Amazon Price: $105.00 (as of August 2, 2020 14:13 –
Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop data mining tools for malware detection. Integrating theory with practical techniques and experimental results, it focuses on malware detection applications for email worms, malicious code, remote exploits, and botnets.
The authors describe the systems they have designed and developed: email worm detection using data mining, a scalable multi-level feature extraction technique to detect malicious executables, detecting remote exploits using data mining, and flow-based identification of botnet traffic by mining multiple log files. For each of these tools, they detail the system architecture, algorithms, performance results, and limitations.
Continue reading “Data Mining Tools for Malware Detection”
Amazon Price: $9.99 (as of August 2, 2020 13:57 –
Have you been hacked yet? You're next! The chances are you will be attacked, soon. This book shows you how you'll be targeted, and what you will hopefully do to prevent it. One in five people have already been hacked, and 25 million more are defrauded every year. You read about it in the news; emails from your bank, "Change your password! Use a VPN! Verify your account details!" These tiny cyber-attacks are typically interstate or international, and never prosecuted. Identities, credit cards, titles, even actual lives are stolen and traded online. Victims rarely find out until it's far too late, and then they are faced with a long, uphill battle. These people never fully recover from the assault. Cybercrime is rampant and just getting worse- the nation just doesn't have the resources to combat it. The federal hiring focus is on cyber-agents: they need more whitehat hackers to investigate and prevent these attacks. Meanwhile, every second another helpless victim is snared in the US alone. How does this happen? Who can do this? You can. Anybody can! It's easy, but we're lured into believing otherwise. This concise manual describes the simplicity of committing digital fraud. Knowledge is power; the last thing the FBI needs is more pressure to fix something they can't. Our ignorance and complacency is the underlying problem. The author seeks to change that. Take a few minutes and try on the black hat! Find out for yourself what it feels like, and learn how to protect yourself from online villains. Each chapter is designed to illustrate ease, simplicity, and security. A wide swath of topics introduce the reader to the hacker tools and methods of attack. Bitcoin transactions are described from start to finish, which is an essential component of Darknet purchases and money laundering. Secure communications and online privacy tactics are highlighted to enable further research (if desired). Many of the weaknesses in our online structures exploited by today's cyber-criminals are revealed within, and various means to defend yourself are spelled out. Links and references are included throughout to hold the reader's hand and expand their opportunities (should you feel the desire). Warning: hard truths within. This may shake you up (at least) a little.
Amazon Price: $28.99 (as of August 2, 2020 14:00 –
This much-anticipated revision, written by the ultimate group of top security experts in the world, features 40 percent new content on how to find security holes in any operating system or application New material addresses the many new exploitation techniques that have been discovered since the first edition, including attacking "unbreakable" software packages such as McAfee's Entercept, Mac OS X, XP, Office 2003, and Vista Also features the first-ever published information on exploiting Cisco's IOS, with content that has never before been explored The companion Web site features downloadable code files
Amazon Price: $54.99 $36.49 You save: $18.50 (34%) (as of August 3, 2020 09:37 –
Peter Szor takes you behind the scenes of anti-virus research, showing howthey are analyzed, how they spread, and–most importantly–how to effectivelydefend against them. This book offers an encyclopedic treatment of thecomputer virus, including: a history of computer viruses, virus behavior,classification, protection strategies, anti-virus and worm-blocking techniques,and how to conduct an accurate threat analysis. The Art of Computer VirusResearch and Defense entertains readers with its look at anti-virus research, butmore importantly it truly arms them in the fight against computer viruses.As one of the lead researchers behind Norton AntiVirus, the most popularantivirus program in the industry, Peter Szor studies viruses every day. Byshowing how viruses really work, this book will help security professionals andstudents protect against them, recognize them, and analyze and limit thedamage they can do.
Amazon Price: $35.00 (as of August 2, 2020 14:00 –
Forget everything you know about crime, war and espionage in cyberspace. Walking Wounded takes the layman to seasoned professional on an insider’s journey through the secret history, technologies, and strategies surrounding war and espionage in cyberspace. Walking Wounded is not another hacking book. It takes the reader behind the scenes and recounts the story of the Pentagon’s love affair with technology, and how this reliance makes them vulnerable to hackers. It explains how foreign intelligence services, criminals, and amateur hackers have compromised our sensitive systems for three decades, while our government hackers are running rampant through foreign information systems. And it explains how our national policies have made us all less secure. Walking Wounded gives the reader the tools to get beyond the hype, mythologies, and marketing and understand what President Obama called, “The most serious threat to out national security.”