guide comes this do-it-yourself guide to BEAM (Biology, Electronics, Aesthetics, Mechanics) robots. They're cheap, simple, and can be built by beginners in just a few hours, with help from this expert guide complete with full-color photos. Get ready for some dumpster-diving!
Amazon Price: $65.00 $8.99 You save: $56.01 (86%). (as of July 28, 2017 01:55 –
A one-of-a-kind guide to setting up a malware research lab, using cutting-edge analysis tools, and reporting the findings
Advanced Malware Analysis is a critical resource for every information security professional's anti-malware arsenal. The proven troubleshooting techniques will give an edge to information security professionals whose job involves detecting, decoding, and reporting on malware.
After explaining malware architecture and how it operates, the book describes how to create and configure a state-of-the-art malware research lab and gather samples for analysis. Then, you’ll learn how to use dozens of malware analysis tools, organize data, and create metrics-rich reports. A crucial tool for combatting malware—which currently hits each second globally Filled with undocumented methods for customizing dozens of analysis software tools for very specific uses Leads you through a malware blueprint first, then lab setup, and finally analysis and reporting activities Every tool explained in this book is available in every country around the world
Amazon Price: $14.00 $14.00 (as of July 27, 2017 23:49 –
Take a fascinating and provocative look at cyber crime and warfare
In Cyber Crime & Warfare: All That Matters, Peter Warren and Michael Streeter outline the history, scale and importance of cyber crime. In particular they show how cyber crime, cyber espionage, and cyber warfare now pose a major threat to society. The authors describe how criminal gangs and rogue states have since moved into the online arena with devastating effect at a time when the modern world–including all the communication services and utilities we have come to take for granted–has become utterly dependent on computers and the internet.
Inside you will find:> A 100 Ideas section that offers original and inspirational ideas to help readers explore the subject in more depth Weblinks and QR codes throughout the text, linking to videos from the author, or more detailed audio explanations Helpful text boxes around key concepts that make navigating through the material a snap