Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance

Rating: 
Amazon Price: $80.00 $55.68 You save: $24.32 (30%). (as of July 20, 2019 17:05 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Identify, mitigate, and respond to network attacks Understand the evolution of security technologies that make up the unified ASA device and how to install the ASA hardware Examine firewall solutions including network access control, IP routing, AAA, application inspection, virtual firewalls, transparent (Layer 2) firewalls, failover and redundancy, and QoS Evaluate Intrusion Prevention System (IPS) solutions including IPS integration and Adaptive Inspection and Prevention Security Services Module (AIP-SSM) configuration Deploy VPN solutions including site-to-site IPsec VPNs, remote- access VPNs, and Public Key Infrastructure (PKI) Learn to manage firewall, IPS, and VPN solutions with Adaptive Security Device Manager (ASDM)

Achieving maximum network security is a challenge for most organizations. Cisco® ASA, a new unified security device that combines firewall, network antivirus, intrusion prevention, and virtual private network (VPN) capabilities, provides proactive threat defense that stops attacks before they spread through the network.
Continue reading “Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance”

Malware Forensics Field Guide for Linux Systems: Digital Forensics Field Guides

Rating: 
Amazon Price: $59.95 $50.35 You save: $9.60 (16%). (as of July 20, 2019 17:00 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The Syngress Digital Forensics Field Guides series includes companions for any digital and computer forensic investigator and analyst. Each book is a "toolkit" with checklists for specific tasks, case studies of difficult situations, and expert analyst tips. This compendium of tools for computer forensics analysts and investigators is presented in a succinct outline format with cross-references to supplemental appendices. It is designed to provide the digital investigator clear and concise guidance in an easily accessible format for responding to an incident or conducting analysis in a lab.

*A condensed hand-held guide complete with on-the-job tasks and checklists
*Specific for Linux-based systems where new malware is developed everday
*Authors are world-renowned leaders in investigating and analyzing malicious code

Honeypots: Tracking Hackers

Rating: 
Amazon Price: $44.99 $25.37 You save: $19.62 (44%). (as of July 20, 2019 02:33 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Honeypots are highly sophisticated technologies used to observe and learn about hackers. Practical and commercial interest in these new forms of hacker defense is now hitting the mainstream. There are many successful commercial honeypots, including ManTrap and Specter. Security expert Marcus Ranum notes in his Foreword, "Right now there are about a half-dozen commercial honeypot products on the market. Within a year, I predict there will be dozens. Within two years, there will be a hundred." Spitzner also covers legal issues, one of the most controversial subjects concerning honeypots, receiving extensive guidance from the Department of Justice in writing the legal material. The book, Know Your Enemy was written by a team of authors, and focuses on a special type of honeypot via a research project called The Honeynet Project. This new book is written by the acknowledged honeypot expert and discusses many different types of honeypot technologies. They are perfect companion books. Get a strong foundation with "Honeypots" and explore more details of honeypot deployment with Know Your Enemy.

Android Malware and Analysis

Rating: 
Amazon Price: N/A (as of July 20, 2019 06:07 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

The rapid growth and development of Android-based devices has resulted in a wealth of sensitive information on mobile devices that offer minimal malware protection. This has created an immediate need for security professionals that understand how to best approach the subject of Android malware threats and analysis.

In Android Malware and Analysis, Ken Dunham, renowned global malware expert and author, teams up with international experts to document the best tools and tactics available for analyzing Android malware. The book covers both methods of malware analysis: dynamic and static.
Continue reading “Android Malware and Analysis”

Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier

Rating: 
Amazon Price: $25.00 $20.07 You save: $4.93 (20%). (as of July 20, 2019 09:58 – Details). Product prices and availability are accurate as of the date/time indicated and are subject to change. Any price and availability information displayed on the Amazon site at the time of purchase will apply to the purchase of this product.

Suelette Dreyfus and her co-author, WikiLeaks founder Julian Assange, tell the extraordinary true story of the computer underground, and the bizarre lives and crimes of an elite ring of international hackers who took on the establishment.

Spanning three continents and a decade of high level infiltration, they created chaos amongst some of the world's biggest and most powerful organisations, including NASA and the US military. Brilliant and obsessed, many of them found themselves addicted to hacking and phreaking. Some descended into drugs and madness, others ended up in jail.
Continue reading “Underground: Tales of Hacking, Madness and Obsession on the Electronic Frontier”